From 089ae7d759c89ac1c31bc6f325b6566efd6a9375 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 8 Mar 2019 10:29:13 -0800 Subject: [PATCH 001/303] Create surface-system-sku-reference --- devices/surface/surface-system-sku-reference | 57 ++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 devices/surface/surface-system-sku-reference diff --git a/devices/surface/surface-system-sku-reference b/devices/surface/surface-system-sku-reference new file mode 100644 index 0000000000..cfd587e1ff --- /dev/null +++ b/devices/surface/surface-system-sku-reference @@ -0,0 +1,57 @@ +--- +title: Surface System SKU reference +description: This topic explains how to use the Surface Diagnostic Toolkit for Business. +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +author: coveminer +ms.author: v-jokai +ms.topic: article +ms.date: 03/08/2019 +--- +# System SKU Reference +This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, + +System SKU is a variable (along with System Model and others) stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. Use the System SKU name whenever you need to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced. + +| **Device** | **System Model** | **System SKU** | +| ------------------------------------------------------------ | ---------------- | -------------------------------- | +| Surface 3 WiFI | Surface 3 | Surface_3 | +| Surface 3 LTE AT&T | Surface 3 | Surface_3_US1 | +| Surface 3 LTE Verizon | Surface 3 | Surface_3_US2 | +| Surface 3 LTE North America | Surface 3 | Surface_3_NAG | +| Surface 3 LTE Outside of North America and T-Mobile In Japan | Surface 3 | Surface_3_ROW | +| Surface Pro | Surface Pro | Surface_Pro_1796 | +| Surface Pro with LTE Advanced | Surface Pro | Surface_Pro_1807 | +| Surface Book 2 13inch | Surface Book 2 | Surface_Book_1832 | +| Surface Book 2 15inch | Surface Book 2 | Surface_Book_1793 | +| Surface Go Consumer | Surface Go | Surface_Go_1824_Consumer | +| Surface Go Commercial | Surface Go | Surface_Go_1824_Commercial | +| Surface Pro 6 Consumer | Surface Pro 6 | Surface_Pro_6_1796_Consumer | +| Surface Pro 6 Commercial | Surface Pro 6 | Surface_Pro_6_1796_Commercial | +| Surface Laptop 2 Consumer | Surface Laptop 2 | Surface_Laptop_2_1769_Consumer | +| Surface Laptop 2 Commercial | Surface Laptop 2 | Surface_Laptop_2_1769_Commercial | + +## Examples + +**PowerShell** + Use the following PowerShell command to pull System SKU: + + gwmi -namespace root\wmi -class MS_SystemInformation | select SystemSKU + +**System Information** +You can also find the System SKU and System Model for a device in System Information. +Click **Start** > **MSInfo32**. + +One example of how you could use this in Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager is part of a Task Sequence WMI Condition. For example: + +**Task Sequence WMI Condition** + + - WMI Namespace – Root\WMI + - WQL Query – SELECT * FROM MS_SystemInformation WHERE SystemSKU = "Surface_Pro_1796" + + + + + + From 1f018bc34fca88edb5d66853b8bfb2dbbe1b9777 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 8 Mar 2019 10:37:02 -0800 Subject: [PATCH 002/303] Rename surface-system-sku-reference to surface-system-sku-reference.md --- ...rface-system-sku-reference => surface-system-sku-reference.md} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename devices/surface/{surface-system-sku-reference => surface-system-sku-reference.md} (100%) diff --git a/devices/surface/surface-system-sku-reference b/devices/surface/surface-system-sku-reference.md similarity index 100% rename from devices/surface/surface-system-sku-reference rename to devices/surface/surface-system-sku-reference.md From 0b3db62aa91a16362d1164f923a791e41f6a1a3d Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 8 Mar 2019 10:38:54 -0800 Subject: [PATCH 003/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index cfd587e1ff..3eae1b37d3 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -1,6 +1,6 @@ --- title: Surface System SKU reference -description: This topic explains how to use the Surface Diagnostic Toolkit for Business. +description: This topic provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -10,7 +10,7 @@ ms.topic: article ms.date: 03/08/2019 --- # System SKU Reference -This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, +This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, and related tools. System SKU is a variable (along with System Model and others) stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. Use the System SKU name whenever you need to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced. From dcffb889ad0fea037d36b12203e30200a7f9fc36 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 8 Mar 2019 10:39:22 -0800 Subject: [PATCH 004/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 3eae1b37d3..95e42ceb79 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -9,7 +9,7 @@ ms.author: v-jokai ms.topic: article ms.date: 03/08/2019 --- -# System SKU Reference +# Surface System SKU Reference This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, and related tools. System SKU is a variable (along with System Model and others) stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. Use the System SKU name whenever you need to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced. From 9de1b40a4e447afbd6c66346c440668d11989f7c Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 8 Mar 2019 11:02:28 -0800 Subject: [PATCH 005/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 95e42ceb79..53be5900e4 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -10,7 +10,7 @@ ms.topic: article ms.date: 03/08/2019 --- # Surface System SKU Reference -This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, and related tools. +This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, or related tools. System SKU is a variable (along with System Model and others) stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. Use the System SKU name whenever you need to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced. From e4bedee256c10839e4091a018f54314709f00994 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:17:57 -0700 Subject: [PATCH 006/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 53be5900e4..ef6ed99246 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -7,7 +7,7 @@ ms.sitesec: library author: coveminer ms.author: v-jokai ms.topic: article -ms.date: 03/08/2019 +ms.date: 03/12/2019 --- # Surface System SKU Reference This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, or related tools. From 93797c979a6e06183d8cf91a305312fcb314e7eb Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:19:27 -0700 Subject: [PATCH 007/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index ef6ed99246..19f88a0fe2 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -34,14 +34,14 @@ System SKU is a variable (along with System Model and others) stored in System M ## Examples -**PowerShell** +### **PowerShell** Use the following PowerShell command to pull System SKU: gwmi -namespace root\wmi -class MS_SystemInformation | select SystemSKU -**System Information** +### **System Information** You can also find the System SKU and System Model for a device in System Information. -Click **Start** > **MSInfo32**. +- Click **Start** > **MSInfo32**. One example of how you could use this in Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager is part of a Task Sequence WMI Condition. For example: From 58b5922fbc870e47166fc4f60cbab62e5f8150ab Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:20:29 -0700 Subject: [PATCH 008/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 19f88a0fe2..c888085bdd 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -43,9 +43,10 @@ System SKU is a variable (along with System Model and others) stored in System M You can also find the System SKU and System Model for a device in System Information. - Click **Start** > **MSInfo32**. -One example of how you could use this in Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager is part of a Task Sequence WMI Condition. For example: -**Task Sequence WMI Condition** + +### **Task Sequence WMI Condition** +One example of how you could use this in Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager is part of a Task Sequence WMI Condition. For example: - WMI Namespace – Root\WMI - WQL Query – SELECT * FROM MS_SystemInformation WHERE SystemSKU = "Surface_Pro_1796" From 210c73214963b7b44507f4379161bf4f465cde68 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:20:52 -0700 Subject: [PATCH 009/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index c888085bdd..508e531da7 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -34,7 +34,7 @@ System SKU is a variable (along with System Model and others) stored in System M ## Examples -### **PowerShell** +### PowerShell Use the following PowerShell command to pull System SKU: gwmi -namespace root\wmi -class MS_SystemInformation | select SystemSKU From b44d4d1a1f2291e08066f7f62f00fd4c2ec7230c Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:25:43 -0700 Subject: [PATCH 010/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 508e531da7..ee97f889e3 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -32,21 +32,19 @@ System SKU is a variable (along with System Model and others) stored in System M | Surface Laptop 2 Consumer | Surface Laptop 2 | Surface_Laptop_2_1769_Consumer | | Surface Laptop 2 Commercial | Surface Laptop 2 | Surface_Laptop_2_1769_Commercial | -## Examples +## Using System SKU variables ### PowerShell - Use the following PowerShell command to pull System SKU: +Use the following PowerShell command to System SKU information: gwmi -namespace root\wmi -class MS_SystemInformation | select SystemSKU -### **System Information** +### System Information You can also find the System SKU and System Model for a device in System Information. - Click **Start** > **MSInfo32**. - - -### **Task Sequence WMI Condition** -One example of how you could use this in Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager is part of a Task Sequence WMI Condition. For example: +### Task Sequence WMI Condition +You can use System SKU variables in a Task Sequence WMI Condition in the Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager. For example: - WMI Namespace – Root\WMI - WQL Query – SELECT * FROM MS_SystemInformation WHERE SystemSKU = "Surface_Pro_1796" From b90de75c195a3d885102db0ea950c7682420153b Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:27:10 -0700 Subject: [PATCH 011/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 1 - 1 file changed, 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index ee97f889e3..64ba353212 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -35,7 +35,6 @@ System SKU is a variable (along with System Model and others) stored in System M ## Using System SKU variables ### PowerShell -Use the following PowerShell command to System SKU information: gwmi -namespace root\wmi -class MS_SystemInformation | select SystemSKU From 46c5fc81f4444eff6464a50e63a3c52f553e6495 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:27:58 -0700 Subject: [PATCH 012/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 64ba353212..38dfa9f891 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -42,7 +42,7 @@ System SKU is a variable (along with System Model and others) stored in System M You can also find the System SKU and System Model for a device in System Information. - Click **Start** > **MSInfo32**. -### Task Sequence WMI Condition +### WMI You can use System SKU variables in a Task Sequence WMI Condition in the Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager. For example: - WMI Namespace – Root\WMI From 42b1a624184497e4547f292ad595ecf3bd7ac72a Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 09:29:38 -0700 Subject: [PATCH 013/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 38dfa9f891..6553415c15 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -10,7 +10,7 @@ ms.topic: article ms.date: 03/12/2019 --- # Surface System SKU Reference -This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, or related tools. +This document provides a reference of System SKU names that you can use to quickly determine the machine state of a specific device using PowerShell, WMI, and related tools. System SKU is a variable (along with System Model and others) stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. Use the System SKU name whenever you need to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced. From 7a1e2ff0f2de4a0d6dcede158e5f386db7840a3f Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 11:25:29 -0700 Subject: [PATCH 014/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...irmware-and-drivers-for-surface-devices.md | 251 ++++-------------- 1 file changed, 48 insertions(+), 203 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 52a92a6ef7..3294b5b798 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -14,226 +14,71 @@ ms.author: jdecker ms.topic: article --- -# Download the latest firmware and drivers for Surface devices +# Deploying the latest firmware and drivers for Surface devices +Although Surface devices are typically automatically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the requisite files on the Microsoft Download Center. Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices. +## Deploying MSI files +Driver and firmware updates for Surface devices containing all required cumulative updates are available as separate MSI files packaged for specific versions of Windows 10. For example, for Surface Pro 6, there are separate MSI files for Windows 10 versions 16299, 17134, and 17763. When deploying updates to Surface devices in your organization, you need to first determine the appropriate .MSI file for the Windows version running on your target devices. -This article provides a list of the available downloads for Surface devices and links to download the drivers and firmware for your device. +## MSI file naming convention +Each .MSI file is named in accordance with a formula that begins with the product and Windows release information, followed by the Windows OS floor number and version number, and ending with the revision of version number: -As easy as it is to keep Surface device drivers and firmware up to date automatically with Windows Update, it is sometimes necessary to download and install updates manually, such as during a Windows deployment. For any situation where you need to install drivers and firmware separately from Windows Update, you can find the files available for download at the Microsoft Download Center. +- **____.msi** -On the Microsoft Download Center page for your device, you will find several files available. These files allow you to deploy drivers and firmware in various ways. You can read more about the different deployment methods for Surface drivers and firmware in [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md). + **Example:** -Driver and firmware updates for Surface devices are **cumulative updates** which provide comprehensive roundups of all of the latest files for the Surface device running that version of Windows. +- SurfacePro6_Win10_16299_1900307_0.msi : +| Product | **SurfacePro6** | +| ------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| Windows release | **Win10** | +| OS floor | **16299** | +| VERSION | **1900307**
**19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07:** Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | +| Revision of version | **0:** Signifies that it's the first release of version 1900307 and has not been re-released for any reason. | -Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices and are detailed here in this article. +Look to the **VERSION** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: ->[!NOTE] ->To simplify the process of locating drivers for your device, downloads for Surface devices have been reorganized to separate pages for each model. Bookmark the Microsoft Download Center page for your device from the links provided on this page. Many of the filenames contain a placeholder denoted with *xxxxxx*, which identifies the current version number or date of the file. -  -Recent additions to the downloads for Surface devices provide you with options to install Windows 10 on your Surface devices and update LTE devices with the latest Windows 10 drivers and firmware. +- SurfacePro6_Win10_16299_1900307_0.msi +- SurfacePro6_Win10_17134_1808507_3.msi +- SurfacePro6_Win10_17763_1808707_3.msi +The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest because its **VERSION** field has the newest build in 2019; the other files are from 2018. +## Downloading MSI files +For a complete list of all available downloadable updates, refer to the following Microsoft Support page: ->[!NOTE] ->A battery charge of 40% or greater is required before you install firmware to a Surface device. See [Microsoft Support article KB2909710](https://go.microsoft.com/fwlink/p/?LinkId=618106) for more information. +- [Download drivers and firmware for Surface](https://support.microsoft.com/en-us/help/4023482/surface-download-drivers-and-firmware-for-surface) -## Surface Laptop 2 - -Download the following updates for [Surface Laptop 2 from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57515). -* SurfaceLaptop2_Win10_XXXXX_XXXXXXX_X.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface Pro 6 - -Download the following updates for [Surface Pro 6 from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57514). - -* SurfacePro6_Win10_XXXXX_XXXXXXX_X.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface GO - -Download the following updates for [Surface GO from the Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=57439). -* SurfaceGO_Win10_17134_1802010_6.msi - Cumulative firmware and driver update package for Windows 10 - -## Surface Book 2 - -Download the following updates for [Surface Book 2 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=56261). -* SurfaceBook2_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface Laptop - -Download the following updates for [Surface Laptop from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=55489). -* SurfaceLaptop_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface Pro - -Download the following updates for [Surface Pro (Model 1796) from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=55484). - -* SurfacePro_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface Pro with LTE Advanced - -Download the following updates for [Surface Pro with LTE Advanced from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=56278). - -* SurfacePro_LTE_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface Pro 6 - -Download the following updates for [Surface Pro 6 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=57514). - -* SurfacePro6_Win10_17134_xxxxx_xxxxxx.msi - -## Surface Studio - - -Download the following updates for [Surface Studio from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=54311). - -* SurfaceStudio_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -## Surface Book - - -Download the following updates [for Surface Book from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49497). - -- SurfaceBook_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -- SurfaceBook_Win10_xxxxx_xxxxxx.zip – Cumulative firmware and driver update package for Windows 10 - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -## Surface Pro 4 - - -Download the following updates for [Surface Pro 4 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49498). - -- SurfacePro4_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -- SurfacePro4_Win10_xxxxx_xxxxxx.zip – Cumulative firmware and driver update package for Windows 10 - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -## Surface Pro 3 - - -Download the following updates [for Surface Pro 3 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=38826). - -- SurfacePro3_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -- SurfacePro3_Win10_xxxxx_xxxxxx.zip – Cumulative firmware and driver update package for Windows 10 - -- SurfacePro3_Win8x_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 8.1 Pro - -- SurfacePro3_Win8x_xxxxx_xxxxxx.zip – Cumulative firmware and driver update package for Windows 8.1 Pro - -- Surface Firmware Tool.msi – Firmware tools for UEFI management - -- Surface Pro 3 AssetTag.zip – UEFI Asset Tag management tool - -- Surface Pro 3 KB2978002.zip – Update for Quick Note-Taking Experience feature in Windows 8.1 - -- Windows8.1-KB2969817-x64.msu – Fixes an issue that causes Surface devices to reboot twice after firmware updates are installed on all supported x64-based versions of Windows 8.1 - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -## Surface 3 - - -Download the following updates [for Surface 3 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49040). - -- Surface3_WiFi_Win10_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 10 - -- Surface3_WiFi_Win10_xxxxx_xxxxxx.zip – Cumulative firmware and driver update package for Windows 10 - -- Surface3_WiFi_Win8x_xxxxx_xxxxxx.msi – Cumulative firmware and driver update package for Windows 8.1 Pro - -- Surface3_WiFi_Win8x_xxxxx_xxxxxx.zip – Cumulative firmware and driver update package for Windows 8.1 Pro - -- Surface 3 AssetTag.zip – UEFI Asset Tag management tool - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -## Surface 3 LTE - - -Download the following updates [for AT&T 4G LTE versions of Surface 3 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49039). - -- Surface3_4GLTE-ATT_Win10_xxxxx_xxxxxx.msi – Surface 3 LTE AT&T - Cumulative firmware and driver update for locked carrier dependent AT&T devices in the US, running Windows 10 - -- Surface3_4GLTE-ATT_Win10_xxxxx_xxxxxx.zip – Surface 3 LTE AT&T - Cumulative firmware and driver update for locked carrier dependent AT&T devices in the US, running Windows 10 - -- Surface3_4GLTE-ATT_Win8x_xxxxx_xxxxxx.msi – Surface 3 LTE AT&T - Cumulative firmware and driver update for locked carrier dependent AT&T devices in the US, running Windows 8.1 Pro - -- Surface3_4GLTE-ATT_Win8x_xxxxx_xxxxxx.zip – Surface 3 LTE AT&T - Cumulative firmware and driver update for locked carrier dependent AT&T devices in the US, running Windows 8.1 Pro - -- Surface 3 AssetTag.zip – UEFI Asset Tag management tool - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -Download the following updates [for non-AT&T 4G LTE versions of Surface 3 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49037). - -- Surface3_4GLTE-NorthAmericaUnlocked_Win10_xxxxx_xxxxxx.msi – Surface 3 LTE North America - Cumulative firmware and driver update for unlocked carrier independent devices in the US, running Windows 10 - -- Surface3_4GLTE-NorthAmericaUnlocked_Win10_xxxxx_xxxxxx.zip – Surface 3 LTE North America - Cumulative firmware and driver update for unlocked carrier independent devices in the US, running Windows 10 - -- Surface3_4GLTE-NorthAmericaUnlocked_Win8x_xxxxx_xxxxxx.msi – Surface 3 LTE North America - Cumulative firmware and driver update for unlocked carrier independent devices in the US, running Windows 8.1 Pro - -- Surface3_4GLTE-NorthAmericaUnlocked_Win8x_xxxxx_xxxxxx.zip – Surface 3 LTE North America - Cumulative firmware and driver update for unlocked carrier independent devices in the US, running Windows 8.1 Pro - -- Surface 3 AssetTag.zip – UEFI Asset Tag management tool - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -Download the following updates [for 4G LTE Surface 3 versions for regions outside North America from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49041). - -- Surface3_4GLTE-RestOfTheWorld_Win10_xxxxx_xxxxxx.msi – Surface 3 LTE rest of the world cumulative - Cumulative firmware and driver update for carrier independent devices outside of the US, as well as for Japan, running Windows 10 - -- Surface3_4GLTE-RestOfTheWorld_Win10_xxxxx_xxxxxx.zip – Surface 3 LTE rest of the world cumulative - Cumulative firmware and driver update for carrier independent devices outside of the US, as well as for Japan, running Windows 10 - -- Surface3_4GLTE-RestOfTheWorld_Win8x_xxxxx_xxxxxx.msi – Surface 3 LTE rest of the world cumulative - Cumulative firmware and driver update for carrier independent devices outside of the US, as well as for Japan, running Windows 8.1 Pro - -- Surface3_4GLTE-RestOfTheWorld_Win8x_xxxxx_xxxxxx.zip – Surface 3 LTE rest of the world cumulative - Cumulative firmware and driver update for carrier independent devices outside of the US, as well as for Japan, running Windows 8.1 Pro - -- Surface 3 AssetTag.zip – UEFI Asset Tag management tool - -- Wintab-xxxxx-64-bit.zip – Tablet driver update for all supported x64-based versions of Windows 8.1 - -## Surface Pro 2 - - -Download the following updates [for Surface Pro 2 from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49042). - -- SurfacePro2\_Win10\_xxxxxx.zip – Cumulative firmware and driver update package for Windows 10 - -- SurfacePro2\_Win8x\_xxxxxx.zip – Cumulative firmware and driver update package for Windows 8.1 Pro - -- Surface Ethernet Adapter.zip – x64 Ethernet adapter drivers - -- Surface Gigabit Ethernet Adapter.zip – x64 Ethernet adapter drivers - -- Windows8.1-KB2969817-x64.msu – Fixes an issue that causes Surface devices to reboot twice after firmware updates are installed on all supported x64-based versions of Windows 8.1 - -## Surface Pro - - -Download the following updates [for Surface Pro (Model 1514) from the Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=49038). - -- SurfacePro\_Win10\_xxxxxx.zip – Cumulative firmware and driver update package for Windows 10 - -- Surface Pro 1 - xxxxxx.zip – Cumulative firmware and driver update package for Windows 8.1 Pro - -- Surface Ethernet Adapter.zip – x64 Ethernet adapter drivers - -- Surface Gigabit Ethernet Adapter.zip – x64 Ethernet adapter drivers - -- Windows8.1-KB2969817-x64.msu – Fixes an issue that causes Surface devices to reboot twice after firmware updates are installed on all supported x64-based versions of Windows 8.1 - -## Surface devices with Windows RT +The following MSI files are available: +-Surface Laptop 2 +-Surface Pro 6 +-Surface Go +-Surface Go with LTE Advanced +-Surface Book 2 +-Surface Laptop +-Surface Pro +-Surface Pro with LTE Advanced +-Surface Pro 6 +-Surface Studio +-Surface Studio 2 +-Surface Book +-Surface Pro 4 +-Surface Pro 3 +-Surface 3 +-Surface 3 LTE +-Surface Pro 2 +-Surface Pro +[!NOTE] There are no downloadable firmware or driver updates available for Surface devices with Windows RT, including Surface RT and Surface 2. Updates can only be applied using Windows Update. -If you have additional questions on the driver pack and updates, please contact [Microsoft Surface support for business](https://www.microsoft.com/surface/support/business). +For more information about deploying Surface drivers and firmware, refer to: + +- [Manage Surface driver and firmware updates](https://docs.microsoft.com/en-us/surface/manage-surface-pro-3-firmware-updates). + +- [Microsoft Surface support for business](https://www.microsoft.com/surface/support/business). -    From d6d47ce7ff2dd7e49ab0783b1980fac4705a619e Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 11:27:18 -0700 Subject: [PATCH 015/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...irmware-and-drivers-for-surface-devices.md | 40 +++++++++---------- 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 3294b5b798..1f4ce2c143 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -20,7 +20,7 @@ Although Surface devices are typically automatically updated with the latest dev ## Deploying MSI files Driver and firmware updates for Surface devices containing all required cumulative updates are available as separate MSI files packaged for specific versions of Windows 10. For example, for Surface Pro 6, there are separate MSI files for Windows 10 versions 16299, 17134, and 17763. When deploying updates to Surface devices in your organization, you need to first determine the appropriate .MSI file for the Windows version running on your target devices. -## MSI file naming convention +### MSI file naming convention Each .MSI file is named in accordance with a formula that begins with the product and Windows release information, followed by the Windows OS floor number and version number, and ending with the revision of version number: - **____.msi** @@ -44,31 +44,31 @@ Look to the **VERSION** number to determine the latest files that contain the mo The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest because its **VERSION** field has the newest build in 2019; the other files are from 2018. -## Downloading MSI files +### Downloading MSI files For a complete list of all available downloadable updates, refer to the following Microsoft Support page: - [Download drivers and firmware for Surface](https://support.microsoft.com/en-us/help/4023482/surface-download-drivers-and-firmware-for-surface) The following MSI files are available: --Surface Laptop 2 --Surface Pro 6 --Surface Go --Surface Go with LTE Advanced --Surface Book 2 --Surface Laptop --Surface Pro --Surface Pro with LTE Advanced --Surface Pro 6 --Surface Studio --Surface Studio 2 --Surface Book --Surface Pro 4 --Surface Pro 3 --Surface 3 --Surface 3 LTE --Surface Pro 2 --Surface Pro +- Surface Laptop 2 +- Surface Pro 6 +- Surface Go +- Surface Go with LTE Advanced +- Surface Book 2 +- Surface Laptop +- Surface Pro +- Surface Pro with LTE Advanced +- Surface Pro 6 +- Surface Studio +- Surface Studio 2 +- Surface Book +- Surface Pro 4 +- Surface Pro 3 +- Surface 3 +- Surface 3 LTE +- Surface Pro 2 +- Surface Pro [!NOTE] There are no downloadable firmware or driver updates available for Surface devices with Windows RT, including Surface RT and Surface 2. Updates can only be applied using Windows Update. From 39d6c3a394ebdc0440cd683d99f1810db47725af Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:05:43 -0700 Subject: [PATCH 016/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...irmware-and-drivers-for-surface-devices.md | 35 ++++++++++--------- 1 file changed, 19 insertions(+), 16 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 1f4ce2c143..ff534fe286 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -18,23 +18,25 @@ ms.topic: article Although Surface devices are typically automatically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the requisite files on the Microsoft Download Center. Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices. ## Deploying MSI files -Driver and firmware updates for Surface devices containing all required cumulative updates are available as separate MSI files packaged for specific versions of Windows 10. For example, for Surface Pro 6, there are separate MSI files for Windows 10 versions 16299, 17134, and 17763. When deploying updates to Surface devices in your organization, you need to first determine the appropriate .MSI file for the Windows version running on your target devices. -### MSI file naming convention -Each .MSI file is named in accordance with a formula that begins with the product and Windows release information, followed by the Windows OS floor number and version number, and ending with the revision of version number: +Driver and firmware updates for Surface devices containing all required cumulative updates are available as separate MSI files packaged for specific versions of Windows 10. For example, for Surface Pro 6, there are separate MSI files for Windows 10 versions 16299, 17134, and 17763. +When deploying updates to Surface devices in your organization, you need to first determine the appropriate .MSI file for the Windows version running on your target devices. -- **____.msi** +**Naming convention for Surface MSI files** +Each .MSI file is named in accordance with a formula that begins with the product and Windows release information, followed by the Windows OS floor number and version number, and ending with the revision of version number: - **Example:** +Product_Windows release_Release OS floor_VERSION_Revision of version.msi -- SurfacePro6_Win10_16299_1900307_0.msi : -| Product | **SurfacePro6** | -| ------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| Windows release | **Win10** | -| OS floor | **16299** | -| VERSION | **1900307**
**19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07:** Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | -| Revision of version | **0:** Signifies that it's the first release of version 1900307 and has not been re-released for any reason. | +Example: +SurfacePro6_Win10_16299_1900307_0.msi : + +| Product | Windows release | OS floor | Version | Revision of version | +| ----------- | --------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- | +| SurfacePro6 | Win10 | 16299 | 1900307 | 0 | +| | | | **Notes**

**19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | **Notes**

Signifies that it's the first release of version 1900307 and has not been re-released for any reason. | + + Look to the **VERSION** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: @@ -42,14 +44,16 @@ Look to the **VERSION** number to determine the latest files that contain the mo - SurfacePro6_Win10_17134_1808507_3.msi - SurfacePro6_Win10_17763_1808707_3.msi -The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest because its **VERSION** field has the newest build in 2019; the other files are from 2018. +The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest because its VERSION field has the newest build in 2019; the other files are from 2018. -### Downloading MSI files +**Downloading MSI files** For a complete list of all available downloadable updates, refer to the following Microsoft Support page: + - [Download drivers and firmware for Surface](https://support.microsoft.com/en-us/help/4023482/surface-download-drivers-and-firmware-for-surface) -The following MSI files are available: + +The following MSI files are available: - Surface Laptop 2 - Surface Pro 6 @@ -68,7 +72,6 @@ The following MSI files are available: - Surface 3 - Surface 3 LTE - Surface Pro 2 -- Surface Pro [!NOTE] There are no downloadable firmware or driver updates available for Surface devices with Windows RT, including Surface RT and Surface 2. Updates can only be applied using Windows Update. From 0160b32f699a101ca4415ad0b60238098921a95e Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:07:10 -0700 Subject: [PATCH 017/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index ff534fe286..f9a0716473 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -34,7 +34,7 @@ SurfacePro6_Win10_16299_1900307_0.msi : | Product | Windows release | OS floor | Version | Revision of version | | ----------- | --------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- | | SurfacePro6 | Win10 | 16299 | 1900307 | 0 | -| | | | **Notes**

**19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | **Notes**

Signifies that it's the first release of version 1900307 and has not been re-released for any reason. | +| | | | **19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | Signifies that it's the first release of version 1900307 and has not been re-released for any reason. | Look to the **VERSION** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: From b6ff8a5f77e400f9908aa3e2ff84073b69bec225 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:09:09 -0700 Subject: [PATCH 018/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...-the-latest-firmware-and-drivers-for-surface-devices.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index f9a0716473..586e7f8540 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -18,16 +18,15 @@ ms.topic: article Although Surface devices are typically automatically updated with the latest device drivers and firmware via Windows Update, sometimes it's necessary to download and install updates manually, such as during a Windows deployment. If you need to install drivers and firmware separately from Windows Update, you can find the requisite files on the Microsoft Download Center. Installation files for administrative tools, drivers for accessories, and updates for Windows are also available for some devices. ## Deploying MSI files - Driver and firmware updates for Surface devices containing all required cumulative updates are available as separate MSI files packaged for specific versions of Windows 10. For example, for Surface Pro 6, there are separate MSI files for Windows 10 versions 16299, 17134, and 17763. When deploying updates to Surface devices in your organization, you need to first determine the appropriate .MSI file for the Windows version running on your target devices. -**Naming convention for Surface MSI files** +### Naming convention for Surface MSI files Each .MSI file is named in accordance with a formula that begins with the product and Windows release information, followed by the Windows OS floor number and version number, and ending with the revision of version number: -Product_Windows release_Release OS floor_VERSION_Revision of version.msi +- Product_Windows release_Release OS floor_VERSION_Revision of version.msi -Example: +#### Example: SurfacePro6_Win10_16299_1900307_0.msi : From f02d14995f797e0d299bcf540926db4709fb6c70 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:10:12 -0700 Subject: [PATCH 019/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...ploy-the-latest-firmware-and-drivers-for-surface-devices.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 586e7f8540..164a3c80f2 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -24,12 +24,9 @@ When deploying updates to Surface devices in your organization, you need to firs ### Naming convention for Surface MSI files Each .MSI file is named in accordance with a formula that begins with the product and Windows release information, followed by the Windows OS floor number and version number, and ending with the revision of version number: -- Product_Windows release_Release OS floor_VERSION_Revision of version.msi - #### Example: SurfacePro6_Win10_16299_1900307_0.msi : - | Product | Windows release | OS floor | Version | Revision of version | | ----------- | --------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- | | SurfacePro6 | Win10 | 16299 | 1900307 | 0 | From eb0b9bce237c75edda779d13981d5fa04d747d10 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:12:18 -0700 Subject: [PATCH 020/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...ploy-the-latest-firmware-and-drivers-for-surface-devices.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 164a3c80f2..b052dbc0e3 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -42,10 +42,9 @@ Look to the **VERSION** number to determine the latest files that contain the mo The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest because its VERSION field has the newest build in 2019; the other files are from 2018. -**Downloading MSI files** +### Downloading MSI files For a complete list of all available downloadable updates, refer to the following Microsoft Support page: - - [Download drivers and firmware for Surface](https://support.microsoft.com/en-us/help/4023482/surface-download-drivers-and-firmware-for-surface) From c908797c3a3fd8fc8483f2a0301159207dc41736 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:15:04 -0700 Subject: [PATCH 021/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index b052dbc0e3..5bfd03e705 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -43,7 +43,7 @@ Look to the **VERSION** number to determine the latest files that contain the mo The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest because its VERSION field has the newest build in 2019; the other files are from 2018. ### Downloading MSI files -For a complete list of all available downloadable updates, refer to the following Microsoft Support page: +To download MSI files, refer to the following Microsoft Support page: - [Download drivers and firmware for Surface](https://support.microsoft.com/en-us/help/4023482/surface-download-drivers-and-firmware-for-surface) From aafdf85d29ffd915e825d63df7287aeb8bbe0f5f Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:21:58 -0700 Subject: [PATCH 022/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 5bfd03e705..44bf9343ab 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -30,7 +30,7 @@ SurfacePro6_Win10_16299_1900307_0.msi : | Product | Windows release | OS floor | Version | Revision of version | | ----------- | --------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- | | SurfacePro6 | Win10 | 16299 | 1900307 | 0 | -| | | | **19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | Signifies that it's the first release of version 1900307 and has not been re-released for any reason. | +| | | | Indicates key date and sequence information.
**19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | Indicates release history of the MSI file. In this example, **0** shows it's the first release of version 1900307 and has not been re-released for any reason. | Look to the **VERSION** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: From b931b11ebdbd71db66bfb7a2daee9e8e62795146 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:28:22 -0700 Subject: [PATCH 023/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...latest-firmware-and-drivers-for-surface-devices.md | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index 44bf9343ab..a4c5402497 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -26,13 +26,12 @@ Each .MSI file is named in accordance with a formula that begins with the produc #### Example: SurfacePro6_Win10_16299_1900307_0.msi : - -| Product | Windows release | OS floor | Version | Revision of version | -| ----------- | --------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- | -| SurfacePro6 | Win10 | 16299 | 1900307 | 0 | -| | | | Indicates key date and sequence information.
**19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | Indicates release history of the MSI file. In this example, **0** shows it's the first release of version 1900307 and has not been re-released for any reason. | +| Product | Windows release | OS floor | Version | Revision of version | +| ----------- | --------------- | -------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------- | +| SurfacePro6 | Win10 | 16299 | 1900307 | 0 | +| | | | Indicates key date and sequence information | Indicates release history of the MSI file | +| | | | **19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | **0:** Signifies it's the first release of version 1900307 and has not been re-released for any reason. | - Look to the **VERSION** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: From e519eab17944880e508c3511d8ab4995cc3689e4 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:30:40 -0700 Subject: [PATCH 024/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...ploy-the-latest-firmware-and-drivers-for-surface-devices.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index a4c5402497..bc3a2d4be0 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -26,7 +26,8 @@ Each .MSI file is named in accordance with a formula that begins with the produc #### Example: SurfacePro6_Win10_16299_1900307_0.msi : -| Product | Windows release | OS floor | Version | Revision of version | + +| Product | Windows release | OS floor | Version | Revision of version | | ----------- | --------------- | -------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------- | | SurfacePro6 | Win10 | 16299 | 1900307 | 0 | | | | | Indicates key date and sequence information | Indicates release history of the MSI file | From d24491c86b56742ab35edf62dc547cc6f5e77f24 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 12 Mar 2019 12:34:28 -0700 Subject: [PATCH 025/303] Update deploy-the-latest-firmware-and-drivers-for-surface-devices.md --- ...eploy-the-latest-firmware-and-drivers-for-surface-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index bc3a2d4be0..ea01c94076 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -33,7 +33,7 @@ SurfacePro6_Win10_16299_1900307_0.msi : | | | | Indicates key date and sequence information | Indicates release history of the MSI file | | | | | **19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | **0:** Signifies it's the first release of version 1900307 and has not been re-released for any reason. | -Look to the **VERSION** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: +Look to the **version** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: - SurfacePro6_Win10_16299_1900307_0.msi From ef9f653ad6794d92c826ab57755aa8cdd2dffa78 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 14 Mar 2019 10:14:23 -0700 Subject: [PATCH 026/303] removed en-us from links and excessive spacing in table --- ...est-firmware-and-drivers-for-surface-devices.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md index ea01c94076..1fd6b06754 100644 --- a/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md +++ b/devices/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices.md @@ -27,11 +27,11 @@ Each .MSI file is named in accordance with a formula that begins with the produc #### Example: SurfacePro6_Win10_16299_1900307_0.msi : -| Product | Windows release | OS floor | Version | Revision of version | -| ----------- | --------------- | -------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------- | -| SurfacePro6 | Win10 | 16299 | 1900307 | 0 | -| | | | Indicates key date and sequence information | Indicates release history of the MSI file | -| | | | **19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | **0:** Signifies it's the first release of version 1900307 and has not been re-released for any reason. | +| Product | Windows release | OS floor | Version | | Revision of version | +| --- | --- | --- | --- | --- | +| SurfacePro6 | Win10 | 16299 | 1900307 | 0 | +| | | | Indicates key date and sequence information | Indicates release history of the MSI file | +| | | | **19:** Signifies the year (2019)
**003**: Signifies that it’s the third release of 2019
**07**: Signifies the product version number. (Surface Pro 6 is officially the seventh version of Surface Pro.) | **0:** Signifies it's the first release of version 1900307 and has not been re-released for any reason. | Look to the **version** number to determine the latest files that contain the most recent security updates. For example, you might need to install the newest file from the following list: @@ -45,7 +45,7 @@ The first file — SurfacePro6_Win10_16299_1900307_0.msi — is the newest be ### Downloading MSI files To download MSI files, refer to the following Microsoft Support page: -- [Download drivers and firmware for Surface](https://support.microsoft.com/en-us/help/4023482/surface-download-drivers-and-firmware-for-surface) +- [Download drivers and firmware for Surface](https://support.microsoft.com/help/4023482/surface-download-drivers-and-firmware-for-surface) The following MSI files are available: @@ -73,7 +73,7 @@ There are no downloadable firmware or driver updates available for Surface devic For more information about deploying Surface drivers and firmware, refer to: -- [Manage Surface driver and firmware updates](https://docs.microsoft.com/en-us/surface/manage-surface-pro-3-firmware-updates). +- [Manage Surface driver and firmware updates](https://docs.microsoft.com/surface/manage-surface-pro-3-firmware-updates). - [Microsoft Surface support for business](https://www.microsoft.com/surface/support/business). From 10acedb6adc67affd0e1c582a84c1c49610fa336 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 19 Mar 2019 12:13:03 -0700 Subject: [PATCH 027/303] Update surface-system-sku-reference.md --- devices/surface/surface-system-sku-reference.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/surface-system-sku-reference.md index 6553415c15..c0aa8460a0 100644 --- a/devices/surface/surface-system-sku-reference.md +++ b/devices/surface/surface-system-sku-reference.md @@ -14,8 +14,8 @@ This document provides a reference of System SKU names that you can use to quick System SKU is a variable (along with System Model and others) stored in System Management BIOS (SMBIOS) tables in the UEFI layer of Surface devices. Use the System SKU name whenever you need to differentiate between devices with the same System Model name, such as Surface Pro and Surface Pro with LTE Advanced. -| **Device** | **System Model** | **System SKU** | -| ------------------------------------------------------------ | ---------------- | -------------------------------- | +| **Device**| **System Model** | **System SKU**| +| --- | ---| --- | | Surface 3 WiFI | Surface 3 | Surface_3 | | Surface 3 LTE AT&T | Surface 3 | Surface_3_US1 | | Surface 3 LTE Verizon | Surface 3 | Surface_3_US2 | From e9e7b492877b1d974778283b976e3648e76e7184 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 19 Mar 2019 12:35:23 -0700 Subject: [PATCH 028/303] Rename devices/surface/surface-system-sku-reference.md to devices/surface/documentation/surface-system-sku-reference.md --- .../surface/{ => documentation}/surface-system-sku-reference.md | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename devices/surface/{ => documentation}/surface-system-sku-reference.md (100%) diff --git a/devices/surface/surface-system-sku-reference.md b/devices/surface/documentation/surface-system-sku-reference.md similarity index 100% rename from devices/surface/surface-system-sku-reference.md rename to devices/surface/documentation/surface-system-sku-reference.md From 1ebdbb876ade472bde9bd4810d5822dedf365654 Mon Sep 17 00:00:00 2001 From: Harshitha Chidananda Murthy Date: Fri, 3 May 2019 14:03:34 -0700 Subject: [PATCH 029/303] changing DLC link --- devices/surface/assettag.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/assettag.md b/devices/surface/assettag.md index 9771aacb0d..2ce1261c1f 100644 --- a/devices/surface/assettag.md +++ b/devices/surface/assettag.md @@ -26,8 +26,8 @@ for Surface devices. It works on Surface Pro 3 and all newer Surface devices. To run Surface Asset Tag: -1. On the Surface device, download **Surface Pro 3 AssetTag.zip** from the [Microsoft Download - Center](http://www.microsoft.com/download/details.aspx?id=44076), +1. On the Surface device, download **Surface Asset Tag.zip** from the [Microsoft Download + Center](https://www.microsoft.com/en-us/download/details.aspx?id=46703), extract the zip file, and save AssetTag.exe in desired folder (in this example, C:\\assets). From 3f9c4d581f2639802de675c2075512ff15d6b56b Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 7 May 2019 14:39:07 -0700 Subject: [PATCH 030/303] stubbed out draft Surface index --- devices/surface/index-draft.md | 211 +++++++++++++++++++++++++++++++++ 1 file changed, 211 insertions(+) create mode 100644 devices/surface/index-draft.md diff --git a/devices/surface/index-draft.md b/devices/surface/index-draft.md new file mode 100644 index 0000000000..7fc6e200fe --- /dev/null +++ b/devices/surface/index-draft.md @@ -0,0 +1,211 @@ +--- +layout: HubPage +hide_bc: true +description: Office documentation for admins & IT professionals +ms.author: robmazz +author: robmazz +ms.topic: hub-page +keywords: Microsoft 365, Microsoft 365 Enterprise, Microsoft 365 documentation, Office 365, Windows 10 Enterprise, EMS, Enterprise Mobility + Security, enterprise +localization_priority: Normal +audience: microsoft-business +ms.prod: microsoft-365-enterprise +title: Microsoft 365 Enterprise documentation and resources +description: Learn about the product documentation and resources available for Microsoft 365 Enterprise IT admins, information workers, and partners. +--- +
+
+

Microsoft 365 Enterprise documentation and resources

+

Learn how to plan, deploy, and use Microsoft Office 365, Windows 10, and Enterprise Mobility + Security together in your organization. These services provide an integrated and secure infrastructure that enables teamwork and unlocks creativity.

+

+ +
+
\ No newline at end of file From bab47b84fc1b93236eb7fd1018fc58e2f829e91e Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Wed, 8 May 2019 08:57:22 -0700 Subject: [PATCH 031/303] Testing structure changes --- devices/surface/TOC-old.md | 39 +++++ devices/surface/TOC.md | 87 ++++++----- devices/surface/index-draft.md | 211 -------------------------- devices/surface/index-old.md | 63 ++++++++ devices/surface/index.md | 268 +++++++++++++++++++++++++-------- 5 files changed, 359 insertions(+), 309 deletions(-) create mode 100644 devices/surface/TOC-old.md delete mode 100644 devices/surface/index-draft.md create mode 100644 devices/surface/index-old.md diff --git a/devices/surface/TOC-old.md b/devices/surface/TOC-old.md new file mode 100644 index 0000000000..c83a77a2bd --- /dev/null +++ b/devices/surface/TOC-old.md @@ -0,0 +1,39 @@ +# [Surface](index.md) +## [Deploy Surface devices](deploy.md) +### [Windows Autopilot and Surface devices](windows-autopilot-and-surface-devices.md) +### [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsc.md) +#### [Long-Term Servicing Branch for Surface devices](ltsb-for-surface.md) +### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) +### [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md) +### [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md) +### [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md) +### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md) +#### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md) +#### [Using the Surface Deployment Accelerator deployment share](using-the-sda-deployment-share.md) +### [Maintain optimal power settings on Surface devices](maintain-optimal-power-settings-on-Surface-devices.md) +### [Battery Limit setting](battery-limit.md) +### [Surface Brightness Control](microsoft-surface-brightness-control.md) +### [Surface Asset Tag](assettag.md) +## [Surface firmware and driver updates](update.md) +### [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) +### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md) +### [Surface Dock Updater](surface-dock-updater.md) +### [Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) +## [Considerations for Surface and System Center Configuration Manager](considerations-for-surface-and-system-center-configuration-manager.md) +## [Deploy Surface app with Microsoft Store for Business](deploy-surface-app-with-windows-store-for-business.md) +## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) +## [Manage Surface UEFI settings](manage-surface-uefi-settings.md) +### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md) +### [Surface System SKU reference](surface-system-sku-reference.md) +## [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) +### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) +### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) +### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) +## [Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) +### [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) +### [Run Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) +## [Surface Data Eraser](microsoft-surface-data-eraser.md) +## [Top support solutions for Surface devices](support-solutions-surface.md) +## [Change history for Surface documentation](change-history-for-surface.md) + + diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index c83a77a2bd..549ebaa1f2 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -1,39 +1,54 @@ # [Surface](index.md) -## [Deploy Surface devices](deploy.md) -### [Windows Autopilot and Surface devices](windows-autopilot-and-surface-devices.md) -### [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsc.md) -#### [Long-Term Servicing Branch for Surface devices](ltsb-for-surface.md) -### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) -### [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md) -### [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md) -### [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md) -### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md) -#### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md) -#### [Using the Surface Deployment Accelerator deployment share](using-the-sda-deployment-share.md) -### [Maintain optimal power settings on Surface devices](maintain-optimal-power-settings-on-Surface-devices.md) -### [Battery Limit setting](battery-limit.md) -### [Surface Brightness Control](microsoft-surface-brightness-control.md) -### [Surface Asset Tag](assettag.md) -## [Surface firmware and driver updates](update.md) -### [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) -### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md) -### [Surface Dock Updater](surface-dock-updater.md) -### [Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) -## [Considerations for Surface and System Center Configuration Manager](considerations-for-surface-and-system-center-configuration-manager.md) -## [Deploy Surface app with Microsoft Store for Business](deploy-surface-app-with-windows-store-for-business.md) -## [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) -## [Manage Surface UEFI settings](manage-surface-uefi-settings.md) -### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md) -### [Surface System SKU reference](surface-system-sku-reference.md) -## [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) -### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) -### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) -### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) -## [Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) -### [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) -### [Run Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) -## [Surface Data Eraser](microsoft-surface-data-eraser.md) -## [Top support solutions for Surface devices](support-solutions-surface.md) -## [Change history for Surface documentation](change-history-for-surface.md) +## Overview +### Surface Pro Tech specs +### Surface Book Tech specs +### Surface Studio Tech specs +### Surface Go Tech specs +### Surface Laptop 2 Tech specs +## Plan +### Windows Autopilot and Surface devices +### Surface device compatibility with Windows 10 Long-Term Servicing Branch +### Long-Term Servicing Branch for Surface devices +### Wake On LAN for Surface devices +### Considerations for Surface and System Center Configuration Manager +### Deploy Surface app with Microsoft Store for Business +### Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices +### Ethernet adapters and Surface deployment + +## Deploy +### Deploy Surface devices +### Surface Deployment Accelerator +### Step by step: Surface Deployment Accelerator +### Deploy Windows 10 to Surface devices with MDT +### Upgrade Surface devices to Windows 10 with MDT +### Customize the OOBE for Surface deployments +### Using the Surface Deployment Accelerator deployment share +### Surface System SKU reference + +## Manage +### Maintain optimal power settings on Surface devices +### Battery Limit setting +### Surface Brightness Control +### Surface Asset Tag +### Surface firmware and driver updates +### Download the latest firmware and drivers for Surface devices +### Manage Surface driver and firmware updates +### Surface Dock Updater +### Use System Center Configuration Manager to manage devices with SEMM + +## Secure +### Manage Surface UEFI settings +### Advanced UEFI security features for Surface Pro 3 +### Surface Enterprise Management Mode +### Enroll and configure Surface devices with SEMM +### Unenroll Surface devices from SEMM + +## Support +### Surface Diagnostic Toolkit for Business +### Use Surface Diagnostic Toolkit for Business in desktop mode +### Run Surface Diagnostic Toolkit for Business using commands +### Surface Data Eraser +### Top support solutions for Surface devices +### Change history for Surface documentation \ No newline at end of file diff --git a/devices/surface/index-draft.md b/devices/surface/index-draft.md deleted file mode 100644 index 7fc6e200fe..0000000000 --- a/devices/surface/index-draft.md +++ /dev/null @@ -1,211 +0,0 @@ ---- -layout: HubPage -hide_bc: true -description: Office documentation for admins & IT professionals -ms.author: robmazz -author: robmazz -ms.topic: hub-page -keywords: Microsoft 365, Microsoft 365 Enterprise, Microsoft 365 documentation, Office 365, Windows 10 Enterprise, EMS, Enterprise Mobility + Security, enterprise -localization_priority: Normal -audience: microsoft-business -ms.prod: microsoft-365-enterprise -title: Microsoft 365 Enterprise documentation and resources -description: Learn about the product documentation and resources available for Microsoft 365 Enterprise IT admins, information workers, and partners. ---- -
-
-

Microsoft 365 Enterprise documentation and resources

-

Learn how to plan, deploy, and use Microsoft Office 365, Windows 10, and Enterprise Mobility + Security together in your organization. These services provide an integrated and secure infrastructure that enables teamwork and unlocks creativity.

-

- -
-
\ No newline at end of file diff --git a/devices/surface/index-old.md b/devices/surface/index-old.md new file mode 100644 index 0000000000..e559820d25 --- /dev/null +++ b/devices/surface/index-old.md @@ -0,0 +1,63 @@ +--- +title: Surface (Surface) +description: +ms.assetid: 2a6aec85-b8e2-4784-8dc1-194ed5126a04 +ms.localizationpriority: high +ms.prod: w10 +ms.mktglfcycl: manage +ms.pagetype: surface, devices +ms.sitesec: library +author: heatherpoulsen +ms.author: jdecker +ms.topic: article +ms.date: 10/16/2017 +--- + +# Surface + + +This library provides guidance to help you deploy Windows on Microsoft Surface devices, keep those devices up to date, and easily manage and support Surface devices in your organization. + +For more information on planning for, deploying, and managing Surface devices in your organization, see the [Surface TechCenter](https://technet.microsoft.com/windows/surface). + +## In this section + +| Topic | Description | +| --- | --- | +| [Deploy Surface devices](deploy.md) | Get deployment guidance for your Surface devices including information about MDT, OOBE customization, Ethernet adaptors, and Surface Deployment Accelerator. | +| [Surface firmware and driver updates](update.md) | Find out how to download and manage the latest firmware and driver updates for your Surface device. | +| [Considerations for Surface and System Center Configuration Manager](considerations-for-surface-and-system-center-configuration-manager.md) | Get guidance on how to deploy and manage Surface devices with System Center Configuration Manager. | +| [Deploy Surface app with Microsoft Store for Business](deploy-surface-app-with-windows-store-for-business.md) | Find out how to add and download Surface app with Microsoft Store for Business, as well as install Surface app with PowerShell and MDT. | +| [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) | Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. | +| [Manage Surface UEFI settings](manage-surface-uefi-settings.md) | Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. | +| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. | +| [Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) | Learn how to investigate, troubleshoot, and resolve hardware, software, and firmware issues with Surface devices. | +| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. | +| [Top support solutions for Surface devices](support-solutions-surface.md) | These are the top Microsoft Support solutions for common issues experienced using Surface devices in an enterprise. | +| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. | + + +## Learn more + +[Certifying Surface Pro 4 and Surface Book as standard devices at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/849/Certifying-Surface-Pro-4-and-Surface-Book-as-standard-devices-at-Microsoft) + + + + +  + +## Related topics + + +[Surface TechCenter](https://technet.microsoft.com/windows/surface) + +[Surface for IT pros blog](http://blogs.technet.com/b/surface/) + +  + +  + + + + + diff --git a/devices/surface/index.md b/devices/surface/index.md index e559820d25..e1bca95c9d 100644 --- a/devices/surface/index.md +++ b/devices/surface/index.md @@ -1,63 +1,207 @@ +--- +layout: HubPage +hide_bc: true +description: Surface and Surface Hub documentation for admins & IT professionals +ms.author: robmazz +author: robmazz +ms.topic: hub-page +keywords: Microsoft Surface, Microsoft Surface Hub, Surface documentation +localization_priority: Normal +audience: microsoft-business +ms.prod: microsoft-365-enterprise +title: Microsoft Surface and Surface Hub documentation and resources +description: Learn about Microsoft Surface and Surface Hub devices. --- -title: Surface (Surface) -description: -ms.assetid: 2a6aec85-b8e2-4784-8dc1-194ed5126a04 -ms.localizationpriority: high -ms.prod: w10 -ms.mktglfcycl: manage -ms.pagetype: surface, devices -ms.sitesec: library -author: heatherpoulsen -ms.author: jdecker -ms.topic: article -ms.date: 10/16/2017 ---- - -# Surface - - -This library provides guidance to help you deploy Windows on Microsoft Surface devices, keep those devices up to date, and easily manage and support Surface devices in your organization. - -For more information on planning for, deploying, and managing Surface devices in your organization, see the [Surface TechCenter](https://technet.microsoft.com/windows/surface). - -## In this section - -| Topic | Description | -| --- | --- | -| [Deploy Surface devices](deploy.md) | Get deployment guidance for your Surface devices including information about MDT, OOBE customization, Ethernet adaptors, and Surface Deployment Accelerator. | -| [Surface firmware and driver updates](update.md) | Find out how to download and manage the latest firmware and driver updates for your Surface device. | -| [Considerations for Surface and System Center Configuration Manager](considerations-for-surface-and-system-center-configuration-manager.md) | Get guidance on how to deploy and manage Surface devices with System Center Configuration Manager. | -| [Deploy Surface app with Microsoft Store for Business](deploy-surface-app-with-windows-store-for-business.md) | Find out how to add and download Surface app with Microsoft Store for Business, as well as install Surface app with PowerShell and MDT. | -| [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) | Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. | -| [Manage Surface UEFI settings](manage-surface-uefi-settings.md) | Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. | -| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. | -| [Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) | Learn how to investigate, troubleshoot, and resolve hardware, software, and firmware issues with Surface devices. | -| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. | -| [Top support solutions for Surface devices](support-solutions-surface.md) | These are the top Microsoft Support solutions for common issues experienced using Surface devices in an enterprise. | -| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. | - - -## Learn more - -[Certifying Surface Pro 4 and Surface Book as standard devices at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/849/Certifying-Surface-Pro-4-and-Surface-Book-as-standard-devices-at-Microsoft) - - - - -  - -## Related topics - - -[Surface TechCenter](https://technet.microsoft.com/windows/surface) - -[Surface for IT pros blog](http://blogs.technet.com/b/surface/) - -  - -  - - - - - +
+
+

Microsoft Surface and Surface Hub

+

Learn how to plan, deploy, and use Microsoft Surface and Surface Hub devices.

+

+ +
+
\ No newline at end of file From 64470e6bbbad6c9ab6141e05b8fab5417fbe1716 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Wed, 8 May 2019 09:32:01 -0700 Subject: [PATCH 032/303] updating hub links to relative md file links for surface section --- devices/surface/index.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface/index.md b/devices/surface/index.md index e1bca95c9d..2e0fbaf710 100644 --- a/devices/surface/index.md +++ b/devices/surface/index.md @@ -35,9 +35,9 @@ description: Learn about Microsoft Surface and Surface Hub devices.

Surface Devices

-

Plan

-

Deploy

-

Manage

+

Plan

+

Deploy

+

Manage

From 83dea4e637686037beb580bdb522b8d2fb9357c9 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Wed, 8 May 2019 09:49:33 -0700 Subject: [PATCH 033/303] testing landing page for Surface, updated links on hub --- devices/surface/get-started.md | 203 +++++++++++++++++++++++++++++++++ devices/surface/index.md | 11 +- 2 files changed, 209 insertions(+), 5 deletions(-) create mode 100644 devices/surface/get-started.md diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md new file mode 100644 index 0000000000..4a5975a122 --- /dev/null +++ b/devices/surface/get-started.md @@ -0,0 +1,203 @@ +--- +title: Content set name +description: Add a short description +services: skype-for-business-online-admin +author: samanro +manager: samanro +layout: LandingPage +ms.assetid: +ms.service: skype-for-business-online-admin +ms.tgt_pltfrm: na +ms.devlang: na +ms.topic: landing-page +ms.date: 12/13/2017 +ms.author: samanro +--- + + +
    +
  • +
    +
    +
    +
    +
    + Tools +
    +
    +
    +

    Heading

    +

    Link name

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +
    + Security +
    +
    +
    +

    Heading

    +

    Link name

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +
    + Tasks +
    +
    +
    +

    Heading

    +

    Link name

    +
    +
    +
    +
    +
  • +
+ +--- + +

Featured Articles

+
    +
  • +
    +
    +
    +
    +

    Category

    +

    Add link to article

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +

    Category

    +

    Add link to article

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +

    Category

    +

    Add link to article

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +

    Category

    +

    Add link to article

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +

    Category

    +

    Add link to article

    +
    +
    +
    +
    +
  • +
  • +
    +
    +
    +
    +

    Category

    +

    Add link to article

    +
    +
    +
    +
    +
  • +
\ No newline at end of file diff --git a/devices/surface/index.md b/devices/surface/index.md index 2e0fbaf710..692a359eed 100644 --- a/devices/surface/index.md +++ b/devices/surface/index.md @@ -35,9 +35,10 @@ description: Learn about Microsoft Surface and Surface Hub devices.

Surface Devices

-

Plan

-

Deploy

-

Manage

+

Get started

+

Plan

+

Deploy

+

Manage

@@ -89,7 +90,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
-

Surface communities

+

Communities

Surface IT Pro blog

Surface Devices Tech Community

Intune & Company Portal app

@@ -127,7 +128,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
-

Surface support solutions

+

Support solutions

Support for Surface devices

Support for Surface Hub

From db3d6235d42c46e3a9665cab3403fe2f7f45f566 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Wed, 8 May 2019 10:04:21 -0700 Subject: [PATCH 034/303] updated description on test Surface landing page --- devices/surface/get-started.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index 4a5975a122..3dd6a0ea5b 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -13,6 +13,10 @@ ms.topic: landing-page ms.date: 12/13/2017 ms.author: samanro --- +# Get Started with Surface Devices + +Harness the power of Surface, Windows, and Office connected together through the cloud. Find tools, step-by-step guides, and other resources to help you plan, deploy, and manage Surface devices in your organization. + -Connecting your Windows 10-based device to work using a deep link +Connecting your Windows 10-based device to work using a deep link

Added following deep link parameters to the table:

  • Username
  • From 3da2c6ce776de227bbcadeb7acb8e47efcea33e0 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 12 Jun 2019 14:43:55 -0700 Subject: [PATCH 150/303] Update TOC.md --- devices/surface/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index a70a5dd752..ecf5a43cb3 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -25,7 +25,7 @@ ### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) ### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) ### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) -## [Fix common Surface problems using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business-intro.md) +## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business-intro.md) ### [Deploy Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) ### [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) ### [Run Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) From 564d90047630f34fc9698a549125caa65b154c20 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 12 Jun 2019 14:50:26 -0700 Subject: [PATCH 151/303] Fixed bookmark warning --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index bfcf5c439f..3552914bb0 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1110,7 +1110,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
-Connecting your Windows 10-based device to work using a deep link +Connecting your Windows 10-based device to work using a deep link

Added following deep link parameters to the table:

  • Username
  • From 92d042b67cedeebe8513c0248593abdc69714610 Mon Sep 17 00:00:00 2001 From: Orlando Rodriguez <49177883+ojrb@users.noreply.github.com> Date: Wed, 12 Jun 2019 16:57:16 -0500 Subject: [PATCH 152/303] Update hello-adequate-domain-controllers.md --- .../hello-adequate-domain-controllers.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md b/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md index ec2f68cca1..1db75a0a5b 100644 --- a/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md +++ b/windows/security/identity-protection/hello-for-business/hello-adequate-domain-controllers.md @@ -19,10 +19,13 @@ ms.date: 08/20/2018 **Applies to** - Windows 10, version 1702 or later -- Windows Server 2019 +- Windows Server, versions 2016 and 2019 - Hybrid or On-Premises deployment - Key trust +> [!NOTE] +>There was an issue with key trust on Windows Server 2019. To fix it, refer to [KB4487044](https://support.microsoft.com/en-us/help/4487044/windows-10-update-kb4487044). + ## How many is adequate @@ -68,8 +71,7 @@ There are several conclusions here: The preceding was an example to show why it's unrealistic to have a "one-size-fits-all" number to describe what "an adequate amount" means. In the real world, authentication is not evenly distributed across domain controllers. -> [!NOTE] ->There was an issue with key trust on Windows Server 2019. To fix it, refer to [KB4487044](https://support.microsoft.com/en-us/help/4487044/windows-10-update-kb4487044). + ## Determining total AS Request load From 023fad307baab5cb271ff7a9b37b9ddb95bf1ee9 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 12 Jun 2019 15:08:45 -0700 Subject: [PATCH 153/303] fixed bookmark --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 3552914bb0..0f9b975e5d 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1110,7 +1110,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
-Connecting your Windows 10-based device to work using a deep link +Connecting your Windows 10-based device to work using a deep link

Added following deep link parameters to the table:

  • Username
  • From 2397053c22f47e7006220a7ae93b8a43c6cf51cd Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 12 Jun 2019 15:10:11 -0700 Subject: [PATCH 154/303] v1.5 --- windows/deployment/upgrade/setupdiag.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index a01e22e515..90cead2867 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -426,9 +426,9 @@ Each rule name and its associated unique rule identifier are listed with a descr - Added a rule for WinSetupBootFilter driver failures. - Added a rule for early down-level failures that occur early in the down-level phase per user request. - Overall rules processing performance is improved. - - Added registry output for info matched to: HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag + - Information is now output to the registry at **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag** - This enables Configuration Manager, Intune and Enterprise customers to query the registry on targeted systems to get SetupDiag failure information. - - This registry information will soon be integrated with the GetHelp app to help customer service agents more quickly help with update failures. + - This registry information will soon be integrated with the GetHelp app to help customer service and support agents more quickly help with update failures. - The **/AddReg** command was added to toggle registry output. This setting is **off** by default for offline mode, and **on** by default for online mode. The command has no effect for online mode and enables registry output for offline mode. - This registry key is deleted as soon as SetupDiag is run a second time, and replaced with current data, so it’s always up to date. - This registry key also gets deleted when a new update instance is invoked. From 22d912f977b3143ce08b56ecbb3a471c4a6b9fb8 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 12 Jun 2019 15:29:05 -0700 Subject: [PATCH 155/303] v1.5 --- windows/deployment/upgrade/setupdiag.md | 161 ++++-------------------- 1 file changed, 26 insertions(+), 135 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 90cead2867..8ef4005d2b 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -151,150 +151,38 @@ SetupDiag.exe /Output:C:\SetupDiag\Dumpdebug.log /LogsPath:D:\Dump ## Sample output -The following is an example where SetupDiag is run in offline mode. In this example, there is an application warning, but since setup is executed in /quiet mode so it becomes a block. Instructions to resolve the problem are provided by SetupDiag in the output. - -The output also provides an error code 0xC1900208 - 0x4000C which corresponds to a compatibility issue as documented in the [Upgrade error codes](upgrade-error-codes.md#result-codes) and [Resolution procedures](resolution-procedures.md#modern-setup-errors) topics in this article. +The following is an example where SetupDiag is run in offline mode. ``` -C:\SetupDiag>SetupDiag.exe /Output:C:\SetupDiag\Results.log /LogsPath:C:\Temp\BobMacNeill +D:\SetupDiag>SetupDiag.exe /output:c:\setupdiag\result.xml /logspath:D:\Tests\Logs\f55be736-beed-4b9b-aedf-c133536c946e /format:xml SetupDiag v1.5.0.0 Copyright (c) Microsoft Corporation. All rights reserved. -Searching for setup logs, this can take a minute or more depending on the number and size of the logs...please wait. - Found 4 setupact.logs. - Processing setupact.log at: c:\temp\bobmacneill\$WINDOWS.~BT\Sources\Panther\setupact.log - Processing setupact.log at: c:\temp\bobmacneill\Panther\setupact.log - Processing setupact.log at: c:\temp\bobmacneill\Panther\NewOs\Panther\setupact.log - Processing setupact.log at: c:\temp\bobmacneill\Panther\UnattendGC\setupact.log -Found c:\temp\bobmacneill\$WINDOWS.~BT\Sources\Panther\setupact.log with update date 03/29/2018 23:13:58 and CV: H2X+YsWL/UOkj/8X to be the correct setup log. -Gathering information from setup logs. +Searching for setup logs... +Found d:\tests\Logs\f55be736-beed-4b9b-aedf-c133536c946e\setupact_6.log with update date 6/12/2019 2:44:20 PM to be the correct setup log. +Found d:\tests\Logs\f55be736-beed-4b9b-aedf-c133536c946e\setupact_1.log with update date 6/12/2019 2:45:19 PM to be the correct rollback log. + +Gathering baseline information from setup logs... SetupDiag: processing rule: CompatScanOnly. -..No match. +...No match. -SetupDiag: processing rule: BitLockerHardblock. -..No match. +... -SetupDiag: processing rule: VHDHardblock. -..No match. +SetupDiag: processing rule: DISMImageSessionFailure. +.. +Error: SetupDiag reports DISM provider failure. +Last Phase: Safe OS +Last Operation: Apply Optional Component status +Message = Failed to get the IDismImage instance from the image session +Function: CDISMManager::CloseImageSession +Error: 0x800706ba +Recommend you re-download the update source files, reboot and try the update again. -SetupDiag: processing rule: PortableWorkspaceHardblock. -..No match. +SetupDiag found 1 matching issue. -SetupDiag: processing rule: AuditModeHardblock. -..No match. - -SetupDiag: processing rule: SafeModeHardblock. -..No match. - -SetupDiag: processing rule: InsufficientSystemPartitionDiskSpaceHardblock. -..No match. - -SetupDiag: processing rule: CompatBlockedApplicationAutoUninstall. -....No match. - -SetupDiag: processing rule: CompatBlockedApplicationDismissable. -.... - -Matching Profile found: CompatBlockedApplicationDismissable - EA52620B-E6A0-4BBC-882E-0686605736D9 -Warning: Found Application Block for: "Microsoft Endpoint Protection". -This is a dismissible message when not running setup.exe in "/quiet" mode. -Consider specifying "/compat /ignore warning" to ignore these dismissible warnings. -You must manually uninstall "Microsoft Endpoint Protection" before continuing with the installation/update, or change the command line parameters to ignore warnings. -For more information about Setup command line switches, see here: -https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-command-line-options - -SetupDiag: processing rule: CompatBlockedApplicationManualUninstall. -....No match. - -SetupDiag: processing rule: HardblockDeviceOrDriver. -....No match. - -SetupDiag: processing rule: HardblockMismatchedLanguage. -..No match. - -SetupDiag: processing rule: HardblockFlightSigning. -..No match. - -SetupDiag: processing rule: DiskSpaceBlockInDownLevel. -..No match. - -SetupDiag: processing rule: DiskSpaceFailure. -..No match. - -SetupDiag: processing rule: DebugSetupMemoryDump. -.No match. - -SetupDiag: processing rule: DebugSetupCrash. -.No match. - -SetupDiag: processing rule: DebugMemoryDump. -.No match. - -SetupDiag: processing rule: DeviceInstallHang. -..No match. - -SetupDiag: processing rule: BootFailureDetected. -.No match. - -SetupDiag: processing rule: FindDebugInfoFromRollbackLog. -.No match. - -SetupDiag: processing rule: AdvancedInstallerFailed. -..No match. - -SetupDiag: processing rule: FindMigApplyUnitFailure. -..No match. - -SetupDiag: processing rule: FindMigGatherUnitFailure. -..No match. - -SetupDiag: processing rule: OptionalComponentInstallFailure. -..No match. - -SetupDiag: processing rule: CriticalSafeOSDUFailure. -..No match. - -SetupDiag: processing rule: UserProfileCreationFailureDuringOnlineApply. -..No match. - -SetupDiag: processing rule: WimMountFailure. -..No match. - -SetupDiag: processing rule: FindSuccessfulUpgrade. -..No match. - -SetupDiag: processing rule: FindSetupHostReportedFailure. -..No match. - -SetupDiag: processing rule: FindDownlevelFailure. -..No match. - -SetupDiag: processing rule: FindAbruptDownlevelFailure. -....Error: SetupDiag reports abrupt down-level failure. Last Operation: Finalize, Error: 0xC1900208 - 0x4000C -Failure Data: Last Operation: Finalize, Error: 0xC1900208 - 0x4000C -Refer to https://docs.microsoft.com/windows/deployment/upgrade/upgrade-error-codes for error information. - -SetupDiag: processing rule: FindSetupPlatformFailedOperationInfo. -..No match. - -SetupDiag: processing rule: FindRollbackFailure. -..No match. - -SetupDiag found 2 matching issues. - -Warning: Found Application Block for: "Microsoft Endpoint Protection". -This is a dismissible message when not running setup.exe in "/quiet" mode. -Consider specifying "/compat /ignore warning" to ignore these dismissible warnings. -You must manually uninstall "Microsoft Endpoint Protection" before continuing with the installation/update, or change the command line parameters to ignore warnings. -For more information about Setup command line switches, see here: -https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-command-line-options -Error: SetupDiag reports abrupt down-level failure. Last Operation: Finalize, Error: 0xC1900208 - 0x4000C -Failure Data: Last Operation: Finalize, Error: 0xC1900208 - 0x4000C -Refer to https://docs.microsoft.com/windows/deployment/upgrade/upgrade-error-codes for error information. - -SetupDiag results were logged to: c:\setupdiag\results.log +SetupDiag results were logged to: c:\setupdiag\results.xml Logs ZipFile created at: c:\setupdiag\Logs_14.zip ``` @@ -417,11 +305,14 @@ Each rule name and its associated unique rule identifier are listed with a descr ## Release notes -06/13/2019 - SetupDiag v1.5.0.0 is released with 56 rules, as a standalone tool available from the Download Center. - - All date and time outputs are updatred to localized format per user request. - - Huge performance improvement in searching out setupact.logs and determine correct log to parse. What used to take a minute or more, now typically takes seconds. For example, a sample cab with 9 setupact.logs (three over 200mb each) that used to take nearly 2 minutes in version 1.4.1 now takes 12 seconds. +06/19/2019 - SetupDiag v1.5.0.0 is released with 56 rules, as a standalone tool available from the Download Center. + - All date and time outputs are updated to localized format per user request. + - SetupPhase and SetupOperation information has been added to /verbose output. + - Added las Setup Operation and last Setup Phase information to most rules where it make sense (see new output below). + - There is a huge performance improvement in searching setupact.logs to determine correct log to parse. What used to take a minute or more, now typically takes seconds. For example, a sample cab with 9 setupact.logs (three over 200mb each) that used to take nearly 2 minutes in version 1.4.1 now takes 12 seconds. - Added SetupDiag version number to text report (xml and json always had it). - Added "no match" reports for xml and json per user request. + - Added a rule for DISM Image Session Failures. - Added a rule for failures revolving around WimMount registration (Driver location info in the registry). - Added a rule for WinSetupBootFilter driver failures. - Added a rule for early down-level failures that occur early in the down-level phase per user request. From ceff60e9cdfad6cca77974d57accb51ca9e7a714 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 12 Jun 2019 15:47:23 -0700 Subject: [PATCH 156/303] v1.5 --- windows/deployment/upgrade/setupdiag.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 8ef4005d2b..7cb1276811 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -67,10 +67,10 @@ The [Release notes](#release-notes) section at the bottom of this topic has info | /LogsPath:\ |
    • This optional parameter tells SetupDiag.exe where to find the log files for an offline analysis. These log files can be in a flat folder format, or containing multiple subdirectories. SetupDiag will recursively search all child directories.
    | | /ZipLogs:\ |
    • This optional parameter tells SetupDiag.exe to create a zip file containing the results and all the log files it parsed. The zip file is created in the same directory where SetupDiag.exe is run.
    • Default: If not specified, a value of 'true' is used.
    | | /Format:\ |
    • This optional parameter can be used to output log files in xml or JSON format. If this parameter is not specified, text format is used by default.
    | -| /Scenario:\[Recovery\] | This optional parameter instructs SetupDiag.exe to look for and process reset and recovery logs and ignore setup/upgrade logs.| +| /Scenario:\[Recovery\] |
    • This optional parameter instructs SetupDiag.exe to look for and process reset and recovery logs and ignore setup/upgrade logs.
    | | /Verbose |
    • This optional parameter will output much more data to a log file. By default, SetupDiag will only produce a log file entry for serious errors. Using **/Verbose** will cause SetupDiag to always produce an additional log file with debugging details. These details can be useful when reporting a problem with SetupDiag.
    | | /NoTel |
    • This optional parameter tells SetupDiag.exe not to send diagnostic telemetry to Microsoft.
    | -| /AddReg | This optional parameter instructs SetupDiag.exe to add failure information to the registry in offline mode. By default, SetupDiag will add failure information to the registry in online mode only. Registry data is added to the following location on the system where SetupDiag is run: **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag**. | +| /AddReg |
    • This optional parameter instructs SetupDiag.exe to add failure information to the registry in offline mode. By default, SetupDiag will add failure information to the registry in online mode only. Registry data is added to the following location on the system where SetupDiag is run: **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag**.
    | Note: The **/Mode** parameter is deprecated in version 1.4.0.0 of SetupDiag. - In previous versions, this command was used with the LogsPath parameter to specify that SetupDiag should run in an offline manner to analyze a set of log files that were captured from a different computer. In version 1.4.0.0 when you specify /LogsPath then SetupDiag will automatically run in offline mode, therefore the /Mode parameter is not needed. From bf33baca6c2e7b7f2f1b5f8b106b9d58e2f43d6b Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Wed, 12 Jun 2019 22:39:40 -0500 Subject: [PATCH 157/303] Adding note as suggested. --- .../bitlocker/bitlocker-management-for-enterprises.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md index fb326e7977..2072fbfde3 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md @@ -22,6 +22,10 @@ The ideal for BitLocker management is to eliminate the need for IT admins to set Though much Windows BitLocker [documentation](bitlocker-overview.md) has been published, customers frequently ask for recommendations and pointers to specific, task-oriented documentation that is both easy to digest and focused on how to deploy and manage BitLocker. This article links to relevant documentation, products, and services to help answer this and other related frequently-asked questions, and also provides BitLocker recommendations for different types of computers. + +>[!IMPORTANT] +> Microsoft BitLocker Administration and Monitoring (MBAM) capabilities would be offered from [SCCM in on-prem scenarios](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology) in a future. + ## Managing domain-joined computers and moving to cloud Companies that image their own computers using Microsoft System Center 2012 Configuration Manager SP1 (SCCM) or later can use an existing task sequence to [pre-provision BitLocker](https://technet.microsoft.com/library/hh846237.aspx#BKMK_PreProvisionBitLocker) encryption while in Windows Preinstallation Environment (WinPE) and can then [enable protection](https://technet.microsoft.com/library/hh846237.aspx#BKMK_EnableBitLocker). This can help ensure that computers are encrypted from the start, even before users receive them. As part of the imaging process, a company could also decide to use SCCM to pre-set any desired [BitLocker Group Policy](https://technet.microsoft.com/library/ee706521(v=ws.10).aspx). @@ -132,8 +136,10 @@ PS C:\> Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpace
    + + -**Powershell** +# **Powershell** [BitLocker cmdlets for Windows PowerShell](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md#bitlocker-cmdlets-for-windows-powershell) From d60e6c1156f26eb39544bc26d1e450db4a8f4030 Mon Sep 17 00:00:00 2001 From: "H. Poulsen" Date: Thu, 13 Jun 2019 07:28:59 -0700 Subject: [PATCH 158/303] Update windows-as-a-service.md Updated video, latest news, and Champs Corner. Added bookmark to Windows release health dashboard. --- .../deployment/update/windows-as-a-service.md | 21 ++++++++++--------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index 525b7c99b1..8484835d8d 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -21,20 +21,19 @@ Find the tools and resources you need to help deploy and support Windows as a se Find the latest and greatest news on Windows 10 deployment and servicing. **Discovering the Windows 10 Update history pages** -> [!VIDEO https://www.youtube-nocookie.com/embed/GADIXBf9R58] +> [!VIDEO https://www.youtube-nocookie.com/embed/mTnAb9XjMPY] -Everyone wins when transparency is a top priority. We want you to know when updates are available, as well as alert you to any potential issues you may encounter during or after you install an update. The Windows update history page is for anyone looking to gain an immediate, precise understanding of particular Windows update issues. +Everyone wins when transparency is a top priority. We want you to know when updates are available, as well as alert you to any potential issues you may encounter during or after you install an update. Bookmark the Windows release health dashboard for near real-time information on known issues, workarounds, and resolutions--as well as the current status of the latest feature update rollout. The latest news: [See more news](waas-morenews.md). You can also check out the [Windows 10 blog](https://techcommunity.microsoft.com/t5/Windows-10-Blog/bg-p/Windows10Blog). @@ -44,9 +43,11 @@ Written by IT pros for IT pros, sharing real world examples and scenarios for Wi -**NEW** Classifying Windows updates in common deployment tools +**NEW** Deployment rings: The hidden [strategic] gem of Windows as a service -NEW Express updates for Windows Server 2016 re-enabled for November 2018 update +Classifying Windows updates in common deployment tools + +Express updates for Windows Server 2016 re-enabled for November 2018 update 2019 SHA-2 Code Signing Support requirement for Windows and WSUS From e545bb30adde6659dafbc051ac6166e93c7abcd3 Mon Sep 17 00:00:00 2001 From: "H. Poulsen" Date: Thu, 13 Jun 2019 08:14:34 -0700 Subject: [PATCH 159/303] Update waas-morenews.md --- windows/deployment/update/waas-morenews.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/deployment/update/waas-morenews.md b/windows/deployment/update/waas-morenews.md index 829b1efc16..2d91a632b5 100644 --- a/windows/deployment/update/waas-morenews.md +++ b/windows/deployment/update/waas-morenews.md @@ -16,6 +16,12 @@ ms.topic: article Here's more news about [Windows as a service](windows-as-a-service.md):
      +
    • Windows 10, version 1809 designated for broad deployment - March 28, 2019
    • +
    • Data, insights and listening to improve the customer experience - March 6, 2019
    • +
    • Getting to know the Windows update history pages - February 21, 2019
    • +
    • Windows Update for Business and the retirement of SAC-T - February 14, 2019
    • +
    • Application compatibility in the Windows ecosystem - January 15, 2019
    • +
    • Windows monthly security and quality updates overview - January 10, 2019
    • Driver quality in the Windows ecosystem - December 19, 2018
    • Modern Desktop Podcast - Episode 001 – Windows 10 Monthly Quality Updates - December 18, 2018
    • Measuring Delivery Optimization and its impact to your network - December 13, 2018
    • From a78c0996ed13cad9e96f5baecfaadaf384a75bce Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Thu, 13 Jun 2019 10:49:17 -0500 Subject: [PATCH 160/303] Update windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../bitlocker/bitlocker-management-for-enterprises.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md index 2072fbfde3..b24d3713f4 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md @@ -24,7 +24,7 @@ Though much Windows BitLocker [documentation](bitlocker-overview.md) has been pu >[!IMPORTANT] -> Microsoft BitLocker Administration and Monitoring (MBAM) capabilities would be offered from [SCCM in on-prem scenarios](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology) in a future. +> Microsoft BitLocker Administration and Monitoring (MBAM) capabilities will be offered from [SCCM in on-prem scenarios](https://docs.microsoft.com/microsoft-desktop-optimization-pack/mbam-v25/viewing-mbam-25-reports-for-the-configuration-manager-integration-topology) in the future. ## Managing domain-joined computers and moving to cloud From c8ca511d7cc4610ad8324eecbe73f6ae6992c856 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Thu, 13 Jun 2019 10:49:25 -0500 Subject: [PATCH 161/303] Update windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../bitlocker/bitlocker-management-for-enterprises.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md index b24d3713f4..b89ced627d 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md @@ -139,7 +139,7 @@ PS C:\> Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpace -# **Powershell** +# **PowerShell** [BitLocker cmdlets for Windows PowerShell](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md#bitlocker-cmdlets-for-windows-powershell) From 8ce8a767c4e63cea93ea860372aca3f07aa013d9 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Thu, 13 Jun 2019 11:07:01 -0700 Subject: [PATCH 162/303] Updates to main Surface hub page with JK --- .../surface-hub-2s-site-readiness-guide.md | 0 devices/surface/index.md | 29 +++++++++---------- 2 files changed, 14 insertions(+), 15 deletions(-) create mode 100644 devices/surface-hub/surface-hub-2s-site-readiness-guide.md diff --git a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md new file mode 100644 index 0000000000..e69de29bb2 diff --git a/devices/surface/index.md b/devices/surface/index.md index 55d3cd6e4a..c3557eb9db 100644 --- a/devices/surface/index.md +++ b/devices/surface/index.md @@ -16,7 +16,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.

      Microsoft Surface

      -

      Learn how to plan, deploy, and use Microsoft Surface and Surface Hub devices.

      +

      Learn how to plan, deploy, and manage Microsoft Surface and Surface Hub devices.

      @@ -51,15 +50,15 @@ description: Learn about Microsoft Surface and Surface Hub devices. @@ -94,7 +93,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.

      Surface Device Tech Specs

      Surface Pro

      -

      Surface Book

      +

      Surface Book

      Surface Studio

      Surface Go

      Surface Laptop 2

      @@ -109,12 +108,12 @@ description: Learn about Microsoft Surface and Surface Hub devices.
      - Specs list + Specs list
      @@ -134,7 +133,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
      @@ -168,12 +167,12 @@ description: Learn about Microsoft Surface and Surface Hub devices. From d137405205bd345329ae06783482bfb77ec5aeed Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 13 Jun 2019 11:09:41 -0700 Subject: [PATCH 163/303] added dev comments --- ...ew-in-windows-mdm-enrollment-management.md | 13 +- .../policy-configuration-service-provider.md | 14 ++ .../mdm/policy-csp-devicehealthmonitoring.md | 229 ++++++++++++++++++ 3 files changed, 251 insertions(+), 5 deletions(-) create mode 100644 windows/client-management/mdm/policy-csp-devicehealthmonitoring.md diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 66fea7504c..8cf23e8c68 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -33,7 +33,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - **Breaking changes and known issues** - [Get command inside an atomic command is not supported](#get-command-inside-an-atomic-command-is-not-supported) - - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification-channel-uri-not-preserved-during-upgrade-from-windows81-to-windows10) + - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10) - [Apps installed using WMI classes are not removed](#apps-installed-using-wmi-classes-are-not-removed) - [Passing CDATA in SyncML does not work](#passing-cdata-in-syncml-does-not-work) - [SSL settings in IIS server for SCEP must be set to "Ignore"](#ssl-settings-in-iis-server-for-scep-must-be-set-to-ignore) @@ -46,7 +46,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#mcmcwfciw10mobile) - [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices) - [MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#mdm-client-will-immediately-check-in-with-the-mdm-server-after-client-renews-wns-channel-uri) - - [User provisioning failure in Azure Active Directory joined Windows 10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows10-pc) + - [User provisioning failure in Azure Active Directory joined Windows 10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows-10-pc) - [Requirements to note for VPN certificates also used for Kerberos Authentication](#requirements-to-note-for-vpn-certificates-also-used-for-kerberos-authentication) - [Device management agent for the push-button reset is not working](#device-management-agent-for-the-push-button-reset-is-not-working) @@ -96,6 +96,9 @@ For details about Microsoft mobile device management protocols for Windows 10 s -Connecting your Windows 10-based device to work using a deep link +Connecting your Windows 10-based device to work using a deep link

      Added following deep link parameters to the table:

      • Username
      • @@ -1649,7 +1652,7 @@ Applies only to phone prior to build 10586.218: When ApplicationManagement/Appli ``` -### Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile +### Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile In your deployment, if you have multiple certificates provisioned on the device and the Wi-Fi profile provisioned does not have a strict filtering criteria, you may see connection failures when connecting to Wi-Fi. The solution is to ensure that the Wi-Fi profile provisioned has strict filtering criteria such that it matches only one certificate. @@ -1845,7 +1848,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware ## Frequently Asked Questions -### **Can there be more than 1 MDM server to enroll and manage devices in Windows 10?** +### **Can there be more than 1 MDM server to enroll and manage devices in Windows 10?** No. Only one MDM is allowed. ### **How do I set the maximum number of Azure Active Directory joined devices per user?** diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index ccb096009a..2fca9aa0c0 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -1006,6 +1006,20 @@ The following diagram shows the Policy configuration service provider in tree fo +### DeviceHealthMonitoring policies + +
        +
        + DeviceHealthMonitoring/AllowDeviceHealthMonitoring +
        +
        + DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope +
        +
        + DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination +
        +
        + ### DeviceInstallation policies
        diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md new file mode 100644 index 0000000000..582e30c8fc --- /dev/null +++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md @@ -0,0 +1,229 @@ +--- +title: Policy CSP - TimeLanguageSettings +description: Policy CSP - TimeLanguageSettings +ms.author: dansimp +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: manikadhiman +ms.date: 06/13/2019 +ms.reviewer: +manager: dansimp +--- + +# Policy CSP - DeviceHealthMonitoring + + +
        + + +## DeviceHealthMonitoring policies + +
        +
        + DeviceHealthMonitoring/AllowDeviceHealthMonitoring +
        +
        + DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope +
        +
        + DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination +
        +
        + + +
        + + +**DeviceHealthMonitoring/AllowDeviceHealthMonitoring** + + + + + + + + + + + + + + + + + + + + + +
        HomeProBusinessEnterpriseEducationMobileMobile Enterprise
        cross markcross markcheck mark6check mark6check mark6
        + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
        + + + +DeviceHealthMonitoring is an opt-in health monitoring connection between the device and Microsoft. You should enable this policy only if your organization is using a Microsoft device monitoring service which requires it. + + + +The following list shows the supported values: + +- 1 — The DeviceHealthMonitoring connection is enabled. +- 0 (default) — The DeviceHealthMonitoring connection is disabled. + + + + + + + + + + +
        + + +**DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope** + + + + + + + + + + + + + + + + + + + + + +
        HomeProBusinessEnterpriseEducationMobileMobile Enterprise
        cross markcross markcheck mark6check mark6check mark6
        + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
        + + + +This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. +This policy modifies which health events are sent to Microsoft on the DeviceHealthMonitoring connection. +IT Pros do not need to set this policy. Instead, Microsoft Intune is expected to dynamically manage this value in coordination with the Microsoft DeviceHealthMonitoring service. + + + + + + + + + + + + + + +
        + + +**DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination** + + + + + + + + + + + + + + + + + + + + + +
        HomeProBusinessEnterpriseEducationMobileMobile Enterprise
        cross markcross markcheck mark6check mark6check mark6
        + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
        + + + +This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. +The value of this policy constrains the DeviceHealthMonitoring connection to certain destinations in order to support regional and sovereign cloud scenarios. +In most cases, an IT Pro does not need to define this policy. Instead, it is expected that this value is dynamically managed by Microsoft Intune to align with the region or cloud to which the device's tenant is already linked. Only configure this policy manually if explicitly instructed to do so by a Microsoft device monitoring service. + + + + + + + + + + + + + +
        + + + + + +## DeviceHealthMonitoring policies supported by IoT Core + +- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](#devicehealthmonitoring-configdevicehealthmonitoringscope) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination) + + + +## DeviceHealthMonitoring policies supported by IoT Enterprise + +- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](#devicehealthmonitoring-configdevicehealthmonitoringscope) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination) + + +
        +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in Windows 10, version 1903. \ No newline at end of file From 15a6bdb4933b9933f1f98b9f0215396e755966e4 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Jun 2019 11:34:00 -0700 Subject: [PATCH 164/303] latest changes --- devices/surface-hub/TOC.md | 2 +- devices/surface-hub/surface-hub-2s-custom-install.md | 4 ++-- ...face-hub-2s-secure-with-uefi.md => surface-hub-2s-uefi.md} | 4 ++-- devices/surface-hub/surface-hub-2s-whats-new.md | 4 ++-- 4 files changed, 7 insertions(+), 7 deletions(-) rename devices/surface-hub/{surface-hub-2s-secure-with-uefi.md => surface-hub-2s-uefi.md} (72%) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 835d85681c..c1bc54d2a8 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -3,7 +3,7 @@ # Surface Hub 2S ## Overview -### [What's new in Surface Hub 2S](surface-hub-2s-whats-new.md) +### [What's new in Surface Hub 2S for IT admins](surface-hub-2s-whats-new.md) ### [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) ### [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) diff --git a/devices/surface-hub/surface-hub-2s-custom-install.md b/devices/surface-hub/surface-hub-2s-custom-install.md index a973883c28..b7ee37606e 100644 --- a/devices/surface-hub/surface-hub-2s-custom-install.md +++ b/devices/surface-hub/surface-hub-2s-custom-install.md @@ -1,5 +1,5 @@ --- -title: "Customizing physical installation of Surface Hub 2S" +title: "Customize wall mount of Surface Hub 2S" description: "Learn how to perform a custom install of Surface Hub 2S." keywords: separate values with commas ms.prod: surface-hub @@ -11,7 +11,7 @@ ms.topic: article ms.localizationpriority: Normal --- -# Customizing installation of Surface Hub 2S +# Customize wall mount of Surface Hub 2S If you’re not using certified mounting solutions, you can mount Surface Hub 2S using readily available retail hardware. diff --git a/devices/surface-hub/surface-hub-2s-secure-with-uefi.md b/devices/surface-hub/surface-hub-2s-uefi.md similarity index 72% rename from devices/surface-hub/surface-hub-2s-secure-with-uefi.md rename to devices/surface-hub/surface-hub-2s-uefi.md index 57fec42637..021b26e452 100644 --- a/devices/surface-hub/surface-hub-2s-secure-with-uefi.md +++ b/devices/surface-hub/surface-hub-2s-uefi.md @@ -1,5 +1,5 @@ --- -title: "Secure Surface Hub 2S with UEFI" +title: "Secure and manage Surface Hub 2S with UEFI" description: "Learn more securing Surface Hub 2S with UEFI." keywords: separate values with commas ms.prod: surface-hub @@ -11,4 +11,4 @@ ms.topic: article ms.localizationpriority: Normal --- -# Secure Surface Hub 2S with UEFI \ No newline at end of file +# Secure and manage Surface Hub 2S with UEFI \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 094ba8cd2e..3373fa92a3 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -1,5 +1,5 @@ --- -title: "What's new in Surface Hub 2S" +title: "What's new in Surface Hub 2S for IT admins" description: "Learn more about new features in Surface Hub 2S." keywords: separate values with commas ms.prod: surface-hub @@ -11,7 +11,7 @@ ms.topic: article ms.localizationpriority: Normal --- -# What's new in Surface Hub 2S +# What's new in Surface Hub 2S for IT admins Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork delivering a digital whiteboard, meetings platform, and a Windows 10 computing experience in one device. From 1fc39919c2c45b8c93fc36bf1f3c7ff17a386683 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Jun 2019 11:34:30 -0700 Subject: [PATCH 165/303] Update TOC.md --- devices/surface-hub/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index c1bc54d2a8..4071950d3d 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -5,7 +5,7 @@ ## Overview ### [What's new in Surface Hub 2S for IT admins](surface-hub-2s-whats-new.md) ### [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) -### [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) +### [Managing Windows 10 Team operating system on Surface Hub ](differences-between-surface-hub-and-windows-10-enterprise.md) ## Plan ### Surface Hub 2S Site Readiness Guide From 9b181fc2880d85d3be08a3561943ba3e186f5734 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 13 Jun 2019 12:34:21 -0700 Subject: [PATCH 166/303] change link and authorship --- windows/deployment/upgrade/log-files.md | 6 +++--- .../manage-windows-upgrades-with-upgrade-readiness.md | 6 +++--- windows/deployment/upgrade/quick-fixes.md | 6 +++--- windows/deployment/upgrade/resolution-procedures.md | 6 +++--- .../upgrade/resolve-windows-10-upgrade-errors.md | 6 +++--- windows/deployment/upgrade/setupdiag.md | 6 +++--- windows/deployment/upgrade/submit-errors.md | 6 +++--- windows/deployment/upgrade/troubleshoot-upgrade-errors.md | 6 +++--- windows/deployment/upgrade/upgrade-error-codes.md | 6 +++--- .../upgrade/upgrade-readiness-additional-insights.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-architecture.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-data-sharing.md | 6 +++--- .../upgrade/upgrade-readiness-deploy-windows.md | 6 +++--- .../upgrade/upgrade-readiness-deployment-script.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-get-started.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-identify-apps.md | 6 +++--- .../upgrade/upgrade-readiness-monitor-deployment.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-release-notes.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-requirements.md | 6 +++--- .../upgrade/upgrade-readiness-resolve-issues.md | 6 +++--- .../deployment/upgrade/upgrade-readiness-target-new-OS.md | 6 +++--- .../upgrade/upgrade-readiness-upgrade-overview.md | 6 +++--- ...-windows-10-with-system-center-configuraton-manager.md | 6 +++--- ...to-windows-10-with-the-microsoft-deployment-toolkit.md | 6 +++--- .../deployment/upgrade/upgrade-windows-phone-8-1-to-10.md | 6 +++--- .../use-upgrade-readiness-to-manage-windows-upgrades.md | 6 +++--- windows/deployment/upgrade/windows-10-edition-upgrades.md | 6 +++--- windows/deployment/upgrade/windows-10-upgrade-paths.md | 6 +++--- windows/deployment/upgrade/windows-error-reporting.md | 6 +++--- .../windows-upgrade-and-migration-considerations.md | 8 ++++---- 30 files changed, 91 insertions(+), 91 deletions(-) diff --git a/windows/deployment/upgrade/log-files.md b/windows/deployment/upgrade/log-files.md index 1454e87f15..fdcd498da9 100644 --- a/windows/deployment/upgrade/log-files.md +++ b/windows/deployment/upgrade/log-files.md @@ -1,15 +1,15 @@ --- title: Log files - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md b/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md index 6808396a25..66da87eb73 100644 --- a/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md +++ b/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md @@ -2,11 +2,11 @@ title: Manage Windows upgrades with Upgrade Readiness (Windows 10) description: Provides an overview of the process of managing Windows upgrades with Upgrade Readiness. ms.prod: w10 -author: lomayor +author: greg-lindsay ms.date: 04/25/2017 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.topic: article --- diff --git a/windows/deployment/upgrade/quick-fixes.md b/windows/deployment/upgrade/quick-fixes.md index a2633ed3d5..f258bb2378 100644 --- a/windows/deployment/upgrade/quick-fixes.md +++ b/windows/deployment/upgrade/quick-fixes.md @@ -1,15 +1,15 @@ --- title: Quick fixes - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 0168eee901..5d364a27c6 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -1,15 +1,15 @@ --- title: Resolution procedures - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index f8c61e91e8..e869cfa80e 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -1,15 +1,15 @@ --- title: Resolve Windows 10 upgrade errors - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 3472d88e0f..86a8d4b49b 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -1,15 +1,15 @@ --- title: SetupDiag ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: How to use the SetupDiag tool to diagnose Windows Setup errors keywords: deploy, troubleshoot, windows, 10, upgrade, update, setup, diagnose ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/submit-errors.md b/windows/deployment/upgrade/submit-errors.md index beb151b43d..1eebd06873 100644 --- a/windows/deployment/upgrade/submit-errors.md +++ b/windows/deployment/upgrade/submit-errors.md @@ -1,15 +1,15 @@ --- title: Submit Windows 10 upgrade errors using Feedback Hub ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Submit Windows 10 upgrade errors for diagnosis using feedback hub keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, feedback ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/troubleshoot-upgrade-errors.md b/windows/deployment/upgrade/troubleshoot-upgrade-errors.md index b663b5680f..fe26d367f3 100644 --- a/windows/deployment/upgrade/troubleshoot-upgrade-errors.md +++ b/windows/deployment/upgrade/troubleshoot-upgrade-errors.md @@ -1,15 +1,15 @@ --- title: Troubleshoot Windows 10 upgrade errors - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-error-codes.md b/windows/deployment/upgrade/upgrade-error-codes.md index 1f5d32e449..efaa098dab 100644 --- a/windows/deployment/upgrade/upgrade-error-codes.md +++ b/windows/deployment/upgrade/upgrade-error-codes.md @@ -1,15 +1,15 @@ --- title: Upgrade error codes - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-readiness-additional-insights.md b/windows/deployment/upgrade/upgrade-readiness-additional-insights.md index 84ce07f8df..e7672a7634 100644 --- a/windows/deployment/upgrade/upgrade-readiness-additional-insights.md +++ b/windows/deployment/upgrade/upgrade-readiness-additional-insights.md @@ -1,11 +1,11 @@ --- title: Upgrade Readiness - Additional insights ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Explains additional features of Upgrade Readiness. ms.prod: w10 -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-architecture.md b/windows/deployment/upgrade/upgrade-readiness-architecture.md index ae046f6abf..2f98a96cc3 100644 --- a/windows/deployment/upgrade/upgrade-readiness-architecture.md +++ b/windows/deployment/upgrade/upgrade-readiness-architecture.md @@ -1,11 +1,11 @@ --- title: Upgrade Readiness architecture (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Describes Upgrade Readiness architecture. ms.prod: w10 -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-data-sharing.md b/windows/deployment/upgrade/upgrade-readiness-data-sharing.md index d5b3c8d42a..a6470eed73 100644 --- a/windows/deployment/upgrade/upgrade-readiness-data-sharing.md +++ b/windows/deployment/upgrade/upgrade-readiness-data-sharing.md @@ -1,14 +1,14 @@ --- title: Upgrade Readiness data sharing ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Connectivity scenarios for data sharing with Upgrade Readiness ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-deploy-windows.md b/windows/deployment/upgrade/upgrade-readiness-deploy-windows.md index 7a445d7a3b..9827ca77e8 100644 --- a/windows/deployment/upgrade/upgrade-readiness-deploy-windows.md +++ b/windows/deployment/upgrade/upgrade-readiness-deploy-windows.md @@ -1,11 +1,11 @@ --- title: Upgrade Readiness - Get a list of computers that are upgrade ready (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Describes how to get a list of computers that are ready to be upgraded in Upgrade Readiness. ms.prod: w10 -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-deployment-script.md b/windows/deployment/upgrade/upgrade-readiness-deployment-script.md index 8bb240a99d..83db3a42b1 100644 --- a/windows/deployment/upgrade/upgrade-readiness-deployment-script.md +++ b/windows/deployment/upgrade/upgrade-readiness-deployment-script.md @@ -1,14 +1,14 @@ --- title: Upgrade Readiness deployment script (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Deployment script for Upgrade Readiness. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-get-started.md b/windows/deployment/upgrade/upgrade-readiness-get-started.md index e5c2bfe712..a75f7d866b 100644 --- a/windows/deployment/upgrade/upgrade-readiness-get-started.md +++ b/windows/deployment/upgrade/upgrade-readiness-get-started.md @@ -1,15 +1,15 @@ --- title: Get started with Upgrade Readiness (Windows 10) ms.reviewer: -manager: dansimp +manager: laurawi description: Explains how to get started with Upgrade Readiness. keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics, ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greglin ms.localizationpriority: medium ms.topic: article ms.collection: M365-analytics diff --git a/windows/deployment/upgrade/upgrade-readiness-identify-apps.md b/windows/deployment/upgrade/upgrade-readiness-identify-apps.md index 9d236c0832..81992ee784 100644 --- a/windows/deployment/upgrade/upgrade-readiness-identify-apps.md +++ b/windows/deployment/upgrade/upgrade-readiness-identify-apps.md @@ -1,11 +1,11 @@ --- title: Upgrade Readiness - Identify important apps (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Describes how to prepare your environment so that you can use Upgrade Readiness to manage Windows upgrades. ms.prod: w10 -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-monitor-deployment.md b/windows/deployment/upgrade/upgrade-readiness-monitor-deployment.md index a1ba5c430c..6dffc54509 100644 --- a/windows/deployment/upgrade/upgrade-readiness-monitor-deployment.md +++ b/windows/deployment/upgrade/upgrade-readiness-monitor-deployment.md @@ -1,13 +1,13 @@ --- title: Monitor deployment with Upgrade Readiness ms.reviewer: -manager: dansimp +manager: laurawi description: Describes how to use Upgrade Readiness to monitor the deployment after Windows upgrades. keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics, ms.localizationpriority: medium ms.prod: w10 -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greglin ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-release-notes.md b/windows/deployment/upgrade/upgrade-readiness-release-notes.md index 40445e1737..1dbfd97e48 100644 --- a/windows/deployment/upgrade/upgrade-readiness-release-notes.md +++ b/windows/deployment/upgrade/upgrade-readiness-release-notes.md @@ -1,9 +1,9 @@ --- title: Upgrade Readiness release notes (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor -author: lomayor +manager: laurawi +ms.author: greglin +author: greg-lindsay description: Provides tips and limitations about Upgrade Readiness. redirect_url: https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-requirements#important-information-about-this-release --- diff --git a/windows/deployment/upgrade/upgrade-readiness-requirements.md b/windows/deployment/upgrade/upgrade-readiness-requirements.md index 4dce07d5b1..1ed4a081c1 100644 --- a/windows/deployment/upgrade/upgrade-readiness-requirements.md +++ b/windows/deployment/upgrade/upgrade-readiness-requirements.md @@ -1,12 +1,12 @@ --- title: Upgrade Readiness requirements (Windows 10) ms.reviewer: -manager: dansimp +manager: laurawi description: Provides requirements for Upgrade Readiness. keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics, ms.prod: w10 -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greglin ms.localizationpriority: medium ms.topic: article ms.collection: M365-analytics diff --git a/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md b/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md index 7a049836e4..3367363f1c 100644 --- a/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md +++ b/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md @@ -1,12 +1,12 @@ --- title: Upgrade Readiness - Resolve application and driver issues (Windows 10) ms.reviewer: -manager: dansimp +manager: laurawi description: Describes how to resolve application and driver issues that can occur during an upgrade with Upgrade Readiness. keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics, ms.prod: w10 -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greglin ms.localizationpriority: medium ms.topic: article ms.collection: M365-analytics diff --git a/windows/deployment/upgrade/upgrade-readiness-target-new-OS.md b/windows/deployment/upgrade/upgrade-readiness-target-new-OS.md index 865b2f92fa..3af81df13a 100644 --- a/windows/deployment/upgrade/upgrade-readiness-target-new-OS.md +++ b/windows/deployment/upgrade/upgrade-readiness-target-new-OS.md @@ -1,11 +1,11 @@ --- title: Upgrade Readiness - Targeting a new operating system version ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Explains how to run Upgrade Readiness again to target a different operating system version or bulk-approve all apps from a given vendor ms.prod: w10 -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md b/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md index 099a473f14..7ef0302e8a 100644 --- a/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md +++ b/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md @@ -1,11 +1,11 @@ --- title: Upgrade Readiness - Upgrade Overview (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Displays the total count of computers sharing data and upgraded. ms.prod: w10 -author: lomayor +author: greg-lindsay ms.topic: article ms.collection: M365-analytics --- diff --git a/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md b/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md index e52a6199cf..23551d5256 100644 --- a/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md +++ b/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md @@ -3,13 +3,13 @@ title: Perform an in-place upgrade to Windows 10 using Configuration Manager (Wi description: The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. Use a System Center Configuration Manager task sequence to completely automate the process. ms.assetid: F8DF6191-0DB0-4EF5-A9B1-6A11D5DE4878 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin keywords: upgrade, update, task sequence, deploy ms.prod: w10 ms.localizationpriority: medium ms.mktglfcycl: deploy -author: lomayor +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md b/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md index 4628fe593e..1b00b1f559 100644 --- a/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md +++ b/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md @@ -3,15 +3,15 @@ title: Perform an in-place upgrade to Windows 10 with MDT (Windows 10) description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. ms.assetid: B8993151-3C1E-4F22-93F4-2C5F2771A460 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin keywords: upgrade, update, task sequence, deploy ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt -author: lomayor +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md b/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md index 6758f63dd2..78f2f9d558 100644 --- a/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md +++ b/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md @@ -1,8 +1,8 @@ --- title: Upgrade Windows Phone 8.1 to Windows 10 Mobile in an MDM environment (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: This article describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using MDM. keywords: upgrade, update, windows, phone, windows 10, mdm, mobile ms.prod: w10 @@ -10,7 +10,7 @@ ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdm -author: lomayor +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 4dd2b034b1..bc54105187 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -1,13 +1,13 @@ --- title: Use Upgrade Readiness to manage Windows upgrades (Windows 10) ms.reviewer: -manager: dansimp +manager: laurawi description: Describes how to use Upgrade Readiness to manage Windows upgrades. keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics, ms.localizationpriority: medium ms.prod: w10 -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greglin ms.topic: article --- diff --git a/windows/deployment/upgrade/windows-10-edition-upgrades.md b/windows/deployment/upgrade/windows-10-edition-upgrades.md index e727489a71..4b834a7569 100644 --- a/windows/deployment/upgrade/windows-10-edition-upgrades.md +++ b/windows/deployment/upgrade/windows-10-edition-upgrades.md @@ -3,14 +3,14 @@ title: Windows 10 edition upgrade (Windows 10) description: With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. ms.assetid: A7642E90-A3E7-4A25-8044-C4E402DC462A ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mobile -author: lomayor +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/windows-10-upgrade-paths.md b/windows/deployment/upgrade/windows-10-upgrade-paths.md index 437295f796..fb67b1f826 100644 --- a/windows/deployment/upgrade/windows-10-upgrade-paths.md +++ b/windows/deployment/upgrade/windows-10-upgrade-paths.md @@ -1,15 +1,15 @@ --- title: Windows 10 upgrade paths (Windows 10) ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: You can upgrade to Windows 10 from a previous version of Windows if the upgrade path is supported. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.localizationpriority: medium ms.pagetype: mobile -author: lomayor +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/upgrade/windows-error-reporting.md b/windows/deployment/upgrade/windows-error-reporting.md index b76cbcc4c0..8397184345 100644 --- a/windows/deployment/upgrade/windows-error-reporting.md +++ b/windows/deployment/upgrade/windows-error-reporting.md @@ -1,15 +1,15 @@ --- title: Windows error reporting - Windows IT Pro ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors. keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor +author: greg-lindsay ms.localizationpriority: medium ms.topic: article --- diff --git a/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md b/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md index 5e98406385..3d4945693b 100644 --- a/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md +++ b/windows/deployment/upgrade/windows-upgrade-and-migration-considerations.md @@ -3,12 +3,12 @@ title: Windows Upgrade and Migration Considerations (Windows 10) description: Windows Upgrade and Migration Considerations ms.assetid: 7f85095c-5922-45e9-b28e-91b1263c7281 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.topic: article --- @@ -40,7 +40,7 @@ You can use USMT to automate migration during large deployments of the Windows o Whether you are upgrading or migrating to a new version of Windows, you must be aware of the following issues and considerations: ### Application compatibility -For more information about application compatibility in Windows, see the [Application Compatibility Toolkit (ACT)](https://go.microsoft.com/fwlink/p/?LinkId=131349). +For more information about application compatibility in Windows, see [Use Upgrade Readiness to manage Windows upgrades](https://docs.microsoft.com/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades). ### Multilingual Windows image upgrades When performing multilingual Windows upgrades, cross-language upgrades are not supported by USMT. If you are upgrading or migrating an operating system with multiple language packs installed, you can upgrade or migrate only to the system default user interface (UI) language. For example, if English is the default but you have a Spanish language pack installed, you can upgrade or migrate only to English. From 59df9ebc4125718c56e678e3239a9be4ac864ee5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 13 Jun 2019 12:47:41 -0700 Subject: [PATCH 167/303] fix authors and delete blank files --- .../assign-applications-using-roles-in-mdt-2013.md | 11 ----------- .../assign-applications-using-roles-in-mdt.md | 1 - ...stributed-environment-for-windows-10-deployment.md | 1 - .../configure-mdt-2013-for-userexit-scripts.md | 8 -------- .../deploy-windows-mdt/configure-mdt-2013-settings.md | 9 --------- .../configure-mdt-deployment-share-rules.md | 1 - .../configure-mdt-for-userexit-scripts.md | 1 - .../deploy-windows-mdt/configure-mdt-settings.md | 1 - ...ask-sequence-with-configuration-manager-and-mdt.md | 1 - .../create-a-windows-10-reference-image.md | 1 - .../deploy-a-windows-10-image-using-mdt.md | 1 - ...indows-10-with-the-microsoft-deployment-toolkit.md | 1 - ...t-started-with-the-microsoft-deployment-toolkit.md | 1 - .../integrate-configuration-manager-with-mdt-2013.md | 8 -------- .../integrate-configuration-manager-with-mdt.md | 1 - .../deploy-windows-mdt/key-features-in-mdt-2013.md | 8 -------- .../deploy-windows-mdt/key-features-in-mdt.md | 1 - .../mdt-2013-lite-touch-components.md | 8 -------- .../deploy-windows-mdt/mdt-lite-touch-components.md | 1 - .../prepare-for-windows-deployment-with-mdt-2013.md | 8 -------- .../prepare-for-windows-deployment-with-mdt.md | 1 - .../refresh-a-windows-7-computer-with-windows-10.md | 1 - ...a-windows-7-computer-with-a-windows-10-computer.md | 1 - .../set-up-mdt-2013-for-bitlocker.md | 9 --------- .../deploy-windows-mdt/set-up-mdt-for-bitlocker.md | 1 - ...e-a-windows-10-deployment-in-a-test-environment.md | 1 - .../use-orchestrator-runbooks-with-mdt-2013.md | 8 -------- .../use-orchestrator-runbooks-with-mdt.md | 1 - ...base-to-stage-windows-10-deployment-information.md | 1 - .../use-web-services-in-mdt-2013.md | 10 ---------- .../deploy-windows-mdt/use-web-services-in-mdt.md | 1 - windows/deployment/update/WIP4Biz-intro.md | 6 +++--- .../update/olympia/olympia-enrollment-guidelines.md | 7 +++---- .../update/waas-optimize-windows-10-updates.md | 7 +++---- windows/deployment/update/waas-overview.md | 6 +++--- windows/deployment/update/waas-quick-start.md | 6 +++--- windows/deployment/update/waas-restart.md | 6 +++--- .../waas-servicing-channels-windows-10-updates.md | 6 +++--- .../deployment/update/waas-servicing-differences.md | 6 +++--- .../waas-servicing-strategy-windows-10-updates.md | 6 +++--- windows/deployment/update/waas-wu-settings.md | 6 +++--- windows/deployment/update/waas-wufb-group-policy.md | 6 +++--- windows/deployment/update/waas-wufb-intune.md | 6 +++--- .../update/windows-analytics-FAQ-troubleshooting.md | 6 +++--- .../update/windows-analytics-azure-portal.md | 6 +++--- .../update/windows-analytics-get-started.md | 2 +- .../deployment/update/windows-analytics-overview.md | 6 +++--- .../deployment/update/windows-analytics-privacy.md | 6 +++--- windows/deployment/update/windows-as-a-service.md | 6 +++--- .../update/windows-update-error-reference.md | 6 +++--- windows/deployment/update/windows-update-errors.md | 6 +++--- windows/deployment/update/windows-update-logs.md | 6 +++--- windows/deployment/update/windows-update-overview.md | 6 +++--- windows/deployment/update/windows-update-resources.md | 6 +++--- .../update/windows-update-troubleshooting.md | 6 +++--- windows/deployment/update/wufb-autoupdate.md | 6 +++--- windows/deployment/update/wufb-basics.md | 6 +++--- windows/deployment/update/wufb-compliancedeadlines.md | 6 +++--- windows/deployment/update/wufb-managedrivers.md | 6 +++--- windows/deployment/update/wufb-manageupdate.md | 6 +++--- windows/deployment/update/wufb-onboard.md | 6 +++--- ...ting-started-with-the-user-state-migration-tool.md | 7 +++---- .../deployment/usmt/migrate-application-settings.md | 6 +++--- .../deployment/usmt/migration-store-types-overview.md | 6 +++--- .../deployment/usmt/offline-migration-reference.md | 6 +++--- .../usmt/understanding-migration-xml-files.md | 6 +++--- windows/deployment/usmt/usmt-best-practices.md | 6 +++--- .../usmt/usmt-choose-migration-store-type.md | 6 +++--- windows/deployment/usmt/usmt-command-line-syntax.md | 6 +++--- windows/deployment/usmt/usmt-common-issues.md | 6 +++--- .../usmt/usmt-common-migration-scenarios.md | 6 +++--- windows/deployment/usmt/usmt-configxml-file.md | 6 +++--- .../deployment/usmt/usmt-conflicts-and-precedence.md | 6 +++--- windows/deployment/usmt/usmt-custom-xml-examples.md | 6 +++--- windows/deployment/usmt/usmt-customize-xml-files.md | 6 +++--- .../deployment/usmt/usmt-determine-what-to-migrate.md | 6 +++--- .../usmt/usmt-estimate-migration-store-size.md | 6 +++--- .../usmt/usmt-exclude-files-and-settings.md | 6 +++--- 78 files changed, 139 insertions(+), 250 deletions(-) delete mode 100644 windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013.md delete mode 100644 windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts.md delete mode 100644 windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings.md delete mode 100644 windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013.md delete mode 100644 windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013.md delete mode 100644 windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components.md delete mode 100644 windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013.md delete mode 100644 windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker.md delete mode 100644 windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013.md delete mode 100644 windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013.md diff --git a/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013.md b/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013.md deleted file mode 100644 index e61d686275..0000000000 --- a/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: Assign applications using roles in MDT (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: assign-applications-using-roles-in-mdt ---- - -  -  diff --git a/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md b/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md index 8d16fd4b7a..756fc911c0 100644 --- a/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md +++ b/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md b/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md index 0903aea0ea..f67841a761 100644 --- a/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md +++ b/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts.md b/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts.md deleted file mode 100644 index ef21fa7bd0..0000000000 --- a/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: Configure MDT for UserExit scripts (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: configure-mdt-for-userexit-scripts ---- diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings.md b/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings.md deleted file mode 100644 index c3cabdda10..0000000000 --- a/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings.md +++ /dev/null @@ -1,9 +0,0 @@ ---- -title: Configure MDT settings (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: configure-mdt-settings ---- - diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md b/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md index f778e8cc14..442937bc56 100644 --- a/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md +++ b/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md b/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md index 7b2a140db5..4e27658bb8 100644 --- a/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md +++ b/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md b/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md index 38f3bf9697..3dc56ce385 100644 --- a/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md +++ b/windows/deployment/deploy-windows-mdt/configure-mdt-settings.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md b/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md index 9d22117344..63152fa7d1 100644 --- a/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md +++ b/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.pagetype: mdt ms.sitesec: library author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md b/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md index 3be36db1d6..6611c9e8c6 100644 --- a/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md +++ b/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 04/18/2018 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md index 723fe97573..13fdc556c1 100644 --- a/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md +++ b/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 10/16/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md b/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md index 71bb24a17b..e8646cd0cc 100644 --- a/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md +++ b/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library author: greg-lindsay ms.pagetype: mdt -ms.date: 10/16/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md b/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md index 66bc91fb19..f5c4077436 100644 --- a/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md +++ b/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013.md b/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013.md deleted file mode 100644 index 60f05428e8..0000000000 --- a/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: Integrate Configuration Manager with MDT 2013 Update 2 (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: integrate-configuration-manager-with-mdt ---- diff --git a/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt.md b/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt.md index 8c27e07eb1..615e6cdb7b 100644 --- a/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.mktglfcycl: deploy ms.sitesec: library author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013.md b/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013.md deleted file mode 100644 index 691db21017..0000000000 --- a/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: Key features in MDT 2013 Update 2 (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: key-features-in-mdt ---- diff --git a/windows/deployment/deploy-windows-mdt/key-features-in-mdt.md b/windows/deployment/deploy-windows-mdt/key-features-in-mdt.md index 0874e8bd17..a4f74c153c 100644 --- a/windows/deployment/deploy-windows-mdt/key-features-in-mdt.md +++ b/windows/deployment/deploy-windows-mdt/key-features-in-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components.md b/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components.md deleted file mode 100644 index 760abd5455..0000000000 --- a/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: MDT 2013 Update 2 Lite Touch components (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: mdt-lite-touch-components ---- diff --git a/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components.md b/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components.md index 88d3f8935b..843e70ad0b 100644 --- a/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components.md +++ b/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013.md deleted file mode 100644 index e4648b07a1..0000000000 --- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: Prepare for deployment with MDT 2013 Update 2 (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: prepare-for-windows-deployment-with-mdt ---- diff --git a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md index 477b2b3911..797f366f1c 100644 --- a/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md b/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md index e6185525fe..77ad0897c7 100644 --- a/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md +++ b/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md b/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md index c25fd36599..a4a4b66bc4 100644 --- a/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md +++ b/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker.md b/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker.md deleted file mode 100644 index acff894776..0000000000 --- a/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker.md +++ /dev/null @@ -1,9 +0,0 @@ ---- -title: Set up MDT for BitLocker (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: set-up-mdt-for-bitlocker ---- - diff --git a/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md b/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md index cca2fc6ff4..f61b25241d 100644 --- a/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md +++ b/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md b/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md index 81847807c4..e9e6bd140d 100644 --- a/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md +++ b/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013.md b/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013.md deleted file mode 100644 index 8d41fdebf7..0000000000 --- a/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: Use Orchestrator runbooks with MDT (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: use-orchestrator-runbooks-with-mdt ---- diff --git a/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md b/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md index 6a0ecfb6b6..614153e319 100644 --- a/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md +++ b/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.sitesec: library ms.pagetype: mdt author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md b/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md index 0b373621dc..0c2970d7dc 100644 --- a/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md +++ b/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information.md @@ -12,7 +12,6 @@ ms.mktglfcycl: deploy ms.localizationpriority: medium ms.sitesec: library author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013.md b/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013.md deleted file mode 100644 index 9dd0e6b171..0000000000 --- a/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -title: Use web services in MDT (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -redirect_url: use-web-services-in-mdt ---- - -  diff --git a/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md b/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md index 7b720cee45..f0133fa130 100644 --- a/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md +++ b/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt.md @@ -12,7 +12,6 @@ ms.localizationpriority: medium ms.pagetype: mdt ms.sitesec: library author: greg-lindsay -ms.date: 07/27/2017 ms.topic: article --- diff --git a/windows/deployment/update/WIP4Biz-intro.md b/windows/deployment/update/WIP4Biz-intro.md index ea49f083a2..101adcbb48 100644 --- a/windows/deployment/update/WIP4Biz-intro.md +++ b/windows/deployment/update/WIP4Biz-intro.md @@ -5,12 +5,12 @@ keywords: updates, servicing, current, deployment, semi-annual channel, feature, ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 03/01/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/olympia/olympia-enrollment-guidelines.md b/windows/deployment/update/olympia/olympia-enrollment-guidelines.md index 54fa43fd13..da75754d7f 100644 --- a/windows/deployment/update/olympia/olympia-enrollment-guidelines.md +++ b/windows/deployment/update/olympia/olympia-enrollment-guidelines.md @@ -1,14 +1,13 @@ --- title: Olympia Corp enrollment guidelines description: Olympia Corp enrollment guidelines -ms.author: dolmont +ms.author: greglin ms.topic: article ms.prod: w10 ms.technology: windows -author: dulcemontemayor -ms.date: 03/02/2018 +author: greg-lindsay ms.reviewer: -manager: dansimp +manager: laurawi keywords: insider, trial, enterprise, lab, corporation, test --- diff --git a/windows/deployment/update/waas-optimize-windows-10-updates.md b/windows/deployment/update/waas-optimize-windows-10-updates.md index 13ebd08cdd..f4255e3760 100644 --- a/windows/deployment/update/waas-optimize-windows-10-updates.md +++ b/windows/deployment/update/waas-optimize-windows-10-updates.md @@ -4,12 +4,11 @@ description: Two methods of peer-to-peer content distribution are available in W ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor -ms.date: 09/24/2018 +ms.author: greg-lindsay ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 82d2d4b3e1..787af15764 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -5,12 +5,12 @@ keywords: updates, servicing, current, deployment, semi-annual channel, feature, ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/24/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-quick-start.md b/windows/deployment/update/waas-quick-start.md index 8a9f05b8e6..2c926db3d9 100644 --- a/windows/deployment/update/waas-quick-start.md +++ b/windows/deployment/update/waas-quick-start.md @@ -5,12 +5,12 @@ keywords: updates, servicing, current, deployment, semi-annual channel, feature, ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 10/17/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-restart.md b/windows/deployment/update/waas-restart.md index 898c957fd4..2d3589d3ec 100644 --- a/windows/deployment/update/waas-restart.md +++ b/windows/deployment/update/waas-restart.md @@ -4,12 +4,12 @@ description: tbd ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 07/27/2017 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md index 11d7c5d4b4..211678945d 100644 --- a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md @@ -4,12 +4,12 @@ description: tbd ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 10/13/2017 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-servicing-differences.md b/windows/deployment/update/waas-servicing-differences.md index a99bba615f..9e0f207f1f 100644 --- a/windows/deployment/update/waas-servicing-differences.md +++ b/windows/deployment/update/waas-servicing-differences.md @@ -1,15 +1,15 @@ --- title: Servicing differences between Windows 10 and older operating systems ms.reviewer: -manager: dansimp +manager: laurawi description: Learn the differences between servicing Windows 10 and servicing older operating systems. keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.topic: article ms.collection: M365-modern-desktop --- diff --git a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md index 3a807c3ec9..9621e81104 100644 --- a/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-strategy-windows-10-updates.md @@ -4,12 +4,12 @@ description: A strong Windows 10 deployment strategy begins with establishing a ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 11/02/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-wu-settings.md b/windows/deployment/update/waas-wu-settings.md index 5ed2a1f465..0a0e4b3426 100644 --- a/windows/deployment/update/waas-wu-settings.md +++ b/windows/deployment/update/waas-wu-settings.md @@ -4,12 +4,12 @@ description: Additional settings to control the behavior of Windows Update (WU) ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 07/27/2017 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md index b447161237..b983785b2f 100644 --- a/windows/deployment/update/waas-wufb-group-policy.md +++ b/windows/deployment/update/waas-wufb-group-policy.md @@ -4,12 +4,12 @@ description: Configure Windows Update for Business settings using Group Policy. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 07/27/2017 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/waas-wufb-intune.md b/windows/deployment/update/waas-wufb-intune.md index 81ac40df54..862f35635b 100644 --- a/windows/deployment/update/waas-wufb-intune.md +++ b/windows/deployment/update/waas-wufb-intune.md @@ -4,12 +4,12 @@ description: Configure Windows Update for Business settings using Microsoft Intu ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 07/27/2017 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 63afadf857..a68b265218 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -1,15 +1,15 @@ --- title: Frequently asked questions and troubleshooting Windows Analytics ms.reviewer: -manager: dansimp +manager: laurawi description: Frequently asked questions about Windows Analytics and steps to take when things go wrong keywords: windows analytics, oms, operations management suite, prerequisites, requirements, updates, upgrades, log analytics, health, FAQ, problems, troubleshooting, error ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greg-lindsay ms.localizationpriority: medium ms.collection: M365-analytics ms.topic: article diff --git a/windows/deployment/update/windows-analytics-azure-portal.md b/windows/deployment/update/windows-analytics-azure-portal.md index 4734b9dcc2..d39c251ca1 100644 --- a/windows/deployment/update/windows-analytics-azure-portal.md +++ b/windows/deployment/update/windows-analytics-azure-portal.md @@ -1,15 +1,15 @@ --- title: Windows Analytics in the Azure Portal ms.reviewer: -manager: dansimp +manager: laurawi description: Use the Azure Portal to add and configure Windows Analytics solutions keywords: Device Health, oms, Azure, portal, operations management suite, add, manage, configure, Upgrade Readiness, Update Compliance ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greg-lindsay ms.localizationpriority: medium ms.collection: M365-analytics ms.topic: article diff --git a/windows/deployment/update/windows-analytics-get-started.md b/windows/deployment/update/windows-analytics-get-started.md index 17c051faaf..29309faa64 100644 --- a/windows/deployment/update/windows-analytics-get-started.md +++ b/windows/deployment/update/windows-analytics-get-started.md @@ -1,7 +1,7 @@ --- title: Enrolling devices in Windows Analytics (Windows 10) ms.reviewer: -manager: dansimp +manager: laurawi description: Enroll devices to enable use of Update Compliance, Upgrade Readiness, and Device Health in Windows Analytics. keywords: windows analytics, oms, operations management suite, prerequisites, requirements, updates, upgrades, log analytics, health, azure portal ms.prod: w10 diff --git a/windows/deployment/update/windows-analytics-overview.md b/windows/deployment/update/windows-analytics-overview.md index b302f6f1ff..22d20bf71a 100644 --- a/windows/deployment/update/windows-analytics-overview.md +++ b/windows/deployment/update/windows-analytics-overview.md @@ -1,15 +1,15 @@ --- title: Windows Analytics ms.reviewer: -manager: dansimp +manager: laurawi description: Introduction and overview of Windows Analytics keywords: Device Health, Upgrade Readiness, Update Compliance, oms, operations management suite, prerequisites, requirements, monitoring, crash, drivers ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greg-lindsay ms.localizationpriority: medium ms.collection: M365-analytics ms.topic: article diff --git a/windows/deployment/update/windows-analytics-privacy.md b/windows/deployment/update/windows-analytics-privacy.md index 98f8b7cc8e..f0135e2b3d 100644 --- a/windows/deployment/update/windows-analytics-privacy.md +++ b/windows/deployment/update/windows-analytics-privacy.md @@ -1,15 +1,15 @@ --- title: Windows Analytics and privacy ms.reviewer: -manager: dansimp +manager: laurawi description: How Windows Analytics uses data keywords: windows analytics, oms, privacy, data, diagnostic, operations management suite, prerequisites, requirements, updates, upgrades, log analytics, health, FAQ, problems, troubleshooting, error ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greg-lindsay ms.localizationpriority: high ms.collection: M365-analytics ms.topic: article diff --git a/windows/deployment/update/windows-as-a-service.md b/windows/deployment/update/windows-as-a-service.md index 525b7c99b1..ea7165bc4c 100644 --- a/windows/deployment/update/windows-as-a-service.md +++ b/windows/deployment/update/windows-as-a-service.md @@ -4,11 +4,11 @@ ms.prod: windows-10 layout: LandingPage ms.topic: landing-page ms.manager: elizapo -author: lomayor -ms.author: lomayor +author: greg-lindsay +ms.author: greg-lindsay ms.date: 01/24/2019 ms.reviewer: -manager: dansimp +manager: laurawi ms.localizationpriority: high ms.collection: M365-modern-desktop --- diff --git a/windows/deployment/update/windows-update-error-reference.md b/windows/deployment/update/windows-update-error-reference.md index cca22ab6ad..476a82bf7b 100644 --- a/windows/deployment/update/windows-update-error-reference.md +++ b/windows/deployment/update/windows-update-error-reference.md @@ -4,12 +4,12 @@ description: Reference information for Windows Update error codes ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/18/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/windows-update-errors.md b/windows/deployment/update/windows-update-errors.md index 44bb1240ca..54c06b6319 100644 --- a/windows/deployment/update/windows-update-errors.md +++ b/windows/deployment/update/windows-update-errors.md @@ -4,12 +4,12 @@ description: Learn about some common issues you might experience with Windows Up ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/18/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/windows-update-logs.md b/windows/deployment/update/windows-update-logs.md index 854d12fc0e..233ad50d7b 100644 --- a/windows/deployment/update/windows-update-logs.md +++ b/windows/deployment/update/windows-update-logs.md @@ -4,12 +4,12 @@ description: Learn about the Windows Update log files ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/18/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/windows-update-overview.md b/windows/deployment/update/windows-update-overview.md index 87b016f3a5..c88535580b 100644 --- a/windows/deployment/update/windows-update-overview.md +++ b/windows/deployment/update/windows-update-overview.md @@ -4,12 +4,12 @@ description: Learn how Windows Update works, including architecture and troubles ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/18/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 3c86a313b1..b403e77a48 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -4,12 +4,12 @@ description: Additional resources for Windows Update ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/18/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index 10c28bdca8..65a79ce245 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -4,12 +4,12 @@ description: Learn how to troubleshoot Windows Update ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 09/18/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/wufb-autoupdate.md b/windows/deployment/update/wufb-autoupdate.md index 8b02223e9a..e2d14bf393 100644 --- a/windows/deployment/update/wufb-autoupdate.md +++ b/windows/deployment/update/wufb-autoupdate.md @@ -4,12 +4,12 @@ description: Learn how to get started using Windows Update for Business. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 06/20/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/wufb-basics.md b/windows/deployment/update/wufb-basics.md index 79bfff04d8..24c01317ea 100644 --- a/windows/deployment/update/wufb-basics.md +++ b/windows/deployment/update/wufb-basics.md @@ -4,12 +4,12 @@ description: Learn how to get started using the Basic GPO in Windows Update for ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 06/20/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- # Configure the Basic group policy for Windows Update for Business diff --git a/windows/deployment/update/wufb-compliancedeadlines.md b/windows/deployment/update/wufb-compliancedeadlines.md index eb8f6bcde2..e464692f3f 100644 --- a/windows/deployment/update/wufb-compliancedeadlines.md +++ b/windows/deployment/update/wufb-compliancedeadlines.md @@ -4,12 +4,12 @@ description: Learn how to enforce compliance deadlines using Windows Update for ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 06/20/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- # Enforcing compliance deadlines for updates diff --git a/windows/deployment/update/wufb-managedrivers.md b/windows/deployment/update/wufb-managedrivers.md index 80f65c4baf..d45d3a878d 100644 --- a/windows/deployment/update/wufb-managedrivers.md +++ b/windows/deployment/update/wufb-managedrivers.md @@ -4,12 +4,12 @@ description: Learn how to manage drivers, dual managed environments, and bandwid ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 06/21/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- # Managing drivers, dual-managed environments, and Delivery Optimization with group policies diff --git a/windows/deployment/update/wufb-manageupdate.md b/windows/deployment/update/wufb-manageupdate.md index a631ad47fa..329656a29e 100644 --- a/windows/deployment/update/wufb-manageupdate.md +++ b/windows/deployment/update/wufb-manageupdate.md @@ -4,12 +4,12 @@ description: Learn how to get started using Windows Update for Business. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.date: 06/20/2018 ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/update/wufb-onboard.md b/windows/deployment/update/wufb-onboard.md index 13e56f815c..fac68e1a9c 100644 --- a/windows/deployment/update/wufb-onboard.md +++ b/windows/deployment/update/wufb-onboard.md @@ -4,11 +4,11 @@ description: Learn how to get started using Windows Update for Business. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library -author: lomayor +author: greg-lindsay ms.localizationpriority: medium -ms.author: lomayor +ms.author: greg-lindsay ms.reviewer: -manager: dansimp +manager: laurawi ms.topic: article --- diff --git a/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool.md b/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool.md index 4091d13b4e..18c68ba130 100644 --- a/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool.md +++ b/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool.md @@ -3,13 +3,12 @@ title: Getting Started with the User State Migration Tool (USMT) (Windows 10) description: Getting Started with the User State Migration Tool (USMT) ms.assetid: 506ff1d2-94b8-4460-8672-56aad963504b ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor -ms.date: 04/19/2017 +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/usmt/migrate-application-settings.md b/windows/deployment/usmt/migrate-application-settings.md index 6cdbb764fc..42df4ca724 100644 --- a/windows/deployment/usmt/migrate-application-settings.md +++ b/windows/deployment/usmt/migrate-application-settings.md @@ -3,12 +3,12 @@ title: Migrate Application Settings (Windows 10) description: Migrate Application Settings ms.assetid: 28f70a83-0a3e-4a6b-968a-2b78ccd3cc07 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/migration-store-types-overview.md b/windows/deployment/usmt/migration-store-types-overview.md index c0a4e086b3..b27a83634c 100644 --- a/windows/deployment/usmt/migration-store-types-overview.md +++ b/windows/deployment/usmt/migration-store-types-overview.md @@ -3,12 +3,12 @@ title: Migration Store Types Overview (Windows 10) description: Migration Store Types Overview ms.assetid: 3b6ce746-76c6-43ff-8cd5-02ed0ae0cf70 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/offline-migration-reference.md b/windows/deployment/usmt/offline-migration-reference.md index 8ae2bd96b0..805c560048 100644 --- a/windows/deployment/usmt/offline-migration-reference.md +++ b/windows/deployment/usmt/offline-migration-reference.md @@ -3,12 +3,12 @@ title: Offline Migration Reference (Windows 10) description: Offline Migration Reference ms.assetid: f347547c-d601-4c3e-8f2d-0138edeacfda ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/understanding-migration-xml-files.md b/windows/deployment/usmt/understanding-migration-xml-files.md index 69edbd4515..1b14b72d27 100644 --- a/windows/deployment/usmt/understanding-migration-xml-files.md +++ b/windows/deployment/usmt/understanding-migration-xml-files.md @@ -3,12 +3,12 @@ title: Understanding Migration XML Files (Windows 10) description: Understanding Migration XML Files ms.assetid: d3d1fe89-085c-4da8-9657-fd54b8bfc4b7 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-best-practices.md b/windows/deployment/usmt/usmt-best-practices.md index 71c900fa77..ac51eb5045 100644 --- a/windows/deployment/usmt/usmt-best-practices.md +++ b/windows/deployment/usmt/usmt-best-practices.md @@ -3,12 +3,12 @@ title: USMT Best Practices (Windows 10) description: USMT Best Practices ms.assetid: e3cb1e78-4230-4eae-b179-e6e9160542d2 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-choose-migration-store-type.md b/windows/deployment/usmt/usmt-choose-migration-store-type.md index 30f49c1574..50445e7561 100644 --- a/windows/deployment/usmt/usmt-choose-migration-store-type.md +++ b/windows/deployment/usmt/usmt-choose-migration-store-type.md @@ -3,12 +3,12 @@ title: Choose a Migration Store Type (Windows 10) description: Choose a Migration Store Type ms.assetid: 4e163e90-9c57-490b-b849-2ed52ab6765f ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-command-line-syntax.md b/windows/deployment/usmt/usmt-command-line-syntax.md index c4e0977727..2f513af87c 100644 --- a/windows/deployment/usmt/usmt-command-line-syntax.md +++ b/windows/deployment/usmt/usmt-command-line-syntax.md @@ -3,12 +3,12 @@ title: User State Migration Tool (USMT) Command-line Syntax (Windows 10) description: User State Migration Tool (USMT) Command-line Syntax ms.assetid: f9d205c9-e824-46c7-8d8b-d7e4b52fd514 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-common-issues.md b/windows/deployment/usmt/usmt-common-issues.md index 6944af7cea..45c41d0914 100644 --- a/windows/deployment/usmt/usmt-common-issues.md +++ b/windows/deployment/usmt/usmt-common-issues.md @@ -3,13 +3,13 @@ title: Common Issues (Windows 10) description: Common Issues ms.assetid: 5a37e390-8617-4768-9eee-50397fbbb2e1 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.date: 09/19/2017 -author: lomayor +author: greg-lindsay ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-common-migration-scenarios.md b/windows/deployment/usmt/usmt-common-migration-scenarios.md index 4442b789c5..89f0dae0bd 100644 --- a/windows/deployment/usmt/usmt-common-migration-scenarios.md +++ b/windows/deployment/usmt/usmt-common-migration-scenarios.md @@ -3,12 +3,12 @@ title: Common Migration Scenarios (Windows 10) description: Common Migration Scenarios ms.assetid: 1d8170d5-e775-4963-b7a5-b55e8987c1e4 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-configxml-file.md b/windows/deployment/usmt/usmt-configxml-file.md index bde6f9635e..c1fea98e25 100644 --- a/windows/deployment/usmt/usmt-configxml-file.md +++ b/windows/deployment/usmt/usmt-configxml-file.md @@ -3,12 +3,12 @@ title: Config.xml File (Windows 10) description: Config.xml File ms.assetid: 9dc98e76-5155-4641-bcb3-81915db538e8 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-conflicts-and-precedence.md b/windows/deployment/usmt/usmt-conflicts-and-precedence.md index ed6b77296b..960dfab3e3 100644 --- a/windows/deployment/usmt/usmt-conflicts-and-precedence.md +++ b/windows/deployment/usmt/usmt-conflicts-and-precedence.md @@ -3,12 +3,12 @@ title: Conflicts and Precedence (Windows 10) description: Conflicts and Precedence ms.assetid: 0e2691a8-ff1e-4424-879b-4d5a2f8a113a ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-custom-xml-examples.md b/windows/deployment/usmt/usmt-custom-xml-examples.md index c937f9a6ab..cc48de1b6c 100644 --- a/windows/deployment/usmt/usmt-custom-xml-examples.md +++ b/windows/deployment/usmt/usmt-custom-xml-examples.md @@ -3,12 +3,12 @@ title: Custom XML Examples (Windows 10) description: Custom XML Examples ms.assetid: 48f441d9-6c66-43ef-91e9-7c78cde6fcc0 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-customize-xml-files.md b/windows/deployment/usmt/usmt-customize-xml-files.md index 113321c67a..de23e1d507 100644 --- a/windows/deployment/usmt/usmt-customize-xml-files.md +++ b/windows/deployment/usmt/usmt-customize-xml-files.md @@ -3,12 +3,12 @@ title: Customize USMT XML Files (Windows 10) description: Customize USMT XML Files ms.assetid: d58363c1-fd13-4f65-8b91-9986659dc93e ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-determine-what-to-migrate.md b/windows/deployment/usmt/usmt-determine-what-to-migrate.md index 5d036e690f..c301d5075d 100644 --- a/windows/deployment/usmt/usmt-determine-what-to-migrate.md +++ b/windows/deployment/usmt/usmt-determine-what-to-migrate.md @@ -3,12 +3,12 @@ title: Determine What to Migrate (Windows 10) description: Determine What to Migrate ms.assetid: 01ae1d13-c3eb-4618-b39d-ee5d18d55761 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-estimate-migration-store-size.md b/windows/deployment/usmt/usmt-estimate-migration-store-size.md index 48949d7a00..581f97e79a 100644 --- a/windows/deployment/usmt/usmt-estimate-migration-store-size.md +++ b/windows/deployment/usmt/usmt-estimate-migration-store-size.md @@ -3,12 +3,12 @@ title: Estimate Migration Store Size (Windows 10) description: Estimate Migration Store Size ms.assetid: cfb9062b-7a2a-467a-a24e-0b31ce830093 ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- diff --git a/windows/deployment/usmt/usmt-exclude-files-and-settings.md b/windows/deployment/usmt/usmt-exclude-files-and-settings.md index 0cdacd74e9..4566d2d488 100644 --- a/windows/deployment/usmt/usmt-exclude-files-and-settings.md +++ b/windows/deployment/usmt/usmt-exclude-files-and-settings.md @@ -3,12 +3,12 @@ title: Exclude Files and Settings (Windows 10) description: Exclude Files and Settings ms.assetid: df85baf1-6e29-4995-a4bb-ba3f8f7fed0b ms.reviewer: -manager: dansimp -ms.author: lomayor +manager: laurawi +ms.author: greglin ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library -author: lomayor +author: greg-lindsay ms.date: 04/19/2017 ms.topic: article --- From 1918354bb32000b43f8fe8ae091001f4fd977c12 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 13 Jun 2019 13:18:04 -0700 Subject: [PATCH 168/303] Fixed bookmarks --- .../mdm/mdm-enrollment-of-windows-devices.md | 4 ++-- .../new-in-windows-mdm-enrollment-management.md | 16 ++++++++-------- .../mdm/policy-csp-devicehealthmonitoring.md | 4 ++-- 3 files changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md b/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md index 380290bbc1..d2c9ee214d 100644 --- a/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md +++ b/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md @@ -228,7 +228,7 @@ All Windows 10-based devices can be connected to an MDM. You can connect to an ![access work or school](images/unifiedenrollment-rs1-30.png) -4. Click the **Enroll only in device management** link (available in servicing build 14393.82, KB3176934) . For older builds, use [Connecting your Windows 10-based device to work using a deep link](#connecting-your-windows10-based-device-to-work-using-a-deep-link). +4. Click the **Enroll only in device management** link (available in servicing build 14393.82, KB3176934) . For older builds, use [Connecting your Windows 10-based device to work using a deep link](#connecting-your-windows-10-based-device-to-work-using-a-deep-link). ![connect to work or school](images/unifiedenrollment-rs1-31.png) @@ -255,7 +255,7 @@ All Windows 10-based devices can be connected to an MDM. You can connect to an ![phone settings](images/unifiedenrollment-rs1-39.png) -3. Click the **Enroll only in device management** link. This is only available in the servicing build 14393.82 (KB3176934). For older builds, use [Connecting your Windows 10-based device to work using a deep link](#connecting-your-windows10-based-device-to-work-using-a-deep-link). +3. Click the **Enroll only in device management** link. This is only available in the servicing build 14393.82 (KB3176934). For older builds, use [Connecting your Windows 10-based device to work using a deep link](#connecting-your-windows-10-based-device-to-work-using-a-deep-link). ![access work or school page](images/unifiedenrollment-rs1-40.png) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 8cf23e8c68..5e7790b88c 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -33,7 +33,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - **Breaking changes and known issues** - [Get command inside an atomic command is not supported](#get-command-inside-an-atomic-command-is-not-supported) - - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10) + - [Notification channel URI not preserved during upgrade from Windows8.1 to Windows10](#notification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10) - [Apps installed using WMI classes are not removed](#apps-installed-using-wmi-classes-are-not-removed) - [Passing CDATA in SyncML does not work](#passing-cdata-in-syncml-does-not-work) - [SSL settings in IIS server for SCEP must be set to "Ignore"](#ssl-settings-in-iis-server-for-scep-must-be-set-to-ignore) @@ -43,15 +43,15 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [Version information for mobile devices](#version-information-for-mobile-devices) - [Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues](#upgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues) - [Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#apps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218) - - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#mcmcwfciw10mobile) + - [Multiple certificates might cause Wi-Fi connection instabilities in Windows10 Mobile](#multiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile) - [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices) - [MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#mdm-client-will-immediately-check-in-with-the-mdm-server-after-client-renews-wns-channel-uri) - - [User provisioning failure in Azure Active Directory joined Windows 10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows-10-pc) + - [User provisioning failure in Azure Active Directory joined Windows10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows-10-pc) - [Requirements to note for VPN certificates also used for Kerberos Authentication](#requirements-to-note-for-vpn-certificates-also-used-for-kerberos-authentication) - [Device management agent for the push-button reset is not working](#device-management-agent-for-the-push-button-reset-is-not-working) - **Frequently Asked Questions** - - [Can there be more than 1 MDM server to enroll and manage devices in Windows 10?](#ctbmt1mdmsteamdiw10) + - [Can there be more than 1 MDM server to enroll and manage devices in Windows 10?](#can-there-be-more-than-1-mdm-server-to-enroll-and-manage-devices-in-windows-10-?) - [How do I set the maximum number of Azure Active Directory joined devices per user?](#how-do-i-set-the-maximum-number-of-azure-active-directory-joined-devices-per-user) - [What is dmwappushsvc?](#what-is-dmwappushsvc) @@ -1586,7 +1586,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s In Windows 10, a Get command inside an atomic command is not supported. This was allowed in Windows Phone 8 and Windows Phone 8.1. -### Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10 +### Notification channel URI not preserved during upgrade from Windows8.1 to Windows10 During an upgrade from Windows 8.1 to Windows 10, the notification channel URI information is not preserved. In addition, the MDM client loses the PFN, AppID, and client secret. @@ -1652,7 +1652,7 @@ Applies only to phone prior to build 10586.218: When ApplicationManagement/Appli ``` -### Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile +### Multiple certificates might cause Wi-Fi connection instabilities in Windows10 Mobile In your deployment, if you have multiple certificates provisioned on the device and the Wi-Fi profile provisioned does not have a strict filtering criteria, you may see connection failures when connecting to Wi-Fi. The solution is to ensure that the Wi-Fi profile provisioned has strict filtering criteria such that it matches only one certificate. @@ -1833,7 +1833,7 @@ In Windows 10 Mobile, remote PIN reset in Azure AD joined devices are not suppo Starting in Windows 10, after the MDM client automatically renews the WNS channel URI, the MDM client will immediately check-in with the MDM server. Henceforth, for every MDM client check-in, the MDM server should send a GET request for "ProviderID/Push/ChannelURI" to retrieve the latest channel URI and compare it with the existing channel URI; then update the channel URI if necessary. -### User provisioning failure in Azure Active Directory joined Windows 10 PC +### User provisioning failure in Azure Active Directory joined Windows10 PC In Azure AD joined Windows 10 PC, provisioning /.User resources fails when the user is not logged in as an Azure AD user. If you attempt to join Azure AD from **Settings** > **System** > **About** user interface, make sure to log off and log on with Azure AD credentials to get your organizational configuration from your MDM server. This behavior is by design. @@ -1848,7 +1848,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware ## Frequently Asked Questions -### **Can there be more than 1 MDM server to enroll and manage devices in Windows 10?** +### **Can there be more than 1 MDM server to enroll and manage devices in Windows10?** No. Only one MDM is allowed. ### **How do I set the maximum number of Azure Active Directory joined devices per user?** diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md index 582e30c8fc..8434d381ef 100644 --- a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md +++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md @@ -126,7 +126,7 @@ The following list shows the supported values: -This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. +This policy is applicable only if the [AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. This policy modifies which health events are sent to Microsoft on the DeviceHealthMonitoring connection. IT Pros do not need to set this policy. Instead, Microsoft Intune is expected to dynamically manage this value in coordination with the Microsoft DeviceHealthMonitoring service. @@ -181,7 +181,7 @@ IT Pros do not need to set this policy. Instead, Microsoft Intune is expected to -This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. +This policy is applicable only if the [AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. The value of this policy constrains the DeviceHealthMonitoring connection to certain destinations in order to support regional and sovereign cloud scenarios. In most cases, an IT Pro does not need to define this policy. Instead, it is expected that this value is dynamically managed by Microsoft Intune to align with the region or cloud to which the device's tenant is already linked. Only configure this policy manually if explicitly instructed to do so by a Microsoft device monitoring service. From 33a9f224cf7fdee2d18e4cef9913ff0d4ec2a586 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Jun 2019 13:36:15 -0700 Subject: [PATCH 169/303] latest changes --- .../surface-hub-2s-change-history.md | 4 +- .../surface-hub-2s-site-readiness-guide.md | 24 ++++++++ .../surface-hub/surface-hub-2s-whats-new.md | 56 ++++++------------- 3 files changed, 44 insertions(+), 40 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-change-history.md b/devices/surface-hub/surface-hub-2s-change-history.md index e6d1ed496d..15c100dbba 100644 --- a/devices/surface-hub/surface-hub-2s-change-history.md +++ b/devices/surface-hub/surface-hub-2s-change-history.md @@ -11,4 +11,6 @@ ms.topic: article ms.localizationpriority: Normal --- -# Change history for Surface Hub 2S \ No newline at end of file +# Change history for Surface Hub 2S + +This topic will summarize new and updated content in the Surface Hub 2S documentation library. \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md index e69de29bb2..14e81e7afb 100644 --- a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md @@ -0,0 +1,24 @@ +--- +title: "Surface Hub 2S site readiness guide" +description: "Get familiar with site readiness requirements and recommendations for Surface Hub 2S." +keywords: separate values with commas +ms.prod: surface-hub +ms.sitesec: library +author: robmazz +ms.author: robmazz +audience: Admin +ms.topic: article +ms.localizationpriority: Normal +--- +# Surface Hub 2S site readiness guide + +## In this section + +| Topic | Description | +| ------------------------------------------------------------------------------------ | ---------------------------------------------------------------------------- | +| [Site planning for Surface Hub 2S](surface-hub-2s-site-planning.md) | Review room considerations and planning for peripherals. | +| [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) | Get an overview of required steps from unpacking to starting Surface Hub 2S. | +| [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) | Learn about licensed accessories for mounting Surface Hub 2S. | +| [Customizing installation of Surface Hub 2S](surface-hub-2s-custom-install.md) | Learn how to custom install without licensed mounting accessories. | +| [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) | Get details for I/O ports and keypad power and selection controls. | +| [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) | Learn about wired and wireless methods of connecting to Surface Hub. | \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 3373fa92a3..abf36a2e83 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -15,49 +15,27 @@ ms.localizationpriority: Normal Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork delivering a digital whiteboard, meetings platform, and a Windows 10 computing experience in one device. -## Modular design -A key part of the design of Surface Hub 2 is that it’s built to be modular and easily updateable when new features become available. With a removable processor cartridge on the back of the device Surface Hub 2S will be fully updatable to Surface Hub 2X simply by replacing the cartridge. For example, Surface Hub 2S already includes components and features that can be activated in Surface Hub 2X including the ability to tile multiple Surface Hubs together and rotate the device. -## UEFI management and recovery +| Capability | Summary | Learn more | +| ------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| MDM and UEFI manageability | Manage settings and policies using a mobile device management (MDM) provider.

        Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



        [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | +| Cloud and on-premises coexistence | Calling and meeting capabilities support coexistence of cloud and on premises solutions with side-by-side compatibility with Skype for Business. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | +| Reset and recovery | Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | +| Microsoft Whiteboard | Active Directory integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers on Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | +| Microsoft Teams Meeting Room License | Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | +| On-screen display | Adjust volume, brightness and input control directly on the display. | | +| Sensor-activated Connected Standby | Doppler sensor triggers energy conservation power state changes based on nearby presence, entering Connected Standby sleep state after 1 minute of inactivity.

        Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | +| Surface Hub pen | Ergonomically redesigned and easily attachable on the sides of the device. Pen firmware is updateable for future features. | | +| Surface app for Surface Hub 2S | | | +| Ready for tomorrow | Removable cartridge facilitates upgrading to new features. | | +| | | | -Surface Hub 2S is fully integrated with Surface Enterprise Management Mode (SEMM), enabling IT administrators to manage hardware components and firmware at the firmware level. For example you can restrict boot options, disable the various radios in the system such as Wi-Fi and Bluetooth, and lockdown access to the UEFI menu. To learn more about the SEMM technology that’s shared across Surface products, see [Microsoft Surface Enterprise Management Mode](https://docs.microsoft.com/surface/surface-enterprise-management-mode). + +For more information about what’s new in Surface Hub 2S, see: -## Mobile and untethered - -You can mount Surface Hub 2S using the optional [Steelcase Roam Mobile Stand](https://www.steelcase.com/products/collaboration/steelcase-roam/) making it easy to move the device between a conference rooms, huddle spaces, or wherever it needs to be. An optional lithium-ion [APC Charge Mobile Battery](https://www.apc.com/us/en/campaign/apc-charge-mobile-battery-for-microsoft-surface-hub-2.jsp) provides power to the device wherever you are using it, providing enough battery power to support a typical meeting lasting an hour or more. - -## Advanced display, camera and audio - -With Surface Hub 2S meetings sound and look crystal clear because of improved display, microphones, speakers, 4K camera and integration with Microsoft Teams and Skype for Business. - -- **Display:** A 50” 4K plus PixelSense anti-glare display with a 3:2 aspect ratio enables image clarity with high-quality pen and touch feel. -- **Camera:** The 4K camera delivers a 90-degree horizontal field of view designed to integrate natural colors and uniform lighting to enable a cognitively comfortable meeting experience. It includes an internal lens rotation mechanism that allows you to setup the field of view for either portrait or landscape. In the event of an accidental impact to the camera, resiliency in the form of a breakaway foot and integrated tether allow the camera to detach and bounce back without dropping to the floor. -- **Audio:** For enhanced audio clarity, even in noisy environments, sound is delivered using a pair of 2-way front facing, super wideband stereo speakers and a discrete bass module designed to faithfully reproduce the human voice. An integrated 8-microphone full band array uses spatial filtering (more commonly known as beamforming) to focus on people speaking in front of the device and ignore sounds from the sides or back of the room. New capabilities such as “smart voice automatic gain control” further minimize background noise to improve voice clarity. - -## Microsoft Teams - -Calling and meeting capabilities support coexistence of cloud and on premises solutions with side-by-side compatibility with Skype for Business. Microsoft Teams for Surface Hub enables “one-touch join” and up to four incoming video streams. - -## Microsoft Whiteboard - -Microsoft Whiteboard on Surface Hub 2S gives you a persistent digital canvas with features such as intelligent ink, Active Directory integration on Surface Hub 2. and Bing search. You can share the whiteboard across Windows, iOS, and Android devices and transform analog whiteboard images into digital ink, enabling them to blend as if it were originally created on Surface Hub. - -## New licensing options - -Take advantage of the [Microsoft Teams Meeting Room License](https://techcommunity.microsoft.com/t5/Surface-IT-Pro-Blog/New-Office-365-licensing-options-for-Surface-Hub/ba-p/339238) available in Office 365. This license covers Skype for Business, Microsoft Teams, and Intune. - -## On-screen display - -Surface Hub 2S provides an on-screen display that you can use to configure additional settings. - -## New power settings - -Like the original Surface Hub, when Surface Hub 2S detects that someone has entered the room, it wakes up and displays the Welcome screen. Surface Hub 2S now supports connected standby, the default power management state across Surface devices. It uses a Doppler sensor to trigger entering sleep state when a room is vacated or after a minute of no movement in the room or activity on the device. - -## New Surface Hub pen - -The new Surface Hub 2 pen includes a projective capacitance optically bonded sensor (PCOS) ative pen technology that facilitates real time writing without lag. The pen is powered with AAA batteries and comes with firmware that can be updated. +- [Surface Hub 2S product site](https://www.microsoft.com/en-us/p/surface-hub-2S/8P62MW6BN9G4?activetab=pivot:overviewtab) +- [Behind the Design Surface Hub 2S](https://techcommunity.microsoft.com/t5/Surface-IT-Pro-Blog/Behind-the-design-Surface-Hub-2S/ba-p/464099) ## Surface Hub 2S compared with Surface Hub From e040e8afabe3b4e42c715816995b15d783758148 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 13 Jun 2019 13:40:31 -0700 Subject: [PATCH 170/303] Fixed bookmark suggestions --- .../mdm/mdm-enrollment-of-windows-devices.md | 2 +- .../new-in-windows-mdm-enrollment-management.md | 16 ++++++++-------- 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md b/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md index d2c9ee214d..28a7ec571f 100644 --- a/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md +++ b/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md @@ -285,7 +285,7 @@ There are a few instances where your device may not be able to connect to work, -## Connecting your Windows 10-based device to work using a deep link +## Connecting your Windows 10-based device to work using a deep link Windows 10-based devices may be connected to work using a deep link. Users will be able to click or open a link in a particular format from anywhere in Windows 10 and be directed to the new enrollment experience. diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 5e7790b88c..d8463492ad 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -33,7 +33,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - **Breaking changes and known issues** - [Get command inside an atomic command is not supported](#get-command-inside-an-atomic-command-is-not-supported) - - [Notification channel URI not preserved during upgrade from Windows8.1 to Windows10](#notification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10) + - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10) - [Apps installed using WMI classes are not removed](#apps-installed-using-wmi-classes-are-not-removed) - [Passing CDATA in SyncML does not work](#passing-cdata-in-syncml-does-not-work) - [SSL settings in IIS server for SCEP must be set to "Ignore"](#ssl-settings-in-iis-server-for-scep-must-be-set-to-ignore) @@ -43,15 +43,15 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [Version information for mobile devices](#version-information-for-mobile-devices) - [Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues](#upgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues) - [Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#apps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218) - - [Multiple certificates might cause Wi-Fi connection instabilities in Windows10 Mobile](#multiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile) + - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#multiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile) - [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices) - [MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#mdm-client-will-immediately-check-in-with-the-mdm-server-after-client-renews-wns-channel-uri) - - [User provisioning failure in Azure Active Directory joined Windows10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows-10-pc) + - [User provisioning failure in Azure Active Directory joined Windows 10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows-10-pc) - [Requirements to note for VPN certificates also used for Kerberos Authentication](#requirements-to-note-for-vpn-certificates-also-used-for-kerberos-authentication) - [Device management agent for the push-button reset is not working](#device-management-agent-for-the-push-button-reset-is-not-working) - **Frequently Asked Questions** - - [Can there be more than 1 MDM server to enroll and manage devices in Windows 10?](#can-there-be-more-than-1-mdm-server-to-enroll-and-manage-devices-in-windows-10-?) + - [Can there be more than 1 MDM server to enroll and manage devices in Windows 10?](#can-there-be-more-than-1-mdm-server-to-enroll-and-manage-devices-in-windows-10) - [How do I set the maximum number of Azure Active Directory joined devices per user?](#how-do-i-set-the-maximum-number-of-azure-active-directory-joined-devices-per-user) - [What is dmwappushsvc?](#what-is-dmwappushsvc) @@ -1586,7 +1586,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s In Windows 10, a Get command inside an atomic command is not supported. This was allowed in Windows Phone 8 and Windows Phone 8.1. -### Notification channel URI not preserved during upgrade from Windows8.1 to Windows10 +### Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10 During an upgrade from Windows 8.1 to Windows 10, the notification channel URI information is not preserved. In addition, the MDM client loses the PFN, AppID, and client secret. @@ -1652,7 +1652,7 @@ Applies only to phone prior to build 10586.218: When ApplicationManagement/Appli ``` -### Multiple certificates might cause Wi-Fi connection instabilities in Windows10 Mobile +### Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile In your deployment, if you have multiple certificates provisioned on the device and the Wi-Fi profile provisioned does not have a strict filtering criteria, you may see connection failures when connecting to Wi-Fi. The solution is to ensure that the Wi-Fi profile provisioned has strict filtering criteria such that it matches only one certificate. @@ -1833,7 +1833,7 @@ In Windows 10 Mobile, remote PIN reset in Azure AD joined devices are not suppo Starting in Windows 10, after the MDM client automatically renews the WNS channel URI, the MDM client will immediately check-in with the MDM server. Henceforth, for every MDM client check-in, the MDM server should send a GET request for "ProviderID/Push/ChannelURI" to retrieve the latest channel URI and compare it with the existing channel URI; then update the channel URI if necessary. -### User provisioning failure in Azure Active Directory joined Windows10 PC +### User provisioning failure in Azure Active Directory joined Windows 10 PC In Azure AD joined Windows 10 PC, provisioning /.User resources fails when the user is not logged in as an Azure AD user. If you attempt to join Azure AD from **Settings** > **System** > **About** user interface, make sure to log off and log on with Azure AD credentials to get your organizational configuration from your MDM server. This behavior is by design. @@ -1848,7 +1848,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware ## Frequently Asked Questions -### **Can there be more than 1 MDM server to enroll and manage devices in Windows10?** +### **Can there be more than 1 MDM server to enroll and manage devices in Windows 10?** No. Only one MDM is allowed. ### **How do I set the maximum number of Azure Active Directory joined devices per user?** From 1c301ba8ab02d8ebd6b31e79627123ef566e243f Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 13 Jun 2019 14:46:13 -0700 Subject: [PATCH 171/303] Added DeviceHealthMonitoring heading --- windows/client-management/mdm/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index 79029616d0..e965f77361 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -208,6 +208,7 @@ #### [DeliveryOptimization](policy-csp-deliveryoptimization.md) #### [Desktop](policy-csp-desktop.md) #### [DeviceGuard](policy-csp-deviceguard.md) +#### [DeviceHealthMonitoring]((policy-csp-devicehealthmonitoring.md)) #### [DeviceInstallation](policy-csp-deviceinstallation.md) #### [DeviceLock](policy-csp-devicelock.md) #### [Display](policy-csp-display.md) From 06c97a869158cc4b13a1a137ed2b0bb53cc4e34e Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 13 Jun 2019 14:46:31 -0700 Subject: [PATCH 172/303] Update TOC.md --- windows/client-management/mdm/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md index e965f77361..4ec8751db6 100644 --- a/windows/client-management/mdm/TOC.md +++ b/windows/client-management/mdm/TOC.md @@ -208,7 +208,7 @@ #### [DeliveryOptimization](policy-csp-deliveryoptimization.md) #### [Desktop](policy-csp-desktop.md) #### [DeviceGuard](policy-csp-deviceguard.md) -#### [DeviceHealthMonitoring]((policy-csp-devicehealthmonitoring.md)) +#### [DeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md) #### [DeviceInstallation](policy-csp-deviceinstallation.md) #### [DeviceLock](policy-csp-devicelock.md) #### [Display](policy-csp-display.md) From a5dc72b26f0eeb993092c9156ef942c10a216abd Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Thu, 13 Jun 2019 14:59:12 -0700 Subject: [PATCH 173/303] Hub and landing page updates with JK --- devices/surface-hub/index.md | 25 +++++++------ ...> surface-hub-2s-secure-with-uefi-semm.md} | 0 devices/surface-hub/surface-hub-2s-uefi.md | 14 ------- devices/surface/get-started.md | 37 +++++++++++++------ 4 files changed, 38 insertions(+), 38 deletions(-) rename devices/surface-hub/{surface-hub-2s-secure-with-semm.md => surface-hub-2s-secure-with-uefi-semm.md} (100%) delete mode 100644 devices/surface-hub/surface-hub-2s-uefi.md diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index 2085210b3f..9485113b2e 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -12,7 +12,7 @@ description: "Get started with Microsoft Surface Hub." --- # Get started with Surface Hub -Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for brainstorming, collaboration, and presentations. Use the links to content below to learn how to plan, deploy, manage, and support your Surface Hub devices. +Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, collaboration, and presentations. Use the links to content below to learn how to plan, deploy, manage, and support your Surface Hub devices.
        • @@ -27,7 +27,7 @@ Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for @@ -44,8 +44,9 @@ Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for @@ -62,8 +63,9 @@ Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for @@ -83,8 +85,8 @@ Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for @@ -101,9 +103,8 @@ Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for @@ -115,7 +116,7 @@ Microsoft Surface Hub 2S and Surface Hub are all-in one productivity devices for
          - Support icon + Support icon
          diff --git a/devices/surface-hub/surface-hub-2s-secure-with-semm.md b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md similarity index 100% rename from devices/surface-hub/surface-hub-2s-secure-with-semm.md rename to devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md diff --git a/devices/surface-hub/surface-hub-2s-uefi.md b/devices/surface-hub/surface-hub-2s-uefi.md deleted file mode 100644 index 021b26e452..0000000000 --- a/devices/surface-hub/surface-hub-2s-uefi.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Secure and manage Surface Hub 2S with UEFI" -description: "Learn more securing Surface Hub 2S with UEFI." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Secure and manage Surface Hub 2S with UEFI \ No newline at end of file diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index 5db35c3cae..8698a60c0b 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -21,12 +21,16 @@ Harness the power of Surface, Windows, and Office connected together through the
          @@ -43,7 +47,8 @@ Harness the power of Surface, Windows, and Office connected together through the
          @@ -60,7 +65,9 @@ Harness the power of Surface, Windows, and Office connected together through the @@ -80,7 +87,9 @@ Harness the power of Surface, Windows, and Office connected together through the @@ -97,7 +106,9 @@ Harness the power of Surface, Windows, and Office connected together through the @@ -114,7 +125,8 @@ Harness the power of Surface, Windows, and Office connected together through the @@ -131,8 +143,8 @@ Harness the power of Surface, Windows, and Office connected together through the

          Get ready for Surface devices

          -

          Prepare your environment for Surface devices

          -

          Surface Device Readiness Guide

          +

          NEED UPDATE

          +

          NEED UPDATE

          @@ -144,8 +156,8 @@ Harness the power of Surface, Windows, and Office connected together through the

          Integrate with Surface devices

          -

          Surface devices with Windows 10

          -

          Surface devices and other operating systems

          +

          NEED UPDATE

          +

          NEED UPDATE

          @@ -157,7 +169,8 @@ Harness the power of Surface, Windows, and Office connected together through the

          Community

          -

          Join the Surface Devices Technical Community

          +

          Surface IT Pro blog

          +

          Surface Devices Tech Community

          From 48a8eba2565314977ebe2d202e64478ae503324d Mon Sep 17 00:00:00 2001 From: Chandler Deng Date: Thu, 13 Jun 2019 15:03:50 -0700 Subject: [PATCH 174/303] Update kiosk-shelllauncher.md --- windows/configuration/kiosk-shelllauncher.md | 28 ++++++++++++++++++-- 1 file changed, 26 insertions(+), 2 deletions(-) diff --git a/windows/configuration/kiosk-shelllauncher.md b/windows/configuration/kiosk-shelllauncher.md index 1e484e0795..8d69516231 100644 --- a/windows/configuration/kiosk-shelllauncher.md +++ b/windows/configuration/kiosk-shelllauncher.md @@ -110,7 +110,7 @@ The following XML sample works for **Shell Launcher v1**: ``` -For **Shell Launcher v2**, you will use a different schema reference and a different app type for `Shell`, as shown in the following example. +For **Shell Launcher v2**, you can use UWP app type for `Shell` by specifying the v2 namespace, and use `v2:AppType` to specify the type, as shown in the following example. If `v2:AppType` is not specified, it implies the shell is Win32 app. ``` @@ -138,7 +138,7 @@ In your MDM service, you can create a [custom OMA-URI setting](https://docs.micr The OMA-URI path is `./Device/Vendor/MSFT/AssignedAccess/ShellLauncher`. -For the value, you can select data type `String` and paste the desired configuration file content into the value box. If you wish to upload the xml instead of pasting the content, choose data type `String (XML file)` instead. +For the value, you can select data type `String` and paste the desired configuration file content into the value box. If you wish to upload the xml instead of pasting the content, choose data type `String (XML file)`. ![Screenshot of custom OMA-URI settings](images/slv2-oma-uri.png) @@ -282,3 +282,27 @@ $IsShellLauncherEnabled = $ShellLauncherClass.IsEnabled() "`nEnabled is set to " + $IsShellLauncherEnabled.Enabled ``` + +## default action, custom action, exit code +Shell launcher defines 4 actions to handle app exits, you can customize shell launcher and use these actions based on different exit code. + +Value|Description +--- | --- +0|Restart the shell +1|Restart the device +2|Shut down the device +3|Do nothing + +These action can be used as default action, or can be mapped to a specific exit code. Refer to [Shell Launcher](https://docs.microsoft.com/en-us/windows-hardware/customize/enterprise/wesl-usersettingsetcustomshell) to see how these codes with Shell Launcher WMI. + +To configure these action with Shell Launcher CSP, use below syntax in the shell launcher configuration xml. You can specify at most 4 custom actions mapping to 4 exit codes, and one default action for all other exit codes. When app exits and if the exit code is not found in the custom action mapping, or there is no default action defined, it will be no-op, i.e. nothing happens. So it's recommeded to at least define DefaultAction. [Get XML examples for different Shell Launcher v2 configurations.](https://github.com/Microsoft/Windows-iotcore-samples/tree/develop/Samples/ShellLauncherV2) +``` xml + + + + + + + + +``` From e4fd804795d936b5c4d7190954ccb6a907dd4a3b Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 13 Jun 2019 15:03:54 -0700 Subject: [PATCH 175/303] Fixed typo --- .../client-management/mdm/policy-csp-devicehealthmonitoring.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md index 8434d381ef..6d781a591a 100644 --- a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md +++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md @@ -128,7 +128,7 @@ The following list shows the supported values: This policy is applicable only if the [AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) policy has been set to 1 (Enabled) on the device. This policy modifies which health events are sent to Microsoft on the DeviceHealthMonitoring connection. -IT Pros do not need to set this policy. Instead, Microsoft Intune is expected to dynamically manage this value in coordination with the Microsoft DeviceHealthMonitoring service. +IT Pros do not need to set this policy. Instead, Microsoft Intune is expected to dynamically manage this value in coordination with the Microsoft device health monitoring service. From eb0a11326e11834bb80888b8f61e8efa5e06d937 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 13 Jun 2019 15:41:17 -0700 Subject: [PATCH 176/303] Minor edits to I242, I243 (#448) --- .../status-windows-10-1507.yml | 4 +-- ...indows-10-1607-and-windows-server-2016.yml | 14 ++-------- .../status-windows-10-1703.yml | 4 +-- .../status-windows-10-1709.yml | 14 ++-------- .../status-windows-10-1803.yml | 14 ++-------- ...indows-10-1809-and-windows-server-2019.yml | 6 ++--- .../status-windows-10-1903.yml | 4 +-- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 24 +++-------------- ...windows-8.1-and-windows-server-2012-r2.yml | 14 +++------- .../status-windows-server-2008-sp2.yml | 26 ++----------------- .../status-windows-server-2012.yml | 20 +++----------- 11 files changed, 28 insertions(+), 116 deletions(-) diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 6a2eec1758..93243a1403 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - +
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 10240.18244

          June 11, 2019
          KB4503291
          Mitigated
          June 12, 2019
          05:43 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 10240.18244

          June 11, 2019
          KB4503291
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 10240.18094

          January 08, 2019
          KB4480962
          Mitigated
          April 25, 2019
          02:00 PM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 10240.18215

          May 14, 2019
          KB4499154
          Resolved
          KB4505051
          May 19, 2019
          02:00 PM PT
          @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 10240.18244

          June 11, 2019
          KB4503291
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 10240.18244

          June 11, 2019
          KB4503291
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          " diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 9ed4799d06..6cb47efa7c 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + @@ -72,7 +72,6 @@ sections: -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Mitigated
          June 12, 2019
          05:43 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Mitigated
          June 13, 2019
          02:21 PM PT
          Some applications may fail to run as expected on clients of AD FS 2016
          Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016)

          See details >
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Mitigated
          June 07, 2019
          04:25 PM PT
          Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
          Some devices running Windows Server with Hyper-V enabled may start into Bitlocker recovery with error 0xC0210000

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Mitigated
          May 23, 2019
          09:57 AM PT
          Cluster service may fail if the minimum password length is set to greater than 14
          The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

          See details >
          OS Build 14393.2639

          November 27, 2018
          KB4467684
          Mitigated
          April 25, 2019
          02:00 PM PT
          Update not showing as applicable through WSUS or SCCM or when manually installed
          Update not showing as applicable through WSUS or SCCM or when manually installed

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4498947
          May 14, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4505052
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Resolved
          KB4494440
          May 14, 2019
          10:00 AM PT
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

          See details >
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Resolved
          KB4494440
          May 14, 2019
          10:00 AM PT
          " @@ -88,7 +87,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Some applications may fail to run as expected on clients of AD FS 2016
          Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016) after installation of KB4493473 on the server. Applications that may exhibit this behavior use an IFRAME during non-interactive authentication requests and receive X-Frame Options set to DENY.

          Affected platforms:
          • Server: Windows Server 2016
          Workaround: You can use the Allow-From value of the header if the IFRAME is only accessing pages from a single-origin URL. On the affected server, open a PowerShell window as an administrator and run the following command: set-AdfsResponseHeaders -SetHeaderName X-Frame-Options -SetHeaderValue \"allow-from https://example.com\"

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Mitigated
          Last updated:
          June 07, 2019
          04:25 PM PT

          Opened:
          June 04, 2019
          05:55 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503267.

          Back to top
          OS Build 14393.2999

          May 23, 2019
          KB4499177
          Resolved
          KB4503267
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          @@ -106,15 +105,6 @@ sections: " -- title: April 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493473
           
          Affected platforms:  
          • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
          • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
          Resolution: This issue was resolved in KB4494440.

          Back to top
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Resolved
          KB4494440
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          April 25, 2019
          02:00 PM PT
          - " - - title: March 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index c30a03c5ce..8b4ec480b0 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + @@ -80,7 +80,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Mitigated
          June 12, 2019
          05:43 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 15063.1563

          January 08, 2019
          KB4480973
          Mitigated
          April 25, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 15063.1839

          May 28, 2019
          KB4499162
          Resolved
          KB4503279
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 15063.1805

          May 14, 2019
          KB4499181
          Resolved
          KB4505055
          May 19, 2019
          02:00 PM PT
          - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503279.

          Back to top
          OS Build 15063.1839

          May 28, 2019
          KB4499162
          Resolved
          KB4503279
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index d6799cbaca..c2567e3d6c 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,12 +60,11 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Mitigated
          June 12, 2019
          05:43 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 16299.904

          January 08, 2019
          KB4480978
          Mitigated
          April 25, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 16299.1182

          May 28, 2019
          KB4499147
          Resolved
          KB4503284
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 16299.1143

          May 14, 2019
          KB4498946
          Resolved
          KB4505062
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 16299.1127

          April 25, 2019
          KB4493440
          Resolved
          KB4499179
          May 14, 2019
          10:00 AM PT
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

          See details >
          OS Build 16299.1127

          April 25, 2019
          KB4493440
          Resolved
          KB4499179
          May 14, 2019
          10:00 AM PT
          " @@ -81,7 +80,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503284.

          Back to top
          OS Build 16299.1182

          May 28, 2019
          KB4499147
          Resolved
          KB4503284
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " @@ -96,15 +95,6 @@ sections: " -- title: April 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493440
           
          Affected platforms:  
          • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
          • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
          Resolution: This issue was resolved in KB4499179.

          Back to top
          OS Build 16299.1127

          April 25, 2019
          KB4493440
          Resolved
          KB4499179
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          April 25, 2019
          02:00 PM PT
          - " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index 1f4862558b..e5e520f52d 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -60,13 +60,12 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          June 12, 2019
          05:43 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 17134.523

          January 08, 2019
          KB4480966
          Mitigated
          April 25, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

          See details >
          OS Build 17134.648

          March 12, 2019
          KB4489868
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17134.765

          May 14, 2019
          KB4499167
          Resolved
          KB4505064
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 17134.753

          April 25, 2019
          KB4493437
          Resolved
          KB4499167
          May 14, 2019
          10:00 AM PT
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

          See details >
          OS Build 17134.753

          April 25, 2019
          KB4493437
          Resolved
          KB4499167
          May 14, 2019
          10:00 AM PT
          " @@ -82,7 +81,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503286.

          Back to top
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " @@ -97,15 +96,6 @@ sections: " -- title: April 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4493437
           
          Affected platforms:  
          • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
          • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
          Resolution: This issue was resolved in KB4499167.

          Back to top
          OS Build 17134.753

          April 25, 2019
          KB4493437
          Resolved
          KB4499167
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          April 25, 2019
          02:00 PM PT
          - " - - title: March 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index af3528cf49..9702c0dc1a 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,7 +65,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + @@ -75,7 +75,6 @@ sections: -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          June 12, 2019
          05:43 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          June 13, 2019
          02:21 PM PT
          Devices with some Asian language packs installed may receive an error
          After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

          See details >
          OS Build 17763.437

          April 09, 2019
          KB4493509
          Mitigated
          May 03, 2019
          10:59 AM PT
          Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
          Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Mitigated
          May 02, 2019
          04:47 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 17763.253

          January 08, 2019
          KB4480116
          Mitigated
          April 09, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4505056
          May 19, 2019
          02:00 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Some customers are reporting that KB4494441 installed twice on their device

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          May 16, 2019
          02:37 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 17763.475

          May 03, 2019
          KB4495667
          Resolved
          KB4494441
          May 14, 2019
          10:00 AM PT
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail.

          See details >
          OS Build 17763.475

          May 03, 2019
          KB4495667
          Resolved
          KB4494441
          May 14, 2019
          10:00 AM PT
          " @@ -91,7 +90,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503327.

          Back to top
          OS Build 17763.529

          May 21, 2019
          KB4497934
          Resolved
          KB4503327
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " @@ -106,7 +105,6 @@ sections:
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505056) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505056 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505056, search for it in the Microsoft Update Catalog.
           

          Back to topOS Build 17763.503

          May 14, 2019
          KB4494441Resolved
          KB4505056Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Affected platforms:
          • Client: Windows 10, version 1809
          Cause:
          In certain situations, installing an update requires multiple download and restart steps. In cases where two intermediate steps of the installation complete successfully, the View your Update history page will report that installation completed successfully twice. 

          Resolution:
          No action is required on your part. The update installation may take longer and may require more than one restart, but will install successfully after all intermediate installation steps have completed. We are working on improving this update experience to ensure the Update history correctly reflects the installation of the latest cumulative update (LCU).

          Back to topOS Build 17763.503

          May 14, 2019
          KB4494441Resolved
          Resolved:
          May 16, 2019
          02:37 PM PT

          Opened:
          May 14, 2019
          02:56 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to topOS Build 17763.475

          May 03, 2019
          KB4495667Resolved
          KB4494441Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT -
          Zone transfers over TCP may fail
          Zone transfers between primary and secondary DNS servers over the Transmission Control Protocol (TCP) may fail after installing KB4495667
           
          Affected platforms:  
          • Client: Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016 
          • Server: Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016 
          Resolution: This issue was resolved in KB4494441.

          Back to topOS Build 17763.475

          May 03, 2019
          KB4495667Resolved
          KB4494441Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 14, 2019
          01:19 PM PT " diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 713ffe86b5..d8fce2b490 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -69,7 +69,7 @@ sections:
          Loss of functionality in Dynabook Smartphone Link app
          After updating to Windows 10, version 1903, you may experience a loss of functionality when using the Dynabook Smartphone Link application.

          See details >OS Build 18362.116

          May 20, 2019
          KB4505057Investigating
          May 24, 2019
          03:10 PM PT
          Display brightness may not respond to adjustments
          Microsoft and Intel have identified a driver compatibility issue on devices configured with certain Intel display drivers.

          See details >OS Build 18362.116

          May 21, 2019
          KB4505057Investigating
          May 21, 2019
          04:47 PM PT
          Audio not working with Dolby Atmos headphones and home theater
          Users may experience audio loss with Dolby Atmos headphones or Dolby Atmos home theater.

          See details >OS Build 18362.116

          May 21, 2019
          KB4505057Investigating
          May 21, 2019
          07:17 AM PT -
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >OS Build 18362.175

          June 11, 2019
          KB4503293Mitigated
          June 12, 2019
          05:43 PM PT +
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >OS Build 18362.175

          June 11, 2019
          KB4503293Mitigated
          June 13, 2019
          02:21 PM PT
          Error attempting to update with external USB device or memory card attached
          PCs with an external USB device or SD memory card attached may get error: \"This PC can't be upgraded to Windows 10.\"

          See details >OS Build 18362.116

          May 21, 2019
          KB4505057Mitigated
          June 11, 2019
          12:34 PM PT
          Gamma ramps, color profiles, and night light settings do not apply in some cases
          Microsoft has identified some scenarios where gamma ramps, color profiles and night light settings may stop working.

          See details >OS Build 18362.116

          May 21, 2019
          KB4505057Mitigated
          May 24, 2019
          11:02 AM PT
          Unable to discover or connect to Bluetooth devices
          Microsoft has identified compatibility issues with some versions of Realtek and Qualcomm Bluetooth radio drivers.

          See details >OS Build 18362.116

          May 21, 2019
          KB4505057Mitigated
          May 21, 2019
          04:48 PM PT @@ -95,7 +95,7 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 18362.175

          June 11, 2019
          KB4503293
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 18362.175

          June 11, 2019
          KB4503293
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          " diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index b9c2807c45..15933ee460 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -60,14 +60,10 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - - + + - - - -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503292
          Mitigated
          June 12, 2019
          05:43 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >
          May 14, 2019
          KB4499164
          Mitigated
          June 07, 2019
          02:57 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503292
          Mitigated
          June 13, 2019
          02:21 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >
          May 14, 2019
          KB4499164
          Mitigated
          June 13, 2019
          02:21 PM PT
          System may be unresponsive after restart with certain McAfee antivirus products
          Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

          See details >
          April 09, 2019
          KB4493472
          Mitigated
          April 25, 2019
          02:00 PM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          May 14, 2019
          KB4499164
          Resolved
          KB4505050
          May 18, 2019
          02:00 PM PT
          System may be unresponsive after restart if ArcaBit antivirus software installed
          Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493472
          Resolved
          May 14, 2019
          01:23 PM PT
          System unresponsive after restart if Sophos Endpoint Protection installed
          Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493472
          Resolved
          May 14, 2019
          01:22 PM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Devices with Avira antivirus software installed may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493472
          Resolved
          May 14, 2019
          01:21 PM PT
          Authentication may fail for services after the Kerberos ticket expires
          Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

          See details >
          March 12, 2019
          KB4489878
          Resolved
          KB4499164
          May 14, 2019
          10:00 AM PT
          " @@ -83,8 +79,8 @@ sections: - type: markdown text: " - - + +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          June 11, 2019
          KB4503292
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


          Affected platforms:
          • Client: Windows 7 SP1; Windows 8.1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

          Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

          Next steps: We are working on a resolution and estimate a solution will be available in mid-July.

          Back to top
          May 14, 2019
          KB4499164
          Mitigated
          Last updated:
          June 07, 2019
          02:57 PM PT

          Opened:
          June 07, 2019
          02:57 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          June 11, 2019
          KB4503292
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


          Affected platforms:
          • Client: Windows 7 SP1; Windows 8.1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

          Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          May 14, 2019
          KB4499164
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 07, 2019
          02:57 PM PT
          " @@ -103,17 +99,5 @@ sections: text: " - - - -
          DetailsOriginating updateStatusHistory
          System may be unresponsive after restart with certain McAfee antivirus products
          Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

          Affected platforms:
          • Client:  Windows 8.1; Windows 7 SP1
          • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
          Workaround: Guidance for McAfee customers can be found in the following McAfee support articles: 
          Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information.

          Back to top
          April 09, 2019
          KB4493472
          Mitigated
          Last updated:
          April 25, 2019
          02:00 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System may be unresponsive after restart if ArcaBit antivirus software installed
          Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

          Affected platforms:
          • Client: Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

          Back to top
          April 09, 2019
          KB4493472
          Resolved
          Resolved:
          May 14, 2019
          01:23 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System unresponsive after restart if Sophos Endpoint Protection installed
          Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493472.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Sophos has released an update to address this issue. Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

          Back to top
          April 09, 2019
          KB4493472
          Resolved
          Resolved:
          May 14, 2019
          01:22 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493472.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1 
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

          Back to top
          April 09, 2019
          KB4493472
          Resolved
          Resolved:
          May 14, 2019
          01:21 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          - " - -- title: March 2019 -- items: - - type: markdown - text: " - -
          DetailsOriginating updateStatusHistory
          Authentication may fail for services after the Kerberos ticket expires
          After installing KB4489878, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

          Affected platforms: 
          • Client: Windows 7 SP1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4499164.

          Back to top
          March 12, 2019
          KB4489878
          Resolved
          KB4499164
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          March 12, 2019
          10:00 AM PT
          " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 8aa99cced1..cf15004033 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -60,17 +60,14 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - - + + - - -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503276
          Mitigated
          June 12, 2019
          05:43 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >
          May 14, 2019
          KB4499151
          Mitigated
          June 07, 2019
          02:57 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503276
          Mitigated
          June 13, 2019
          02:21 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >
          May 14, 2019
          KB4499151
          Mitigated
          June 13, 2019
          02:21 PM PT
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          See details >
          April 25, 2019
          KB4493443
          Mitigated
          May 15, 2019
          05:53 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

          See details >
          January 08, 2019
          KB4480963
          Mitigated
          April 25, 2019
          02:00 PM PT
          System may be unresponsive after restart with certain McAfee antivirus products
          Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

          See details >
          April 09, 2019
          KB4493446
          Mitigated
          April 18, 2019
          05:00 PM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >
          March 12, 2019
          KB4489881
          Resolved
          KB4503276
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          May 14, 2019
          KB4499151
          Resolved
          KB4505050
          May 18, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          April 25, 2019
          KB4493443
          Resolved
          KB4499151
          May 14, 2019
          10:00 AM PT
          System may be unresponsive after restart if ArcaBit antivirus software installed
          Devices with ArcaBit antivirus software installed may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493446
          Resolved
          May 14, 2019
          01:22 PM PT
          System unresponsive after restart if Sophos Endpoint Protection installed
          Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493446
          Resolved
          May 14, 2019
          01:22 PM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Devices with Avira antivirus software installed may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493446
          Resolved
          May 14, 2019
          01:21 PM PT
          " @@ -86,8 +83,8 @@ sections: - type: markdown text: " - - + +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          June 11, 2019
          KB4503276
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


          Affected platforms:
          • Client: Windows 7 SP1; Windows 8.1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

          Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

          Next steps: We are working on a resolution and estimate a solution will be available in mid-July.

          Back to top
          May 14, 2019
          KB4499151
          Mitigated
          Last updated:
          June 07, 2019
          02:57 PM PT

          Opened:
          June 07, 2019
          02:57 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          June 11, 2019
          KB4503276
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


          Affected platforms:
          • Client: Windows 7 SP1; Windows 8.1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

          Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          May 14, 2019
          KB4499151
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 07, 2019
          02:57 PM PT
          " @@ -108,9 +105,6 @@ sections: text: " - - -
          DetailsOriginating updateStatusHistory
          System may be unresponsive after restart with certain McAfee antivirus products
          Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update. 

          Affected platforms:
          • Client:  Windows 8.1; Windows 7 SP1
          • Server:  Windows Server 2012 R2; Windows Server 2008 R2 SP1
          Workaround: Guidance for McAfee customers can be found in the following McAfee support articles:  
          Next steps: We are presently investigating this issue with McAfee. We will provide an update once we have more information. 

          Back to top
          April 09, 2019
          KB4493446
          Mitigated
          Last updated:
          April 18, 2019
          05:00 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System may be unresponsive after restart if ArcaBit antivirus software installed
          Microsoft and ArcaBit have identified an issue on devices with ArcaBit antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

          Affected platforms:
          • Client: Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2012 R2; Windows Server 2008 R2 SP1
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. ArcaBit has released an update to address this issue. For more information, see the Arcabit support article.

          Back to top
          April 09, 2019
          KB4493446
          Resolved
          Resolved:
          May 14, 2019
          01:22 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System unresponsive after restart if Sophos Endpoint Protection installed
          Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493446.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Sophos has released an update to address this issue. Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

          Back to top
          April 09, 2019
          KB4493446
          Resolved
          Resolved:
          May 14, 2019
          01:22 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493446.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1 
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2 
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

          Back to top
          April 09, 2019
          KB4493446
          Resolved
          Resolved:
          May 14, 2019
          01:21 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          " diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 712250b6be..584416430c 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -60,10 +60,7 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - - - - +
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503273
          Mitigated
          June 12, 2019
          05:43 PM PT
          System unresponsive after restart if Sophos Endpoint Protection installed
          Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493471
          Resolved
          May 14, 2019
          01:21 PM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Devices with Avira antivirus software installed may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493471
          Resolved
          May 14, 2019
          01:19 PM PT
          Authentication may fail for services after the Kerberos ticket expires
          Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires.

          See details >
          March 12, 2019
          KB4489880
          Resolved
          KB4499149
          May 14, 2019
          10:00 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503273
          Mitigated
          June 13, 2019
          02:21 PM PT
          " @@ -79,25 +76,6 @@ sections: - type: markdown text: " - -
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          June 11, 2019
          KB4503273
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          - " - -- title: April 2019 -- items: - - type: markdown - text: " - - - -
          DetailsOriginating updateStatusHistory
          System unresponsive after restart if Sophos Endpoint Protection installed
          Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493471.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Sophos has released an update to address this issue. Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

          Back to top
          April 09, 2019
          KB4493471
          Resolved
          Resolved:
          May 14, 2019
          01:21 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493471.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1 
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

          Back to top
          April 09, 2019
          KB4493471
          Resolved
          Resolved:
          May 14, 2019
          01:19 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          - " - -- title: March 2019 -- items: - - type: markdown - text: " - - +
          DetailsOriginating updateStatusHistory
          Authentication may fail for services after the Kerberos ticket expires
          After installing KB4489880, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.

          Affected platforms: 
          • Client: Windows 7 SP1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4499149.

          Back to top
          March 12, 2019
          KB4489880
          Resolved
          KB4499149
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          March 12, 2019
          10:00 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          June 11, 2019
          KB4503273
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          " diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 9136d15fb3..4d8ccb2267 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,15 +60,13 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - - + + - -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503285
          Mitigated
          June 12, 2019
          05:43 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >
          May 14, 2019
          KB4499171
          Mitigated
          June 07, 2019
          02:57 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          June 11, 2019
          KB4503285
          Mitigated
          June 13, 2019
          02:21 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >
          May 14, 2019
          KB4499171
          Mitigated
          June 13, 2019
          02:21 PM PT
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          See details >
          April 25, 2019
          KB4493462
          Mitigated
          May 15, 2019
          05:53 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

          See details >
          January 08, 2019
          KB4480975
          Mitigated
          April 25, 2019
          02:00 PM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >
          March 12, 2019
          KB4489891
          Resolved
          KB4503285
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          May 14, 2019
          KB4499171
          Resolved
          KB4505050
          May 18, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          April 25, 2019
          KB4493462
          Resolved
          KB4499171
          May 14, 2019
          10:00 AM PT
          System unresponsive after restart if Sophos Endpoint Protection installed
          Devices with Sophos Endpoint Protection installed and managed by Sophos Central or Sophos Enterprise Console (SEC) may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493451
          Resolved
          May 14, 2019
          01:21 PM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Devices with Avira antivirus software installed may become unresponsive upon restart.

          See details >
          April 09, 2019
          KB4493451
          Resolved
          May 14, 2019
          01:19 PM PT
          " @@ -84,8 +82,8 @@ sections: - type: markdown text: " - - + +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the error using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To workaround this issue, see KB4508640.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          June 11, 2019
          KB4503285
          Mitigated
          Last updated:
          June 12, 2019
          05:43 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


          Affected platforms:
          • Client: Windows 7 SP1; Windows 8.1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

          Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

          Next steps: We are working on a resolution and estimate a solution will be available in mid-July.

          Back to top
          May 14, 2019
          KB4499171
          Mitigated
          Last updated:
          June 07, 2019
          02:57 PM PT

          Opened:
          June 07, 2019
          02:57 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          June 11, 2019
          KB4503285
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


          Affected platforms:
          • Client: Windows 7 SP1; Windows 8.1
          • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

          Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          May 14, 2019
          KB4499171
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 07, 2019
          02:57 PM PT
          " @@ -100,16 +98,6 @@ sections: " -- title: April 2019 -- items: - - type: markdown - text: " - - - -
          DetailsOriginating updateStatusHistory
          System unresponsive after restart if Sophos Endpoint Protection installed
          Microsoft and Sophos have identified an issue on devices with Sophos Endpoint Protection installed and managed by either Sophos Central or Sophos Enterprise Console (SEC) that may cause the system to become unresponsive upon restart after installing KB4493451.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Sophos has released an update to address this issue. Guidance for Sophos Endpoint and Sophos Enterprise Console customers can be found in the Sophos support article.

          Back to top
          April 09, 2019
          KB4493451
          Resolved
          Resolved:
          May 14, 2019
          01:21 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          System may be unresponsive after restart if Avira antivirus software installed
          Microsoft and Avira have identified an issue on devices with Avira antivirus software installed that may cause the system to become unresponsive upon restart after installing KB4493451.

          Affected platforms: 
          • Client: Windows 8.1; Windows 7 SP1 
          • Server: Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue has been resolved. Microsoft has removed the temporary block for all affected Windows updates. Avira has released an automatic update to address this issue. Guidance for Avira customers can be found in the Avira support article.

          Back to top
          April 09, 2019
          KB4493451
          Resolved
          Resolved:
          May 14, 2019
          01:19 PM PT

          Opened:
          April 09, 2019
          10:00 AM PT
          - " - - title: March 2019 - items: - type: markdown From 8b1650b52ae341fb27c503155987bf95e0395382 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Jun 2019 16:00:45 -0700 Subject: [PATCH 177/303] New page per tools team request --- devices/surface/TOC.md | 2 -- .../surface/surface-diagnostic-toolkit-for-business-intro.md | 0 2 files changed, 2 deletions(-) create mode 100644 devices/surface/surface-diagnostic-toolkit-for-business-intro.md diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 1cb8990822..3b0acc91f0 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -36,5 +36,3 @@ ## [Surface Data Eraser](microsoft-surface-data-eraser.md) ## [Top support solutions for Surface devices](support-solutions-surface.md) ## [Change history for Surface documentation](change-history-for-surface.md) - - diff --git a/devices/surface/surface-diagnostic-toolkit-for-business-intro.md b/devices/surface/surface-diagnostic-toolkit-for-business-intro.md new file mode 100644 index 0000000000..e69de29bb2 From baa3bf14160fd1bbd2b5ef006c06c3f26695f5ae Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Jun 2019 16:09:27 -0700 Subject: [PATCH 178/303] updates change history rename sdtb page to deploy..... --- devices/surface/change-history-for-surface.md | 8 ++++ .../surface-diagnostic-toolkit-business.md | 2 +- ...e-diagnostic-toolkit-for-business-intro.md | 42 +++++++++++++++++++ 3 files changed, 51 insertions(+), 1 deletion(-) diff --git a/devices/surface/change-history-for-surface.md b/devices/surface/change-history-for-surface.md index d4e7df2e2b..312c8a39b2 100644 --- a/devices/surface/change-history-for-surface.md +++ b/devices/surface/change-history-for-surface.md @@ -15,10 +15,18 @@ ms.topic: article This topic lists new and updated topics in the Surface documentation library. +## June 2019 + +New or changed topic | Description +--- | --- + +[Fix common Surface problems using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-for-business-intro.md) | New + ## March 2019 New or changed topic | Description --- | --- + [Surface System SKU reference](surface-system-sku-reference.md) | New diff --git a/devices/surface/surface-diagnostic-toolkit-business.md b/devices/surface/surface-diagnostic-toolkit-business.md index ad0823f286..34551c95a0 100644 --- a/devices/surface/surface-diagnostic-toolkit-business.md +++ b/devices/surface/surface-diagnostic-toolkit-business.md @@ -1,5 +1,5 @@ --- -title: Surface Diagnostic Toolkit for Business +title: Deploy Surface Diagnostic Toolkit for Business description: This topic explains how to use the Surface Diagnostic Toolkit for Business. ms.prod: w10 ms.mktglfcycl: manage diff --git a/devices/surface/surface-diagnostic-toolkit-for-business-intro.md b/devices/surface/surface-diagnostic-toolkit-for-business-intro.md index e69de29bb2..514bd6b4ac 100644 --- a/devices/surface/surface-diagnostic-toolkit-for-business-intro.md +++ b/devices/surface/surface-diagnostic-toolkit-for-business-intro.md @@ -0,0 +1,42 @@ +--- +title: Fix common Surface problems using the Surface Diagnostic Toolkit for Business +description: This page provides an introduction to the Surface Diagnostic Toolkit for Business for use in commercial environments. +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +author: dansimp +ms.author: dansimp +ms.topic: article +ms.date: 06/11/2019 +ms.reviewer: cottmca +manager: dansimp +--- + +# Fix common Surface problems using the Surface Diagnostic Toolkit for Business + +If your Surface isn’t working properly, the Microsoft Surface Diagnostic Toolkit for Business can help you or your administrator find and solve problems. + +> [!NOTE] +> Surface Diagnostic Toolkit for Business is built for commercial devices. If your device is a personal device and not managed by your work or school run the [Surface Diagnostic Toolkit](https://support.microsoft.com/en-us/help/4037239/surface-fix-common-surface-problems-using-surface-diagnostic-toolkit) instead. + +## Run the Surface Diagnostic Toolkit for Business + +Before you run the diagnostic tool, make sure you have the latest Windows updates. Go to [Install Surface and Windows 10 updates](https://support.microsoft.com/en-us/help/4023505/surface-install-surface-and-windows-updates) for more information. If that doesn't solve the problem, you'll need to run the diagnostic tool. + +> [!NOTE] +> The Surface Diagnostic Toolkit for Business only works on Surface devices running Windows 10. It does not work on Surface Pro, Surface Pro 2, or Surface devices configured in S mode. + +**To run the Surface Diagnostic Toolkit for Business:** + +1. Download the [Surface Diagnostic Toolkit for Business](https://aka.ms/checkmysurface). +2. Select Run and follow the on-screen instructions. + +The diagnosis and repair time averages 15 minutes but could take an hour or longer, depending on internet connection speed and the number of updates or repairs required. For more detailed information on Surface Diagnostic Toolkit for Business, refer to [Deploy Surface Diagnostic Toolkit for Business](https://docs.microsoft.com/en-us/surface/surface-diagnostic-toolkit-business). + +# If you still need help + +If the Surface Diagnostic Toolkit for Business didn’t fix the problem, you can also: + +- Make an in-store appointment: We might be able to fix the problem or provide a replacement Surface at your local Microsoft Store. [Locate a Microsoft Store near you](https://www.microsoft.com/en-us/store/locations/find-a-store?WT.mc_id=MSC_Solutions_en_us_scheduleappt). +- Contact customer support: If you want to talk to someone about how to fix your problem, [contact us](https://support.microsoft.com/en-us/help/4037645/contact-surface-warranty-and-software-support-for-business). +- Get your Surface serviced: If your Surface product needs service, [request it online](https://mybusinessservice.surface.com/). From e5eb46b0d4daa89b3b9d89211dbdc86be87dbff4 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 13 Jun 2019 16:29:01 -0700 Subject: [PATCH 179/303] Update surface-diagnostic-toolkit-business.md --- devices/surface/surface-diagnostic-toolkit-business.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/surface-diagnostic-toolkit-business.md b/devices/surface/surface-diagnostic-toolkit-business.md index 34551c95a0..82d39fd1a8 100644 --- a/devices/surface/surface-diagnostic-toolkit-business.md +++ b/devices/surface/surface-diagnostic-toolkit-business.md @@ -12,7 +12,7 @@ ms.reviewer: manager: dansimp --- -# Surface Diagnostic Toolkit for Business +# Deploy Surface Diagnostic Toolkit for Business The Microsoft Surface Diagnostic Toolkit for Business (SDT) enables IT administrators to quickly investigate, troubleshoot, and resolve hardware, software, and firmware issues with Surface devices. You can run a range of diagnostic tests and software repairs in addition to obtaining device health insights and guidance for resolving issues. From 479b749588e708121568b2757d63883ee8be95b1 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 13 Jun 2019 18:26:06 -0700 Subject: [PATCH 180/303] small formatting change --- .../windows-autopilot/windows-autopilot-requirements.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index f4f79e0f88..720370ca95 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -45,7 +45,9 @@ Windows Autopilot depends on a variety of internet-based services. Access to the In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the required services. For additional details about each of these services and their specific requirements, review the following details: -
          ServiceInformation -
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
          +
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used:
          +
          • https://ztd.dds.microsoft.com
          • +
          • https://cs.dds.microsoft.com
          For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about problems that might occur when you connect to the Internet through a proxy server.
          Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information. From 9ff9b74ab703fb6b6e6951c327a476386c7f5204 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 13 Jun 2019 18:37:44 -0700 Subject: [PATCH 181/303] fix broken link --- .../threat-protection/microsoft-defender-atp/preview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index 726d1f8e75..ebc7ab056b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -42,7 +42,7 @@ Turn on the preview experience setting to be among the first to try upcoming fea ## Preview features The following features are included in the preview release: -- [Windows Server 2008 R2 SP1]
          You can now onboard Windows Server 2008 R2 SP1. +- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints#windows-server-2008-r2-sp1--windows-server-2012-r2-and-windows-server-2016)
          You can now onboard Windows Server 2008 R2 SP1. - [Microsoft Defender ATP for Mac](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac)
          Microsoft Defender ATP for Mac brings the next-generation protection, and endpoint detection and response coverage to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices. From 0320c002e420e20b533e97861fb1c1079520c829 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 13 Jun 2019 22:10:42 -0700 Subject: [PATCH 182/303] add pre-release --- .../microsoft-defender-atp/configure-server-endpoints.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index 2a52070897..69993debe0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -20,7 +20,7 @@ ms.topic: article **Applies to:** -- Windows Server 2008 R2 SP1 +- Windows Server 2008 R2 SP1 (pre-release) - Windows Server 2012 R2 - Windows Server 2016 - Windows Server, version 1803 @@ -35,7 +35,7 @@ ms.topic: article Microsoft Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Microsoft Defender Security Center console. The service supports the onboarding of the following servers: -- Windows Server 2008 R2 SP1 +- Windows Server 2008 R2 SP1 (pre-release) - Windows Server 2012 R2 - Windows Server 2016 - Windows Server, version 1803 From e5999f1349bc9d84d2e69bc3322962b38ba94200 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 14 Jun 2019 22:36:41 +0500 Subject: [PATCH 183/303] Hybrid AAD was not listed Hybrid AAD was not listed in the list. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/2111 --- .../windows-autopilot/windows-autopilot-requirements.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index 720370ca95..40ae947ed4 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -45,9 +45,7 @@ Windows Autopilot depends on a variety of internet-based services. Access to the In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the required services. For additional details about each of these services and their specific requirements, review the following details:
          ServiceInformation -
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used:
          -
          • https://ztd.dds.microsoft.com
          • -
          • https://cs.dds.microsoft.com
          +
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
          For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about problems that might occur when you connect to the Internet through a proxy server.
          Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information. @@ -77,6 +75,7 @@ If the Microsoft Store is not accessible, the AutoPilot process will still conti
          Office 365As part of the Intune device configuration, installation of Office 365 ProPlus may be required. For more information, see Office 365 URLs and IP address ranges (includes all Office services, DNS names, IP addresses; includes Azure AD and other services that may overlap with those listed above).
          Certificate revocation lists (CRLs)Some of these services will also need to check certificate revocation lists (CRLs) for certificates used in the services.  A full list of these is documented at Office 365 URLs and IP address ranges and Office 365 Certificate Chains. +
          Hybrid AAD joinHybrid AAD can be join, the machine should be on corporate network for hybrid AAD join to work. See details at Windows Autopilot user-driven mode
          ## Licensing requirements From 465554ec693299de1a3bafcdd6bd7e7d821ff01a Mon Sep 17 00:00:00 2001 From: Christopher Yoo Date: Fri, 14 Jun 2019 10:50:37 -0700 Subject: [PATCH 184/303] Updated link to have proper redirection --- windows/privacy/diagnostic-data-viewer-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/diagnostic-data-viewer-overview.md b/windows/privacy/diagnostic-data-viewer-overview.md index f5e4bd8b0e..8577fea884 100644 --- a/windows/privacy/diagnostic-data-viewer-overview.md +++ b/windows/privacy/diagnostic-data-viewer-overview.md @@ -45,7 +45,7 @@ Before you can use this tool for viewing Windows diagnostic data, you must turn Download the app from the [Microsoft Store Diagnostic Data Viewer](https://www.microsoft.com/en-us/store/p/diagnostic-data-viewer/9n8wtrrsq8f7?rtc=1) page. >[!Important] - >It's possible that your Windows machine may not have the Microsoft Store available (e.g. Windows Server). If this is the case, please check out [Diagnostic Data Viewer for PowerShell](https://go.microsoft.com/fwlink/?linkid=2023830). + >It's possible that your Windows machine may not have the Microsoft Store available (e.g. Windows Server). If this is the case, please check out [Diagnostic Data Viewer for PowerShell](https://go.microsoft.com/fwlink/?linkid=2094264). ### Start the Diagnostic Data Viewer You can start this app from the **Settings** panel. From 1c95f1512234f79a5e93a73f28cc7a3307571e48 Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Fri, 14 Jun 2019 13:51:39 -0400 Subject: [PATCH 185/303] minor update specifying subsection of Settings --- .../threat-protection/microsoft-defender-atp/powerbi-reports.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md index f65850cce0..c70bb4f029 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports.md @@ -45,7 +45,7 @@ You can access these options from Microsoft Defender Security Center. Both the P ## Create a Microsoft Defender ATP dashboard on Power BI service Microsoft Defender ATP makes it easy to create a Power BI dashboard by providing an option straight from the portal. -1. In the navigation pane, select **Settings** > **Power BI reports**. +1. In the navigation pane, select **Settings** > **General** > **Power BI reports**. 2. Click **Create dashboard**. From 861f82cfb7d83223e792fed266ad10309558e9cb Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Fri, 14 Jun 2019 10:57:34 -0700 Subject: [PATCH 186/303] Added DeviceHealthMonitoring policies --- .../mdm/new-in-windows-mdm-enrollment-management.md | 7 +++++++ .../mdm/policy-configuration-service-provider.md | 6 ++++++ 2 files changed, 13 insertions(+) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index d8463492ad..6092b82889 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -56,6 +56,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [What is dmwappushsvc?](#what-is-dmwappushsvc) - **Change history in MDM documentation** + - [June 2019](#june-2019) - [May 2019](#may-2019) - [April 2019](#april-2019) - [March 2019](#march-2019) @@ -1871,6 +1872,12 @@ How do I turn if off? | The service can be stopped from the "Services" console o ## Change history in MDM documentation +### June 2019 + +|New or updated topic | Description| +|--- | ---| +|[Policy CSP - DeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md)|Added the following new policies:
          AllowDeviceHealthMonitoring, ConfigDeviceHealthMonitoringScope, ConfigDeviceHealthMonitoringUploadDestination.| + ### May 2019 |New or updated topic | Description| diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 2fca9aa0c0..e1f4607cac 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -5354,6 +5354,9 @@ The following diagram shows the Policy configuration service provider in tree fo - [DeliveryOptimization/DORestrictPeerSelectionBy](#deliveryoptimization-dorestrictpeerselectionby) - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth) - [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth) +- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](#devicehealthmonitoring-configdevicehealthmonitoringscope) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination) - [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) - [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) - [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) @@ -5401,6 +5404,9 @@ The following diagram shows the Policy configuration service provider in tree fo - [DeliveryOptimization/DORestrictPeerSelectionBy](#deliveryoptimization-dorestrictpeerselectionby) - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth) - [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth) +- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](#devicehealthmonitoring-allowdevicehealthmonitoring) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](#devicehealthmonitoring-configdevicehealthmonitoringscope) +- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination) - [Update/ConfigureDeadlineForFeatureUpdates](#update-configuredeadlineforfeatureupdates) - [Update/ConfigureDeadlineForQualityUpdates](#update-configuredeadlineforqualityupdates) - [Update/ConfigureDeadlineGracePeriod](#update-configuredeadlinegraceperiod) From e71230fe85eb41ada79845e15d913da4768157b3 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 14 Jun 2019 10:58:28 -0700 Subject: [PATCH 187/303] updates --- devices/surface-hub/surface-hub-2s-connect.md | 21 ++++++++++++++----- .../surface-hub-2s-port-keypad-overview.md | 10 ++++----- 2 files changed, 21 insertions(+), 10 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index 20126f3eaa..4f0d7c7bd6 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -22,16 +22,16 @@ You can display content from your devices to Surface Hub 2S. If the source devic > [!NOTE] > Surface Hub-2S will use the video input that you select until a new connection is made, the existing connection is disrupted, or the Connect App is closed. -## Recommended configurations for connecting to Surface Hub 2S +## Recommended wired configurations for connecting to Surface Hub 2S In general, it’s recommended to use native cable connections whenever possible such as USB-C to USB-C or HDMI to HDMI. Other combinations such as MiniDP to HDMI or MiniDP to USB-C will also work. |**Mode**|**Connection**|**Functionality**|**Comments**| |:---- |:---------- |:------------ |:-------- | -| Wired “Connect” Application | USB-C (via underside compute module) | Video, audio, TouchBack/InkBack into Surface Hub 2S.| Provides display port video, audio, and TouchBack/InkBack on a single cable. | +| Wired “Connect” Application | USB-C (via compute module) | Video, audio, TouchBack/InkBack into Surface Hub 2S.| Provides display port video, audio, and TouchBack/InkBack on a single cable. | | | HDMI + USB-C | HDMI-in for Audio/Video
          USB-C for TouchBack/InkBack | USB-C supports TouchBack/InkBack with the HDMI A/V connection

          Use USB-C to USB-A to connect to legacy computers

          *NOTE: For best results, connect HDMI before connecting USB-C cable. If the computer you are using for HDMI is not compatible with TouchBack and InkBack, you won't need a USB-C cable.* | -| “Source” selection experience
          (bypasses the OS, full screen requires source selection with keypad button) | USB-C (port in compute module) | Video, Audio into Surface Hub 2S | Single cable needed for A/V
          Touchback not supported
          HDCP enabled | -| | HDMI (in port) | Video, Audio into Surface Hub 2S | Single cable needed for A/V
          TouchBack not supported
          HDCP enabled | +| “Source” selection experience
          (bypasses the OS, full screen requires source selection with keypad button) | USB-C (port in compute module) | Video, Audio into Surface Hub 2S | Single cable needed for A/V
          Touchback/InkBack not supported
          HDCP enabled | +| | HDMI (in port) | Video, Audio into Surface Hub 2S | Single cable needed for A/V
          TouchBack/InkBack not supported
          HDCP enabled | When you connect a guest computer to Surface Hub 2S via the wired connect USB-C port, several USB devices are discovered and configured. These peripheral devices are created for TouchBack and InkBack. As shown in the table below, the peripheral devices can be viewed in Device Manager, which will show duplicate names for some devices. @@ -72,6 +72,17 @@ DisplayPort cables are certified for to 3 meters in length. If a long cable is n > [!NOTE] > Most DisplayPort sources will automatically switch to HDMI signaling if HDMI is detected. +## Wirelessly connect to Surface Hub 2S +Windows 10 natively supports Miracast, which lets you wireless connect to Surface Hub 2S. + **** +**To connect using Miracast:** +1. On your Windows 10 device, enter **Win** + **K**. +2. In the Connect window, look for the name of your Surface Hub 2S in the list of nearby devices. You can find the name of your Surface Hub 2S in the bottom left corner of the display. +3. If required, your system administrator may have enabled the PIN setting for Miracast connections on your Surface Hub which means that the first time you connect to that Surface Hub, a PIN number will be displayed on the screen. + +> [!NOTE] +> If you’re a local administrator on Surface Hub 2S, you can configure PIN requirements via **Surface app > Settings.** + ## Connecting peripherals to Surface Hub 2S ## Bluetooth accessories @@ -84,6 +95,6 @@ You can connect the following accessories to Surface Hub-2S using Bluetooth: - Speakers > [!NOTE] -> After you connect a Bluetooth headset or speaker, you might need to change the default microphone and speaker settings. For more information, see [Local management for Surface Hub settings](https://docs.microsoft.com/en-us/surface-hub/local-management-surface-hub-settings). +> After you connect a Bluetooth headset or speaker, you might need to change the default microphone and speaker settings. For more information, see [Local management for Surface Hub settings](local-management-surface-hub-settings.md). ## Learn more diff --git a/devices/surface-hub/surface-hub-2s-port-keypad-overview.md b/devices/surface-hub/surface-hub-2s-port-keypad-overview.md index 9f1a454f65..4e4b0a8d6b 100644 --- a/devices/surface-hub/surface-hub-2s-port-keypad-overview.md +++ b/devices/surface-hub/surface-hub-2s-port-keypad-overview.md @@ -26,12 +26,12 @@ The figure below shows the location of ports and physical buttons located on a k | 1 | **USB C** | **USB 3.1 Gen 1**
          Use as a walk-up port for plugging in peripherals such as thumb-drives. Guest ports are located on each side of the device (4).

          *NOTE: This is the recommended port for connecting an external camera. Additional camera mount features are incorporated into the design to help support retention of attached cameras.*

          NOTE: TouchBack and video ingest are not supported on these ports. | Type C

          15 W Port (5V/3A) | | 2 | **AC power** | **100-240V input**
          Connect to standard AC power and Surface Hub 2S will auto switch to the local power standard such as110 volts in the US and Canada or 220 volts in the UK.

          *NOTE: When the AC cord is plugged in, the system remains in an off state in which only the system management controller (SMC), real time clock (RTC), and keypad are running.* | IEC 60320 C14 | | 3 | **DC power** | **24V DC input port**
          Use for connecting to mobile battery. | Xbox1 Dual barrel to Anderson connector | -| 4 | **Ethernet** | **1000/100/10 BaseT**
          Use for providing a continuous connection in a corporate environment and related scenarios requiring maximum stability or capacity. | RJ45 | +| 4 | **Ethernet** | **1000/100/10 Base-T**
          Use for providing a continuous connection in a corporate environment and related scenarios requiring maximum stability or capacity. | RJ45 | | 5 | **USB-A** | **USB 3.1 Gen 1**
          Use as a walk-up port for plugging in peripherals such as thumb-drives. | Type A
          7.5 W Port (5V/1.5A) | -| 6 | **USB-C** | **USB 3.1 Gen 1**
          Use as a walk-up port for connecting external PCs and related devices or plugging in peripherals such as thumb-drives.

          *NOTE: This is the recommended video input port, supporting both TouchBack and InkBack.* | Type C
          18 W Port (5V/3A, 9V/2A) | +| 6 | **USB-C** | **USB 3.1 Gen 1**
          Use as a walk-up port for connecting external PCs and related devices or plugging in peripherals such as thumb-drives.

          *NOTE: This is the recommended input port for video, TouchBack, and InkBack.* | Type C
          18 W Port (5V/3A, 9V/2A) | | 7 | **HDMI-in** | **HDMI 2.0, HDCP 2.2 /1.4**
          Use for multiple scenarios including HDMI-to-HDMI guest input. | Standard HDMI | -| 8 | **Mini DisplayPort-out** | **DisplayPort 1.2 output**
          Use for video-out scenarios such as mirroring the Surface Hub 2S display to a larger projector.

          *NOTE: This supports a maximum resolution of 3840 x 2160 (4K UHD) @60Hz.* | Mini DisplayPort | -| 9 | **Source** | Use to toggle among connected ingest sources — external PC, HDMI, and DisplayPort modes. | n/a | +| 8 | **Mini DP-out** | **Mini DP 1.2 output**
          Use for video-out scenarios such as mirroring the Surface Hub 2S display to a larger projector.

          *NOTE: This supports a maximum resolution of 3840 x 2160 (4K UHD) @60Hz.* | Mini DP | +| 9 | **Source** | Use to toggle among connected ingest sources — external PC, HDMI, and Mini DP modes. | n/a | | 10 | **Volume** | Use +/- to adjust audio locally on the device.

          *NOTE: When navigating to the brightness control, use +/- on the volume slider to control display brightness.* | n/a | | 11 | **Power** | Power device on/off.
          Use also to navigate display menus and select items. | n/a | @@ -44,4 +44,4 @@ Surface Hub 2S consists of two primary system components: |**Component**|**Functionality**| |:--------- |:----------------- | |**Video board**| - Produces the image on the LCD display.
          - Provides an audio/video connection path to/from the compute module.
          - Provides video scaling to support external video sources.
          - Performs color correction and calibration.
          - Responsible for power management, including occupancy sensors and device power states.
          - Monitors and manages all thermal sensors throughout the device.
          - Performs internal diagnostics.
          - Captures diagnostics, error logs and telemetry for all components not connected to the compute module.
          - Controls the behavior of keypad buttons.
          - Provides an on-screen display for control of video source, brightness, and volume. | -|**Compute module**| Connects to and controls all USB devices.
          - Provides video board interconnections for USB, DisplayPort, HDMI, PCIe.
          - Provides Ethernet access via wired and wireless interfaces.
          Provides the on-screen audio/video content.
          - Ingests audio/video provided by external sources.
          - Allows video to be passed directly to the video board (bypassing the ingest process) for scenarios in which an external source is HDCP encrypted or is beyond the capability of the ingest subsystem.
          - Provides digital audio output for accessibility and room audio systems respectively (USB dongle support only). | +|**Compute module**| Connects to and controls all USB devices.
          - Provides video board interconnections for USB, Mini DP, HDMI, PCIe.
          - Provides Ethernet access via wired and wireless interfaces.
          Provides the on-screen audio/video content.
          - Ingests audio/video provided by external sources.
          - Allows video to be passed directly to the video board (bypassing the ingest process) for scenarios in which an external source is HDCP encrypted or is beyond the capability of the ingest subsystem.
          - Provides digital audio output for accessibility and room audio systems respectively (USB dongle support only). | From dd5c97a56c2f548f63657159cc307b48e41e7b1f Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 14 Jun 2019 22:59:58 +0500 Subject: [PATCH 188/303] Added CSP Syntax As the user shared the information and syntax for CSP. So I have updated the content. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1803 --- .../client-management/mdm/policy-csp-printers.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index b8ebc7042d..4e47b5a776 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -106,6 +106,19 @@ ADMX Info: - GP ADMX file name: *Printing.admx* + + +CSP Example +``` +Name: Point and Print Enable Oma-URI: ./Device/Vendor/MSFT/Policy/Config/Printers/PointAndPrintRestrictions +Data type: String Value: + + + + + +``` +
          From 392dd2b683f4c9ab53037ab65e1d302a36a92c75 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Fri, 14 Jun 2019 11:34:13 -0700 Subject: [PATCH 189/303] Updated date --- .../client-management/mdm/policy-csp-devicehealthmonitoring.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md index 6d781a591a..c945a7c66c 100644 --- a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md +++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 06/13/2019 +ms.date: 06/14/2019 ms.reviewer: manager: dansimp --- From b486bde4dd14ba4c3db66de8351c3ed3a3550dd6 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 14 Jun 2019 23:51:33 +0500 Subject: [PATCH 190/303] Applied changes Applied changes as suggested. --- windows/client-management/mdm/policy-csp-printers.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index 4e47b5a776..16470df06b 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -107,8 +107,8 @@ ADMX Info: - -CSP Example + +Example ``` Name: Point and Print Enable Oma-URI: ./Device/Vendor/MSFT/Policy/Config/Printers/PointAndPrintRestrictions Data type: String Value: @@ -118,7 +118,7 @@ Data type: String Value: ``` - +
          From dd8fba1f9c3c34defb0e69198d7e70f0bb9aa419 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Fri, 14 Jun 2019 13:52:47 -0700 Subject: [PATCH 191/303] Updates with JK on Surface Hub 2S topics and deletions --- devices/surface-hub/index.md | 16 ++-- .../surface-hub-2s-change-history.md | 8 +- .../surface-hub-2s-change-start-menu.md | 14 --- .../surface-hub-2s-conditional-access.md | 14 --- .../surface-hub-2s-configure-skype.md | 14 --- .../surface-hub-2s-configure-teams.md | 14 --- .../surface-hub-2s-configure-using-o365.md | 14 --- .../surface-hub-2s-deploy-checklist.md | 86 +++++++++---------- .../surface-hub-2s-install-mount.md | 4 +- .../surface-hub-2s-manage-settings.md | 14 --- .../surface-hub-2s-manage-surface-app.md | 14 --- .../surface-hub-2s-pen-firmware.md | 14 --- .../surface-hub/surface-hub-2s-quick-start.md | 10 +-- devices/surface-hub/surface-hub-2s-startup.md | 1 + devices/surface/get-started.md | 21 +++-- 15 files changed, 79 insertions(+), 179 deletions(-) delete mode 100644 devices/surface-hub/surface-hub-2s-change-start-menu.md delete mode 100644 devices/surface-hub/surface-hub-2s-conditional-access.md delete mode 100644 devices/surface-hub/surface-hub-2s-configure-skype.md delete mode 100644 devices/surface-hub/surface-hub-2s-configure-teams.md delete mode 100644 devices/surface-hub/surface-hub-2s-configure-using-o365.md delete mode 100644 devices/surface-hub/surface-hub-2s-manage-settings.md delete mode 100644 devices/surface-hub/surface-hub-2s-manage-surface-app.md delete mode 100644 devices/surface-hub/surface-hub-2s-pen-firmware.md diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index 9485113b2e..d90490a3f9 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -26,6 +26,7 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, @@ -45,8 +46,8 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, @@ -121,8 +122,10 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, @@ -139,6 +142,7 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming,

          Get ready for Surface Hub 2S

          +

          Ordering Surface Hub 2S

          Prepare your environment for Surface Hub 2S

          Unpacking Surface Hub 2S

          Install & mount Surface Hub 2S

          @@ -152,11 +156,10 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, @@ -168,6 +171,7 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, diff --git a/devices/surface-hub/surface-hub-2s-change-history.md b/devices/surface-hub/surface-hub-2s-change-history.md index 15c100dbba..b7c59d5fd2 100644 --- a/devices/surface-hub/surface-hub-2s-change-history.md +++ b/devices/surface-hub/surface-hub-2s-change-history.md @@ -13,4 +13,10 @@ ms.localizationpriority: Normal # Change history for Surface Hub 2S -This topic will summarize new and updated content in the Surface Hub 2S documentation library. \ No newline at end of file +This topic will summarize new and updated content in the Surface Hub 2S documentation library. + +## June 2019 + +Changes | Description +|:--- |:--- | +| Published new guidance for Surface Hub 2S | New | diff --git a/devices/surface-hub/surface-hub-2s-change-start-menu.md b/devices/surface-hub/surface-hub-2s-change-start-menu.md deleted file mode 100644 index 5f1f66375b..0000000000 --- a/devices/surface-hub/surface-hub-2s-change-start-menu.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Change the Start Menu on Surface Hub 2S" -description: "Learn how to change Start Menu on Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Change the Start Menu on Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-conditional-access.md b/devices/surface-hub/surface-hub-2s-conditional-access.md deleted file mode 100644 index fefdcfd895..0000000000 --- a/devices/surface-hub/surface-hub-2s-conditional-access.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Conditional access in Surface Hub 2S" -description: "Learn more about conditional access in Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Conditional access in Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-configure-skype.md b/devices/surface-hub/surface-hub-2s-configure-skype.md deleted file mode 100644 index 3e6527781a..0000000000 --- a/devices/surface-hub/surface-hub-2s-configure-skype.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Configure Skype for Business on Surface Hub 2S" -description: "Learn more about using Skype for Business on Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Configure Skype for Business on Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-configure-teams.md b/devices/surface-hub/surface-hub-2s-configure-teams.md deleted file mode 100644 index d8390a6d23..0000000000 --- a/devices/surface-hub/surface-hub-2s-configure-teams.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Configure Microsoft Teams on Surface Hub 2S" -description: "Learn more about configuring Teams on Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Configure Microsoft Teams on Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-configure-using-o365.md b/devices/surface-hub/surface-hub-2s-configure-using-o365.md deleted file mode 100644 index 14a9b0f582..0000000000 --- a/devices/surface-hub/surface-hub-2s-configure-using-o365.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Configure Surface Hub 2S accounts via Office 365 portal" -description: "Learn how to Configure Surface Hub 2S accounts using the Office 365 portal." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Configure Surface Hub 2S via Office 365 portal \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-deploy-checklist.md b/devices/surface-hub/surface-hub-2s-deploy-checklist.md index ebda8ed344..5122533501 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-checklist.md +++ b/devices/surface-hub/surface-hub-2s-deploy-checklist.md @@ -1,5 +1,5 @@ --- -title: "Surface Hub 2S deployment checklist" +title: "Surface Hub 2S deployment checklists" description: "Verify your deployment of Surface Hub 2S using pre- and post-deployment checklists." keywords: separate values with commas ms.prod: surface-hub @@ -11,53 +11,53 @@ ms.topic: article ms.localizationpriority: Normal --- -# Surface Hub 2S deployment checklist +# Surface Hub 2S deployment checklists ## Surface Hub 2S pre-deployment checklist -**Check**|**Item**|**Response**| **Learn more**| +|**Check**|**Item**|**Response**|**Learn more**| |:------ |:------ |:----- |:------ | -|☐
          |**Device account name**| | | -|☐
          |**Device account UPN**| | | -|☐
          |**ActiveSync Policy**| | | -|☐
          |**Calendar processing configuration completed**| - Yes
          - No | | -|☐
          |**Device friendly name**| | | -|☐
          |**Device host name**| | | -|☐
          |**Affiliation**| - None
          - Active Directory affiliation
          - Azure Active Directory | | -|☐
          |**Microsoft Teams Mode**| - Mode 0
          - Mode 1
          - Mode 2 | | -|☐
          |**Device Management**| - Yes, Microsoft Intune
          - Yes, other mobile device manager [MDM]
          - None | | -|☐
          |**Proxy**| - Automatic configuration
          - Proxy server
          - Proxy auto-config (PAC) file | | -|☐
          |**Proxy authentication**| - Device account credentials
          - Prompt for credentials | | -|☐
          |**Password rotation**| - On
          - Off | | -|☐
          |**Skype for Business additional domain names (on-premises only)**| | | -|☐
          |**Session timeout time**| | | -|☐
          |**Session timeout action**| - End session
          - Allow resume | | -|☐
          |**My meetings and files**| - Enabled
          - Disabled | | -|☐
          |**Lock screen timeout**| | | -|☐
          |**Sleep idle timeout**| | | -|☐
          |**Bluetooth**| - On
          - Off | | -|☐
          |**Use only BitLocker USB drives**| - On
          - Off | | -|☐
          |**Install additional certificates (on-premises only)**| | [Using certificates for AADJ on-premises single-sign on](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert) | -|☐
          |**Windows update**| - Windows Update for Business
          - Windows Server Update Services [WSUS] | [Deploy updates using Windows Update for Business](https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb)
          [Get Started with Windows Server Update Services (WSUS)](https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) | -|☐
          |**Surface app speaker setting**| - Rolling stand
          - Wall-mounted | | -|☐
          |**IP Address**| - Wired - DHCP
          - Wired - DHCP reservation
          - Wireless – DHCP
          - Wireless – DHCP reservation | | +| ☐ |**Device account name**| | | +| ☐ |**Device account UPN**| | | +| ☐ |**ActiveSync Policy**| | | +| ☐ |**Calendar processing configuration completed**| - Yes
          - No | | +| ☐ |**Device friendly name**| | | +| ☐ |**Device host name**| | | +| ☐ |**Affiliation**| - None
          - Active Directory affiliation
          - Azure Active Directory | | +| ☐ |**Microsoft Teams Mode**| - Mode 0
          - Mode 1
          - Mode 2 | | +| ☐ |**Device Management**| - Yes, Microsoft Intune
          - Yes, other mobile device manager [MDM]
          - None | | +| ☐ |**Proxy**| - Automatic configuration
          - Proxy server
          - Proxy auto-config (PAC) file | | +| ☐ |**Proxy authentication**| - Device account credentials
          - Prompt for credentials | | +| ☐ |**Password rotation**| - On
          - Off | | +| ☐ |**Skype for Business additional domain names (on-premises only)**| | | +| ☐ |**Session timeout time**| | | +| ☐ |**Session timeout action**| - End session
          - Allow resume | | +| ☐ |**My meetings and files**| - Enabled
          - Disabled | | +| ☐ |**Lock screen timeout**| | | +| ☐ |**Sleep idle timeout**| | | +| ☐ |**Bluetooth**| - On
          - Off | | +| ☐ |**Use only BitLocker USB drives**| - On
          - Off | | +| ☐ |**Install additional certificates (on-premises only)**| | [Using certificates for AADJ on-premises single-sign on](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert) | +|☐ |**Windows update**| - Windows Update for Business
          - Windows Server Update Services [WSUS] | [Deploy updates using Windows Update for Business](https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb)
          [Get Started with Windows Server Update Services (WSUS)](https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) | +|☐ |**Surface app speaker setting**| - Rolling stand
          - Wall-mounted | | +|☐ |**IP Address**| - Wired - DHCP
          - Wired - DHCP reservation
          - Wireless – DHCP
          - Wireless – DHCP reservation | | ## Surface Hub 2S post-deployment checklist -**Check**|**Item**|**Response**|**Learn more**| +|**Check**|**Item**|**Response**|**Learn more**| |:------|:-------|:---------|:----------| -|☐
          |**Device account syncing**| - Yes
          - No | | -|☐
          |**Bitlocker key**| - Saved to file (no affiliation)
          - Saved in Active Directory (AD affiliation)
          - Saved in Azure AD ( Azure AD affiliation) | | -|☐
          |**Device OS updates**| - Completed | | -|☐
          |**Windows Store updates**| - Automatic
          - Manual | | -|☐
          |**Microsoft Teams scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions
          - Able to join audio
          - Able to join video
          - Able to share screen | | -|☐
          |**Skype for Business scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions correctly
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | -|☐
          |**Scheduled meeting when already invited**| - Meeting declined | | -|☐
          |**Microsoft Teams ad-hoc meeting**| - Invite other users work
          - Able to join audio
          - Able to join Video
          - Able to share screen | | -|☐
          |**Skype for Business scheduled meeting**| - Invite other users work
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | -|☐
          |**Microsoft Whiteboard**| - Launch from start / welcome screen
          - Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | -|☐
          |**Incoming Skype/Teams call**| - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM (Skype for Business only) | | -|☐
          |**Incoming live video streams**| - Maximum 2 (Skype for Business)
          - Maximum 4 (Microsoft Teams) | | -|☐
          |**Microsoft Teams Mode 0 behavior**| - Skype for Business tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | -|☐
          |**Microsoft Teams Mode 1 behavior**| - Teams tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | -|☐
          |**Microsoft Teams Mode 2 behavior**| - Teams tile on welcome / start screen
          - Can join scheduled Teams meetings
          - Fail to join Skype for Business meetings | | +| ☐ |**Device account syncing**| - Yes
          - No | | +| ☐ |**Bitlocker key**| - Saved to file (no affiliation)
          - Saved in Active Directory (AD affiliation)
          - Saved in Azure AD ( Azure AD affiliation) | | +| ☐ |**Device OS updates**| - Completed | | +| ☐ |**Windows Store updates**| - Automatic
          - Manual | | +| ☐ |**Microsoft Teams scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions
          - Able to join audio
          - Able to join video
          - Able to share screen || +| ☐ |**Skype for Business scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions correctly
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | +| ☐ |**Scheduled meeting when already invited**| - Meeting declined | | +| ☐ |**Microsoft Teams ad-hoc meeting**| - Invite other users work
          - Able to join audio
          - Able to join Video
          - Able to share screen | | +| ☐ |**Skype for Business scheduled meeting**| - Invite other users work
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | +| ☐ |**Microsoft Whiteboard**| - Launch from start / welcome screen
          - Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | +| ☐ |**Incoming Skype/Teams call**| - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM (Skype for Business only) | | +| ☐ |**Incoming live video streams**| - Maximum 2 (Skype for Business)
          - Maximum 4 (Microsoft Teams) | | +| ☐ |**Microsoft Teams Mode 0 behavior**| - Skype for Business tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | +| ☐ |**Microsoft Teams Mode 1 behavior**| - Teams tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | +| ☐ |**Microsoft Teams Mode 2 behavior**| - Teams tile on welcome / start screen
          - Can join scheduled Teams meetings
          - Fail to join Skype for Business meetings | | diff --git a/devices/surface-hub/surface-hub-2s-install-mount.md b/devices/surface-hub/surface-hub-2s-install-mount.md index 118ccf0adc..ea36247a09 100644 --- a/devices/surface-hub/surface-hub-2s-install-mount.md +++ b/devices/surface-hub/surface-hub-2s-install-mount.md @@ -23,7 +23,7 @@ For more information, see [Officially licensed third-party accessories](http://l - [Steelcase mobile stand and APC battery set up](https://youtu.be/VTzdu4Skpkg) - ![* Surface Hub 2S on Roam Mobile Stand *](images/sh2-mobile-stand.png)
          + ![Surface Hub 2S on Roam Mobile Stand](images/sh2-mobile-stand.png)
          *Figure 1. Surface Hub 2S on Roam Mobile Stand.* -If you’re not using licensed accessories, see [Customizing installation of Surface Hub 2S](surface-hub-2s-connect.md). \ No newline at end of file +If you’re not using licensed accessories, see [Customizing installation of Surface Hub 2S](surface-hub-2s-connect.md). diff --git a/devices/surface-hub/surface-hub-2s-manage-settings.md b/devices/surface-hub/surface-hub-2s-manage-settings.md deleted file mode 100644 index 3f3737fa93..0000000000 --- a/devices/surface-hub/surface-hub-2s-manage-settings.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Manage settings on Surface Hub 2S" -description: "Learn more managing settings on Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Manage settings on Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-manage-surface-app.md b/devices/surface-hub/surface-hub-2s-manage-surface-app.md deleted file mode 100644 index 35fb2897ea..0000000000 --- a/devices/surface-hub/surface-hub-2s-manage-surface-app.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Manage Surface Hub 2S using Surface app" -description: "Learn what you can do with the Surface app on Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Manage Surface Hub 2S using Surface app \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-pen-firmware.md b/devices/surface-hub/surface-hub-2s-pen-firmware.md deleted file mode 100644 index 843266c78c..0000000000 --- a/devices/surface-hub/surface-hub-2s-pen-firmware.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Update pen firmware on Surface Hub 2S" -description: "Learn how to update and manage pen firmware in Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Update pen firmware on Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index 4b0dcecb21..048dbf53ba 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -10,20 +10,18 @@ audience: Admin ms.topic: article ms.localizationpriority: Normal --- + # Surface Hub 2S quick start - - ## Unpack Surface Hub 2S + 1. Use the handles on each side of the box to move it to the space where you'll set it up. 2. Before opening, remove the clips (4) located on the front and back, and then lift the top off the box using the handles. 3. In the base of the Surface Hub 2S, open the accessories box containing the setup guide, Surface Hub 2 pen, Surface Hub 2 camera and the power cable. 4. On the back of the Surface Hub there's an instructional label showing you where to attach the mounting hardware. Install them in place and remove the label. - - -| 1. **Set up your mount first** | | -| ----------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | +| 1. **Set up your mount first** | | +| -------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | | Leave your Surface Hub in the box until the mount is set up and mounting hardware is applied. Mount is not included. Your mount is sold separately. | ![* Set up your mount first *](images/sh2-setup-1.png)
          | | 2. **Attach hardware to the Surface Hub** | | | Mounting hardware and specific instructions are found in the box for your mount. | ![* Attach hardware to the Surface Hub *](images/sh2-setup-2.png)
          | diff --git a/devices/surface-hub/surface-hub-2s-startup.md b/devices/surface-hub/surface-hub-2s-startup.md index de208b737b..2ceccf0497 100644 --- a/devices/surface-hub/surface-hub-2s-startup.md +++ b/devices/surface-hub/surface-hub-2s-startup.md @@ -10,4 +10,5 @@ audience: Admin ms.topic: article ms.localizationpriority: Normal --- + # Out-of-box startup for Surface Hub 2S diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index 8698a60c0b..d520047515 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -26,11 +26,11 @@ Harness the power of Surface, Windows, and Office connected together through the
          @@ -120,7 +120,7 @@ Harness the power of Surface, Windows, and Office connected together through the
          - Support + Support
          @@ -142,9 +142,12 @@ Harness the power of Surface, Windows, and Office connected together through the
          -

          Get ready for Surface devices

          -

          NEED UPDATE

          -

          NEED UPDATE

          +

          Technical specifications

          +

          Surface Pro

          +

          Surface Book

          +

          Surface Studio

          +

          Surface Go

          +

          Surface Laptop 2

          From 3289635dee2ede35f0a772fbe27947bcce484ac9 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Fri, 14 Jun 2019 14:05:46 -0700 Subject: [PATCH 192/303] Updated Surface Hub 2S TOC section for changes to removed files --- devices/surface-hub/TOC.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 2c64daf392..cef5db805f 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -34,10 +34,9 @@ ### [Save your BitLocker key](save-bitlocker-key-surface-hub.md) ### [Microsoft Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) ### [Applying ActiveSync policies to device accounts](apply-activesync-policies-for-surface-hub-device-accounts.md) -### [Changing Start Menu on Surface Hub 2S](surface-hub-2s-change-start-menu.md) ## Secure -### [Securing Surface Hub 2S with UEFI](surface-hub-2s-secure-with-uefi.md) +### [Securing Surface Hub 2S with UEFI](surface-hub-2s-secure-with-uefi-semm.md) ### [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) ## Support From c36d4cd5c2c912a204b70b160ba1cb33a350ecf7 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Fri, 14 Jun 2019 14:21:08 -0700 Subject: [PATCH 193/303] Fixed linking errors for Surface videos on Surface Hub landing page --- devices/surface-hub/index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index d90490a3f9..2d2bad66e7 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -157,8 +157,8 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, From 0cd9bb682025268f66102746c3732bdf76d0fbb2 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Fri, 14 Jun 2019 14:34:04 -0700 Subject: [PATCH 194/303] Updated doc date attribute --- .../client-management/mdm/policy-csp-timelanguagesettings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index b4e998c79c..5feefe04ae 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 03/12/2018 +ms.date: 06/15/2019 ms.reviewer: manager: dansimp --- From 71506bea8fd869814fd0ea5f3a6fd87b522fa2f2 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Fri, 14 Jun 2019 15:07:39 -0700 Subject: [PATCH 195/303] General formatting and cleanup for Surface Hub 2S topics --- .../surface-hub-2s-install-mount.md | 2 -- .../surface-hub/surface-hub-2s-quick-start.md | 26 ++++++++--------- .../surface-hub-2s-site-planning.md | 21 ++++---------- .../surface-hub-2s-site-readiness-guide.md | 19 ++++++------- .../surface-hub/surface-hub-2s-whats-new.md | 28 ++++++++----------- 5 files changed, 38 insertions(+), 58 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-install-mount.md b/devices/surface-hub/surface-hub-2s-install-mount.md index ea36247a09..a3269296d3 100644 --- a/devices/surface-hub/surface-hub-2s-install-mount.md +++ b/devices/surface-hub/surface-hub-2s-install-mount.md @@ -22,8 +22,6 @@ For more information, see [Officially licensed third-party accessories](http://l - [Unboxing and set up](https://youtu.be/fCrxdNXvru4) - [Steelcase mobile stand and APC battery set up](https://youtu.be/VTzdu4Skpkg) - ![Surface Hub 2S on Roam Mobile Stand](images/sh2-mobile-stand.png)
          -*Figure 1. Surface Hub 2S on Roam Mobile Stand.* If you’re not using licensed accessories, see [Customizing installation of Surface Hub 2S](surface-hub-2s-connect.md). diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index 048dbf53ba..275f02b2b2 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -21,25 +21,21 @@ ms.localizationpriority: Normal 4. On the back of the Surface Hub there's an instructional label showing you where to attach the mounting hardware. Install them in place and remove the label. | 1. **Set up your mount first** | | -| -------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | -| Leave your Surface Hub in the box until the mount is set up and mounting hardware is applied. Mount is not included. Your mount is sold separately. | ![* Set up your mount first *](images/sh2-setup-1.png)
          | -| 2. **Attach hardware to the Surface Hub** | | -| Mounting hardware and specific instructions are found in the box for your mount. | ![* Attach hardware to the Surface Hub *](images/sh2-setup-2.png)
          | -| 3. **Remove the instructional label before mounting.** | | -| Get someone to help you lift and mount your Surface Hub. Make sure to hold and lift the Surface Hub from the bottom. | ![* Remove the instructional label before mounting *](images/sh2-setup-3.png)
          | -| 4. **Attach accessories and power on** | | -| Install accessories and attach power cable as shown. See guides on the screen cling. Remove cling wrap from the screen. Press the power button to power on. | ![* Attach accessories and power on *](images/sh2-setup-4.png)
          | - - +|------ | -------- | +| Leave your Surface Hub in the box until the mount is set up and mounting hardware is applied. Mount is not included. Your mount is sold separately. | ![* Set up your mount first *](images/sh2-setup-1.png)
          | +| 2. **Attach hardware to the Surface Hub** | | +| Mounting hardware and specific instructions are found in the box for your mount. | ![* Attach hardware to the Surface Hub *](images/sh2-setup-2.png)
          | +| 3. **Remove the instructional label before mounting.** | | +| Get someone to help you lift and mount your Surface Hub. Make sure to hold and lift the Surface Hub from the bottom. | ![* Remove the instructional label before mounting *](images/sh2-setup-3.png)
          | +| 4. **Attach accessories and power on** | | +| Install accessories and attach power cable as shown. See guides on the screen cling. Remove cling wrap from the screen. Press the power button to power on. | ![* Attach accessories and power on *](images/sh2-setup-4.png)
          | ## Install pen and camera + 1. Attach Surface Hub 2 pen magnetically to your preferred side of the device. 2. Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. -**Start Surface Hub 2S** +## Start Surface Hub 2S -1. Insert the power cable into the back of the device and plug it into a power outlet. Run the cable through any cable guides on your mounting solution and remove the screen clang. +1. Insert the power cable into the back of the device and plug it into a power outlet. Run the cable through any cable guides on your mounting solution and remove the screen clang. 2. To begin, press the power button on the bottom right. To learn more about running the out of the box (OOBE) setup of Surface Hub 2S, see [Out-of-box startup for Surface Hub 2S](surface-hub-2s-startup.md). - - - diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index ee0db6c68b..2e3a44c1d7 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -16,23 +16,19 @@ ms.localizationpriority: Normal ## Introduction Designed for team collaboration, Surface Hub 2S can transform the way you work — not only in the conference rooms but any place you want to work. One of the biggest advantages of Surface Hub 2S is the ability to move it from one space to another when used with the Steelcase Roam mobile stand and mobile battery. Providing unplugged, uninterrupted teamwork capabilities, Surface Hub 2S can be integrated into almost any workspace. - ## Room considerations Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces may require peripherals such as an additional camera, microphone, or room systems solution such as Microsoft Teams Rooms. See the following table for guidance. +|**Room size**|**Participants**|**Proximity**|**Additional requirements**| +|:-----|:-----|:--------|:------| +|**Huddle**| 1-3 | 1-2 meters | None | +|**Small meeting**| 3-5 | Up to 2.3 meters | None | +|**Medium-size meeting**| 5-7 | Up to 4 meters | Peripherals optional| +|**Larger meting**| 7 + | More than 4 meters | Peripherals recommended | -| Room size | Participants | Proximity | Additional requirements | -| ------------------- | ------------ | ------------------ | ----------------------- | -| Huddle | 1-3 | 1-2 meters | None | -| Small meeting | 3-5 | Up to 2.3 meters | None. | -| Medium-size meeting | 5-7 | Up to 4 meters | Peripherals optional | -| Larger meting | 7 + | More than 4 meters | Peripherals recommended | - - As a general guideline, install Surface Hub 2S in a space that meets the following criteria: - - People can reach all four edges of the touchscreen. - The screen is not in direct sunlight, which could affect viewing or damage the screen. @@ -40,18 +36,13 @@ As a general guideline, install Surface Hub 2S in a space that meets the followi - Microphones are not affected by noise sources, such as fans or vents. - Space is well lit with no reflective sources. - Whether mounted to a wall or installed on the mobile stand, the areas where you use the device should maintain: - Room temperatures no cooler than 10°C (50° F) and no hotter than 35°C (95° F). - Relative humidity no lower than 20 percent and no higher than 80 percent. - For detailed room planning guidance and more information about Microsoft Teams Rooms see [Plan Microsoft Teams Rooms.](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) - ## Managing Surface Hub 2S location If you plan to use Surface Hub 2S on a mobile stand, you may wish to explore third party solutions that enable location services. For example, active RFID systems can provide real-time tracking throughout complex office or industrial spaces. For more information, consult your A/V provider or other third-party expertise for guidance. - - diff --git a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md index 14e81e7afb..359559a375 100644 --- a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md @@ -10,15 +10,14 @@ audience: Admin ms.topic: article ms.localizationpriority: Normal --- + # Surface Hub 2S site readiness guide -## In this section - -| Topic | Description | -| ------------------------------------------------------------------------------------ | ---------------------------------------------------------------------------- | -| [Site planning for Surface Hub 2S](surface-hub-2s-site-planning.md) | Review room considerations and planning for peripherals. | -| [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) | Get an overview of required steps from unpacking to starting Surface Hub 2S. | -| [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) | Learn about licensed accessories for mounting Surface Hub 2S. | -| [Customizing installation of Surface Hub 2S](surface-hub-2s-custom-install.md) | Learn how to custom install without licensed mounting accessories. | -| [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) | Get details for I/O ports and keypad power and selection controls. | -| [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) | Learn about wired and wireless methods of connecting to Surface Hub. | \ No newline at end of file +|**Topic**|**Description**| +|:-------|:-------| +| [Site planning for Surface Hub 2S](surface-hub-2s-site-planning.md) | Review room considerations and planning for peripherals. | +| [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) | Get an overview of required steps from unpacking to starting Surface Hub 2S. | +| [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) | Learn about licensed accessories for mounting Surface Hub 2S. | +| [Customizing installation of Surface Hub 2S](surface-hub-2s-custom-install.md) | Learn how to custom install without licensed mounting accessories.| +| [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) | Get details for I/O ports and keypad power and selection controls. | +| [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) | Learn about wired and wireless methods of connecting to Surface Hub.| diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index abf36a2e83..8f6bedc869 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -15,23 +15,19 @@ ms.localizationpriority: Normal Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork delivering a digital whiteboard, meetings platform, and a Windows 10 computing experience in one device. +|**Capability**|**Summary**|**Learn more**| +|:-------|:------|:----| +|**MDM and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | +|**Cloud and on-premises coexistence**| Calling and meeting capabilities support coexistence of cloud and on premises solutions with side-by-side compatibility with Skype for Business. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | +|**Reset and recovery**| Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | +|**Microsoft Whiteboard**| Active Directory integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers on Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | +|**Microsoft Teams Meeting Room License**| Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | +|**On-screen display**| Adjust volume, brightness and input control directly on the display. | | +|**Sensor-activated Connected Standby**| Doppler sensor triggers energy conservation power state changes based on nearby presence, entering Connected Standby sleep state after 1 minute of inactivity.

          Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | +|**Surface Hub pen**| Ergonomically redesigned and easily attachable on the sides of the device. Pen firmware is updatable for future features. | | +|**Surface app for Surface Hub 2S**| | | +|**Ready for tomorrow**| Removable cartridge facilitates upgrading to new features. | | - -| Capability | Summary | Learn more | -| ------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| MDM and UEFI manageability | Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | -| Cloud and on-premises coexistence | Calling and meeting capabilities support coexistence of cloud and on premises solutions with side-by-side compatibility with Skype for Business. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | -| Reset and recovery | Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | -| Microsoft Whiteboard | Active Directory integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers on Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | -| Microsoft Teams Meeting Room License | Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | -| On-screen display | Adjust volume, brightness and input control directly on the display. | | -| Sensor-activated Connected Standby | Doppler sensor triggers energy conservation power state changes based on nearby presence, entering Connected Standby sleep state after 1 minute of inactivity.

          Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | -| Surface Hub pen | Ergonomically redesigned and easily attachable on the sides of the device. Pen firmware is updateable for future features. | | -| Surface app for Surface Hub 2S | | | -| Ready for tomorrow | Removable cartridge facilitates upgrading to new features. | | -| | | | - - For more information about what’s new in Surface Hub 2S, see: - [Surface Hub 2S product site](https://www.microsoft.com/en-us/p/surface-hub-2S/8P62MW6BN9G4?activetab=pivot:overviewtab) From 2c1e4fb73462e78426749b5edee63991b694240b Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Fri, 14 Jun 2019 15:34:42 -0700 Subject: [PATCH 196/303] fixed bookmark suggestions --- .../mdm/mdm-enrollment-of-windows-devices.md | 2 +- .../mdm/new-in-windows-mdm-enrollment-management.md | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md b/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md index 298e6e88d2..08bae9914c 100644 --- a/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md +++ b/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md @@ -255,7 +255,7 @@ All Windows 10-based devices can be connected to an MDM. You can connect to an ![phone settings](images/unifiedenrollment-rs1-39.png) -3. Click the **Enroll only in device management** link. This is only available in the servicing build 14393.82 (KB3176934). For older builds, use [Connecting your Windows 10-based device to work using a deep link](#connecting-your-windows10-based-device-to-work-using-a-deep-link). +3. Click the **Enroll only in device management** link. This is only available in the servicing build 14393.82 (KB3176934). For older builds, use [Connecting your Windows 10-based device to work using a deep link](#connecting-your-windows-10-based-device-to-work-using-a-deep-link). ![access work or school page](images/unifiedenrollment-rs1-40.png) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index d397680a0c..0f9b975e5d 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -33,7 +33,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - **Breaking changes and known issues** - [Get command inside an atomic command is not supported](#get-command-inside-an-atomic-command-is-not-supported) - - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification-channel-uri-not-preserved-during-upgrade-from-windows81-to-windows10) + - [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10) - [Apps installed using WMI classes are not removed](#apps-installed-using-wmi-classes-are-not-removed) - [Passing CDATA in SyncML does not work](#passing-cdata-in-syncml-does-not-work) - [SSL settings in IIS server for SCEP must be set to "Ignore"](#ssl-settings-in-iis-server-for-scep-must-be-set-to-ignore) @@ -43,15 +43,15 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [Version information for mobile devices](#version-information-for-mobile-devices) - [Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues](#upgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues) - [Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#apps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218) - - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#mcmcwfciw10mobile) + - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#multiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile) - [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices) - [MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#mdm-client-will-immediately-check-in-with-the-mdm-server-after-client-renews-wns-channel-uri) - - [User provisioning failure in Azure Active Directory joined Windows 10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows10-pc) + - [User provisioning failure in Azure Active Directory joined Windows 10 PC](#user-provisioning-failure-in-azure-active-directory-joined-windows-10-pc) - [Requirements to note for VPN certificates also used for Kerberos Authentication](#requirements-to-note-for-vpn-certificates-also-used-for-kerberos-authentication) - [Device management agent for the push-button reset is not working](#device-management-agent-for-the-push-button-reset-is-not-working) - **Frequently Asked Questions** - - [Can there be more than 1 MDM server to enroll and manage devices in Windows 10?](#ctbmt1mdmsteamdiw10) + - [Can there be more than 1 MDM server to enroll and manage devices in Windows 10?](#can-there-be-more-than-1-mdm-server-to-enroll-and-manage-devices-in-windows-10) - [How do I set the maximum number of Azure Active Directory joined devices per user?](#how-do-i-set-the-maximum-number-of-azure-active-directory-joined-devices-per-user) - [What is dmwappushsvc?](#what-is-dmwappushsvc) From 8fc897a323d8a1c9f53d49b80bf2111756a2aa43 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Fri, 14 Jun 2019 18:22:11 -0700 Subject: [PATCH 197/303] Issue update for event 245 (#461) --- .../status-windows-10-1607-and-windows-server-2016.yml | 2 -- windows/release-information/status-windows-10-1703.yml | 2 -- windows/release-information/status-windows-10-1709.yml | 2 -- windows/release-information/status-windows-10-1803.yml | 4 ++-- .../status-windows-10-1809-and-windows-server-2019.yml | 6 ++++-- .../status-windows-8.1-and-windows-server-2012-r2.yml | 2 -- windows/release-information/status-windows-server-2012.yml | 2 -- 7 files changed, 6 insertions(+), 14 deletions(-) diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 6cb47efa7c..6e44dcec30 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -71,7 +71,6 @@ sections:
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >
          OS Build 14393.2848

          March 12, 2019
          KB4489882
          Resolved
          KB4503267
          June 11, 2019
          10:00 AM PT
          Update not showing as applicable through WSUS or SCCM or when manually installed
          Update not showing as applicable through WSUS or SCCM or when manually installed

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4498947
          May 14, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4505052
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Resolved
          KB4494440
          May 14, 2019
          10:00 AM PT
          " @@ -101,7 +100,6 @@ sections:
          Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
          Some devices running Windows Server 2016 with Hyper-V enabled may enter Bitlocker recovery mode and receive an error, \"0xC0210000\" after installing KB4494440 and restarting.

          Note Windows 10, version 1607 may also be affected when Bitlocker and Hyper-V are both enabled.

          Affected platforms:
          • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2016
          Workaround: If your device is already in this state, you can successfully start Windows after suspending Bitlocker from the Windows Recovery Environment (WinRE) using the following steps:
          1. Retrieve the 48 digit Bitlocker recovery password for the OS volume from your organization's portal or from wherever the key was stored when Bitlocker was first enabled.
          2. From the recovery screen, press the enter key and enter the recovery password when prompted.
          3. If your device starts in the Windows Recovery Environment and asks for recovery key again, select Skip the drive to continue to WinRE.
          4. select Advanced options then Troubleshoot then Advanced options then Command Prompt.
          5. Unlock OS drive using the command: Manage-bde -unlock c: -rp <48 digit numerical recovery password separated by “-“ in 6 digit group>
          6. Suspend Bitlocker using the command: Manage-bde -protectors -disable c:
          7. Exit the command window using the command: exit
          8. Select Continue from recovery environment.
          9. The device should now start Windows.
          10. Once started, launch an Administrator Command Prompt and resume the Bitlocker to ensure the system remains protected, using the command: Manage-bde -protectors -enable c:
          Note The workaround needs to be followed on every system restart unless Bitlocker is suspended before restarting.

          To prevent this issue, execute the following command to temporarily suspend Bitlocker just before restarting the system: Manage-bde -protectors -disable c: -rc 1
          Note This command will suspend Bitlocker for 1 restart of the device (-rc 1 option only works inside OS and does not work from recovery environment).

          Next steps: Microsoft is presently investigating this issue and will provide an update when available.

          Back to topOS Build 14393.2969

          May 14, 2019
          KB4494440Mitigated
          Last updated:
          May 23, 2019
          09:57 AM PT

          Opened:
          May 21, 2019
          08:50 AM PT
          Update not showing as applicable through WSUS or SCCM or when manually installed
          KB4494440 or later updates may not show as applicable through WSUS or SCCM to the affected platforms. When manually installing the standalone update from Microsoft Update Catalog, it may fail to install with the error, \"The update is not applicable to your computer.\"


          Affected platforms:
          • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2016

          Resolution: The servicing stack update (SSU) (KB4498947) must be installed before installing the latest cumulative update (LCU). The LCU will not be reported as applicable until the SSU is installed. For more information, see Servicing stack updates.

          Back to topOS Build 14393.2969

          May 14, 2019
          KB4494440Resolved
          KB4498947Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 24, 2019
          04:20 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505052) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505052 from Windows Update and then restarting your device.

          This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505052, search for it in the Microsoft Update Catalog.
           

          Back to topOS Build 14393.2969

          May 14, 2019
          KB4494440Resolved
          KB4505052Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT -
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to topOS Build 14393.2941

          April 25, 2019
          KB4493473Resolved
          KB4494440Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 8b4ec480b0..8ae2a4ecef 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -64,7 +64,6 @@ sections:
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >OS Build 15063.1563

          January 08, 2019
          KB4480973Mitigated
          April 25, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >OS Build 15063.1839

          May 28, 2019
          KB4499162Resolved
          KB4503279June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >OS Build 15063.1805

          May 14, 2019
          KB4499181Resolved
          KB4505055May 19, 2019
          02:00 PM PT -
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >OS Build 15063.1784

          April 25, 2019
          KB4493436Resolved
          KB4499181May 14, 2019
          10:00 AM PT " @@ -91,7 +90,6 @@ sections: text: " -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505055) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505055 from Windows Update and then restarting your device.

          This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505055, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 15063.1805

          May 14, 2019
          KB4499181
          Resolved
          KB4505055
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to top
          OS Build 15063.1784

          April 25, 2019
          KB4493436
          Resolved
          KB4499181
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT
          " diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index c2567e3d6c..55dd4088ef 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -64,7 +64,6 @@ sections:
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >OS Build 16299.904

          January 08, 2019
          KB4480978Mitigated
          April 25, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >OS Build 16299.1182

          May 28, 2019
          KB4499147Resolved
          KB4503284June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >OS Build 16299.1143

          May 14, 2019
          KB4498946Resolved
          KB4505062May 19, 2019
          02:00 PM PT -
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >OS Build 16299.1127

          April 25, 2019
          KB4493440Resolved
          KB4499179May 14, 2019
          10:00 AM PT " @@ -91,7 +90,6 @@ sections: text: " -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505062) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505062 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505062, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 16299.1143

          May 14, 2019
          KB4498946
          Resolved
          KB4505062
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to top
          OS Build 16299.1127

          April 25, 2019
          KB4493440
          Resolved
          KB4499179
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT
          " diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index e5e520f52d..cfec8c3b62 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -60,12 +60,12 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          + -
          SummaryOriginating updateStatusLast updated
          Startup to a black screen after installing updates
          Your device may startup to a black screen during the first logon after installing updates.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 17134.523

          January 08, 2019
          KB4480966
          Mitigated
          April 25, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

          See details >
          OS Build 17134.648

          March 12, 2019
          KB4489868
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17134.765

          May 14, 2019
          KB4499167
          Resolved
          KB4505064
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 17134.753

          April 25, 2019
          KB4493437
          Resolved
          KB4499167
          May 14, 2019
          10:00 AM PT
          " @@ -81,6 +81,7 @@ sections: - type: markdown text: " +
          DetailsOriginating updateStatusHistory
          Startup to a black screen after installing updates
          We are investigating reports that a small number of devices may startup to a black screen during the first logon after installing updates.


          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
          • Server: Windows Server 2019
          Workaround: To mitigate this issue, press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Your device should now restart normally.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          Last updated:
          June 14, 2019
          04:41 PM PT

          Opened:
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503286.

          Back to top
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          @@ -92,7 +93,6 @@ sections: text: " -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505064) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505064 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505064, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 17134.765

          May 14, 2019
          KB4499167
          Resolved
          KB4505064
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to top
          OS Build 17134.753

          April 25, 2019
          KB4493437
          Resolved
          KB4499167
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT
          " diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 9702c0dc1a..30186020f9 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -65,6 +65,8 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          + + @@ -74,7 +76,6 @@ sections: -
          SummaryOriginating updateStatusLast updated
          Devices with Realtek Bluetooth radios may not pair or connect as expected
          Devices with Realtek Bluetooth radios in some circumstances may have issues pairing or connecting to devices.

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Acknowledged
          June 14, 2019
          05:45 PM PT
          Startup to a black screen after installing updates
          Your device may startup to a black screen during the first logon after installing updates.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          June 13, 2019
          02:21 PM PT
          Devices with some Asian language packs installed may receive an error
          After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

          See details >
          OS Build 17763.437

          April 09, 2019
          KB4493509
          Mitigated
          May 03, 2019
          10:59 AM PT
          Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
          Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Mitigated
          May 02, 2019
          04:47 PM PT
          Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
          Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

          See details >
          OS Build 17763.134

          November 13, 2018
          KB4467708
          Resolved
          May 21, 2019
          07:42 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4505056
          May 19, 2019
          02:00 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Some customers are reporting that KB4494441 installed twice on their device

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          May 16, 2019
          02:37 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 17763.475

          May 03, 2019
          KB4495667
          Resolved
          KB4494441
          May 14, 2019
          10:00 AM PT
          " @@ -90,6 +91,8 @@ sections: - type: markdown text: " + +
          DetailsOriginating updateStatusHistory
          Devices with Realtek Bluetooth radios may not pair or connect as expected
          Devices with Realtek Bluetooth radios in some circumstances may have issues pairing or connecting to devices.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server 2019
          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Acknowledged
          Last updated:
          June 14, 2019
          05:45 PM PT

          Opened:
          June 14, 2019
          05:45 PM PT
          Startup to a black screen after installing updates
          We are investigating reports that a small number of devices may startup to a black screen during the first logon after installing updates.


          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
          • Server: Windows Server 2019
          Workaround: To mitigate this issue, press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Your device should now restart normally.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          Last updated:
          June 14, 2019
          04:41 PM PT

          Opened:
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503327.

          Back to top
          OS Build 17763.529

          May 21, 2019
          KB4497934
          Resolved
          KB4503327
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          @@ -104,7 +107,6 @@ sections:
          Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
          When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
           
          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server, version 1809; Windows Server 2019
          Workaround: You can use another browser, such as Internet Explorer to print your documents.
           
          Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

          Back to topOS Build 17763.379

          March 12, 2019
          KB4489899Mitigated
          Last updated:
          May 02, 2019
          04:47 PM PT

          Opened:
          May 02, 2019
          04:47 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505056) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505056 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505056, search for it in the Microsoft Update Catalog.
           

          Back to topOS Build 17763.503

          May 14, 2019
          KB4494441Resolved
          KB4505056Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Affected platforms:
          • Client: Windows 10, version 1809
          Cause:
          In certain situations, installing an update requires multiple download and restart steps. In cases where two intermediate steps of the installation complete successfully, the View your Update history page will report that installation completed successfully twice. 

          Resolution:
          No action is required on your part. The update installation may take longer and may require more than one restart, but will install successfully after all intermediate installation steps have completed. We are working on improving this update experience to ensure the Update history correctly reflects the installation of the latest cumulative update (LCU).

          Back to topOS Build 17763.503

          May 14, 2019
          KB4494441Resolved
          Resolved:
          May 16, 2019
          02:37 PM PT

          Opened:
          May 14, 2019
          02:56 PM PT -
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to topOS Build 17763.475

          May 03, 2019
          KB4495667Resolved
          KB4494441Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT " diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index cf15004033..cacbe9d898 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -67,7 +67,6 @@ sections:
          System may be unresponsive after restart with certain McAfee antivirus products
          Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

          See details >April 09, 2019
          KB4493446Mitigated
          April 18, 2019
          05:00 PM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >March 12, 2019
          KB4489881Resolved
          KB4503276June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >May 14, 2019
          KB4499151Resolved
          KB4505050May 18, 2019
          02:00 PM PT -
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >April 25, 2019
          KB4493443Resolved
          KB4499151May 14, 2019
          10:00 AM PT " @@ -95,7 +94,6 @@ sections: -
          DetailsOriginating updateStatusHistory
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          Affected platforms:
          • Client: Windows 8.1
          • Server: Windows Server 2012 R2; Windows Server 2012
          Workaround:
          If you see any of the previous dictionary updates listed below, uninstall it from Programs and features > Uninstall or change a program. New words that were in previous dictionary updates are also in this update.
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1080)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1080)

          Back to top
          April 25, 2019
          KB4493443
          Mitigated
          Last updated:
          May 15, 2019
          05:53 PM PT

          Opened:
          May 15, 2019
          05:53 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"optional\" update for Internet Explorer 11 (KB4505050) to resolve this issue. We recommend you apply this update by installing KB4505050 from Windows Update and then restarting your device.
          To download and install this update, see How to get an update through Windows Update. This update is also available through the Microsoft Update Catalog website.

          Back to top
          May 14, 2019
          KB4499151
          Resolved
          KB4505050
          Resolved:
          May 18, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to top
          April 25, 2019
          KB4493443
          Resolved
          KB4499151
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT
          " diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 4d8ccb2267..1de697b2ee 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -66,7 +66,6 @@ sections:
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

          See details >January 08, 2019
          KB4480975Mitigated
          April 25, 2019
          02:00 PM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >March 12, 2019
          KB4489891Resolved
          KB4503285June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >May 14, 2019
          KB4499171Resolved
          KB4505050May 18, 2019
          02:00 PM PT -
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >April 25, 2019
          KB4493462Resolved
          KB4499171May 14, 2019
          10:00 AM PT " @@ -94,7 +93,6 @@ sections: -
          DetailsOriginating updateStatusHistory
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          Affected platforms:
          • Client: Windows 8.1
          • Server: Windows Server 2012 R2; Windows Server 2012
          Workaround:
          If you see any of the previous dictionary updates listed below, uninstall it from Programs and features > Uninstall or change a program. New words that were in previous dictionary updates are also in this update.
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1080)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1080)

          Back to top
          April 25, 2019
          KB4493462
          Mitigated
          Last updated:
          May 15, 2019
          05:53 PM PT

          Opened:
          May 15, 2019
          05:53 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"optional\" update for Internet Explorer 11 (KB4505050) to resolve this issue. We recommend you apply this update by installing KB4505050 from Windows Update and then restarting your device.
          To download and install this update, see How to get an update through Windows Update. This update is also available through the Microsoft Update Catalog website.

          Back to top
          May 14, 2019
          KB4499171
          Resolved
          KB4505050
          Resolved:
          May 18, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to top
          April 25, 2019
          KB4493462
          Resolved
          KB4499171
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT
          " From 387bb65b31832303175a45bd4e06bc7d50194d6d Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 14 Jun 2019 18:23:52 -0700 Subject: [PATCH 198/303] New page --- devices/surface-hub/images/sh2-reset.png | Bin 0 -> 72908 bytes .../surface-hub-2s-recover-reset.md | 29 ++++++++++++++++-- 2 files changed, 27 insertions(+), 2 deletions(-) create mode 100644 devices/surface-hub/images/sh2-reset.png diff --git a/devices/surface-hub/images/sh2-reset.png b/devices/surface-hub/images/sh2-reset.png new file mode 100644 index 0000000000000000000000000000000000000000..203a9d9559a7d3a2a8eaf05b311bb078bfc070eb GIT binary patch literal 72908 zcmbSyRZv__*e1^4?(P~i1lQp1?k*u%aCZ&v?(Xg`!5tFZH88jiu#>O$zuc|bt(uEd zXKH%t^m)7cu{Tm#Q3?f-5D@|b0!2nzTonQW3IG8CISPOS-@$lr;e&u6hma8$RrkpL zn**Dzv3%PPuie>&6OUdDOG6EF%0Zuiih+TijEN8&uc{(0CP7VIoDiSPb`pPi8AkK? zF1&r6^XNaxQcwP_?$+y<`_~&d+HsugZZ$KNok5>Ot9aLFIn5Ymf)D=G`@XtGI^P_~ zu-YsXuTcDVlfFzbC$T&njihml4S5LsLF*J%KS%v{#rAy!8|J@@L1V>OFGl*v&=~3oRyPo5^22!Q**$>|@2lTUGyVpm|!Li6r5!MZwxHFdwhhQ7w~1 zk-_1r9F|L0p2^{*qM+n(oWifrFN@v$F~mkmv)hTUn8!mQsMnTyIh{2LVo*EyiDww! z5DdQ#U?-JDz5GMvByRqmE7)lL;iu#ERNt-L*Q@S-i1TcAZ`*YmW+E;-NDt6PIa17~ zmwEuEnI29~#;}_ml#Kqgc<%OWw0w3(KtSlQ6W;80`l?7OSozUuc0+nwV**-_Af*bU zjv_TkERm&g+8aqas8Ey3bLdMEh{T$#-|G3=;`Ub8H!)|}b8t-N-+iGmmBFJD=5rOO zOZ#2FkMyi-c{26%J*n?`^y4)E>3C-Iq0RO3&gNsA*kJ?D=$Csi+;|BR-XO?rr0nYI zt#&$V`2}ywsm`d2_INhCp}`t|)E=RP{3_tN+uL2|vssvWg`U=Q6;~!#QdEnbTrZ`> zK~=A>#XFqO8v%J!r*qD^n2fgg z+pXfgVp+*<6szY2lox}4rR+r0j8yuA-6P;KS#cwOZ`E+i?PvG2q!SM}I- zxOk_r=+8Z3g`wQS{Wv?g*y_~Sb}(!j&EmI7F(Pvf_g2Odplb-GJSN31rv+OdX4xEnuyf2&sNaxJ`cJqOZQ&#k0TiLZc0MaH5)c8rhoV`7KytDrP_@iwb(E+Aii zx2L+DgZUyu9}Hj`EYe+DlKSvDxHvyvX)Pwbc#EVS`&e^nQ3zw(%vYE{tcrwRr{t*i zJ}w4oKj}4JfVNPE*ao3D$&+CVu3Tovi*y>THy~L;)lV131Dy7kDC<2hbTfF}ss;2) zqNo)zZenGng2W>a_MUHTx$r?--V2WxZLYLo{{ob^m;tdm5u!gaMVtlkgF*I&ac zGg@S4vKw#Xgw1#FPH#qDfs+M2-iJM_Mrru$W)o$=UM8$?G;Y^fkNjfkBuO`e9!7~o zx-^aq4w-=vghTN2n6D(#B(j)EaxMCU=P-tpU$gOevaIar_C3$1&zdq+;T0^ZaYK+28HjtPA|>3>w5@NqH$9dO(f(_alTmn1A-8c_EUoFjE*q`GoqK zGV8i2sf1pn>*89KUe1_K-$(Gigdq>LQxz}+0Qc7Oh2wt_uzswFg9Z+x@$Ls2ZI&4` z9*5BQCXaVL=zfRW>;AZ4Ts~V(3A;w$4=tf|YBaAjzT$3T zMj@BWR3}?8fI~?fy;xr-;UcAvImLF`pCA(SlD>7{N}$R5GMkQu`Bt@0 zf#@xE+YID!4RXQ+dEXu>oNm+?Fs{7sOQ3YIou+Va#eWS)waH2YJr%)hw^L}GFE@#r z?>>b&}q!7*ND&?Q?N1Y2U#<%Y>B8pKcbnO++9Es{!# z+CB{VB|!Z7S0ZQGlFc90Pw?#==%A@gq0B_rP4ITCvc!d4SwdJZx09z}k@O4P{W^+aJ_c;-q4f!}>mhxdTzxx#3uEAiZ=n@J6 zW$G>9;#i&*H9C|>&LQNgK?CU7^>8k<$%@9mK&-P6%35o8p~Pb6aeMoE!oh$G(i0IU z@yF>x1()Mwr>p97N!s0`HGY_r6jU%a2@Gs&jmD&%N=ekaUZ456@_>qauyLK*Se%_P zm426(1~d`ER1o+DdQBcr-;y0pjVEm_GilvQ9-uAfCj*|)16MaRfmKZwsy2}y2$6( z6yZ@Pa4TO9ER7*Pr9lPg!;E@LVzAzR8p{Ni6=6WT&2pvk7&*l6H(G15z>(c+*N=BY zFAU%*wM_S?^OZlp*^&2S^NB*L$opdzvbr_o($2O8vM*bm2iV@Ld^n8*(lmzo{U5%S zGo8FXtQ(49XsG{NonpP>Yt4q?UiUv>p_l;ZH?e4XEvh9!%dqrIC8WMfS?rcEeqFnd z+davYhN0j7bh{IB-4LcR?3Z9()1s1*maZxjI*&wP9Nj+Db??z&TpQMC&!2-!ON+yR zug)+M6GIg}U>W(a$+E@C7Jt-0lsjVZ!})N=-V&E;!TD}Sl(*h4?SNJHv-%q>l&efc za+3(;&lCz1m5*2wi}Oy`Gd}NLQD_vzAD-9&I3m;xl#&6zA@pr$XvW^F_bBGRi0%z9 zG;WDU}#w=N{E%jAK2q3icIc|qaZT)U2SsWviyI3`B z8u$*b?LX}%!T)eu0z@Ng?|Ng&w;nHzeQz*WyM#duN~z+E3CCB>c37_$U2FcvV9@2t zdDzbu1Hk&;Ks&@niaLryKxr|Vl4SXlP^Ri}tEtNtUowOpFW5w2IGfK+-sQ7EB5%{C zB^Y?cbl@ZJQ-ni|c9lqSBM$-4T-g6VpyB^3!n|_226=XP9Zm?Zku;6|Oq#Y^*|_x^ zLnBN5WVibM$({q5%Gne#2;=nGbytib`E!N(uT+Hz^9kxtmFfvQa%rU6ZP@}|>JJyc zF$(Or?H9yTLcA@`+O{XwUC+cH^lb1)p@*?ys1}+o(~J)0P8V<$6l?zCD@w#+B@Z*Y!R4_cNQpwK}u+P{r5k@35}3Fi&`m1x6k|hFwNq2t;I`V<|mZn!xDpMkqp+yJFvx?V*Sgvxu;<8vR#<9 zj3r@OmP<+e?X)jD(QI?L5Q^k%{^93Yqe>$a&(mN&nWMMjk&7<-?#x<=zYazviE1Hagxxt43O%A>htPf>17(8z)E1aqh(xh)Q)9X@Ie z3>h(iS&-1(Bb-)Vb(+;D78uto+5E?c(L}3y;3;(nKN!#n0|@%lv^Bgt)YF*3>CIhh z^cYp5c!6@h$-mUW$7Q{97=iO`^ew&KYFsD$$euF3sgXIKHv{aBFfn@5|bD=aP zl1XcV8yfBxnvpM!!~JOy6SRO4`u;MRe{$8pz>O^!gEJcN5j6d%_yIm(tR99eXHzHf zSY`EF4eCW$j5>>JLvSzF?PfX7$9_67dAEK~5l6t32J-~awy{M7Ay*|Fm*Havedxpsx5{+%2q=`=$M$4X7Fe$ z5L1N`QPMR>(^RiD;OavCuexdtItp2!i8?FMoa#aUX!^ zo^S`BNs;)uT95nrs;Un3TH<$r;mVDi!9KK&xGDr@yI1x2;Dzr3MiDI#JYh4LG)1LK zX;@NmvPEC)i^ao`7pi?cE5HC?W`i|buxcO@2JQQHyGp3{3>0j!?%T_aeCFqcdUb}) z)E&`lgu83-A*d4;G53A7q3E;2l5{YFu-Ew~6DOL~z%l28__XuYv^_9ZUUWYEfpDa5 zgl>9jyS#*0?=(&5S>a^%Hid+s!UPosU}6WDR~zOBEcu) z>iKz$Z24zk(7-og%WCaP^7j4H4kX-UL@qm7<-3y?-hp^}1f>+_3SdXrTbG+m!_DEn zAWLW@mE=i7W%o^#u1Gz;&t_d7BW6jZ#-bf3__T=oN%Tbk9~SbKnH5y@f#ZSB>GA{3 z@jo5n9R`*nIobrgVeoM}84GPT*{>UPo$urda+uv&_r=}$J^NmpX7Kp5lLCQZ7WTJg z@(l(5$rQWjvZB8mY?7*VTBkm8$;(AxDdv>Ujel}QK@RAt6iF;9v4WT7hu>wfOlRu` zO~k+gx?!((a`1iMdu5;=bufYh(MlH9)kw#%6>NKpLU*5Drhe?S*A=D3#IKIUGKGjQsBCZGX1)!_jh>$wOopA&dZq3+KE_dCF5Z-Kd#d?GK_mCBTyz0{izs+RJc~lI)K& z^_5I~_&&B?!?lpQjPnRA)?936l|i_+e|pU+pec&Nkr!8ITbU6337`X&kABd{teuZ@ z{O}6n81>oa^G&8b#%0{`c+vb;^%#qKXLD(t#i-EtU+6Mmbo)O2a^0UHG@up!c%f!u zP@wtgPp4nc->uH&4?&%6dM~v?QwhP@cGliG0-^I!f6%+P2I_D4!$2Bq=I6B*&!)?0 zQ?WVRkG(Hoo`g>?7$@+Mj?HYSAEi~Ezbd&yfQY;rj%of6J|q~5l27omX$e3PHwg_A zMMFR}iCpj59!Z%Pugq9!BVy7hR7MTQ3ct_&;eo=BhE9c8F>=v|`HTn^X(=oG(Jg!o zI>n;LY9(fe7j^@#L%d-$)$HFWelg{KQX^oyW9gVHI*wNQU0yK*g$fPkOF_QhKei49m7xURP zB~;*c-FFDf1$eg$)j&dQY-%FER|Ts(>{3y5GaBulZyA~II;A5~0SZi7mHd12%sQY3 z1bTdcw<#KWyEcwA_0abB@zkdkCkLH2#oIj>{b~ey2tSL%8w(9pWqD;dXB_78yaHsl z+hcxHd~5DYn1>OPf0Rt8!#r|S0-Z{<3nCPD6)-VXu|H-p9w&TuOpo8L_zfZb-y6?} zTq%@@CS_17U1BkQkcZ=*I@d;!)u^c)%)Va+xP=G=wV5AI@VSI<>b0H-JzeI3i_;8{ zzA2n4*d>t3+tf*h{y>icaGiRQLL*(8jdXx8#r}mWrINiLj#|+IF$sexnTXBsgQyy= zDvc#YAQZ78IsiY|{(QAcEJ#C4ZH891Si(*jhIBSd3zJ5sFffg}ShS#E+G&484JnM@ zAybNU{=8IyIM`(`%($oP-+B_4j3wj8Z4dxVl_Q)CC4aC5tBS+%B}Wd<3R(#xg7*e0 zRWZ^Kz_RJDn_;ZX^EVTCIRsoRHPnAn<*(Qh-7o(XNh)j;4u*dmKg=XT!{zgTw*>z0 z@}(0}G7;UQl*h7w3=FO|6^t}8uJ*v4V*Gg0-y)1aGs(Ml)L12L<4}fDn@WiapNx{`L?1Qf87z|JV~)>iqn@+Gfb$`9`Gt>De=mv_Pn+__-K^ zigM|vK(eskaSp(q-+gZwK(;E{qI#COff7Qrehq=Q4gCf*et5dp?R^8ngxU{Fk&Umo zo*#h88Bp(P>!;o;K$QEb=kadaJM{XC+1<(O*(kn$So9q)2XrHbor~DA!s62e(?`iVNOu;?`6YeGORUHZ9^BVW#hnE->@ci6i{Mw{->5H)SGpZ>mt9~vaS{xxN*+Ny zxStNXM1z}A<)huVm#-oI%K5_#@(woTcQ3U!sQVq_)R5ec-p+<+mUKNVYP$CX+ShCq zM`C}{TlvUkKd8oE8ZJ;Kk&QmLN^WlDva`+O{T*xS>T@*ev~#Wh;qo4z#r?L;?gurd zM*bXyJ%0x(o~qNXN?rNeK}cMEj6mF0*L@u(OhEF6qkPEW!J{)XjMiEXPSWnY!a`{yt=+Ye2X|(!)i| zM8y+~d|s>leZfy<7Y)e_g!fj*g4{0K&CZwi%~_#EolUK`7aMzY#-EhNukI)0=l-t> zh$)OTKezq#z^t92?~`tEi^`hMQ$gRCiKsk3)mwIp6=AUOv3_G)rq~E39XYPf0x-(6 zb$zL^&~VZV*bM5t+I_YurK+r8x=I>8X!X_mexZ{NU<5N-mBT-I2kccVNZ`_9AppI< z>Q2JIo-N8GsrUPB_VwW^nSBxVnIRTr4gGC>od12ZISdhTp#OURo)4qdoV7$mZ}M`p z#OEiW*E?9ITzX-qmu5YfX4+=aEgmaWM6@{Wdpp3=STOW^bFIOZbJfJI!*4Ks#_1Ai z$Bi20vR>CbA12>XiRB@?H>ihkG;jsei!U5VWnst?J10q}`(st{av#6VI4-(?&AD>9 zWqFz=5&1x{u%KIKd3-djdb_N3I3oGe+#^qDE$)tcg?=>3ZXHyi*0M?D|6wqyn8)&* z=P5ac?6_rUzh>P-II2-wma966^%(Ff$?zt{VYSlQvsj++K<2yH{1v{&Gk7`jq3EyQ z-KKk^>AMdBms25jowmw9bUPcU>T>g&{Zm&TSf$XgR%6Wb+vV)BJ?U>*MOJ-1)msr%Vx(&QQR6=6&*? zt>eR~X}JstP7Fn=>UU#9I)c=%bG7sJNKEYd_}%dG2`V9+Ll$ga6$pagt8Y9X+hLtf zuf8OUKE0XHhkkVIb-zS_Kbuec-S>4(vfS*vaE6jGj9i~1&^WRCRkIDIu!&g42^IwO z=ub5l7W?DCPeLyIK&LciLf@CspSsxgB4vt<**r!yVxi{qcc-dg9I;vEGo4wv!E*@V zX8)%U>L@7^%i^FvaLw;}nk7S2l{P2b512r8IHXy#L^u$f3p~vNYchqhxIx!zDNMTT zI3o}eP8*-~0D{uNTvoANJfq z*%_TpU)l$M(2Ibke>>;5JN8+DAJWYHpS^R?VppPax?p?hj*C~h#9^t-XjG-I1H?Fd zYJlPLKPK^Pvr&7t?1%8|kU%0)QUt5G4AqbZ!XNsLhvP+$QLVc|=l9dxmF1=2PPv{3K(Y? zaM)Gr*5!Wa6DPsnxv+NU9|2?U&upIEDzj26H5I1!lmwoOh1#KI&ZMMt#PFdZ!1A++zt>=PcVoIgx>lE7 z-0?*!G?VL|wVE+F94(C(i}pn5j#m?ZEqHJ7IZ5g6cdaJ!N>o3`4Qhy|=Qg_yUXy8Z z6t~x1{68CDC1D1IsImnx34>#d;S5A2rsusmRC5vL^t;YDRx6b&^Bs5_$WhJLX4fD+ zvErWe1M}89hh*Yp3~V9zSLdE~NFKP=o&LmY_3=b6p-Y@pk{4dNnQSlQWV-8)^lZx4 zjoaCC{GK20-LW{W1$D}}Hg#S8sH1?#!2RP->e4Bnl8s*u_c~lE>)GH=p=;yJ%uGZm zcJ=SZY9<1y=7NTJMlMEr2KNGPhIrez;>O}u{Z6*JJ?ZhHu7SI;h)|{M(O z=QG&RzWNk$LxXAoT$Y|N`qx)(fd&H9891i8NA80|$vU)SCXz=YY$lm>+I2?ZsC;@7 z@s#8|aA^Ldne?Pnhzyarucu|pOH z&|}Ul?~$Vh2tiiEYxA|&5l3IpGtF`p{GQ)##u-7A2+;XFHmob2bv2G<9c~xua+6)` z&;bM(#{LXA7UFm%TWYDA=~bBlUGREq0&!^0{;)W9J38na?XEZqdA+25Db$vTB-Fq` z)2GtL8TGpk-4+Le-oDN9V$v#BuTYN$2A}5(pRm4{_|hMgIZ1+WSs9Sm-D@_`Tf`EL3!{d@|~IElFv zRw&L47|b=Bch@JYBO&6hWTSGU%5R0hQL8H9tIDXn}I-af) zL$&y%Gm+ehVix=aZ+X~`=jiEpaYuD*6*eQd??a4Mg6{GGluMN^q?TFw6tK6;3=5Lm zc1C_5-7u;bM<79p;lD&d#NNih8fbXVA`teK-%c&pRspJA9ZovG-`V7B3hT907Axi% z0ze8iJuEF zuO}desDFJmUVpi-9N^5K*KInQsR_QT>z_hEd0Y`m(-VcZco-!|`#khkMiHs{X{pC{Qh2VvfC+qi5Fz1;+$T9 zMJIM;JF?dDk;-)Wr?W+ue(mARf=W0My)=``k}Sw(jyf{+5I!s{y720-TIb~}i&{k@ z@$Z)NT0!ynNnkYI`Sw&IKo>I)0kMg4e*H4shfWzCuq68Gi_WG-t~?cpz)5-T!w!jg zO+@;gA<+aM177V}Nv-r(Wr>`t#7M9*YJkj?a0PM1ESl0^gj$;10vKo^=|c#|`>Ssw zQ?oJeKvmR$C;Vzd$pcETIZNrz4$uDkJ8T{qqWJh!#xk-icSMlol_@T@sprXXJVMLmElZ}NLs z1%4h4t$eHNQI$fK=BX9)Ifl_5kzac)$sOd8pnTWf?J>z#pV8ykk5RXD!fP(fkYUeA z>apP%x1TA{i`2d$HgjN^&}mYVOwyzD^TqFLhaL|3x9aRCqn#UE{Df#_L?~fR7%va< z&s`{_)k4GT5_NE5FwB!a_4qq!mHPGhh-QXU*pBS=FyUsshAovZhB}3zxEuBMdZ+V+ zp)cKFjg}hhM<)Mv+OtmmynzC<#U>}huAC-aXQ;~e6^@|GrvnbKdp?pD#ftL5NZ1_> zl86K>9eBnO!A=f>ozx$~pse6B#bt;>Z~&nKEty7(EAxwn5v83wFB&II;fT(;JR9!C zV0Hw*Sn%Z8$}$j~AVA*llcbjc!qBOVwpj*IMTGX_CkL-v@FJCb6S$2*lrId54kgQZ{!; z!vKl~pydwp1rppr4b(_6ZuKGg&5Cb)Xru?A`;UYK$P8aB@R&^_SKFbd52nw0D)m2t z(=@;}O3i5FaUbQYZrT+p^xPf{nd>S1frV(;j2G&^W8!C`!7Ul-DEr$I^ss@DSL%i0 zogsAHpgrWf?{&RrN?KlYY;{=AlWV5cXw`=nl5wzsF^0&Bsa#I-mM7vuSS>MZR&2J- zE;0CC#PYAm^2yi_6onc7IxbV&<}I(zH|D-4J8S)jqGI@z;NZ<;cI}{Jy^%3HR*(;% zcX!0=yFMcdA|?P<^XhfRtD?0_r? z!%2%Cu`N23Qab+7zn{8X_j1FJ;$wiwp?q$YCIExJc*J?_9#T&6gONG17=Q&6S zHlmskU-(D4(5;8!Eyz;!VgKnGt=b-yHg32W7Bitx4FhtuoydK(2Lr6eHn~<+3%DzW zvYZ<`go=Dkz23-FKXfzRGIF^tWZ4#NZ>$bYhth|(-UG3zU;{M8E4=SGLoF4^e(Zn-9KXF!U+r-+U%@C!ej8Pe?!>`2;a{Po0d(-^GqJx5Ne znSr4d4HxkMCsb2s;uvpz%{?rA`lUTNU-<`dQ)_+ijq3P69Q(v=xEEH>MNJTx;a@XN zupO9P>DOZ9QeREjvGULX$V(RfsdjKH=*F}%%ou&JX+{tQQ8@i2pK!Mc{T^sOg!|zA zh%R0HTw0LuR_x3Pi2Eo)zVA#W_#JSc%nWb_KU}>ch3wC-YU3K@#b?Cf)gwk1t8XC9 zjJX9$6!D<>&I<1IE?;$sc(NqmERcj-;moq6CUiCr$&=Qzb&`KGZVa+pynhA>djDXc zj(>z&rD1B|IQ~_ji8B)l%Q06dl83SMi*uaD!c^Y*qupIUdQxKm-+BMnPrSXR-w&F0 zkeWtkF2;}rMxHYXV-TS~dvh$`1Rf`3Jg78z#K(8I+7d!cD47K(%ER8aE7EV z)=t}99>*eh3b0{RCs^(emFPC<(TLt9i%MkiI4u{vB&p#brQwFiogn=W)abZ*>T@%& zvjAR=8BX#mX-$5_Sb_|Oo&oVH7fs_y8aB^96WD^d?673dQ~E8L+-Y^brLs3&UCB+E zvUmNE2EKuVyZsVumZz#eJ&k+VE)m-dNhAX8{(`Q@DwmA!J$mf4NV=N?U6=Ly^za0K zSq)PEq*qzg#(?wr=&3!YEy{XLAo}o=mWbJlq=|&57lVSl(*#>C#t{;`ZEX2wQZ`^k zL74FT$UJ!uJhCQj z&G8vYMIQy|B^zKXlP=Mp(v!6VveCcNJNm526Pkr&XOR>Ro8s(;#)JCtvL{_RCTZ>2 zC*Y3vDCG7?NNeR`Sm5XZcd+&n==BQ-G!^zWx*T9(UjtLQRi$*x>)FB{3C${`UJg~< zJ6ndxWXOAM=v$WEU-VncFm@~w!i38C@iqJR& zogq%x* z*{lhzJV0a=^(}BcX@A~fLl4HwScMioi9x@sxcNv&VvfQr6oKFs^?3&xCtn*kfIWOq z+=M=8#b9~%${16k2BY?MI+M#ahBI~PXR~pjrR;%U_v6d?`!#U1zA9|oHxetJ9?2rY zTWs4!2>?U)lhZ7l{rn}z&R(}Ro3ScJ=29+=RzdxbXo02oCDK^qvgM;p7fC>jAY@Hk>lFo32D1f>% zx`RWS{WzT~_|hlCDeI$0 z0r)NZr>0aUFf6BjRE+gMivLO~nG;Q<+OtQer{})ILuBuhO1%DDr!G_KbNjOuvLx%= z^vlE$*K9VClgA^u)`e7oXn!Jq z;5k)mB>UIGf{G$ZnW$zPu1KsP;x>#`(e1^yW-0;cdM+3{>-E-3P(9kDT!XdorfA0g z+DO@O#|w2saL}FCX3N%D=8mE9E{y?C3PZ-YS%xul#i7TWR|;KBIAU*QVmp>HeJ2`0 z;oGI@DAd@eiX2Zxm+ez`KmWgaw_ql%8dGhGJg1okm9r0GvrYElaI22BnvtnIZb!fj zspK*hk8xChM23K&K@&}-w*qtFp<#$Gcv!YgW_@9jEQ_%?cy#+EVdR|mCueH66@AL%b9s9enVly2G?G|nX z>5suWWMYI!#C;O6(QH)Tf2GtP8EIh!X7IBM1g=PeR%h_!$zU1D>1pWU1K$*x zd;@18TBWXy7Xk`L-}cv-mTPOoQh*(j4|1n+XQSKNI4bG%KSCRaC+Hta?6nc~)GG>K zo$@^5>ZP8@nROIO*p*z4PCUwwsy^))r*3s=v0gZYV7y(=_Xq0gsQG-yNDl6A2#a3m z2#!$N*_v|?gxufDVpt>th~E4nwGA7oIs3WsB${&&Q(V;LPZ?Dn{5|OGf2NmwHkDF7DxHf%mQk+b! zjN#?RHREOL;XM|mSU4+dFnb+i>f>ZaVR4~1%Y79!GG^FIkFyvroIsUzJx3FoGusj3 zz9gwSIvL`imi&&c$YNb*(e~YT?HF?Q8}6jKanuIAP(gVAUV%ZE1QHjJV_)2ut;%8q zt<=QQ|L;&tg3oO-;t^*Ec@s0~%+wQ96-Hr9-*S6{|L9Om8oaP3tfh{+vUt9Uo2wJQ zfCsOVN5ZKpxJKMCif%X{88%&zQyR2mf0H$Py`wn>6XN9Fp{*C$= zoKZ>R*Lr0~yi@+`lHa4&vEBpsJ!Y-%MNw?#1-Qjh&0ojVPF4c-}@_*}{0>Qt2$$rtY?@ zRlZt1K0`C>{grw>buTmK(GI#C#d}1Z)PDP7zqByYVqCDxEw)2b3-gjta=G-ITqwXP z*p5a=j`qHGt9r4;whcNzVbB)g zlRmv948?MziMX30iSVU?fdAGu5;&!FWvP_DlOyCb*yVX!>V9*g@&*DYAK&}p$b|mp z2zzUOZ1vftaf8h>;LS+%yIK7vIMNRS&Snc#tb^@yjqQ(KkA^nmwPrR!e`}y&9XNBn z1&()v@<_JYX0y1yXa5(uwDN9qc+>>lCAD6IqoiwJR!QOQg~3U8_qR1J)~6c_;J@s9 z%8v2dY6CbbE{OVfyuR3#gYhk|aA9|EAf03jQ1XUBfv)yuB6k92@`v;rd81 z6T6a(=Lj6nzw?8OHCP+sJ<(dti|uzJ^$@g6WqmwS$~hxTih&=kx1;)|+cNQLKTj#> zwgW`7rh8l(X#edM-MvRR_)7Bj*|V|Dc^vb@dz9pugA%nEAN*l&bm~DVJ_LaX#ZVMa9BiJ6!3_hI0k45??MHox^KZ?;XBIb1AXBD~@gn7|Je#!J@8#iO{RW9S{k*bUB@KUCi4al0l**i~z=m_>2@b z=4pFL$^k@qHdVO4KP70DS+8_b0H}!s2OG43(N>k^Sci@`nD{F(h0$g&zh46*(9vPA zN^oEzMX!lS68lD>y(HWnIy3@=xjWE9K96Zn9S3!B(C%;5X}{m6)QtN{_fDE%U}-$; znr)Cn5OY!d@zWt?535`o`Y&$=RZf#2mM-V>(~&gXHox&iUH4#WW&uY7U86+gNLKrs zkli8I4h?Xh$aTqxMXCZEPwLN(5<}`WlL|ske$umcqF-PhL%l%(O>aM(*q``0b*kZ8 z%(t-SB%1GmP{~w#bP{e|Z{_5(BpM<0G@t8&MI^Jkx$q@{oScs4FK6*&!n6=Xi9)d&-8JE2 z7egWUS{A%w;S;$_gx99-l*4r9i-Y&ZPjaN=cZADnj*v*Z`>%aJiGYs zkHpnQ(aU14H#8>*nR!y-LOOr*xgLPOF^tCT^hsgw7u@Qy&w4<66Rq&=rAolFDVO>9 zJBpWznA*EOB6a3PL7_SUV?9-laH?<{Gus2S#WG&?0C5xe$p6{7XMZUgLO~5#SQtE^aH8pwQW~@2Q=MKXSd?woM z0k?z+ayNNAjA8ckdBU)q24GYcYomTnQTrPDI3?S~Wmn2eqF)0QEAf&4d5)E=_c|=| zNceI?XOpoQ>xd9tpQR2a3KE!sP}I!DsHeF|S0rsQnIz?c!ImWTtF6LtGjA-m;2 zrQGpQ-Qi-Vr=p$>3tJH3ctC7EMAd+f_%m3ChSPlEosz8%obmJ(yP;9VZraxKeJSsP zpn*ez8-x#xL8tY^W=%5>&tMs&7G&qtSx75tF2Kg|yyX3;&h#_ppBP$%uU(*glXjbE z?eVfPa;zzCE44(-AovsK^M3bfY$}_pit($qnKkPQ9J46(7eskD^=dI#1Gfo5sy|p0 zfVb&y+1Tsmvf>D$Y>QTR3=>!k@hXYR+3kuP0*P~o7MSN~r;VN_I3gJZ4)x;3u+EMG zvC+;Wz2Q^aR|kvK5(aIXS()rg8`wFV0zuO%bPe2&CAYhOBvMoLJCcpiPz+Y;%?l^LpVE z+xlJEJPINrjv8CNi-(ne3)t3sfW?K54JKdtJkRZL*0b<}+WUE=Im55O|E@EZOe-*A$DAzfCGC7v zA$TxsqYC8NOv0QW75MbOr&av%J)UHw)X2-@ZcU7lWhu)N$fsX&O0+t*t(F^ zfGPefc3P5fi}O-BpPMzBZycuRdWSd_w)&!Q6>K_!n&X(x zCpNvV<~e}A&tCvqS$s0sxLzOQ!f*+g6XzjUZeW{J{3MOdlzP;4to=P~_O(BG4q#)7 zU9Ww``)cgzI0)0n!-52ZCp&p8=v7V$W*U)zx?V)6+o-zwEJhorz4E=`w;jTWM`QoB z&?{#y^74WH?WY~5xVguv7nMx(C-oTd$ih!kS5DsK#=NLe6u8hYaqq(m82Ao@uDsDf za%u8JV)t^{Je?@77WhlWBdp=`)H-4}-T+7& zP|cwPj+GF*l0+C@+HCbO?GU^(O3H+OAohPvv+1ks4ox}H6e1K9k`NSMUzK69Lm@U) ze-p3;FPPWT)Rp=B^zo)#!hYlShsA4rzfEgr?*sZ5g#AMiKj9W(qJa` ziESL>Z7_A5?xu5OlLV)z<(*Mq)O`XQ=&|m|8u00fYZc*-_jvTtYEhE;Um|+*?Kkw+ z!Uuo#SjDhQMr!n@1dEB1ZFtSbgky0qWP*?Fw!r)^mR_|m&qEMU7-YghNxuV1N%)== zPQ!MMVPT?HJB|D`4ii0asGLo}2zCR~a%u|1HZH`>_SI@dDOuRk+!P9VU$b5ueJAof zXd+tjVCa83xC4TWMWgcMXa= zt%8qGXNkC48U0_TqYHG2l?O_>`i#QY;vp_G@VK%F`dUoAgG|hvi1MAz{D8{LBRS_A za$^Ftcdf#h$b}xPr+k?vFJV|`Y2>fA>i-hpPpp^|K_Wrv2)#d=;(wSSI*!x~ zei`|CL}LT;EMkIR<>Hc+x``h3D|mLW=Y2Zfa-Vr$lVD&BZ8x+z3llJqA!i6J5v$Dy z_D23E3vg9$^@-K4K!#vK*Mg(CgPN-P(ejTjIQVq$fOzScqX2GSArQ8&c|NQ1(r3n_ z=VhTHic~LG9b5BQ`I;nRJ_PJL=d&ymudm&(AeB2~3L0_dsLg2Z(MMasDh$yPc0e2! zMl%bU`ms0p%?{g!AGG^;K$$2}RTLP~NIvwx7zNHb ze0;Z3^^Nk?ULDSvFkvwc)c3}tl1_2atNDST~=E0q%i+xui97GK^TH4-R@Hmo+g zsv1RXbZ%;0E~s$^rsvBH_Wc)6SFP|zgXxlk0z_8M zEMFfG;u7%M>=%Q`zJ{S{AVFz{de!Jjm1EH3wc~iGgoK(U1tk;sfqOB2tVq5)Z<%#G zfty7>Llc~u$$X7wyZqu&Z>d3*gqI2(@^MlkcmIR}ZcL)?U1%#No=#-Rd5;zoO~7wV zP7wS#$lhl8E;jCHTtjY0I-uVxvy!muDU(}M0Fah6y)tpDor%g(4 zcV0Q@`^6$km)IJK^=w@j+#&D)Y2)3HOf8?S4OSL08Qc0yK${+ruGs&2`6ThZ8AG+` zp@Rofma3-mEB0OG#cliU5=$>*08=|M1nU(FL<(=RnQBmv=&eeEuYdDGwWPJY_QO`f zt-`)$YFe&o|1Z|wDyohzeE$pX?h^FiZo%DyLxQ`z1_8ckl@nc z`|H2$>grnUMdvCPfpeI7XYW^@=d>njE&+Nv@R#|gF`F#>SvAi3uPT6rh6)D*b;vE z0`miF6fjz8kbAS30#b2!@giip5+Cyocz^o6(1Q2*5vug==LlUn%Ct8$KY$bpPXUg6AD47kpR4XrYuG-e~3Bw9?_lk zsY4^}q0m-2mlz$~49(fp+v4(Pt<(?^@q?u9_if|AQe_ms-L^vq^Yvf#e*hix7oJ@y z^xWhilLX8pLuryt2`e=6;$)@J<%G>{feb21=sduCu^aFI zwM79LaufpRNf{Qt$W_vznuph{=LHE+2EEluTrg3;blWL&DyOMntFS_LAxT7ikc=o; z{Baq(8yf->y@h(t*ok(r-n_0HOwb1`|L(tkm8Fb8`O|G6SoD3zZ^;Zq-)Q=2{%^L} z`kxpZa;LWzlPqnxqGmZ+mzx5PNRoD^IBgrfUmk84t%|8|4Q*#+kRpN;1B&u+4f_te z$g$+|ZVA$r7Tfv*j~kIqCxgYPE5GmNGkm9DWPGW84lbC2Xik?cS%KN(lLt@0%NBlr?)afA@IihcEh? z$l)$p|8Az}w=te|mMZ6n5fLzH)R%C`j+}URtb6IZ-A;o71E~D*3D=cq;c1E5(QkDY zE7jZyF}@ZzNIB4CSv%omZup{1GPkQ z^{M~(lI5_^ryB_dnj7ZoQ%kPrXC_3#CBvR7AU?@}+ZWC6Z|vVKl~yN#rvZV`dLOOj zwGNH&TK}O)p&X)N{9J|5k;u?ag}A)V(u9bd|%$nDh=S z|FG}BAEk*=E!1pXn!ylk7T2jua=P1jsN2taS;e1v52n=X{3dHW6j6A=tN8tMY^5;} ziu%nb^ss%bul4j~MGL{C*hOp~;H|FA{z}~Q?SJ_7gbg>9TIG-TM0To|;n29FNegXT z&OqsX1@&r{*m;`oJ=F;R{S`$3?+v!oPqSPFh=HylAoU6-Q&efj!Q((5u3QUg%6(#N zzvx{%cRTF*xBg!|X4=0eT>yHgjtraQjk7uuEeyF@@R>eQ% zh;d?%u)Ujbb}y*pTMoI#Qml?wgtmMcihrsvEWKv)n_U57GoQ`gkPEtWB0te z3q}#)v~yB1vu^J?JfI5<@>y+MsBKchWhjY^`Y-qNLrd~PrL@A>8=r*=VLgZWGwnCu z*|AvRFx_~jM0KVM_QZaRoO@kN>u>U5)1ZxEG)QF1gX0i4V*1{l1}b}zbYc-H~<>*%$| zjcM;i*VwzMR)g6fMQPJVV=`B;{ON4DUiRH11Cq(o#GObZ7k;}he5d);?v0lXA-8y_ zWw@QvzN11O0V`r104SKe|&m zW3bkMBQTZt&pT>4BZjM(`zx2cU9DJ-#)`uv2e1EJwT}W>*+RvAim^lAepTbT^ z@Q*ySV9h|mwZ;(}z1HFDFJ)f{0<z=3>;d4F&+P zp^67R8l`6V9>jh3eqvhaX)zXnwO!$X!S_+t;szlRgg|vq3CTcOdoaoL5%BfS(J20i z$kpns!vx7Di1GcsU|9fyQ8NUP^&P3G;8(L(YePu-lS!^)_fvn6W3hr7GHCc#<{PIv z^H`kvMV1WyI#MZOrNb>W9~2 zwaf4gEjFARP5$Yfhb-_g&OsQ|%}C5Dh00Y@NIW29sZ^ z3wRhaIi#WRv{cYl8h;s7;RX;tTt8??p)WGh{$lCvv3&8FCN{7+IH=8C z4uJ63F}|;LgG{#T)#Md{{@bqSA9SIh>GgTM)I-=u#olXy1^@pR9WVP74F3Nem-c_GzW-O-;-FvB$IMSw2!G$GlI%-=p9BSi&jDN&=`uzc-`JJFR9(Iu zz8{1ddbG?G0IV?uoPe@T8V1P#K>-ZB(=X+1d%*m0wpN>~>|tIFnD`C89k+zt9Ty(@ z#*Y*8tN%%*z3Pr_b{InSU^5U}>2f)QvMV)``1IfA@eTmUaQ_2nQ$K!J%A(#71bY)k zthdu;HraV?r=a$Q+X8>6gy&=~FXfc^Fd0x&fZqWJH($#?-yKZ6Y&ZkU7T`u~%~*0U zJI>;*bsGTu=KRX+?>I0&zwcW@ysoF3KLpeFTYVgHp4t66-`W7c#~v`8q|bWO?9l$D z*YW4=9KhPJTl|)I4?ILW{j|9i>gj7IVA7f{Y!*o}6hPJq1P$T?Kw^6kmR^B(Xq;$# z$BJ~4`c-@$0ZiXiq6HG~=z*5+ukDOEyd3kcQByFY22Q{DMRQ+(H0hj_MHCWP-<*C_ zHdW}A50#>zV)LwSZ}VA(?GC@bT%YuYtU4U46-S=-t+KxIy$5{n?)X6YX3|%<_KTE@ zTUwIf4GIEHe|i{01T0q9eB?S>*>AyUg9HI(b=#7(qVu~YyKv!?{#ots>0 zB~%Xf_v!lAk#x1St8ZY?Cg85?Ankh7zjLauP*-@0zja}bMQT9AxfVKGUFh22C{y)# zcc#4^keJ6|4wT0;Wp2`}dI8V($&PT)C(s^10yI0HmAvv>?F&^c9?G?&ZdKhrPCoY8 z@Vg~zcnzyM{M%GpTpAP~0`$}EdldAVIX-(BRUXBkH-XpaOZQ$Jo)U~FfPF)pch;)? zeyEsxd)*&dEOz~lOPUFS>i}H$kDaEi-&(f--}!$~78vfWVvP6Mb&+1!v~+WoZmk3i z?^+!SWEG%c-kiwf{z`jiJtq}+hK(c=aI{*Hj<`~;@$37$8-ES(i%j!-{QdEtU;qQ- z0$6oB05YJ*7Bc>JF}jM;6mR1H081LLck!ljIzM6gF4FhjYt2y)S7Pr zR(en@CsU4Afn<#FEy=EdEMUIqm0@{#z9Fp81pHO9DfG$X_#9HGy6v=TQn5+LTRt>E zL6yiECqTh)F!c`I83P!1HXq=~OUGDI~|82875G#a1WjKojZcrcRcA3!M^+480Y z&@{=rVQ6FTxdeb;+P8JA{_FE(rx)Y+_eiB{Z95{5%xbl!5a7}9eMyA@+L+W2nl&bJ z(P?b1Ywf^4f&l02lPsmw@YuhT_r$IIf(Y2+C?9W=8^%)Q0{bJ1KbNV#b60%!V+qu( zIc=zA)k=~O8?4_+YJ1j>)%~$VOMXJXupF%)vclNbuUy(D7li%ZSu46%)I_wFs zF0O+h^~r5^iqaqKq_i2Py`KBK0RORgs;K&t4V^ztR+I#)r785TC!Y(7WU2DQ>wVvR zaJJz`h#zjs<2DB1B_gg5Ss)<7-d>h_f?iL=MI`?rbOZg`pJJ>BH&b7m2P5#5Vo7+& zwAjsNZ%Eebq+5{*L2>3I1+RB`d3kHFEBVpumk$RB!%;Xiv53adUOAYK8yXuXM5gqnV@ClcGyfhfh41b!aKg_jW{Ik0&)!?LUmw$Hr5zT z)u;Yf!AQ3|1STTSIpufNLd|K}dwUI`nUif#6Rq99Y~jy2`rU8>Cf5>pxZkJw*I>Ma z0H9hTiTV8``4n^+IxOtLavE>mtSAPxYJ{i;%M+B%wYMPF0PK?=c{Z<;{O>?ALA>5? zQ|BAkb4hf3Z3aLN3AQI}LKgRHi`9;oILzF=5fHm3UuIME(D3kd7pl z8`s&~n7{ct^6)Ho@dXI+?5KG{8io2&^Jog4Z0f;quH`TDD3S^@!+F;|tv_6kG?R;e zFItrVyb*=yZv-d{-jL$&1CiFU040%x zV7fH!8PNMQTD&API3GWIyyu--O+IbyYef4bD2ol${4!RBJUiwY$rbbg4IQ6IorSLUa+kgYohsyIVUIDyDnade^&;LF_g! zM#swJVWu*KN`!tdQG1HHnlR57UW&4p4Vmmt3qoZtU!+FB^quks?#d;Vg0vHI<_V-r zq~JNcs?oBm02tKs>`RVa? zk3vBUsyrtf_-d&$YZa)xdg~XcQsI2rY_PFDFc5Oc`BI^$(~3fJD$Ir0J0Tucq?ar7 z_+Dp$>1@;qR_jU`GuXtLp!RL%r_(QbVu%(_Ni9{~(I-fSRVV~WIi90v6fM_Q&?HMl zdIH&fkCYp}8J6L*S;W4|@vHbdB9SGzS87vHF=#BFn8NxVuk#8Dt3$#)Q2}VkL7%IT zTck+jL%OdGKkWndp;A959OfiCFO-h~!kzi#+MTAYy%FO9kj*dM{8jz^WR3cdwn5JR z3?QpW?4RD%Z&*q~bh22W>D$6+97Yu}*yxYti>SK7{OXme`xGxGaU;8Bsv}qrH*&Y$ z51>OVrFWWc8D>(cGWkflPzN@hj(Rc<&_>S&+C{S1kQe~G@8vM=uZD1F z$ta3_SVk}^PVLwvaLB?!H`Fxw49$=5^1$9tMuW7LUz zZfWH4tvH%3)Fz3*5tK;|BCtV=q*0-g&RAoBbKLpE)#BEd=>Bsr38LXfww$eeZ+77X zOlL(bOCa3%Wjs?cBWaj|AaNjhrt36egNAuD0!d?`mDOZJbj9xvSYETmz*sVl`s;N` zvYqtgNOj2C0yqGMT=qHbTIP4NYKMp?5V@6E&5i>XwLf$~h4T6x25zKXAROnCnjMRE z?l-gj4Kj30c2c?>4&?q+~8bKXs_UB5cn?i=}a%ihX4= z#t_0WJlavpiAwG{PkXKYa0=#8MCNt827_XV)P5c)u~=aZB}Dab?}dGR+P@Dezy517 zviF>P0_HQa9m${%0L9>`b-uaA34lSrlE%#bhnKz1V5Ey2%S(hd7M%P9QaQy3lc|5> z^<>u6Oy4Lu&DKK-2sVt}6W%J?y>1}Fq>+k;C6S7v0P~!`F%W1XtAfIrYP`#dZ*$sz zh{n4A9&Ry|C8jAk?`tV|R0MWXf@2|{pue7UReLfYYa0Ip+g!bE8^ddeqUW~lq-N9X z-9H%0Cer>ANIpJqL3_1Q)N7_^8mdUTZke?d_#dG69V(*O^x3VkkUq%e`t3{8U@U=x zkXP}xo*vnMjjr|dHG23rNk^kg_WxRSRYqkf@7BP+|4(%9|HpFm{rCRgA>mR*2agRl z2^~ni@5u4I`s1BGb^xLGuya!N-pqQtVI~0Nc(!_7uQ_)}2nY$}q~2st?&s|%jcuPC zQZ4|NEYVWcmIcF`4>Vwu4BGNi0#v8BO-*M9F+|s2yL@ZS&Q|>-h2LehgJ>V=qbw$q z%79LzUxhvsfHkFR$=t<57;h>;*!8>a@;}SuY1f zcui3Z92g14Wf+_q|CcCZQEYT&(IjdLnTw9p59CF6`ZOHrUAO5TM)0E3q%ZL9Ra_%U zclLgFr)uXN23>cX29r8L6!5^DNC;rec%(HwUn7y6Zs<_QmXmX_VR&&nbe0^f)mdR7 zUf-}hoF8p=$b?5E++`sk?t5(mU- z8+9GnRtlgIHOYGcnd+ut_c;m?y6gEmj>~6RneO~-{;D!i+b7%m+|Tl=ZC<-l@*ej_ zjE{R*SwhYd`b!yaZ;?U#ZsBCDxba^Gq$Ty7_rWY({n4elDOdlLw>sZ6Te5rHcJco# zmnyXsdwgGFeo&GOa(yZ{G^q7^L%eSXGxF{BrgQjdBh17Rai1^5$HzO{5W|G{QT~XC z@!5fi&gH|&?YM&Vetwy$(Bt=hx*F1ayP2|FE`V7V5U4iU;2VECqWtnhm*7VD8C@xk zG;XnJ9g>BVv9?S}J_iDH1`2Egao|p}i?Qk+*p~>Fy?o!0o6m)*PtP(ET zq~m~75TB6*TFonO&({$NT2%6qD8id6r*A5FmHwCz8yR<&d>yA}nEJ?lq9Co-c%%wE#C4Jw{$ zhoJ^e{+AY@s%vm~%^@sRKTfCBE%~p^1TP#{F6iChgteZUr4(LZ|V*X-L$lfanIhY#@VeiY|Q4~i+P1aQZuCHzquf%KnY#v&iV+h4U zA3WX`D`(LXrJ}om4tO|fhi4B9tFp89%Z7V%u^gU!I+xra!jKq1giL)@b*wvk2?`9Z zaH*(OT8TZTqq~2O;Wm}8L0d7X7pYc~XXXFF9sv3hy?3CBAs==}|R^4ND!2 z4wxK(IrIFB9x!eZIz^HTcl+_l-*um(zjODdn{VNV4&IH>{f9%voFof1sN9bHvo%Uy zKJ7uwwfHK7RK^5n){kJSNjAxl5GoU0sIe(Fn+9!&Ooi3{V&l`aq( zu?sOvd)%3;EwCD?D*~>c8<-2KYiH-n;qHL6r}MU>`KGF9h!ns5-jG=fZ+qsGw|)sT zQDtQ^NQN)*2s<5zxp;QQ!#;OAFTgPf5t)#`7o)4QU?d);ql#VPp0KHS(-$&W`Q0uQY_6*g&QOhj7h_vlAZ`!%f{kC zfK^zsRYR$tkN2dpcxt} zl*;CtRVM`oHt>yy7i~(xXfW~<+6}>%j^o~Zb{R!7sL(&S-;|rHOBB#W8=tPGs!-8zM=Zs!~cL+f6t1mq>V-=)C)T%PgB~61Tsb_V@Ot zubED*e_+U|+s!mvOX~ITrn{aN`GGMF38{FJ5o;)G(U-H_MZl&%bpMd2xVxx0Bsktg z)(ch(u4L>lDd{KqL2GSi_MDbGeezFNGc&UmEh{U|!c``ug45-A(bS3anKxo1H@^?V zrZc!gKsCRJS%@=1IM|mU4F{pC;P|jN`E2@KJt!QAl;mS)#_JUdQRB56uarzzGom`Z z&J13)^Syhc+)KV&s*}D(_r~*TW{|RLCTGGM@r^e#PneTDYfNq4q?Ed{W7?mQ=3}gn zyiNs{_*sTwDvq#llzbFo!6*d$T=SxL>y#N-2p>XdLfC2W3TMK@6KN!6RHJ$< zQnLAWauBdgRVmWU$6`Ou{IXEOP|WiG0n>P~fTXnP6lTfpy&>q^E^s-cXl|#d9P;q+ zeRC(bXix?vnhm=U=paEO&^$u`ag7CsM!`TS&MBg}J)ft}q)Xd-y8+<&eXYBR)PG4d zi3XX96--ZyoR#@Z^QQU@Xded@b)pP(Ja!P zSCjJLp%i=3Z2H0G;M@>k$TBf%eNwazxZe}^c#>V zC!O$M)K&2ksO70Ps|LN;F3>+@uL{F-z}}KqVuDCJLQ#|5N-ilNwn39_2hE7Wo?k{6 z>J^9t{;s>s4rZOMY+-|KIRbYT%Pqn-JBl|hy!SAWZI_j0KrnVz@e-DXZS^jH@j@s= zpd-k}7(v5*;++3Hjf}ouPjE|q-`Xq)i8iq)hwtg!eZl@V?^zb(vR)^g_UWxIo9Fzy za0n9u3j!gRZlxc5BhnM+590ywg{J*2|61DJ)e52eNhQ49^at{{Y$si;L-TSr56(=Qg?Fjp%5r5Eg?`(5Dw!TET%@=r76a06ZTT1(s7~LRdG`Yl*@mQJ>)AZH_vp-2BTd+ z-W*C!JI(%vk_lCaf`mbZIps&f8|{-NS5(Ln3)LP7CKul$-z!SbO{IaH)6)43{dM(i zDB`Jpm){!MGYl!<*!lW*kU^QJD@NXw-=*k?PZkd^8=Hakm-%H#aWRmCVg(4+J%)$| zi;Bk0ny@L3fKp7Iy3%?$@)KyJ;9uw} zmMqTL&?nPJVD+E}p=C|eo$|uf3Tio^V6$HM+-1WvYqR1X_B0y5kPxtnP@AL#s1s|4 zaUx+>5)n&3=bZIli5de5!Y9MFYTxH08c;Vd>4a8T1(hsL%XFMLY3u; zfLQ|okUN@(%T7|p^3lzeDW@9@c2Wfr6B%bc?J~dUZ0Y>1B#pICi8hBm{pJ{ZmYt@1 zK0jIgDg%FE!S9lFN5Y4#)b-M+**jX>U5zR~rmL)c-F{8*JI&&$#z2NWy=rlg7;Y0) zOxi}-s`}iPWfJOCIxt1Vmzv!8;T~BSn2Q&1S{f3~O6JAjywa2v8TU5sS!jcJUS-@? za-L)Fs!_kiRIm4MGU+f!$^HILK}SWmtt%pj^_1zNd8Yac6~%0jtQtxvhwm#1rh0sI z8MT73S@qHhiuWbYQA1d;A!V&vHqEIpBpl>i-c(#7Vh`%B_^#^c;ZH}C?d{t$_6YE? z+7A_UWFWd`uz3<(u1&V)iiVxKBcghZjx`J-E)mLfwV)AT@JTHnwc|*6{1smwNAUUl z{v_RJmnB;z!qQY+2)z;80dFfpa0XV$TFFAWjEbx^L0+zz?Z-x zmSmvOz%Mx>L;XV|`5}Sz1)+?&BB>x^)C%JibqG3*`7I2MBjTfx$)JoD?nH)Jlji&{ zCR~`sbh|OW1>n4*QIRP4i^6Ggx+2-k&hL-jvh0?q<}cvg->jGCZ3FZYW)Yx}2WuZF z>1bFkL2$M&rBt|o;Yu17%MjLDVqj<@Hy3Bk&%Y-$5@uVAl?5XzGLGQVe?fuu3U}wK z>bHWzF6+}uQ&+uLGDra&GU#;5yywfl#BudP)mzJVpr{H;7{s;6{cQ(ZI7H!$k`=#s zku}!~=DSO;!3^Tf7ByXw`F6l+Bbr2+5^6HsH>dVzqE;>brfrS%yU4+qlD^MZ`KQXZ zZy2*fX&+-{C$=WotA)$bZytj ztI6YV#Qel)-k}7g5+}$*L~A)F;D3c);k%hr*s_lqq`o5Z62TpDgE3edBsT{x`Yq-P z5h^nx&b@#;glUrZn^QHhxB9(2?+{N9Mvy;c7~0zB-T9rq#st0AW#1g`sYas##I++5 zLEEvzsjkyj;ohut4m&JZw8oC>Vamq-li?=}6u@u>y$>nl`CZD z<-N?RW38$>;$G4BHv-EJs2$!k^{`)g_xAUe5s?r-U(3nL#J|-fBs2oG@^XcG`Go2h zQ~p|uxM(yKtC5k$`ySca#%ik{o!9(XAKtOFahd?pJ8H^0s~ z%_NDiJ-^41@`#1SBtgYdsZ?}8uEI? z+&C~|b(y@>Ki9uOuSuR@>G!c)`t-7!T9~KkjtMP}cH3xCAM(}e6;e`so}GzLPB2;n zT+UQ3#6!WiEfvpN%z>^>_8PZ3is~ut20+c$NFx%p6kPSa)AYx-6`oQ zZn7H>-nD00PYO_T3)lPKE%Y@YTLNPJGD1W2dWrGNK2wX~ex3%&B#y!fKPwlgykQJq z+S{yR-zj8(qSF~|jyrt{V&d6SK9PgXuDE$pL|b?s=7%Ll%>RWlgvs%2DH$NHEY`Dh zG0KLGe_L5^xi_95e2_<(;hi2PFg-R6NB*2yV<;LyEy?7+`k^6nc7JJfB-LfbO0l@a zk;$$E7=Yyk5Oy&dWpSO5T48BB{;08LV@E`kjw7bymq~!k>7>t4-nm>-AQILOw$SRW z;iUDqLN!B&o1oR5l!Q>c0a5xMlNR_z0Th7@YO6f5l89t#&Z~T(#~%V@$k>!thK|S^ zu$8Y>(LP>f($(xv=BKTkH^oc+=3$mCmWiupRs z2+WO%2i-EknVhh4u2CPzZ&NAv;4+K^T+6XV5(Fo=$AQrELpHHLYowSSB+Z%NO2E49 za4Z6x2SS9!X_opa>@C|d2M!0DGl`%`20}4L3+jaoIl5V0A+6{0-xg%c=@0IWc2Q`l zj2Pr&W}v@5mx8Gb39PJnK|(l)7QQ8Zf2G4nlQS(@MWSBS9(9iU$l3D9UiY6asQe>m zGTXzfW@%)5e0NT@t~xFuo{siYLzbs$KFh(Tx?g(1dO1Es!@?HN2=~?FM-P&*V&bJl zy?%PU$8VQP>G1A>Y>8sbbwbqTlZ5P*(JYZQVD_m|0;tUQTiDpIXUz$22JM(fH?MV> zGB0|06eaZ@A#dEHAb4+?EE?#}Hx4w^AT9iQaU{qQNGLc0;{I;bh;G{%F-~XSDSuK# zQ&?A(IdkZ5K?f5xCwE&R3(m*rK?3*6Yp4A6Nl@p{T5UCIl&( zz)St!5E(NjG_0)^MjJAFVX+t#H^}H4%b1jEFRi7v@R9irm~k=atb3oa-c6=jx=_j) zEhzXXFuyqPt`@a|f6Swj|BOzz%P>#P!&YTn#zedA-fyQui)szZMSvX*k(TF^Xu*gE z6qBcJ@4&u^h8L=AZA*)qM?gaiU=xC*1o zdN@M;ozOYkuDJeXyZ0w|^FZ1Uiv}nRP6(8ZaI7X`(O1H>hnfZ^vK6{p85!!~E1Xnp zB*FtCX^8+E2ZFEicMwZY)?*<&R&yO>(A#CDpw+ZRTq!gcgecsPqXJsK+I+9Onr%NX zFJOj{DQB~}VOlYHLaXY{7-57{D`w1wTo;J99MP|V)rxinEhiJ!i4vD5#X#tjX?VO9 zb9!6G2NROa?8V%-Dnk&rUTAa%GfVt*osjph`*vOyqGvzu(^O$iu z+Vx>tmvl<*sGU_k*gYpbrqm}}tvadk+u|nm4oq6*7TsXx55L&5`n$=Iew z*a3Y8_e9*c+-)+jEjSe-50bFPvr$q>E{@O6idO&9?UQHk6%rLL;Mk(8}92+0dkFL!c3MRR&Q8egHGKFQ(fv2yrC<<5_yazGN$j|p=nEUXhO8m z0XmKB2VrAB@8zqR>q?dIG(P6)fUTH&C`R%d0v5TLKkk90Fr8wStL4SD8~Z~p9alV4 z5Ca==?6B;uPR^OnCGCc!TW>k1V}@JnP8pGsA?#M@+!>2-LglzyPRLKjPTXH#+tB^M zn2k7ZE+bTjl=Ki4yT1X6iJtZwkA?T+s!gpf>v+w#n68;w(Sl)=Vv^1aq4}KyW%Y8+ zpyerBze$%bvCVsNa)MfJ6RsmI{w~;0xjM2@UiF@?T$HrBP2224>_OPPqRzd$+a+$| zcORA_^yU01M1?zU%o&hj=PxI4P-%D0T?s97!c6d*w1nThM_lKZ4blbM_BgoNcL*&H zzoKG~PL`8%Vv0HHaTu5d;G(q(WN{H5W;ZpHsLRC>9axfK{8qG?^l(0`vaw?cc@w5R zmATw}JRnM+rjw@=$?bfyUzrZJS+nqcV#?_P&P5egjGB3hts`oNVHiRfqLvk_r2i@b z?*c^>D~I^eUgf#}@3Dript#s5J{}@9CR%H~jD#k&{r7&Zd*sMsbT8W@W%5oC33LQo z6X(HwaW{3@&ZEbHtOg+raf2%&XDhPi0e={B&uXPkh^`vC3xhe>1Cd|oCPSoDc{kSG zn>vSx>vJ$Qcd^IsSpNRcDLGk;i)g>lJ)cHs%uHy6NTCQnB|U-}mGOlRmKS0chY9oZ z!FVG$Xu=e-1vbF}10b<_MCU_UL^Cj4E8-3r-a2Gzrn-|FMM}(-XvGtE*BkTMxLaYe zl-EHE)5RQzdAL_7D3EA49#nJs91Dt>s^Xve>FA0B9^`DkL#mVl$vFtTHplZ}Qu%7k zEon5O9K3+kZ5?9cn1RsFL0T6-c)93GHM9bQ=<%b~3b_8o$R-x~HQ*Q{A}(?C;q6+=ndCzH@+b&xb8)>`gfKwkCX;QUj3q>PRyt``!tIy`nZwb8VzgX`W-pZX_E# z@^xW)EY`;c*d|q)2w*K%hVI!B3+#g&l+9-5LX<$1Ms$Bw%$Kd>thAmVEPI))6 z30m6+$16|ID2PmN^a#k<*H>oKS*DYwGO2kT#JUND1@Je{H1zHd=q`@WeQv>)OaRy4XzG(*b)avGjD2zFzDoWHgbacPxwq%o zaWwk9fzNzb8Y{|OyfsB4i*?;y0d20z+iBitz00*k&KaD%e;+HkZMg@DrpC%z1e z7cIxi$C)`ek1-hsNS;Oag>Iv0$6}^ zF#2g7L;5d--xys@yXt)I1)n7OLsUd}JSEck>F8B}QLlVo=!(G{ao};%K`ET2--JKn81rEuw=( zwLr9}p{MtSuDLe#@~3){Zl}ufIU|WxjEVZRB>g!hZpaYsIWvMEm18@fP!k1rS!BLt zP5JF`X>VlDQIT)^RN$f68@JtXtVOX{T|9fYHXFal-gV+yq4iJ;nZ8d9IHNboIs_XGcHdat~;tA*7wOcV>}E*-jDI29C%d& zfSVKeUd{lQBZ3S%w(D2r|E^}_NHW_0xpZMA(Xs#MV*YO!j`)71=8wmKv9awxv94~o zp;$1j({7JK;|Nye7E@b8kMu(S&bxTZ0Q|zFP+*?UE!aG% zx3)96Pl!hO#9g>tqi&Eb^W*>gQTLv?Pcp6P@VyJMvFbp3wk1C+{=ZKJK35b28YaXB zn#;b^zQj-pC|xq~MhAdzk29??Whiv!NM=Xs!=n!MjDi1G(;FpNjN`6+?gjYzzwl^* zzw{C=ufc!MUmE*HLWpF(uQ0p~aDtRVUI$B)-1qebeP=Sk|IQQdhK`ALwv(^8$~N(w zz0?c5R1pweyAA^KGW@~e{o)tlVTO;-3P|*(?ZGKDJ?!!Im;5C|HXbNwsH(x@qM|!h zVlDVUS@Hq9dehg}dHy0n&}&crEv{7YedM?I-5|$Yh9ST}#2?<1GDW}3%ca*&%0RVprXcck@5L@!`)c*<@&7Y>I6+V9QL1vBh%{=LqOtj3l`1m^^3q# zwiPYyGfUp_rZ6qMT-PI_kM)uiAO^U+KdIV%c)F05mw*Pw?EYv5p0X8)27Z?ip6hNz zt;qQPz{I~$Z6f13hZ(w+`p1gj>p|vkOwCTi0C-2t&_yPlf~Dzvu~FG^{=&-tr3E0g zL?Od4s^}Yzz^bvHp*UTsm(3Xh#(+k%e~&e<_fvVAO~RsGglM{$wF2#ImPSjIXi$ko zL>#O43Woy%1A7fb(>dT23gSAS*;l`vgnBAuj`lCK76=FckOB3VX_KL6- zm$1n?BoB}}KNKz+)M#@7ssQ4bi*~FAA};VZx=X8(lTViD8I4v!^?Rn@y8fxZ3qR^F zR@4|#%JEom!D3^ zBu(mM@}!rzXt&1_rgLDLn3&B{^Nf_17X5&5PYf{0SbZHDOBuoUcniUs2Ff@Dbld56 z-uD@jwqIONkV>7t;Q04PD~tmGPrY1YpRI`x--=d$Wx`AwUn6%d+A9(zD)xa|E=CNyDq?R!_@1{KtB`sQ&{!qNSo6r>p7_`>y~j;*i(1 zn?n=8KBFn*CltEwCw!jHDyq6)bpHrwB>gb4Gh8Ba4=4H_bA7>izktduitgVT;8MKa zGksq7x-hyrT@gcEhHWyirez+OXX!l$Dgh0P5=(6}Lc_hb* zYG5E=?|+|zo(?Cd#dLONDjpsM{H{z zem5S6s5Gw!VejonoD>)@{Ji!8bSWwIG zMh^}Hg)qy7`2`=abiF~ezW0aU`+Q)r@rRp&D@W(wrbA@3u-ZP2o(=cHRj`Ubf(W@V zVYu&AU`Yl0!DpwKF%yYkgUup(NdfzeZGVOlwCwhQ)%R{I@WH;%LN1}9>VKY zxoHNwg$0hlAr#)N#xR>%oU+5va}*HxH{%>>-gg^mHHHwIUaubGy451#Ge8p?^b!l; zw(P7O$XK`I#_*j&DpQV)w>7D2+1dBBrj2c6G_6#~u8PQLc+{g&ofRNIGX#W{mTDr_ zGi9fv&g}`-E3yp+oWpJQnMD#C=+=lZKwa$Kn+mmuEnN}p(!<9(Vd5Q#k3q{aS1Blb z#?+9~x`JE%1B;2TUk+^H%7j1*vgKL`zSbryDoWyO)5(nZ>)enh)9}bRcEHQQlEJ%5 zf<1jkf`9v0n<+&xLCT)L&?=$pi9UrbrD6`YA2W>@;_sw>337~8YOZKdsk!UTEEZx zzHPvm&Z)0#TjD)_V9X}T=2>|VoY;#>CSA9&r=QQY^At4Oa}sGn1VbLN0M7^_!mmg} zNA>xYy3~goFH{1GndRtd->0%tiNg1s^LJaZS&$W*9`n`Xzadh|n?kt&Aq~alEMfwl z!IN~MmquV()061FP97ZStDj+>&N5c(yd(B5g=+SC{?2v-R%R86h7Qvv*gy$E4HW;a z+@YA=)m|XJvxS7{Q*Hu98E6udC$jj7@wWpA)B8%$pnd2!aEANc^Y~#<@4B{iE@a7Z z`yc7Gqwr%^lujD9ZLdRtdgpEoGFz2^2w+d#|M1f6w5yMTfY1V>f|X(u@=rv8Ia}ni zF*Po@_^T~~MGM17*=fZ_X8A`cJOX2^M{sv2Ds*Zjh8fBF58;tCN|~zUIxP0-H#kn~ z88M1Zf*=ti1$L1{+nCh`s*Fr^#0)vBu;m7$pnl=$xG|d_FLTx+seyZfMuGPLi9?^M z26z6k894?Q7S?1?Qff4m=YQkuouVUu;;!G=RwonN&cwDoNhX@uwryi#Ym!WC+qP}n zK0W{EJXh!3yl>qkt5;UiU8!Hyu3ewnUotG&I^iPeTI~rdc6fVz?`+Q}9b!2+4k)T^ zDG>Wavkgr_J4MMb4c>nmQks;Sx#k=jB3-T+SV8*RJt<>nm^nJdaHaiv)PZ=q`>{$JT?S zw3h57dqu=N@P z#p?gG9hQFr@xNw=g8^i>{y#!EB*P_bkFe+E_+)lS@t>HbqB1ju8NoW{IR2!LAo>l) zlTl?b#Q!|-|7z#o0pcjyPTVWCIYX%HX2tI`0oxGK*k(KvE9GKTjmzNy`LO?~+HaBw z_u`~h3?52k2iI(3C^lBh5!Tfj6_N_Fev`^DfDU*oH8cn@)c-{IxgB$Jw*@s+)a7** z3K$^k2TX6YC>n;4U4RCPULb9R9X~rJ<2y>|Iv8yf#fP&BP$K_(Fj$=gg(@Kzz@t)q zOvxc2-3pcm&>8BTvgagn{H0_x6&sKPen4#@BHqR&W|LX>S=5X`iurffm9)!m2 zZ7zog6`(H~0V;iZKyR*vNPrffAcSNevK9OfZrL2>zc=>@tw?r^Xy;5VtmeU8{v$BY zl`3^Kz)qwOszW!n{9YD#DhDpkSaJ>i-+PkLnfIkULpXIr>*dGM_V{rd#DS5JhzHo5p>j%#(Vn#}6>sIH!4+Z{GP5J-+i8~a% z##ll3zcI!$d2uFI8~Xaq=c(Xz-Cvs#}ZHtq%u`2e!!Db%8Le?Ok4w@3jMp&1>e@Rf1aF`R-4*pm1aE*5DFu^ ziX1nQ1>$i))HHr+L64fIS3>0v5i5O#cI)XsbqgdqE1%mk+9rm|2TV^>O-g*sqaV%c^lt&;a@aw=Kra&GM2Xf_QrG?;sV|x8} zGaXc(+Q%ysHUjp12`cx~RqR8Vx}myPJB&Tty1e(Bt_n}I+p~T-uqZf0V_61n2(Uus z6X9wLdIgWGxP>wr5Gg~S>wE@7ez=H~UMP#azT_}~An<-M=H;;X-He&axPh9zxw-qw z>3U06%gQp{=;`_l1p$NOcG>YXO-%+dhD0C=oSv7voM|oQD`+p{4=>gt$@_r->FB}5 zStMK%Ef6{bGxT^6Uh)SY5WXF`JqU}A>IZiBOl2SaG-PP+Mga*N>%{5E|2)Dcb~r+* zUo#TSxJK{o(E zRc*FamIC9`igyZ;5Gfg-BE+)hBoKz|)6)Na+u^^9!*c>|D{MQ3j(k3*3!N?3ff2qi&Ycu;IShy1gQ(hw zKP(nSfuihsp6@Bwpuysp$BWZPr&hGy^Us6|IuMU6{844D(vlspzA=Xm++`9qE0d${ zlTlNstJ`}vx3u+{v4kJ^ZN0(3<}Nr<^Mwc-9Tof=Rf(Kw|0JK?CL*S*Ix!bGn?<+%uEIYXa_j<^@dDpGf){0dRmCfi zuxQ`g*HO;TBI=~L9Htk^8HgXHEIL1SL7KY63(MKvTFy|<_acUWdwHVyHhyRz#Y76j zqwKoZAOWZIFZp#ch@EsK%ls?fYwxFz5As)mKpBR}h=}b!v}pQ$b=Z~Wln_YC=fZ4% z0YQ|Z905JsV8|Tc%ComOuNe+lEnin;{x2As+dJmH$W=}Q8C!V0vkgZe*_`g* zcO-~^=z-qir`x$}v5$h!#+Y>Hg7c0M{U{f)LDi#fTp}(25ouc*bbJcUTUkz`s@DK5 z=%Y7kkkVAx+`{9|LcC(+g>(D%r7a6vH8C!7^ymBaZYtLC=Qy`UGsj>Kv5}}Is5nw( ztl9(k%|4|kNLFM=%)eD?iFy7f!a*<|Ybyuh;D(On?sgBv`4(;@#rOB?H&1V+np%#y zgL?GB3*?}?AHj`s4EEoTMRj%S;-+XsJHGk2eatM{6>Jxpsu2%v z&0xDel#mNQpvh%j&B0GMSsTj|U_xPFjQmMqU|`3-=k`=CT3gVJ5+p>Yd2U;S4NTr{ zSX{8rniMk?h&#|c`|(YU_MJDX1Wg-Cs(n^N5ew=+Wq=_>#dv%nY;;y5`fhsZGoIOj ztaGIsQ0~R5+sQay`I25CC|#+OI7JIKdwZTP@O@UBH7*^RuR+gZ=EVImARZEf>vE3| za$s0)O2Q=%l6{oN5j9T5jd@dOu2%{~8xKsWIFO+X1(C*m$N$q=PmlXW&9ieQ#w!ha zY}o60v*>roSbXnoF<^C%@HX;1aA=nbcZ0TFV4+l=%LMf_!NnwxPbV<4pt8ko$MjE< zk{+W;BMxcnl4uH)&~4j?%L&+2t~>jKkFE5M?PYgSt@P^;KTY9~et?W`(V z(T2qTG5qD)7AH9>uB-{F&3Th?0p|8T%!F{M0Y1Qv%l~=9>9c|Y>xQk=^hbbVa}neR zt$WX0Nng}etbX4lwkLu}C8Xh%Rm57`qNsc)j^)!pUdeFC{=OHlg9JK8ON-v+?w(+E zF-%IH_gTKZoPg}tVH{r^a{)?L+fwg6bb8;=h9BbBN$g6O#P(SW^vE@J1Sz}l}Dd@^~m zBB&F2@_&>FSUk7wysZRY&jNoIHy+9@BghN^cLuuvdLa=zs-X^gr@bXd-ICr5OZcB0*gj50pBidOK$x{VE$m$fjD9I)Gpxro$c( zh%ALv3%7G&+ zF&{I%_9UArEfHS%xT@B#H4)lILcc8xnBF1j&rB6x_ZVI<6)IQ*_4bC=53HjeiC^bK zwrvJC3yxW+ntjM&l0)@36*uR6a@9@;)O1?z-&|cv!;|wq!=!)!k(1j^_90UX&bbXj zBB(9jGFb5M#h*xH0igs(Q^kfGoow26p%X$PhWVi)_=gs zR2UzaaWsF{cjlbE9rr6E{nM=zi%ywP^QJ+vJ9~F?@prBnB`N$|m^NMQX`o;0Z0{&X z!Ej{o?)m)W@pv(h8zn24fS$HM;cQe;n!nSlhBbZZeqiX=dEYB(I1`Jt#b^5Z#P_}l zvCv5qet@SpkR-=%t&NhDc`Yl-Ss+Pjj1V$?pP(YJkfW0fYcDc<1vYmCp(wQn(KD z^3sDYV-uX1ztZhWpw0eJn8L@a0r&5ZTddkVps2rA0H#olqMEM+n<@7J9Ca@P{xrPD zXJ*H`>@5*px{;*2R`|z%oaXiw(4sal>dKBk2!mgrcj!O6i;#6{IAKeUCz`$0nY+6g znSrm*mVlupIx>GYz8>?QsAsNYz+&rEf69Jy@#Tm4LF=i%IlGtY;mdk|q6=SkNGRUb zmYxg4?RDR0-}c~d$4c^Q#f@bfE;>|=;x)RZ>~MX^;~kf5ILNoBwnmS*VsainIyj2M z$7H*~l^Ho&3;ozrsiWdAH%!w#SNBL_X-k*Bp+>kD@?9`=Mu7NLkXKPpOcB$T*U=RH zoF^d+%NhLo9q?9Td@1B-kF84~>()$81JzuxU@Z_C{+06Gbh=YaOt!fUH5;c6EOf9@ z(9Mm;=lv2JMQx@tD$&Oi8C{-0y1Vt`=GdG?57d{VHCHBsW|+Eu*Wa~~^inYZg6Yvh z2h;TtVc^eI3^7j=j9M$0tjEl=udX9f*Sj4;7gKXxGU4`_iK&ZdG7hr9yfBz7PmHz+ z;GRp&&T(!puLrRojLpiV3Q7cP?alIqy58zrfGMF>ICait&&ZWTu25tIX9F=B za;#0vbqPY|GDi4j1r2F3EzLMq`@5n{X4q&ycx*+DmPDf%D5Qz3Pb>Jl_r~W34@Ad+Pm^_3NL`vQv$a2@qU0y+Ss?;YCqblm9Zx*JiS8R(u zlL-TOqn@3Vp|N=%s2J+=?Y|S^g^gltd2IZ_yjg7f*gmiktZBifyvp z3QnX<^yBvNizJZZGU+b{5QRYy5#tJ6H2ZnBE_VN&dfMsS%v<*1BseVO&25dZzB$HQ@s_}twEe9d(~e#lM6cZhPzC1gY-Howh-lE`25n^lW8h6*6P3P0<5ie6OfXD%CC(jU6Hohfi*uwBtnS({;s_v z&I;i>#oV`$E8*oqu&aFQHw|JhR%i_9-mTxCF`AZ{-x8T?(x0rupEmpWNNu>LTD)x6 zi-nz5V?TC2##ckdMWS3C5i04TOI&y6#Q|?!{Eh8DxbT5;Zrq#j^x8YLh8axf+aXA| zff3#whL9OC(yN1Cwzq&7kG)z1#s3SF;f6@r#uyEsJ0UkLJe{V61oa#7lzMAcf1}5ZJTb@ zXHuIyj{cK%)N9p9!a@zL(!~XWY>SRi31wuA73SL_p9rVH*}#?jd}t+Lhqg6|k%fT?i+6eP%@(hn%Ghs(R}4TPr)(Q`D@4SoK2!zv9@k zd1{_Akm9{se?3>a&r56Z9k3rfQrDxIGA@!q9s`TIH61dBRSDItHrxoTc-B`dj$=dMn0GxEK)gH;sjXW|CLSD99+uU|i^B{_5 zGPwy4Bw2R9WHK{iS!H>aMdE=LQm`)u4OCvcqE)Q@U9ME-H#d4wC$oVE;u zyQ?FyFr{Z3EjNseWV|7N6>25`7AYGW%8vkErjI&r&Snz4AHv= zVV%yPnz(3=*T;SyFl8s9PL;aXu6;EHQk{ZmDLp?2vDRRPia=a7 zj4^|8XrBhR<9i+y%an-h_z}Y<23h-X`zCVxV)|hHQf_uVcyKYz@MXnADbDo!UrBH5 zzBhNzEtpl!&7v>+lHg!PB8nrEf}KL|yzf9n5!B&{xnm(*{sL^-@WxVn|3Jx(i>$bd z)tig3%Z#2#NJUH_B;?=&({TA&q$q9JxUy}+vYbNC(%Ea3#7C)(n1W;o1uRe7*iG?; zGe7J^!v-gAVnCqlZuQ+~^;>w2$hT$K6pE5aYmH7?C|B3AaJYK$pknD_mKdVcN~|)( zvZuj(H8DoA!_=DSgI_Lalq9U@k;LtC8qLJQ!~LgAo(30{8vFf6VV?cDb1M}vKTXd0 z;{%Q)*aO4K7+B^yUwbF~7Cd*!?CvyFu^PvDqU31%P*F4JdkP}(fkNqhP7y1}A#kEb zcT*qhiJh2~1<{s~Kf+e`JivmltLLolX>Tp1RZr`Rn@KBDsjN{z_uWB&-Ig6GpD=O@E^}u-aXM?j3Ahu_{?W zTwyD~i9u)oFAVd-TH>_h6(oJhRG(kTwW{pfDN$#}A|j7XS!lqn!F=gK?9gW&{LrMy z_8LbUN$AYi0J~`M!Cu<~DyJhSY}aMjpubpOwYMvsR{-z!Vdc=Wt1Afw2jW(hK+`0yUmI-KdH5h7xP{@zdQU2gC*iH*1XGJeUo$opLr7a0YNbir zk05VhNcxQ&#NdMw&)%cU+f?81b4W zS}$*H)U0%5oj9IG>*(J01=AYC$%^Gh9xMt*^nieM=Fg7}PT=fu?|8E8LkFt@tU+zv zmD7OUfX6B;j?c>%CEU84GiLfYSZN!&I~`9pUvd(OtQKN8(=Kv6&xswH9MwI!QFC3k z4I4NDX=rLC;iX*3NB_@v_Jw%`)&S}FhK82Eszui^;1HH5q#mWRqx7uri)6)3YS+M; zLG=rPL2``UaI4fP^N8E4KC2yLkTxHFYk3bUJ7^>EWE+w!0<51QK3Hr z6eic-7QANi^_l+oGy<@o__1X$SAWF5Td^+UhlQpH#fsGYY>tZy{JxftnwAc&z?hg? z`zy7MuvnpZ`3cdkQ4m`@F4KJQl9;=$?|)f%rmlYN zbMCaDXA;_77Wf)QUdWoC!C_%jA)ABN@DbNNv*^N#MlZQg1-gUXwbAjCBQ$;^ePPaR zdraOlN_eruf(RoqBaj)55<8NrSncgPs7Y~wTxCnjHdHS^8tq(Sq~?e>LRg|bG2 zXTS~BqRyVa+$t0g8(^&SE9UBW?vR2X1895Au}#W(aE7eQ`Bjb7AUec*_u&UTIg*m< zDqOTQKks^DBx@T^A-cCmKc4N@)?B{ra1vw%Q~t4muy{`Hs9?R@f#Rb>E_nLDLj@KS zdB<_wHf+6RA1WuTg1>LaCe5`TS5>Ag==12|gM>4}^y93>Ry;Wgi>&UUR>0pr@KEA0 z(UB6A1U|+WH%ODl_U9vlfbja#NN;FycjRJ6$>F9aazkY7;o<10dJRY}y0UJY(wzsowx$z}RP;Ddlgs1`(v#GdHaxtXg=V_&`$0|iir;2=GtS-_!dpph{Xg?f z1kroO&RNLSQdZxSKvunF`GLJb;eSVca>!Hx*Nma5bOF&@8jBd2m%G9xc`8U87lH4wZipuwikSyabp)F zvRNqO4HG#5c7I@~nS7ZJ`E)q-;1Hedqk7oqxm#d-97CP^l|LIa_i zk=?G|BqhZIQtGH#50IoX+NIDtJpe1@{3z&b52462ufQ2$q{8m z#h^wxT9PR%p?Jg+>|+WEN>^)bbl@svDlqx;R|M7aXUTaCuXC%+UDvs*_Ul^GtZE3t zzYhJP1=@qi8s*a~ehP%Pp%y{}R7_em77}bG^jt9p*{#E*A?^@netRXqxF(kj1oBgd zaPA}xA_shK^NO&Y&mebYjiBO8g%-F!!?@xDh!oJ%7jK7NvzP^S^Y(ZhXt$4$Qtw?z z;?Fpd(sLU263ua_Xc`lf#=+j=d)q0<2^VNRx-%_9LSuPO)$W8`Dj{8g+vqFxEGS+l zmxS(uNO*h+1y)1?DQo9_nS_K3$sD5qO3K?3lWfruOX_|1eaGwppI4HqsV)r#uG+LE zsTKSoYSyW7VNcC^2de*0Ij?>F9hiTk^YTW+AldbWrT7eiS6OwJA+t+-C)mnN4fTZP z5WR|7@QV^A;v>A!QtKss3hoIV0vj?Zka(kUKxBcNF8)Do<<`bQaQ*|ggIj&*)ST~n zdiW0~PLjVEF6qwY5d}oPR@>iZLqWdWW^CY6bbz9;&XLdD+E^CxZK2)2*PsS%{_lA- zlr#7M%}lc{kr$ubGyqWG9{P9Lg%?r_iA?A!U&KWhbzF^h)&b83!Qu`J*FyC{C}(nE z<}-OzP#CGTu{5g9wt^C3D0eQ;K9C6E>=*7udMJnq?Ir#!%7gI7ML!Wep>>}y)8!}A zvpe?Ao`v99H3~6{cmdLdrYc&BYymf@+jYz!Q){#2;s%deaK`4q11JBS6xh#83MU&S*a-{h?Kxx0n?2f%YOf(kCv$Dk zPkxH>6)(^nfelcg!*+AKAy>Vp3Mbz6+@@Ntm4k9`{tMGppasiv>oU5Se=BlM=_mGF z7eQl=WI$IeuDpZ^$?(*VO2%-d`c=P7uXfH-#MK4l-n+U-gXdh2q*auEO}<_E1-gk>m$WdbiBFMZnMWyZ5)In=Fla*-H2mcI&219iYdx0RA;1r-sjW zXETkuD1!)pp*aBfAueUX>%6R=cgystHOD3MXV+txC2b?ar?&Ub|Z_P%l5`!Ru%k_n$EAKK=zARL#28_*%AQAdqdQ}Z+R zRuCRLS42%7HN>erLo}mnFJ=uybTGS_UV`qM0DAitKx~oGXC2{~4?40^ zUtjpyEK!2&pV$Zd>q=AEd@xNu+`uZGEUQiVNd! zV*XCp*E%n_fWp}RIO$S|slk}7{O>f}F00q1?qlb+VRu&`U4IPPSDj!qKvCZAi7CIj z8CxVmD@YfwXBup^A9_yBW0g+`7>K`+-|qax_U8aQ1-4v2DXb#8n0I z`<@#hi4epD!NE6~Ej5tGdgAuflk8@23A(;f3iWOAzHfV^OW*FuLKw+xqS#o3QXg7A zaJ@vrBO3>J=?KE3+n{mx`o-y-H!I-4b8q{=L=;Qis`;B@`P`0|a!mUas}?z5@)EzD z^DuoqN!4_~!CC>6qZO^_psC?vc?b4J0hYX|iQZeOQPig%Kz`5|od0riCi34vS_0tB zC5~($%5=V?5rYz#t=CXS;N%=QC|&6SgPefeB=ci1;InbpR-*>27@2Som^3rWXKf5T z(!l_~q~P=V*tof97b#KgLAO4I2D+;-2p1aoS>MzIg@jO7>nlQfvMlqN)&f|WS2XHx zcvm@)#B)rDOTKOU@586r&755K6gF04Viph$MLkh81m;xH-olmdg5{F?2hN!}35gM+ zV^tzafLjwcD1FOECvXg+Vw;QOQ590(UzeDH%>$8-uA;l+jaTI zNEGN%at=W~_=Nh@a<04c(vwyN}I0Dlvb;KAxc5ZQP( zKfVJ09YXqdGY|z^+e~gR>?8Ti?#2d7dzlmlAf5L0?l|uKr1K03m2Xj@DNMy)so{Uc z|Ax?Tx+IaCDBEdwh_LCq1BtiM1^|Xy0674JKhcD-q@Itt!0;boK_GWL_S$4*|7#do~BCexF77~DdLuKe$kEj4fJxknH~EKW+H7sbRH+3E7NGo>QScI$|8NekF8q4!nP1x6wl(t!ksokYHfAy<6|E^HI%I zU!?^=Oy?Nd(P^vp?1TD;h7-0wlYDEi3XhssMV<8yLF@yDi1n1``1Aq^9J{mO`0Lx7 z9$*^7&BN;h+Pfq#zg24Cg7vnbXck|jsd!BP1v0N+gG|b9mT9(78v&nUk%`>7Mw9$( zi{(0}*ZU~#_3Z=ZY!7xg5Txw};{5d7PJY0UH{u^{UeBIw2J6r~sQ5|7 zTaJ0lHC*u{dcHSx#Ww~x8(E`ym?>(|rg`NT#d^;B0FA#)?^#{$oI1q~;5`mzaYoii z`P1GRJ-aU=Yyif(z5DRJFR=333x1KZ@o5r6lnzRY?F*4?qBl z&wWWVxY_Q~*~6{HN)0IxEC0vB@V?HC}_gwad9>pi{O}$fmOK% zh9p@kKRsgF$;tKgegA8YFBXd)6ZW)mH^@lF)A-M}#zL!wvw5M8KXRxjcwTbRe_?vN z@PWQFK!e$L1h!4k`8$}8jYS~wKLOu`Sbx|`LduE=)C&5JBrw5{kev07#i>u`r%P(s zaWIO0bM*=--Sj$b`SxXMB>O4jX(|qgBmN8V*$W1!4oU?!IyGd|4uS?Ksx>4bF$B>T zd3nMJ3Fv735q5{m%u=lN`h8!ut_0imnCg8#O|BI{;waf@EZJHr*|QHn!$SI)-ic`+ z9s&jwO&W}h7)3HT=nFm$g3tIo= zvO{HZJj?NLJPp6xg=Z<-t5(|uMK>ge<C5 zzxE7c?d_gy%#BjVO)0E8BH|onZK^`LYJGoc`#W`BuRz) zd0+xbn@WyZ$;k{**ph&#oXpth{3J%*Vn7d(iCo;$rgk5fLLamis^}Px8aoQAzNY)M^YSt_88#+Z!$xvy@{?+Ddk%#FGCo=H(mtqI$d+li zIY5B~0ewfGNsI0lJ$8+LPEtxC#T~XPWZD@kJ)T&PHiVB`QJprhNRWk3zSY1FKbzBO&GY9LKVvi`1ofN=-1z}O0}JLuzwbZ7nS}- zP*8?SF-*Qw5&z?+>s!U!iE>b&Ohql7aPWG3r@;Sa{(?^)YM6AOGU`pY;8I3 za?JpPEO!M-WY^MF?2k|d-M4mM-)vWw%Ha;*A;nkT4?drqW70s-gv9Y%{NKM~X>VbI zq+GCZczS~=zJ0g}a6@@igrup|N;#woXier(Nx@QxBP*yy4aL6pAH@Zasso1>=O&&E zbCWx#u?NG{CLgYs(D5Tn9b5FBDRO~<1{y~;Gn!Y;Tz9*WlQ{mjtn6XIIIT%s5r0mD z7U%1*U2^tkqm_ay!cIP(t9OOLu%rXG1b&- zpLEM^h!T}rjNtR$Ljo&ljsfRM$ZyKa=xMvc%!veP!S!cc?_ zS&WMSVU7No&3xTnL4?6kz-#}x8`E&fI|M_jdM;IVGqf?0nz%KcLcGlyQJwT`^GSL9 zHf(=8QVl<qAD@VXiggDU*cVun$qaSBAAmcMfj9N{TqgT29yQ;apY0o7LiODA z?DmXWeF~1a3Z2t_W{F(cb&F{Fk?G9wTwZ z^NvwlB6!7oBRU98>}6Zuuyr%@jKe*9fblu~TZ9j78e4Y|)#Tx=;=__m4ol=kqGE){ z_rvcFI#>*vieW$T76`&Rmi!H|&AfetKZ%-taVE#(upew-TyUYB6_Z>&-<*5A6HaTHDoD_KYXD0ZrUpO1iMfYQ9}HM5#{V`dDqJSNve!TyPfHH$GYN7*#-Ua_ z93NJiy|~+vt=^VpV(w&%HY%1%{)K>$I68;@GnMWPKluR$b%6>zgaYqib8IL+&FoOY zmeAY?|3s6Df^aP0WV*gLJzKh@DWS{7=0 zc{K#Wrkv7)li#uOA0-`sqQ-JnhuhX7<%@|)HyFnL%!%aB1qqe)>@X#y9OSl>VYWh* zQc3SVyqP#|M)96-yR0INXC=!7C^Gbr4viUb)VwHiba|ekm=wcm1xPi@*bB{~7NH@r zdMaa8wnOlK5`AP7nM5L`F!7V3%8JuV^{Omfr9>2YDI=vZ!1vhwZmkp|@U#|CipJ8) z4_=p58pIgDMm6^ok;O@o5&{yBfovWD`fUC%Pddt@Iks6s4k1~G`~n@>AO%ClyV6Xw z?hmgxI_LT2oMQI2$ltkJy_HQ!C0dV90Yiu4d8Tpa2t0{nvxV=hv**Y65e_b7TGd+7 zysx7^=>wiSh{`PM1FHIQ5%=7DzmxiTHM~W%Z+e*66XiR>sq-1#FpQ7tagBUsqaTpl zq^8zSxC$dbS9XB2^d)RQAHwtwIrWTig38S!ELYgmxWR0EoL-@oQ-l|zIqr6&ZPa1Q zmAt8FvIsL-zDP2`z}q(%W=~C|mo%i~djs|pqmGDBa%N?>!FA?6Iuw#VXfa<-_jhRDivZwqqA)7zonQ z27?rmvQLl|93(c)0W)Wl)$3=G_uU5Ypn_2&J=q!=97o}ZOxnRh76*;l_#3GM+HjBc zJCx6py=+6Q$LAXJ%(~pLz6yeNg0AZof1cra>JFjGeGMR8>VODKB>KW$kU?*eKJ9^Zp@M%fqe1qLrnITXNzd67t6m z)mBGg6fCJW!kBDs!`4_VLzSMgK8wNeW?PlYq}n|cK1VixL@?$FFf%kX$?}xb)(2If zy*4194Ocx!b9{_&o|#4VOwoD9a?9~wSn8RU*` zRYK-gFLyR=V+>cX$t<{`!b3>c?d_>m;1Y58$E8F9Gm0n4H&jK+(@z{&|CerI%=(x=5+M|EmjyA zFq+-Fd43sbKzBR1pc$2DZr%Y7wF`@*QXW(0QljuPKy2aI-jLOz5kIRlPv`}X*vD< zXaI!{d%tr!XpS775Li;>LYa>!^xF|BwmNTP#Mlky#CizUx>45U+PWm$ar*si+96in zxyi+tjcv&2l%6Uzf_xowWEU z)ZR(-bv3z?shBRW5S!BZ3DVVR%&h{S&}=7!YU$eG`1ua@Css=Tg6GG&&xYuEJQcM( zX;-^BO>ilDC0|GCK@z@pb#9yr#Zh(B%0x^DzO=U?K{Z)hcxbY$fzVIxqbWusUlBs$ z{PxdoFSIPIPVYmi)wg#%j4KHUiYU1w&!gBuquH7lJLE_j7GP|m;{^`+y(gHc7jZHj z!{POgu8*AX##BMSrPo_8vvyl^Q0V~mZv>g$o0KPq-hH~xmTJjS>1R3y zT~*Qi<10e;>uXn2#mu9^cA~Tf!g>1(cf;m~US)A3u9e!Zth7CrW<49wy0N(#+=lbD zrK0oQzQ z`<+aEX~k?cdr)0A${e!9>O!K#B!K}G<+G0_-50-$EV2y zE#=fdc^u<6P(u8p`Lqu;>Kh_fN6gMj_-x$sL>aV3Q+-5e*Z1Jrd?WsHt0UjZZv*wP zX`E5q1U@d%S5=mN5Q%hCji>zCzkbqo2o%eX>EEOkV8`3+McFbQR1PgV&g2UpCYw4u z(qB2ODJ<2xsSy-UjUVK%CEG8EoN*e;cfPL^X*cA>v7KtOqq7%eM;Wmq^Q({WDO_wv zuu3ntwqGt&3U&#J8ZcxbL?}^RLer4pVkwphavmok`iJ+O0&-%G?G*3v5Rt zTNDwye~1~23hT>%EGlRFIy0JNg-EhV2P_CiT#G}HEYm?D?7$S~sP>0tLR7vlYQ67F z1kSdRnJk@1nPg(|oyfBy^EG6Jezpg40Y~P3JF^3Y*NL3Wi|-XdAyMC-@#6{2bvc{Q zXWj1#9a+gi@@Yam4Q2Qesis9fTcjZ6j_O>Pq=GMSh& z;N@v{f%%u)5uWP$%%|?VkLL9*9z~S9J!M0Njo*l{iSdx?oGe)xD=Lj;vl9~)hEoR5 zW}P20UHUTG+e-a&wpg+dd9*m4M{wI~Ym-B5vqv{iZ6-Tzoz-k@jYr(co2|sHC<3D{ zBpY#SaGZ@OHIMIto);^|%uXI_&BT#>wLQYNy1c_obyrBYFpW#aNQa`( zCJlX81||T>EK1}31xlAbZitNZRXY)hhDXno*e`lAq>Sa2d&N^~wQq`)Ehp>*?iSDj z?jE>+Nm`;MbCRBN$_@Sf^0b%sy1aOSj|UK?0xVwQK@7^f36+SJn;qx%=QG55S5Imh z*+!}yNmY2K_ESUPH({Uc~kC=m&i|v#j

          vcDBZ{+M?Ajz<+}7V_8&Hn;Sla+RFh+RrVXBuck3F@}Hkpj`SB`RXi5CTcv@ z9q)fDRAdibgVN||!#{m9zr_B{Fp}K^LhtRPyEWfG`Kl{^#PzeT4RM^?=WAB?^z7|< zr-`D@N1cbjH#ORG^?=*n_(zjd+fu#fan&ga_qM6093Z$w9ym9fy+Q{%wS9;RM?}6# z4r{6Yw3r?Q-u3y$yIJj|4j)@M`FF^MV^pZPZLSabt2RSjZT@!YVB!5aL~5LWeJu8~ z`UlNZOJZG%nGa}2Q`2xe9Ts1Ne8l2_NX(0)?*+#*&rPJooU(p0u2=ek4umKQj}}L z8gm?(nzF;V{THxk)57+;B%$A4Z?3K&>il~Vprf-0pdOt@k604uoE~4p@Ggs1aR1az z#rFIKpe589#Y*5|Mryk(t1K~Yyl^LGfBJ)%!&031GiyDxU;DNlpWWVc%gwoc1Zrk` zdGNph8dB3v*dTiK&FhbyG#9U~$Y%G7e_)s9%f867UtN)SHEYpe*3=V6N$pT1U(B;g z5}_nVs6g-#Se#QTFNpjo&}z*%I7GLF3Dg~mIn~u%gEj+w>+VdF1`g7;WWW z_4Gbw)9e)u6E9em9X6b2eg|l5LpjKPl8k#YQJs|SM8hoIoxvaG%L4-$6 zJ2B}eAUe^A)smgf#4qyLF?cCtu?pp8XbG<$Nx-W+7$tcS!YZxNRVvhJ>k{c-j)D92 zwyRrmLCQJWU5&sK``LnK@fMCjp0HDUUEG8`lA0n1-Nxzd!62k`wyYdtrdy#F$cSgW zmS^+xYs0z2A&q3jCQin|p|m?U<%-y&%VH9Ro8;gH^O}=nV z!m=p^6m?9G6RqB&?)U&LO1{9*R)kO|+NRYJZQmj0SW7J<9ypS?Zq{t=zrLfV^0Ei> z5NyeI1IYMRWOLROI#60&SaF(MR~PK*_F2)~;0{QtJ{o5%508AEse`*JJj&B{NE@g82)*n^lx zS$%{47kf>N*GG$CScra4Q?kRulltw(mi5kMLO6*KY5!Kvew)cet3e{w_{*p+Q2K1AJkxVNzxKSI>4IQ=Tz29>uqtJXl*vl}x zxMiW4i0I2LY7+=sBBU5A5)F#|mLZam(PY{Eft ziN6*NJE-V~Ko^rT(e>H`QP1QJxcV|5UKf8=96ljrNaU!POcSGvCb+u` zA`OP0I$pZEI*Q}fHt7SIk7IGIhFKo(Uj*M5&@Ng`IpPP5ujX)rn{Ly0pDw)Wn(yC$ z73&*4uj%O;eEiX$&6XIZ*)ifwNc|*+yaA6=kfkI^gJs2_>G9>dAp4!te!2|)2$bn4 z60t6et$ucA2luOq?}yiYm9y@yN~i#w7wQqG5y_BQ8?s@7@LQx%Xp#U(MVro&gixbD z%whXK+TAGcZv?Izg{pIj79~YH;y0><2BMvYEqmP7fQ`~TzX;#A@w}aS$uQ(b3=gvq zI4(}~-O|uoh5RYLHsInMeoa+s0(Z!G%7Big!+ME8ge)qOm<)4vF zPck{Ie}-yntqk03Z;2jHv|hra2n*8zKd8mV<;;p)f4Z)`DA>go#+Hp_9Y_lTu~-{Y z5E2|2E+T~4EzPuAZEZk2YJI0k^>D#>#KusDQAOh2{NMQb~ zy4Es7GSmbQFr+LA;sW5o>n*FShz8)nh7pw*mfi|XWVaGn5;bZ}?(Hexf!&G{DYbC8 zoe0A@&XSX;yFLR1Yjjq}yC7c~vu}aRHWPW?*-@4y&z$r_!4iWh%!7!)-sQ!)LH|iB zQ&(f$1v1wCee*M}x$!It&d7BEg!((_eu@)R_yCRe^33V};WJx&{pAA;kd?KG7g#Q) zG?_g{yjggiuUJ{__6yaxgYId27os0^1r0x-)XfrpHpg8E2wIl4q^h48s_8H?R+kp% zu8K=1N1r4KaO?lfw;9Z3aA9wflx3TpJ2(2MFlg&64aHPjxS6^~b+eRhmyvENZSRJe zuY^=?gi~1L_+{M~-EEeTWRtD@0^sEvqmxb+vNXhC{M+=Z&v{zjlByZkGm?2ux4t4} zZ2Xfq?KOpqA%1^V%iUDEE<-X5#6P!_3+g3pSN5fkw&{3_n>UB}0>!H#)1BSPEn^*V2>YtgkSMDxw3ZEPGVq*BcO$2iui zrB!e}eF}f=Lu;|LIyHIY9Qk*ji;5t2EQtSnuF>5L53Xka7iao|YaaW_(aAl~TkrcQ z2M4o(6OBi>uj>M*6r{mIpA7a^iv^(kEWRfOvu?NOLg;3&0BGgNnvUQEJn-isF@ek% zFRE#7NpIZb?#oe?US2{2E#B2RX`u7x!l1|3KHatkyF1GAJJZ{wy?COblMNe}AU--z zEfD6k^vmACZhH7H~X>U+fGiclszGjR=1PmOo{i~V`G;{6pG zKk}Ra!4;kbD^OV0rflVVK{wI2_Is-BW(3B}x2;baHwP@qTnoCaau69m5T$G*bEG$WtMpz3LO`MH+GvB>W z*1Z?bEb?y@Fb(3filT&EE-&}iM^uXX@F5rZ zv+xWNcM7Rho7dXxP7$hj8@ex;n)jx?q_6{wh(Se4+qO&}>tLd{AVbu#>ZUBXH_M*+H9 zJtCkp;k^h+V+To^ z>M;FZ<=Yb3$PUZ{FY#ua)4?LVp)9b^;i>K93&|oI_Rp}*Vn!^;H|P!_fcm~Jh8v{g z^x%5nlIZk4X#-U#>Ih2>;uF_vy<)}c`arL|^>^gs&*@~A=Y)rlV(OctYufjqr3=FA z@`P+^P_+QYG^1%Y5QNFA8lcxIxFEN)j(qb-#p^5q><48G>>Wi~KcY?k#10W)Tv5({ zcOyi-Oo?e%4gDE=8ED4)yst}jnPNt&XhL2hY939n8TiLGJp4A?to%fD#x1CKNj5hOFCgv?&-T^%DCcQsbw&wXq_^>Q}0Rnd{4I|F9zk zIjq44FvjU)mG^gL)Hk&lMX3C!ZiRqGwFMf;DBXN$XfOOwfa#c? zpW0$cFKWcqQZ`NObX4rpnCjSBrw!}CuI$@r_s6VQR@jJX4%lbM+}Q;>Ip^Vg*E41F zr3_$g;!!v-k2Cb6lpkS&?@m z`X6oZ%@7G~u-*mH+xZkJl7)^DIbG$`e*ek+i3Bc8{(v|^;g{lX)$pu1SHn0@A32&65O`B%co zH??O4#VZMS0+6wqe!U^O1kGM#jQ_D1f@QvTZQKi6^ZUj#OHST)=im0-)C}uZp5&=G zZgF_>f8rZ0kU`%(o!K1K>#QIvo;wZPw3&h!G1?{f_+65*s+B|4dch`WMtZV%ysV?G)9+K zqDo^DKf!~`MP|7U8g|xjzd8v`>GSsz=7Y_vu!lmA{Kb`I!sOH^G1Yft>Fl^L#>bGY zC*od|*~-WuN;$EBX@2)ajhoc>t`?~_LcfO^l{kG~Y!wh*cZmKgTi(1Foc}`uL)VDcHx4nXIH6Q<1>BVKOr`skAI2 zP5Xi>L6O?t3cRz$L-As@8DOfjdVkj@p~BimH!5@NLPh$gS z*wBOu+FkKMmk=QwqFq#+2&tRwCUO8}hT7R~B|=@qyIr@CA+{t#RtnbX^>4HDPPJ}l zoJn-_92u=COZp#g(`faKWeTl4p*7jI}aiI)fu}KJHcz2%F%-!~ENl38JvYK9VN?|+kFyFEZho{^3#&i4VLdeBO zQQD-9+$oxy?S^U1wGRfHwM3xN;>5Z}>v>SK%vyzw1$><|FR((*#4x)Zs@0;0E@U97 z6c9AeW9S(|HpbYGEf%mybbxIZHwp@s6xUJPER4zdx#(3p$bk&m+3Q#44a`h1K#6Ua`lTcY`Mg6E1DQIj$q58k6| zL-u1y6zi4K*B=NtG&FiPbGup5m>WdcsR$!K;?$e-!PQ1!SoZ|(-?;#|-_ul`K8<0t z7zl^KkClcqoKj8CV}@xS?_}wbZ`bd=8G@AAyje@XmGieL7v=UoOkHOvpvCgE0h-LW zl*ZFDySv{zH-^q;oF-BdgL#n*l#?>0y`LcDfB{r@CPJ-=5^72V84ul>w+$?*BdSJgYos2Z+OXH6JQ@A4j7wQ0JFk}e6A+$`%bjae zz!i?&nn3K3%dM7@(%i5@>Z zNQ=jZjIQtSdd#?#SEZ|02Q}(~ub(Vm-7oz$t2*l=LdlQY+FFt@Hw0ji;n9_9n+^&{ zDB$JyHUuwYNA{yeM@q4_cZw%3{_ZZQUUYc#|!lnBr3G}-?564NS(0dGE zkllnIx&p0?P{-*ZGhBA;sszlrLSe-a*zRV?(M*WwjO{0lcVR5p`JM*xom||Xhwo8q zxMj|k7Kh)#e^8`agwe>6GMoqe>Vu2aey5oOM|4|Fa-lS${jj@{1{-;Lk{lx9yD_KE zx~>xfDk5X*kdaT>-#I4A;_->YB7o}6dwNlAXHl{~n-tmRuyb*QzC~!b7d_-1!nfw< z2$W^Lj}}nYW_vv%91fV@&~_ZLbNEwHvAHM**6l_y(SUnnv1bBH{r;264hv)2x|+JZ zW6y!Ldi8fN&)appSV-5<-9)_(8Efz3EF#fayex^Af_0G6d7-?W+;SuDh3w97qYhK& z2v@~=);lX&#V9jo(_*A;bseyA<8M2>V9*eFHI(gYU(%Ai%0NpxY_qp)tkTw5bv3m<}CYx|nxaB51(72Kz4rC;r7jV>RL5gB0b7Y%LL&xKzdG z(6>9&(U*Me<*q&flS zO1L1ZVFxBJ8JbRa2ij_|!x1GdMLk-t6nDPI8EtEDQ9vgrNSv(YT@#n6rPXx2#+>1O z0)rtla!~cE3UmkH-j1*`Su~7Q5B=R=Fj1|nG?mw3jP7)gK^-(@G1cS{P37?HAQJR& z!j}fSYdM^Kwt7pw&y*NU-hVhaGuYGgI%b?sb*5O(1x~x$Ud!W?`|5apxd;a*gkiu<Q#aBfoUE?cZ)7~r|4_grhmt(wn;M?{ z&>rTL$Mz+aRBW=YglwyC$uiyG9ZP$(pc-+RSvcMv>|7qBp1q}FkSp?3&&wF!^c14b zv=Kyn^Zp4*Qlcay>}lZbvHndn;QDqb_|E-n3LK72i_2HkFr79qN;J|!G~1m4EL~Ef zpMkNdI5u#I4aW=ieXY*?A2~oE1Tm%UOE-)tNm&1_#*6@3uji_N!b)Tgpl=fe|r^x*R(H-{rmp@(La^UfnRx z^aP%=@3rep$Jnu{UALo%vke_dh3Vr>~(cQBacuAo2dXH1M$RmG$DT_&70 z`9|6^6D{`v=k0M}HYSibQTE*a8~x>GyM*lr|i z9bMgxxxO?=o%#ni`yY@h6>{HtpCE}XH2DJ3*5O|K+gfscN8U4)8(So6a0)0T>9lkJ zn>5GR&l`ot1tI^$rw^^5Q8G-jyo#&Y^H9`YAw7!Um&30 z3@)BG;1D=lH9#$LNsRp6A~tD}gSs2SyC*!*p2W4R6>cwY-(KI}cJ95t^`pc`^goA1 zQ-UiV6fhX=MzkPY2~FT>LW#cENu3BSX=3(h*S%wiX99V+(d@_T(-9?}wb}cgtQwR4 zmqN5+Q!}D~XB_Qd>3OwPWsERc$XtlUwz>=|Sg2}Mj^M&@c*pSMmzFYqd>FmG$SG4)IxftHQgmR4*gVWp#phMP(tGmYxa~(G zmz^N$tinkRWWP)JhRRS38y_+>>7dZu4ppo%>Aaab@{Ac_y!`|R?FrlxM$X!Ls57(R zDAv*F&gYadF?Hq)*7`my-6&KWSa^E+JkVy40a*V=&|&j+yj`~xOy6csYH-RO4BQTG z)gNKsL4i3@$>7mDdu;7SH?m+v=UA&nBleRT4X4@&b-2AEO}mxICX_L<<-5PdtLEk> zgXah}du`KZ_sr39WMQ*KyJ1Q}(wDyDB~am6dm^X?d30GiUDSCW-&=;9G?-7FpWX}@ zbk%=7*ISV@^kV*f&9$-N1Hk=ctlS!470U}1GtT&B(2@wBc<3okwZYrgDzWNG%W*jy2Nh0AtJa4hFNGQ8!qTF1C>Oj8%RWx2`cD(h07{{3CN zxM^Ho76|4Xkdtj7F!{VUz04j$fkxbG+)enyi1qmS!M(8QCL`qz2SxPlmtW|Z+j72? zU7p0v7pvLM+~)CK zujDABZDZrL`X&(^<#HF06yhI%4k0`~!Gn#Zfvq#*Cci11G$)$`sf8OTen6M-_2l(G z*iYTl9DA9Xg9DtIf?=Dxt8Hybwn1hx|Dz_Wq8x?ULN1-OmYkJU^+OrDRy;(6j+ zoQf?SKF?1SKf-h(Xk82()27VWJRhg;_YS$6w?}?}@J|kc!JBXn*8VxPiz-;WsEyHy z>08mUu2^0dBEmATH6m>H7s_x!wY4()J6`2d#b-q3kuNt9#))^7qlbm<%VZR$wD-$e zl4bPm!o!eNu@1tAXsn8ZQzf|N=vI`=_F6)-1^W5;wzYJ5UCgUG`WRiqEig_Bbam4L zP2B@23wc&~l9Wf68AIRxL%NZ3mJ=%v*ek6R{JpMsD5{sg$xFz*V$K!L;T+1S@U8Q8 zPnAbBB0v(>soWCx@6C~N*$V$z^{Iia7a>o+u1zYy<(Rm3_G}NWb*ZU1)A^Nm*}Wuu zrspqo9?rwrX-wUQGq2Y0Bp6jSq)7bU`mC>pE6XoX4~-87oce!J^_Wv)*n2?N}BwagW#wKHxlJ8xUkXCQNQzWCsea>~%j2*<~Z z5I&{ca8W&<|EJe3QMsU1SE7w6mX{4@!rQhPIL>TL_b)g$bX-!xYT*vX>2rX+y&&*j0Pwqe@_Q4d zyH9a;uskpF=Wna4%1YhGmPt+M9XYRTd$K_{rKc&-PG~O+2Al5W7vegG3eT>ju4`sB zC&C%58^3jRIW*(ZGvz1;d#WMNt*y;yTrVP$k`hbbC1v=8iT|H@rS2lD2jxXCpB%?aQz0VLk7C7v{^Cx@m|YPOMHbLs6JtmEqkH@K2nfdGbG=e zKkAj6@Y-WtLyTEsR!}%2)_7hixAud-ij?k-x4-IyTmCg;p?#lUlgM3D2nHr(nVoC6 zLr86!^9VZ-vWFo2DcPGMvQ|g2LNYw&H3`C|)8lJz9lkc;&|$wtvG@%pxps&WD|Y%G zhOIqX29@y|}J(c@FoSsu#@wEx<5IJ`)|98{~MMiR1+H3q-in-ov1dVS||PJt;q zl`+cc>cEm*w7znv1Ey}OnasnE?sc&G1+p>b^hGYQ7VhpnrZtJlT^@gcVFNCjk-SYj z9L;kGPY6fNX?KoVRrqol3>(^JDA5d(bIdvRm-Op=`ana9Xkt}4gD#k7*hMeTVj&-^ z#(y!Ha?6<{rz9(eOsX7;46#8}$r5@CVJu-C6nTPy6+688B3A`5#Z20w zA9>zI#MX2(7|)@b#)M3G%ZWxx39UE#Vi4HUMEqJGAtV5!3cej|Aim2H1E%6b6J01j zVZ^-jkm#8M5-%-u0yzw|a5L?1D@1r2h+qrNx?V?1bW4jaSjW!_rIDgzeuz*I^Pn$xb(TSpn=e zz#=mXvz`d(#i%$9!O>NzlL9p|pwOs_QgA+E(8#)NZlzJt4W z8a*CxK{wiW4P*11XR7om14UiPS=-vfgF7l{0b z1ZQATL}f!Ukr-i=S?N~i7)(7{njf!gBbKV;s4(a(v3?hS(q`-YM;Moc z^`5|%f8zTG{Nzx*GZy@;{yCg`1u830=iJY z*h)MjFZPcuqH;O7#6P)qRlkKyenp;%t1$bGdy^a$PTkAUa|p(N5TSvh|eqlET1ebt})Z+nzT655(5)}ZpD zvc3q($3%#r!tR)vDN@*0Y`jB=y6klNeo4+2h$|&$*mqZij_shTlc3avj;*2-|I))u zO2iU@8utL5nHi7zA~2mMI6N8EUJw3d{7dq8mb9w> zWcg4WH45+g_kW4hH_V)@12;Y-DN>{!{h9dm-GY`DgZZGa0T;j|YZ+l+ZW$-e8+b8+25^VbQ=N(3ck4n_xy6?@mTj?mt_m64Y z2;>JW*f5&-XRQQz$2s7=9leD9;S+oxwZTbWpGm=HrAXZL0{j4+0#bceTe;{cE;>E< zcw`d>byr3gGOc6GlEj8W{K%3rIPk(}d+0k?LfDtb+BYkRP{JH8l~%cY!~~+Xxw9ff zSivy0C0G`r#4_0IX7J#L_=8GM*K9>b5gx@B9JuP;8QPHqk)*9Y(ll*u21)$UQW~m4 zxNv(;JD>=TFc~qPo4i(W*rjx&kT(1mQ~vNT0aN!vWIz0gvpSq{g0ltu>r4)W9=F6< z*Bwm`!TotKErDk5FsnnswnB{I_RDOzM#CACXeozWR+6wNFdViwV~keL0Nii2tn$^` zg(8s3udyT+xgbuqd;bIHE(4cgkNk)?)Kx|^F%#pG_H!ybvcbYu-_9{NT}oo_5FRCE z)aYI%=A*;To>h_T#6gwxsH8N@?Z_yA%hH2j_ZHvjkREU1`SyqV z_A)-&Aq7(_U!M0v|uXt(iCRI&l z!Xr_{h?p#(nw4{?O@%^FU}~d3 zrI%LqB-f<}+l>S{r7E2ca zS$dl+FHh762?GyNig@WiR1%Ig&bE~6@7}8C7ep595|7?K$;ptFHo96WqkB7OJb@7( zHNqZ@7!wnw4*_&p<(r5IkeyGrHVgv5m>J+P*~{;};$;}Sg8ntGWM^#B*l<^>;Z(TNmt&bY73F@YreOTE;Xx2LBiF z1nGenspN<2wHca=rly3y<;cO~UxqQT_@zSFHLujuuHE zHuqzOBAQCU?uau|qzEu{QprlB#{ffi_y9CI2y~IhrKm)x6ABh8j@|ekM^`|pb@l4+ z_HK}r!REIER@m6+(>DkhgSFOX^fj7+p@P*Fg}J@GU~zV7_UND#aJYr`4EJp+r`w!8 zW{)jC%Y<~=Cg2@7+{gyxv*y=pk7k#?XsNHr(A2B`xqHOfoc@DeX;lH(@r1H36L+$J}(;{MD01 z6!h}Ol&->?jHq=2_qqz3EM2FTIBw>$_-P6$_JPAPnJJ{nr~?PwL-^UDqvmn7$g&hW zXc8Q;aaIH7)3ZxE2WJ|+SfH91=>v3q*5f0`@9s~_QYK?#yI^lP;TqneD=#c;#0T>K zZumJsc6s6?A|%LnX)v#d3%5H95P3L|M*@SrzjsBt=)Z0TNb7#vfQRO`_J;V5`|9?x zoH@7f2y9>PO_(labAp?>{0Ve-#l>!xgYHFM09V1clQg-_tE1)BXYm963LzH=i1+yZ zYi_Er`N5RHbA3z?|D<>Lcc(kI{g)?POI+eIgM$E>whp9Gm-?-1sB5?0GyW;b?ISiE zO@6-j7YK$FtzW7WpSG7WTYF_AZSQLU%jy%aONvaVIE3ZLFU$Y-j8wXO|MgH2`R9cE z{E;2y$r{B&l^-<$!&OB@L&HK8kw;Zas`c;JLqU8@d%WDG%Dm2N`{v~ufL2G+l?WF# z&O2LS&f&7zw0ZviV-m38D921{NlLdm)jxTmH{5?1wfzP~8Y-q#v4OFlU6n4WBpbj> zsNEYTo0;N`7$jZ{EDA|pbeYO#!B!;PzE;yJEr(qt@Gnlf*g4~N4){vIad~{0j95*c zG-khx9#0+h?abr-4j5^*guTz2EL$I}ykLE7aJ!%j<3W^2n#l3I#hw4Wuas`SJTpqa zIHrHH^y9+K4!)Xxb2p^OEQprD;y?*geyg;Q_i4h5c4;AXOG%nyi5Z!G6`;{g+diewqK!!S4M*} zJC~cnk-wggo-8tUM0DkAi*i8^IOa`Z3?PD`q$?ASpNDa;)#hQ9FfxK{5ezWEGFu5n z9&RhHgtzX$*4!L1^9oTilho?JZck%q2T2ET!vGtI8hl+9kuIQ<&>lA&QooS# zMT<>C8csN__rFPVB8OECv@-prEX%1Z4EJmv31stFI;6Xt$}DKA3Q^_}mg;v(2wW4C zDV8!86?iy{;)P|U@V)sW5G|)1%9cHt^^Qb$AFm+BZ;e8S$W^V9hcRKX{2o>TwL0dvFmaiLO0%-e}6-`s`mSxQgtsWUZX81!eW_Nnvbo#jC z(k5L7m0fjIoz;Fhju6#s-o0H^@auKBb&9N@CrIF$x}{mLlT)zGr^d+eKq2I}g$pXW zEidM{eX7$k_*-gy$CH5kz^fO!;kE!gR&g)c3HG2%FgKCKQM=T>&-X zM5vI%$l4ZA?c0a~B`et+jM`M|Wf~lEHa}`Nh5$N5-gSXv`_0rZox~y*`UfgkpQ*}n zsA1)#f*;5*Ejv_aq_J%Hz^yspp>HVgo57w1@R9PHz=Vy5CVW<=za^gA4RF?1 zhbs^_b!)eyzu)#7bm&%>WLZ*k#YOj%q1VAv6HWCm*@Nv05mT!VlrE zN<1{77FRpDe~hLJf5QX}^^VhZQerrE9JkKJd44E{n2 zFbIPQc>J*f;jt->n;89V89(JS5L<_jY9eR$gA1mr%l79@6+a( zCDqL{;fWXKHz6)K5h6VJIU7HVR^x_2A=A#=wL~ZHp`RRx^^;1xxMjfteMM5=e>+C{ zt>83Iaj6&GYP*#}Vk6u)n|HLH=ZqL#P$tY>#FbgE;bTVQq_xWbzR;&j5y6X7+VU+L1-qbxq+rfu5lQOrVxd~hH zbw8rK^EU|!*R2QMDfS>9pAyFzjk0i0m)H5A_NcDehgR>b4YaxewX0M_SuttTOn^fU zPrDAc-37pSX>wdmHlJ)~yGWXnsYsxwI9X;d!G3=#nfuBM@1~uDXyweo{PjT1t!m|% z#Tm;`6)6A}8W~31zd}+YG`m!`(DSrKL)*ujm9$J)#)8gB*%@nPC(0D!D1`htj55<2 zJuz7bTgG_J>2XjiG}LOsy@V}|^q1i^TBWsD3U_!jDs5?)TPk-;#s~@F-@1or_o*o^ z*KG;UvhU>)MJ-7qq-kB3_e?&9=)?`!isGH|#VGVNKF)F-gXQRMJadO-aPEk|Hk42t zq5esgN92rDw?|_ejhIti_f{?G64$iz3y~xl{xPCP6~hoF*}V&yZvgxh`O|S|eVFQW zGrh*~=e}k%)-fVYs*zW2$f!o&aR1*a|9+9$fb2Zu3C{1v+MR_A8bD;ox5h8Sbud9QufkDSynJ;+9DcD?X=rKP2@N%j1D z6h-Dc(=rPUR=d87yXt9}8|MC}*lhJCxDZTe+9?#(i@Z1Cdk)cTZ9n z6IF+WoG$U#7Jq9o&NJV&9f#cn?3YCrtRiRDF$S-2we1(MT)=Z09{^8V%SIX>2Q~-e zxI#KADe%0zWbxPs@|6b5FLGj>Ni`nQh+2*JD}K9(thuJ-p(yH8L3 zyUSBaISstsuX4EE)r6}(8pp z?ltO$wzew&43?#LZWH-ZAYh1|cC~3MgIRsV#E9AF0wyfXGePt#UB;q>taZSA`6_iO zOl^5(^mV?}@G%eL+dVx)n;jmf9(N*09sH1aex$1<-N=a3QN;r4Wp+s@gkJ4C-wGnq%xa$(v?8|Tx&zgQcA+edY$$hh2#*bRhKovl5A`r9~sQ`AWE1Qr=$$l zAaqL}E`T?w%D%zEWeCdoWR007J!7@4si6_?H7h>W2eEoAj)u~ zOQNOLczaD-Y`>8K?E)Hjx))^7|Etq?4sSW97Q6%m^*;RZJU=m)o8-yLE2Zdzzr+;a_;iBCQ8ZbZiv3w zey#jqb!?z*9dHsyL}ipUY+yof({32H&MN4mieD^Sx>L)V-gNNBT;XMa%c;ZS8$O9U z%FSxY<*J&wuGDc;0nE_GH`o|PcX?SvkQDR-&ANRyY;A)H=GG_iV7X7C@ zfakgSS}TLAF|hby0DYd`%5AL;)u<;JZ(Y9H{9G%U(dx#w*JE4P4JmF;6{nV={nvA;7j-h3}iK#ipRwhS7>t?xc(j39c>TD!%PuIOBaG%A<*?&_`oQb&Tr|x^Z~Xh?3AH=a&!p=Y1WY4 zEBK?cFLVb^Ds||znf##QEsx|)Bu!*iT2T3(Ul=CRIQ^t2ZFX`o8|&%|X9+a9EvF?~ zJpOoYhs)bNKI$2F2S}Mj&=&J%=Ch{d={8t)St9;?JE+D@3v%*ZKw=i7I z;*#&E@BNS~WW^A6k#U0WoZJfKbg{og)ZKm4xR1b99LtiKc;J~+33Rhxw(-;zc6L+0 zKVZ<+-RxeE22HiLV@fX`$?S)GYm2a7dWA>O% zHvf3)Gt$-7Qur#Dr5L}deCc+%pxy*$b*3CZKJLENXf6r*$_&S#(^qYA-E=(EtdR)i zhQ(S2yE}~N)BBx{fveCLQx&xPcpUIX5O+*BS!r`vmn{3c9AN!|5`; zVtK^~H=`^h`?KTT$>p)w+&mIlQTWRUQgGYdW!Usa?3N{AdbgU-6ONH(ueQqz)rMOG zy6x2NUB_upfWNNRQ~;#zTadwHmkM^vuDOdd<{35O0Mef z#-2smsdR`lsJT^KkBsyw>Ox78> zj6$uu+C2L9sEotL#}3|A@ERk44|L^WWlnoIR${Qdha>RbyZAIPKP!1>YQBzL zSl?G2R@W%o1JTRi=*{8xBBNAY?$sybaaO3Cd!nC|HRMoRn%WECTUJbfNtv#yfNU}f!$UYLmDsI0hTMTR|j0eM6KWKOa z&hkxNGgMXqN1;U;jct+lt%mhh=lyeRE>4sZe`Qy@9tvygUC2X<*M2qBbhnK2*WVX3 z-N)CR6BMR7yIq`Vg3c})XKha<9hL+R63Ew9J2 z#^$H8GwEYI_m|R+hwtSuFYq7lEva;A%CZXxVsk?jb#KRsnPaI6qPHb19Q6Z7(uYf> zey3;uJi_bEufqlFkz@~^hJCUoQ{!ngiU+pg8|}~`vOMf53k?|Y&+T7YdR)Ko7dTS*czNSaR$J^g zZt|rwdL1ZVypM`y>4MTPwK>CSF(XOzzk3~6G5*$5i=(e(-dMpl+NG^LJC>{gv5Rq7 z0_*ZOy;beWhU<@$I9oZJSkp#oTPY0yiXFFIG@!FE`@zA(D_^CP^Hj9Ok9RhJ#BQ!B zN1dVdcgD)&t)FW0q-ieTzMaZQT%1tnnhjt`oktVHcD5a=<}#yzy%QELcTjda$YT1N zypMH96x^lzfefD=EJx-_9XjXP9<7pOD1?8FUR~u+Ivz*68dwmo?t3e!C-F=Faz2Wu zo<-nN>MVRO#oLYqgv!9H<@OVZUZ<8Tt_5p@DCVf^ z`N(%Ccg2pN!(Z4xI@KBn3t5vITs3niFB|+9HY|?+-Yq$>3FoU|W6jnAuG%xbKyKKa zwGm14*2?S&Q+#;=oE$E33Im#=8^x?3HN%(T#Cn(eRR$k+I0GYUKn3!Z+1-6H?6-DM zx?ti63he8d{rO)Gamguhp7=W6T^ieY-p18Dej!QOkm3AMbs%`F*IOA^l2u_#<;ac8 z)RBC3G~Edh)1xs32q|xwEM{?~ZT61Yqr0?;PT-ROUmM4{gKkXqn*PmJFc?}=V z0wm01sEtO|TUz|JXPE6`(sI>pEFWg+B_Rx5MH;i=8D7U#Li;Aii} z-R{@HyuiJtr8*_q4N3p*SNVe6IoNSYoGnCRgmPz5P>X@>3J;T*JR{+C;>8zvz?mZ0 z9Mq_3RDTgQt3a4r3JSqgZ7`zVC1k>yRp=?gZ)Z~ur26r?lxJeGa)Pbq$A( zPW%SpugqcUvpDB!P)&pyupRb-Dq*4gg!*={!g9dK1(jd&wR$qRDjVzlB9T@#+5)hPS4#PLrRvx4z8F61Cf z5^F!ho-++Pbz1LZphKgx;=#(g`Yr9zcXk6NF1gdJmlh2q+|k4wovu zC>;#aJ5q#zR1FG9D3KD7j`aEl{P)iH>-)YlXXec8Ic1l%_Fn5*Yd@z|%jgls=l9z$ zpfuk&QkwrwaH96ns3j3tf&i^sz3HUgj21Rq;A z*$#jF$M3+WsP%AyVRlYKs{3E zz6{wiZ(Hzhnzi=*)=l%UmgAIU?)6uM)AsTGKo7<2(B0uT+?jC#4-PPdNL1&3D9=;U zloAR+S@(6EY;p|6{XTnonuR&`?FVrVda`RAkz^kJ(Z1rTn?$$zoz)VWD&LzvGNUbY zd}}&H4vnce-(!xYQ|SfXp9(k8LOdiWh%72lmfC8Z1PaCi(z>}a4Z}rA$e`rI{~b{H z{{uJv_gmokYNR5R5=3vRpX)Epq6|lNqlN4L|y}C5@w-Y6m zqw@W&sD;1k;+E3`+pq9x4!4L$r-3fuIkf#<#q*WJJgo{3(RM*W>kIprzCq!I;zNoHyDRx6U z;Gs-o6}8^Eo#;5dq>ku&RV_7biNusT$Viv@icxs!yJ0RzpiE_LX8dm^&_^j{(b?J< zU+&O8%11EVm~%*RiImozwIZV`LwO`8#fo)$E<)f4GG!PHr?QXv+*L4cA-l zw7g!72w}JzOoE@e*myoSc;7o5Rk3bx+A{pUE-Ds1SIwZWKR~15FnV|@APryd8=S>; zfRsZe0y1BpB}I&V_SlHQrRr>0e?to+&gO9WsfD4cW57v64IayF{D!WfK6ZIfCh}4y zB~58!a_P-o)IjIxC%FRwh{pxL8i&~^J$@So>W^P+XWqZ*ch zQ~z#5fMN2k+qvH$TJ)Z;H-egBTs)9NQHO{D(=?EalSplGo^b*?Xxnx4y!k<;0Y zD&k7F!l!x`YL<5rAF*|~+k_(9Xo$lke}B0)OzhMfSP>~f{_`SUAZg%jYbaTtL?RmK zO{rrHG)k;Eb>ee#(FDsb2i@+ZVD!rsp{~qi7f>h}V<49`0<6@1!SL_j+Fo&)NqFtK z(d@D!=sm@rDL=~b@fPKjnv*jGvDRcX%0$U8yuH0k`F-;Z_K6gcKTC&!&CniV8$SeI z0TmmDok{Hc#U7`mawWlt7&uPpm>8wy{L&!yD!#eVfW+y4LEatP_cf7fe`of#8jG5{x`9)BIzmf-1a2_f=iqaB5 z4oR5PVp1fuh!b-_ zKeC-zc7Ue8;~$Vb)nLPr={AWkZOGIZvG8F1JJ+`^6-Jt7Dc1f0-IAbWYf`@B))KXu zMux!vlborxDlBDxMyK=5tGcXV3xlwK#^6?d(LE34ElzZVjQ*Z`>!^Z1SC5;DuMpVM zHCRAqsTDDuLA|d|0pwQPCBj*9aZOZVT8rAJMW08flTLlA~9!O17L`Wt_&TZ#}&j5B=u(Jf|DD^#al$pj`}=}m{T9(mKN!>|?qq9eMbJW%%IOc%z?!@q84 zoag78IJf+g$01|yI8&avr$iaRuGzDrETb={d26&IYhI+T$Z{LoOpwi!^Q!z5zL_QN zc#xE;;%HsgR%Ab6?3B zZmB6v9F&bNC(;iW{_22X}CxcW?;N!+$ zd&Gk!zd@HDi7%HU&G7id*(w#ymd3oOq0GK1Z76qIAEfd8W-DMF3@}zaMT`A0Htqyv zeczLKpOz0wevTxXuY`sVq1l<+nuRGC;!fc^jlu!n$+{^p`}t9n!~g)>^>&zHjXU;R9C-`J3sldq9v$g^lyFLt|SN;64s=X;Dt$>@$^sS zyjAEaC;7kFP1?%qHH$HY0{zc|YD2wJ(>@7Zfx zKSI;xt6MCDS%b@IO3yowUyb~wsAw|kM>#DJNjAhb0V5J(0I>@AiW-2wz z?sg=pd3|;}_Zm|a6*8h!BoE;t#kq39U1`zRzpMt>i-aht+>uVdmt42mhC?Uqv0MeG zFMr}*O1Ilz`u0^>}&d9<$ZW%O$#DywyG{@gX9b`F4kee8^z%no{ofu<(rY&;(WFfJ?fcWDvql1?@-p3h=3iBQQjIeek5a`I3*Ts}YS+Kf zB@=CNSs%h%XBSs(&kjeHS4Rfbtxbfja8IgvK?nY=%_u&-Fj0M7`){%QoU%n}zlkw5 z_AG31sq0HxexI;)LoXB&KR2@%`TtmaI#2V(2VR}*8L4?;H4qNUU+<0zyf@9)f zmKr}T_^uZ}9!ycr2$aH{?@>o%zTY^IA+bLy)-svY)U>jD^k>TzPYlmnOkjlq9-|hu z)N1gf>!#O;i2VZv++7aXEh(*-PTB0KlkI-UhHQ5INhnsx{(A@o2}LQZD@wCqvQ#yO zb<(3NlNtYX(}A}!4C^?BUn_5cwa}ZCg$9ofyyiKdR6aMEy^*lV2pYmGXp5^O0z>4I zO+uMV?$A(~5oI<8TX;|3bHXqseg=4JtaI|9Wd!YfwH1lARa zF+k}!ixsbw4!bJOvElHuYB;u=g5v?k%zGZmZ%Xc(e8nH}GgvM8%5>v%!_YiP+l+7K zbhq;PFDyg4&*7!*Er`*R8^ODKdSuDZ2X`w4Wmzl=Z*{%112%l_mHtFdHMKiR%HBOV z2F;oPGle&T$3 zYRL&Ow2WWXP8cP_T2dZ!Exz{uJsm@6y&H0w4M7;GG&{mN-<(kd1{v`=HfaC6%!IJy zSH4(_Nnr;7!{wEW267=Qq!W25fg~~J`X6rTJaZs(_UV@}ys$wO#veoEJqC*flOzDN zGUioA)Mct`PK${Kw@4;Ah0bYj{?j+|$cPBSx>boI_SlZ?n5VGfO6`qsOhz$n-{(lA zpphwcn`lpj&oC*01I7DSA})MHwS9%p+UY=BK|2J1x|VbV^3L*ph@J1VK0Hf>R+Y?) z&M=sgnlMgD?X9$S-v|;S>excA!bL+bV~+e<%5pSk`K&-ItmL4LeJ?Np!ZPA@UW;Wq(eFMLPlj literal 0 HcmV?d00001 diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index 2f1f5d1132..6faf4ea3e9 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -1,5 +1,5 @@ --- -title: "Recover and reset Surface Hub 2S" +title: "Reset and recovery for Surface Hub 2S" description: "Learn how to recover and reset Surface Hub 2S." keywords: separate values with commas ms.prod: surface-hub @@ -11,4 +11,29 @@ ms.topic: article ms.localizationpriority: Normal --- -# Recover and reset Surface Hub 2S \ No newline at end of file +# Reset and recovery for Surface Hub 2S + +If you encounter problems with Surface Hub 2S, you can reset the device to factory settings, recover from the cloud, or recover using a USB drive. + +To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** app, select **Update & security**, and then select **Recovery**. + +## Reset device + +1. To reset, click **Get Started**. +2. When the **Ready to reset this device** window appears, click **Reset**. Surface Hub 2S will reinstall the operating system from the recovery partition and may take up to one hour to complete. +3. Run **Setup** to reconfigure the device. +4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). + + +![*Reset and recovery for Surface Hub 2S*](images/sh2-reset.png)
          +*Figure 1. Reset and recovery for Surface Hub 2S.* + +## Recover from the cloud +1. To recover, click **Restart now**. +1. In advanced startup mode, select the option to recover the device from the cloud. Surface Hub 2S will download the latest available customer image from the cloud and reinstall the operating system. +2. Remain connected to the network during the recovery process. +3. Run **Setup** to reconfigure the device. +4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). + +**Recover Surface Hub 2S using USB recovery drive** +New in Surface Hub 2S, you can now reinstall the device using a recovery image. From 16254c4dd247e8ad8c3c34f6abd2135fc44842bd Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Sat, 15 Jun 2019 14:20:56 -0700 Subject: [PATCH 199/303] latest changes --- devices/surface-hub/TOC.md | 1 + .../surface-hub/images/sh2-assign-group.png | Bin 0 -> 17767 bytes .../images/sh2-deploy-apps-sync.png | Bin 0 -> 18554 bytes .../surface-hub/images/sh2-set-intune5.png | Bin 61489 -> 82651 bytes .../surface-hub-2s-deploy-apps-intune.md | 30 ++++++++++++++---- 5 files changed, 24 insertions(+), 7 deletions(-) create mode 100644 devices/surface-hub/images/sh2-assign-group.png create mode 100644 devices/surface-hub/images/sh2-deploy-apps-sync.png diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index cef5db805f..970332a4a5 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -25,6 +25,7 @@ ### [Configure Surface Hub 2S with PowerShell](surface-hub-2s-configure-with-powershell.md) ### [Configure Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) ### [Out of box startup for Surface Hub 2S](surface-hub-2s-startup.md) +### [Deploy apps with Microsoft Intune](surface-hub-2s-deploy-apps-intune.md) ## Manage ### [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) diff --git a/devices/surface-hub/images/sh2-assign-group.png b/devices/surface-hub/images/sh2-assign-group.png new file mode 100644 index 0000000000000000000000000000000000000000..a2d79bcd3422e343f81350c64e249edbbc7bc008 GIT binary patch literal 17767 zcmbV!cRXAF|8KO_7Db2AQgo?RqpejdI#97kY*JMu4r26c!zE3h?it!uEP|C*E!$8p+w>~I81+~*eE5!_*5kEr{ zTco&KGRMj)j_1Aq_@=Scw8Up!&M2L5&l1)=%1VUN9f!= zdsgMf2OUL4ngmOd0@jKmYh#a^30a9xI1EV5%dN*Zq6+H+5IqHnD3P9=>%iTZNl_ks zy~Rlb3hXI%fX3o+W8SAgpk+DTg0Bwt_HK-fj84Z?N(lyo8N*x&2Z0pxGF@KL2t>X( z0|LpU=!d+1cIGw+)F;3jd^_k8u>1YVj*B<1(ttqE&IA86=!@5ta7p<1-+-N@8U62x z*Hd%U;_I5LjYB(iCrTK%Pn21y^tgViT7!r=Ps?FTd>wmbI+xBV zF6~ck1dKG2*Xth<-?sJF6zfF4c*V!=Nl!a=9eK31;`;R6Sw=UT)Hko|scy)>UsNW) z3g}Jtq{vPkY|T?JY;)~ks%sk}A7n+===vy&FRFOJ)U~);i1x}-iQ4Z{-il=K+h9o! z%ed_y0QxiO-s`!Ph71^X$+m=%aPgA@dC52w1-gAXtFEpt9M&Tvur^*LQsVX|Ni!+;>=1AgUDvocqsjojAQD?u_o4+ zw33&^I8f6oPfSKq$9e-W=>$$m$8X5%VlNcyU`_b2Be|o^)|D+bVH5qYjl-7|z{SmF z^j~{ov=kDU?)eVlF<#SemTGyZo1xcQzXWHhiPZkkNRg?6s)^c(;o>X8APUiPo8M1g z%R}ss*&tNaG&D2{461EO#Elup;jVa5Zw9t|zl`Pb;Ul6*c7`V+UT)@PFO@1RB}*U$ zqp2P0eNt1A_(ZZ*Ct7Q9y*I>=&aN$4yj7M=U{Bto)3@H)x|tB$9{p zo6Y8PVdZP;v-!eLz6g1WaY#8OBh^tNeI0*N{nlLv^0Y)31gm5*%=0-<=%0GIL07bm zGGEO{a>-&UHkv-|j9NtF?WUA5NyxNlyN9X!ds7@f_5-RI}v6=O|VH_iT5K;c`r$5 z=;`U9%F6D0{`vlPaJtb?4?lv|V%EDW2#gu_gp}kt*b`Dv`IRRM&Cg+uv+PBS#UcV% zgJI=~3dsgtm3FP7o~FuIuU2xIY;0y*KK|LJV*|rrL}cuOVJ$M2%T>clQ5Z*tOJkZX zCVZx;!Hl%$7?LmwUbi}{z*Pv7ULWZPTQ9!C5v>&a3ETOQ4ex`dQED|J%d?OAz{`zs z#>%wUg|l@Y(#5FN$%bip!NPr|VENT`rV7t;Yu4LWjnf(5eI|s8-B^@i+IgfopT;9B zdjY*g(4bf5$kilEP9kUP+M)_K-K{r1A~a)K61lKmj={}iaWNaDSF#546vDwd?W?rW z1$ucTJC;aa;yQsxP04btVW($jR=sye$F-TC)&FpUu20j*E3=F5>X_VK@YOiwI~rLF z!LaFlS}tZAHnFv5)_B%qTIZeeE2g-QzcKfZXp{8aVk(htWif%Y(&QoZUYTdPcAUV6 zyA%l1yQlsstuH>?A>i1yYEf!{4Jp{Et9<^3oNCBMS!~h!ok}>fox*Hg=mfjywF=L{ z`=56e*lu4P+hRK_XS$T#7r!F?TS6{&^RQ$0TB((Qo*4a7f`{X%Tgx7^nsO_JGi^F@ z>cG{y{q1mV-(H7DQCn2n0rk{pFzpo~UR^rPf|f6_+6CFaAd%a2Dz!m6#_Lw%@Nw~D zTetw5sKpu&x^aKJVX4ez_Q`QRndPs&wwz7Rb?>%oHrX&!&O9u+9_t`E?Kxt;gq|!D zS_)y}N(?9#GF`KmNirN&xRZ<>UP_ud%0;FYKYrt2ESqI$@#ZHOh4{jODYPt>k+1er zb{Hwyo6qN#>=?mP_dI5FvXpbus&i>d35Mp=&hcr51JoG!1V(}rY=)V1X=S8t9WJFg zV>T*9TZu+wnQ3m7iQ>ZW8(Ft!Aw;MyDwUHaDoL?|T%;Yp-`IB^~S?uMvYq z{cld${QdQ1Woecgq2;`h!=WBZ)~&8_p=*D26MrR-;nFj5my_ieIFjbq+DE=r7tzMu z==!ZTPQ(OHl?3jQ3gr{;bT0qMkbUs7K_t-^m#ykFTx7gHZ0fw%>pAqHDWAUfWt%2u zc1Snj2l`Zn>8U%2ORHT5u-|^f^*z3}P;TE}8y>}3=JFoL6e8Kqdt;iAclg^zVc?}g zURppM@?P7Jn9Ry@Hr8zcg2eUj8yUIjxaf-EhHN=hl*6y;^gUpCK;IbDv5yDp;gwJ# zenb?%+vvMzzdyd8Lg@OuU)%Do@mw8li-boLX&%SF#@{(?VGtE(xSHWIv1?Jk+~{0< zAjy1PS`44eVzI_XUx(FBj&x2b_4HqoVRC2GdYP7nIe$9Tk2OUDcsxxE(IPCrsBKUJADzm>@J_p~X<=u03NZ>FDoqgU#n5y?Kj5CXSksT8qu!Yaw zd&hJ1ohVevTHEx?5aOZN8}Rv_v7Y9fbkSuRk|wxGp%-l zOXd<}30((Aj%gEqFL-(AIoW(YtoqfP`9C%iZ^{}kJ#b(A9fa9i0w32R^#ec7lfm#i{*vYM$qE~-#}oZ=YmFYoqiMl7Nxa3&aVh{ndXKgBI=%)x zt6ChT{gW7cBbdb#E<7@11HTm6xi9+ou4eKw&mP`@Prv?+Wz$-Gisq@UB(BBFnw+`? z?=;tBj0K)As|_p`j~GC+UF{tl2Jl5O+CBpijVxTLi)=*)G2Z1DDtb3~{iT#s<tkPUdafq+cdcB6_xR_bZ>0!)8@pSRZvSA!^_zpwW!V6ydIIM4Q^MWs zg%>%A^haAs-|dr3c0^x2;3||v(%uOcD>SJ<*??kIbF^zkI;ve>Ek!?x&H3?5Y4(}Y z7-@UBF^s-(>yL)i)L-m9&mbLvx0Kakx+hW<4&9Xo*-m_Sp?n36k;72pt5SP`y$V>Y z)Qo=xdRW)<1EO|ZGyra>kns%u%<<4ZDY{pZpK+o?B4A!w-Vofa)fRp&#+{4)iyZ=L zpM?>^z&y9BO26o9S8zoH+XC(~#^XOI}$338=<<@&C5>4SrI^ z&?&`|;EceVuIQewCs)Q<5rgg3P`4^1HB_O^^iml4aTURzzr3ysiv5+*oF9yPz7Z1y zJK(lW=~S91?hPMSP2=MNqaHL8r~N2?rM`QslClP^hlLu^h<(E7Y3+pdCh~g2FuoL0 z)aeRMEE95>GrYgx4mA;MZ8VJ*VTkGl$GTv-k|Y}*DD5zdN@3LA%^NoV+^El7QZ>A9 zT_-5aN(kHBUNLJCs)&wbwV-3cng~raeI#nt;rJ#}!?Gi>1wruTUaqsym!+ zepx|P9xO=}AaQOF2t>!7h?%5&4RsZt_f)N=4XR+pX#|@R$Z45SGs7I{O7G2M#M$%; zJ-S#(w|=5-5z>|cw2(dH0)WSova)^&aq${qQ%ts6e7ylQ79DXZurm__sj%tY$A8tD zkOnP(=p1f4uXvbm9?fwd1^-gws9%4lsz5hM%mIA{lya&0{PKGbErH-$!8aYU(TX02 z3-Rn8Sy0fjt*zAwmtY(};S7I2{=**xjKy#otXR?znzZgWL$;_(Ti!!bmynp1ZEF-WQD_?*T~$T6Ma zW0lz-RQ7L+8H!dk&vO(xN zuGS=^J5BoxNO4I!8dd3kOl~~&83Hf*+eX!^<38RNJuWxKI$HRy@Pg4NOGi}Bck2N> zkLoAL`xfN4!;|xX1=ZyNFi6$$KGg$dJP$n5$jozDmu@Q`*o#ix{!R@;+@+UaO7(M+ z$*v56`05M4-YLaAXA1|)5XINF;d7Oe?uYWtoHzM;tk;{*g90Pb%gxVkJ{vL^zWcl= zMLW4A?8yg+-5t~CIRCv3hBk4pX z(2XZz!0#U}0(28}i>jbpw{jDB<0>{0Xl5>%znm|K%l%o#Omir4(8paROGA5LUo+GW zIQY%2|HC^k{nvE#Uz@WzWlt?1aQpnB@jhWv02;3MoZ@$?xg^ zblep}H_Ukv#uu2l<(6SQZ~lHUmW{~M9FW`j{m>eA{8GnAKR)8gf-{ml!Bn%Sc&PpI zjK>Rlr5Vb)_mn8|P|eWXobdDuH}asB$Kbaz7N|liOIB^+t~`goRLUcd0Y2ML89`Fw zkxrJVES(#=f655tAAAb^FBw=rS@_Hb?@9~GpLRL;#1Rfaz2By1SURAF=CPh_gqtkE z`W#<{SU$FuMQ24mZx+3v)C)dtKwfCokz=ttiqVu2KvT}$sLzbQx^vFg6vi8w$Qn2 zu$nFFwKnQiHk1Z{p(87~>jmaR!^Nhi?=!Umwqu%Dgs(8jXRJ@v*8>+2pHgXmW+N>U zXm(y%@!V_6{KogU%@cA9yURQBUUfYA67)It$q{J;E3&^@U6AdPjmy+l$oK{D#&*Ok z1ME3=n5x}jRTBle2)s(Io6mVq*S&(pFXO99bPIpjOF)ko>W(aC1q`Lf>%GyUm*}(( zP^kO#8uVHs{Ex-}jDme4a!;x3GGFjHMkK(q2U;OI3tw3x)o*6-eM`*GN52DgoK=oHpL|gwy6Fx_cEKv4}HF15a39ETTuVhe{ zxmD3!FKlfun;l&>9C9lwJz76H_w#P^IiAY%NDf1C3&}xF=T{lRisr$+FZzGz^XQf= zcg_gX67QetyIF8&K0hmRo0rYfE+h;R7#`G4rI0B?DWlbnV{>WvGsxY36>@;gme4b! zm5`R`aWYGiM5Sh?q{F)V;yOfcsGTR=<50GnWI=|i8*KfCV1cL-`( zcF^rJ`ky`t-XE`aPQ!vfHhtTD+|POyKyp2n-FoqNohLBeVDSE^)s%PBPKu<-L>$0q zC!aFQ|1A{Q-eNx9WL{sZ==HjCSAA0oReww+Cuw-%i>ntU((2dix>5p2D^5Q?T%s-B z=tWZ9kAM2kedMciKsRDyO&Ke>xLWIO331Y1jvfBndg^n~7f5$e;=SpsW16d$bf20+ z6-fP2q$PT0nSRqfErC1ch+MBHmNzOm%@)UP#_j}PrsalLJh2{qZc4d#@Wbx-HN7!u zU4q_BKP@8~sxIaW=nRuw-jlP`IZl zlFzz|8cEvtrP( zX8E6lue0e6jkiT`PPw*o#jh7`Wa-AT6+GkD z&fsej!;+TdI}_Ej0a}@qLYH`P=Jd<@&pv($XkJls_#Q|j9D*PXq4G@J@zJZ>qe4V?kQ%_H%3i#eXj$q!7}zm;uvP zwN!_l!N{YVNGKjrRinn-H}>)pO&I)EI}Z^SX=0&!Rgd*$uAn?T3W9M=s!AczGU|US zH8E~SWaztPT+S@5Q%`%CGCEZ7tQ8_Lm%}4?P1p83I6g70B!ofj$tO?Po!Ae-Qau6eEN4aIp7383=;POaPw>?De1&Gc%py71v)CiMp&ojN;c4dgEYTaBx!Tzy zTat?QU6n6?($By$lzZprc;(n~qiv1p?{T!Bifbxuv34-u7RaF&(Em9?aoI>@s5HP~ ziG8d(hrhg_20mj5GmIL+^Q9JtMJMMClg%&c@qZ_z$Gv@1;jq6I>$B1Z5pj0})U7$e zcCffPdxi8W!CO}gR)3eA`KV`lo6%Vqsw(i8|AO&K6a-PE-wyE`%vHf&EN0;?VjI{2 zrs>X#CH-Cdoh#+2{8HrTpT7JL;0q5-;vFm3#H0oM3xuQlH{YH3>0r}u8d=-{1l zUXN=wGA)>#OaHdpt3`lWusnJE$AyE-P$rlwIMwkjUz#h3CHG~}7gWE#cQLBsbBV4R zsTUWl&95Ds81xPTi$>MV@k&{~drcd<3AxZ1S-mpW@TNj^8$0i;M@R)u#hT>1BLFrk7ejmRCMYVjM zs(AkPdGqs}=j>)Kk6*r9^XC`)!D&>VznhQ2NXo0{$O#JTP--~*QIrVC*LyBMT0bmL zKjkn?f&Tm{nqa665v0`>(<_MRmmY5F;7A^4<)eRQK*(FIIDk4!$`yFPsA;&_fhX#){wVag~w424}Wzfe*i~X9^_! zyb=g>q&oJ`&IdX7ggf824TC_H`j{8l^=79*ApOhKdWHXR6#$rRf;ld~03b@$PrkJZ zf%|Il_|u9iR`GZq8INDEay0pFNIc%~H~0&!_M4ihOM#JhR}_?Q{=+Q( z#>qXKfXzvam*0(h=5>Qm;OBcHaP+VsaI`=_iHn@Hr`PeB z1g@quzNWCI24JWJ17RD$c2W5DekxZZiOFG#;r^TLSMiV>2nM)L-~K1=@Mu)~VD59u z3?1Z4`1lQ0NR9+xn0R@5dMYI6n>PAZaf;i1W>yD)_aVQpm#xv18CiPV=}`nuJ6YwqU?ywsE9;cNBj2__I|+(74@PSowX znk)4@I)io?r>VrNz_kYcq6$mg7}!PBiLlZaZ<#d>K4mS52-@lP(HH)4s$0q3-4T0H z@LmNyFK%Y}YgnyWl?DPVdrJVCT}ne6m9<1w0}Nr;!IT*o&%R1%2q%YGTw2tsg$k>9 z06;S;B+Cs7BEn8Zg+Uxz6tiCB^j$XaGyZVja#Q!aNv&HBvdOmp*0D@UQ`0o?8Vi-6 ziTTf-^FB3UrY-++TZMEu<^Y^mL5W#89?{?&79hyl`4`D#_b5P;UT$kuI19vLP@$0| z*&V;g|IH{}rxYhWY&#*tpzFGd1=KjKoc!I06BeQtG`HiSvzH19(YMdu*8+;AJb=#) zHf%s3fM0Nj>kID(8{Kx;^II<_`kQ9y1zo-sF_MV9lzA~zutMy5fuMRsIk4oWtlQ)~ zq`%8%d+!^I+g>87b?~{#W1)|6S(mfa^&e#8aw~cjCZaNMLdAKxz`S43i$>CI8|I}f zYc5XPZ1YzV!|k>66xTE)1S$dC9WZt=gT(`o_Fz#>-CJ zP^Q@Bw)b`FFe%TXsoLJgMs$D5XjT%ZuRpWY(cjc=NF?Yh3=S_oK|;pEPn$o)IFNt% zg+lV4#N_7Q9T^>6=HTF%j1xA+&3Kv@q9Ej%J=Oq)3yQ&2w*fNC9~^!5HpsSE1gRwO zEXR&?4Vt>_1KFP01Lpns>HmqU{zp*?bYCaXN~|~5pRL!^l)i;u?`!nqt|^1fm5w+S z?{fw2hrKwHK0sc#=9!K_9yi}5RRmb~rGmL6YUgc;_zxkB2$E1A+O%Ip?QF>(lmmu+=keoW5%cT9aRY^x@m#L^CH!}0xW4-nEroH>b!vVh<#5uk7g>IgjOYfq*W)8+C0!Fb% zLmvaC(>QTclo28Fk;D`Ld5qU*dF!ruIg?w5e zzc>Jn<$-nS(m_Q`A|W5d(K!u@!7hN_@lO^2JB?RM7CHQVKZOE6yR8i62-H;L6+o4c zqVkA!OOjlh^_D)}{p(>%*G;!|?SAc!QAD%5#;DPe}npQGy61gUV}OrdJ_V5L$yINQN>YQGu`nI3Vhcc*k56{2?-JB zCLi&D$Kx;B9f_umbit>_zLl)XHrcSxz;?n!_0U5weD;cX6NW)C0Pyu?grNxqs{&5* zrst;KJgp}yW+?XyKKAuo7iiL{*n+;)BJA^OqK`|*Bd)u7%r!iVD1dh7Di321+Ek{H zBM2jzz2Vfqx|ssrj>H{Z)2zJLL?Wdm_1IEkIw}r%)ol>g%-5t&%TFs>JkU<^aEBdZ z#T(Aj>kR#@9n8?*hO&TU(BtDKQXb2F<&MWaG*2hDOeMwfd2PL1!5mhFI^L$vdPkqC zUg{+k`A^HHM`!B_j0_I`<>2HrfBN*@M7gyZ=>(Rr!oxx7qxw}j7`2%u=TPVK@~%d` z;W=ucPGBy9l=kO1d1{hGR_6<=|1Jpg)Tjk)-mT}#R|FCd{143Cz?;q%q9iv6H2AE? zEAb{E+ws38tCK`T;CbNOl?1LlS zVhy0sg?bh4H`&I=T(Vv@^HJbwW}pVrUiZi(huVP z2QJkwnoq$Xul^CS7Ge$E?)>k4C(3HQ0)lj)duy!HE~Xxk{3azv%my4AI%4?p3a9U? zfBVd&>x<|Tu09CZvfNqhRx|8iRj)vxFq$x}Z zn^gV+8!GDB>7Xqd6C<+Hzd~{*Wj7k;C7mXh*X!^lyJEBjhdWF4LxqO*3tjPfPltbf zxjhxa$a&-;n2;#p5Vvtma7Iq_W|frm6a%ZDJaN)}<&7`^R)o!J`iKMNj{X4ZsExgM z)!g+bt3qFXrv+tag=G9zQ5!~)?M=aIiCHAfzNYd zz|B}ch5{-zkZ#g{;xJs~3czcpfn1H0*GV)WTP>MqVjOZlrOeldyT9GfIyJo7dPCf@ z<^3)mu)J#lK4foi-&tp&Xmjz{qHjqD3~32ijT13XoaQ90pAQ|2x|-xP-SB3`wRI!W z&Hvobk$zfm)7%8xj7UG`M_$xMlJ4;bh7s@zqCY?qL!Bk#gNT9yKn*1yRlix z_Y<$@@aWks;?SaHdkVZhj4OT%@gr*ch(-P?#kEz)2~yo%@>(lpqSoDJPI?tqfhVqa zilFP^Sif3mmob3jnYmUCij4Z#7%nI-z2sviYij55+jvh3V>#phl;gCI`DuY-MeZLu1d?ifC;{ds#t%f>Hh z*=wN#ab%UrOr3<$*nHg6t?v&NXFhs-B?{= z5*QiaOQ=j)t#+Mnd+i|SxjM*Zn*PR)XH5KvzZcg3uKz76Ych$$ z=x3ZKz&Z|?SGO0s2D_277CTHO5}qSzLvm`C+{oe!QXkO&C=dlyP zYx0RXq1Pkb6(yDaT07~UlzJOUDPJ4oIQHQ9vEGX^Sn%psRO_66W2(HL7ilDwyVrI;fS2$JlLBFK5Q3%l10!4X-o znK6jBV?ga_)D3d1MGruuLx4*yzqpauFa2)zvp-75i_O5D zMQ2`3)p;tc*;1a4FWyO*ZU@E(+kg#e)>Ko5Z62KZR3<(cyd4oK#pOMV;lC)jJmGpR z?QDYQueK2xpWR?f50|SH5(AR8ZaG~y{r;@zC3(Tg<-m%|JVL&Vp$SP&bpmM5-x8v$ zL2rlYw1P-FU-Wg0H$aGWR<_+Ne$x*h)AS#f@jU)nl3I589-`M+B0cu2k*qSqbG9J; z%deoJGb4C}sMm-%{HPKR!rVdsvJPQpsJt>foCmW1qY9Gu?B@ zJ9Aj5Ngk*<4s4s1OdO)z>5deMlH39hddV@=&vG53P8M60$mrz35q*5lKhD&B-JGE`7Z^p*kL%RP)bb}HhsKfp5)>;X5qdPF15cFJKsCTK`) zCzCDnZbCm@3o5b*A|SwGL}s9X`fW64pVRz8{SfCNJ85?WQ@)ic_bk}f6nb*VdO4D+ zVlR(=6rOwy*Bgc16uWmx%C~q!yYOWtE_U<1i9N=7e#lmYw3V-Wk^H!bfFp%YSWjfS z?pi%^jJ{})6I)j&Hc?*HZ6F+{PwNP^n}s^w)Np9QRF0pMnbFsMy7OuH=gN_(oamsl zmOQnsz91Afkt*Y}nGWmG;(qgBZy*-0>kTGlBa5lbN9!8kX*Fj@Q6KZOj2vH08ht(I zN`dHKUfez7=m2v=!#p?7W82;FTp+nwhlGn4FQ$n*{aWP2`OH>sjU+6x;Q!OJ2xjI|kIcAa!AVnM9-4`C)_f_gr&oS2l#E(Q~?cgJGFYHTk zdrXn9FTe_qOBJU4v8gKD9W(&K?95zlUe4m%wd+S8t7zKp*8vGEVG_VFznX;RLmbrf zEone~Z?^s+o&V$N`T=W(9B}di@E?fxB*XjfI@l~M2xQBiiln}o=1-5gCh2I@A@vPl zO6L6S>~{itLIGD60KfmXYJaVY=pTpIPj+_8PQGos>+Ml3vR;0ZuRa6ew>=FUTh4F# zu^(Sg%z64{dFyz{$$cZB@B0_vs-2nP&9+Dxmf+zHAGBHFNl2jflY`Y@qv=Sw$gwO^ zwiU5bPG@Zn+@?0SHG}eP@}6D479l)@dxj*bOfRv7^xd>99s&C!o9f9_>rja(U7RG? z{}|_0(F90~<>j=ugVWIn5{vh$>lBbPwICPJP~SLEu=Q*;tBK8LXaPJb2uV35Uv;BFO) zV|_G+6$okME%Pd?8m3;Oy&KD4yIfm0tX-<@qs@OgI9P?J0X>$CIkt2Ndo{^l zd8&RilqKs>=;%EQ3Vi-WD`M6ru)pejUSj2MGQx?hA_NB#}TM509_d1*C;8SKBi&RR{4^-t7 zUbs-;b^@R@a>^ZSiqNn80wR2R{bZXJT#geELAn;I^-ZkV`Lx>rxxr3vL285FUX1iJ zgwXV3c{PJFSiT38Q4LGgBh@Jl_RUUV5A@gE3Mv_fXUpPmX)q&w}raiwWJ>xJe zM{G4O@axKDiqDE#iEi%jGPra+{_2>F$%u*S1igm`38x{`Ech*7C>~HG>moQOsD4>S zosC$NER^6*REK)A@<3%Z!BLo2iniuXZ4k^xfAGa_i>covg%d-*oB=xus7E5CY4|^; z9L#4tdHfV=>AHmy>(Cd>M%@o)$hv%$wgi*AQ1~Oi3Im@?mbS)WPH~yrJQ~Z`V>#Ov z#k29c+nz!cktvC;ys!K5bBoUXNmu-J*xVIju-e^2-RuLXiG6#Pm%=R6LeLUo?_azs z=^$S0G&K%YqT@8-se;mv3~;<&%Cvu47}8Z)tY}jPXp_kDE(0?(tXELDRK)Z%PSlQ5 z)PjSxrxm3uE{eCo_6><1DRGOy=54=e4r1gY&{WAtco_6ia93Zc3s);)c*liney9Jz zJXvuEN7Z9@GQ?qCN88mVklL*|MXA&BdxLr_xJ;L{rOf$P`)gwg*T-F_MMga0%U4Q>GT?J2qT1 zuJpLmiRqd`FVPd{+qN{HiMwwKqfK++j9#SixC=zm0Q4H6Hu*B;nQ|020YFD)g0b5v zPZTkt0i3;>jw1GknG2((08coK!L%X`X%G9bc(0$JJ)Q8_XN_MK60PnQziRv|Lq8!@Z`_ zvLJf+@#B^dJKt`h7#GtMdXV`ZveDQ$;$;TN#=`PQxL=c{R;9vhrI(zoY0Q2E>P=O# zOpkcPKGdJH3cDv`dP9>GzWk6ifE$SM541by0M!hq!8vcfkrnlPjb}sfi}|Ns-c7{? zT)f`_Emz$}6ZuGWMsrw%UYDLuwdKm{XqnYNFx9i+PBU#Y?-gMf-%ZmdO(S0}9Le~g zW))R!J!LCoGv=-l(`mpJRTUs*j;bz@tRWuo&v@RJ}voh zg!K2}^xV&|q(*NJK7XDa>y5YFu;#n>G#KLXne(lqGFKz=bo1^QnA=QbdNSt4y3`Cm z-bic2ipWsQY0))ef2TYKG`b^G{Ovef;g~&(dN26g^#=&$N)dpat1=IGtw=jC1F0L2 zfi@o-DbL?S(4fu5$koALriKWbd`FUJvVKmkC;@ObF-Ao7AsNfqCkGC&oe}hGDF=j4 zIz`*@=#EJf#OIU7<2IB^kpls}mksY$=JSpfdk+;mEYZSj?Q#noaf!ggPUY!5*99`c z>0SEK&}A80Qx=wTx_46;_{0MPeK&Had0tm00g>%wUy{H&q_<57<0wZyvKr zGvC}6dR&i&2<7_hv1OdM1+(bR5jgad)AUJS^taP5ro$QyST7z|p+y7sMm`Ro3WQuN zqURq_6=^zpY1UMm_WiAYi_PGjoqUn7 zwgT`x8+@QSn$upo!wQ4qW0?LRRUDlKP0M(z?V$myZF^`x#=%%p9X{}&>OQW{&O|5$ zw{=C-Gn}DN7>=B{?+8aY&fL){(5%^L-G?L?$qE&c!Z&Oj6jSxbzY!j0TF#cuXJX)l z$0sH)C)51vAdpNhGiInR<7w#jI$MI~V%-CQks*uNXMEaFAlf?jGcEtlvm8y!`E|@o zLYaxF`FKM9*V2N54gen40qRP%bywW3xA_Q45CVv*W-MZBxUKzXyu1l0gU{+Y&VuH4 zXvS#S7^f7(Ignz(Xrs@Q;kF$4kA^y#ywG<)3nTga?RWrTS^JjYHT$T?=Y#b?f(w4# zu0vk_VyH(Y?;IHeCH3kf5OnD~84>?wquIZM)PMD#)imD@^qK{_3YH>H$s|~|hQ#{6 zqf-Wr2fO({KDF$h4*{gC|4Xv{H`MyC@ZrB{P5+)r1VAC605$mmt!9aPGi6qxvebil zN@;7(oA#v>H!nXr_NqM4!qshY5^8c9DKUpX*hr)9<~79twX?RON2aUTxFT0$5ePua zL`9#;nr#iOr)6LRB-@?uryD5=dI^FcA`*+rp7^t&aUryF*~_UaenOef#dT{&`>H|fJUL=@^~ z_GbYxF5k+PJ!zlK7vNOx;&BZM+(cft^CWm`P>!lx8OW-E>kn(JRu!Wb@%+d3_W_j+^xMv{cI``vs>qh;C!g0RXK(#Z> zdp4N84xnpfL8&ZlpkXP7Ni0dqxu@1F_vo(AQ6u6)Ns(Cs5 zVb3N!0*JCpR=Y20p7a!c8Z)Oqv88z%qxub-wpnM+%L=e)B#L){QH@dKOa)w@A>ZZ* zpSP=Qdbz=ig9UmNe{pcP;f|qS9)n0t`T-{(&yL3ejvWK|M4Jt>MBM^8oL{m%fCeWYQGXP@~`)@|xf3tb& zQ|;|lJbtWK@r%BpVTA)tdIYP))f5k$Y6A>Vtfv6nx;ot`s{%NYwo?D(t^d76^FPm= ze|2tVPPadA0y5Zj6f&`%Ti&vG4?cL z=;W7nZZ{1w(T(LF7b8wmnar6u{_|3LbkUog#j1`5KrmfJp-|(mENTJq@UA(1wcS8& zG!XC(+%Ngty!<`mt~Y*pBT2iNxo`5qErA!S1uJ3cDgy7iwf~Aed4NQSZeA5k>%~ z;V3OzgH^fW0!><#5f!hyw^K-C`=MQBo*Ep6lomK$;ocni^B;OpzPOUJKbMRTVB+!Y z+uB2FN_?u4EQDSZ0p^UTmZL8_)XvTv@U!EH)cymERygYDq#aWTkA_1(CSyAG zr?ORJCXWtxOv4Ki2_F})tUm>T1T|FE!uQV&*$TlX=Pi&MSEWif?ypaeI*i~Q5>IxS5WX!bHmNMFEgA=AZj zK)_|$(?}*(YelODr~`1T3}C3cYi7W!((@2`o&e-AZSHc@sTT&W5A6uju@a1Rf>mxY zpPQVh=cMdRPu17W*LiD1N$t!^jeFFdKF74n=NjAhe&{h%x1+vjNhAHfsZuBK0+&WRReAw4pG@Kpl4sX?yic1wR;zo=^{W?Uc`YGkR{F^u8k zv1*TmOBytMDn=etsXA}(abIqAg+9rn*a9;urp5zG0q(#K0J^^WYb*9=fpwp$VJT9& zrq|P%^xd0}&}Am?vBgKOv^PdU%2C`xs&r2y$1(Xj?nVS_mSlaw2TqeU;XBNQDTBsW zwLgXheV?`9dcB5{#^0O#2r;fqF)<9z-TYKOe7>-~lFoMu0%H zY$x9f0G#`O6zHB;>#lvMCQ8-t$W?bYmMxt=CY9erOj+}6bol|F6@;il!q<-}kskcp zXsI<9y!YDtiL=I8JFx%1J3|G zLPbLZ4ipG$Q6p3*w5ojxxTb~u0t?tbcdvj&Y$;wNxUsx3YcnRtW`g3 zdmfq&Ou0KZE|Cj ztH@K{Ckb)IhmqX!<3OTol2~zQ`$!cJ5QBkS!=+4IWnG<&6yQ~P&?Um-Jq@0G6))j# zg?}_$2;QM<2XdA2f@6qqmJp9IDv-9@zFANpu#k!%Ac!MjFz+cR-!{a)3f5E0ank&& zwb1$HziE&h|2%s!Jl18l#RJKna?pL^j2-)%=e56Mo+k7o<@m@2lUZgY4EbC^m`ZR>9jp=Chl0WSKsZ zs#8bub+X2{;lN$~1uBew@c#UaBQbuptCO8r6M>Zeqe*bDB=6Hwrs}#kYRedg>)WMR z_^$J&EVB!n{FQy^x9|8*Lxn?di2sRye~vpr+%8&_u@kdalbFcC^Z9p;>-^+mcM`*N z5733XaJ@Y!1EA3l(0g6k68Q5V#T>zv6!gf(=*H>jQ~f|8MPUD(e5xq{w`AX8Oa*~GSb1i1u?l*fnPm56HdhhWeclJq-m6h<+&6b z^50-J*#qcCj)0n&%=QPcu$R$s>bk>Ha&o{_o}UzZ6=zSf>}11mpxG)IPWxD(>w zjIqTWtGP)|+ZnBG!j(Vxi?}NYBbZu#Y5OrjO26CQRf}3S`gTtpzdOO=oM1<9)*h9v zY6>IZ^F#mf`G*J1xpJN5j5Y!)S2d)Hj_*7D5NNNHO`Tp3VP0P0#!|&c@XIAi=8}Pv zK#$i{U&hlhJ&+8G#IY^##U2q65hWQJ&G4~uUW)lh6$&MOY!2?gn&}cm4h~$`KQj7F zPHafkOo+-4QTFm<7}8ES7pH)!Saev({uUST2QR7o z5<+AQQwWNHCP;uVCPD;cNJ4-B36K!zhkf4jb)U0(b-%rOec$TUzbchVRqCnXuDY)K zx}TReR;E%CauQ-;vOQdIsJvsJDuXAi}mkuEhplXLsH^$p(uhaTmp#omn$N3Vx?<8NFHRKAXmSM@8P zX(glE+GTBj@1YrgPhCFw@l@7MdggCm5A?jw{Suncq2(K`FQ;eqekg32zOrGx85Yjz z2>+WVwIZidtLEC3V&_~GIwslV3#`c zP5>XHn+_E00MfT7Z|nw=3ns7k1IeA(6AD1`b)T^=ki0$?0|Sy17pu-30BSHFEzk6f z^G4k40$KZ;2P%|FsEB()SO_)%MNXIWqCMiWkhy^tF)=tn1nkjRS6+QAQR zwfvp94L@TfKR=fRU!K79Q8w2pvV<8`=!lkWIQ|rSw<$hoL{2+k$VNa2I{72GL!qsD ziYjEnezrV0f8oM!Nyo2Tz%tL1qzgM1?;mhcRClXB-Pkwf)GYciakJy(qTQhO{zD33 z)PBVh&hfrTCt5!^%{E6B+Jj_y^0oB zt>M5d@J_e-8@%h&KTM)#hbn4g%(Q;K(}4!1Wfv9a8yiNhKFGXy&x$gDM~DOippnND zi97!W<~m<&B-Y3!dFdk+*Opb5t#csqv~hL;q`j9t9j_rq z;@6ky+xr|_S_>i!azg_RXEPU=3p|q2Zb$mEo$uhiQh}rM6jyuV!WoSBK+YGoYGcVV z`{fczDGZVAgIcMyh{|4JS4>VUo@s1Jh-?1B=5Z1&JLU-u596o%7eUF`o-KM7idL=Ni>uIHNRTu3kl7Fq8kS5Yx)4!YoLApYQ+2b}N8r9) zHq(lv4fgFgA>?!XrLNhY!bDZBRVVb`ryo;L2#mVte9JFdG)+UX%NxsGl4CdSqp-4T z$s04tuR>@MfftMB1K#CK4Nj9H8ZYL>LS$8%<7lWqF5%K@VqcW#%Pi2>N%NO)Rm=y5 zbDmDwhSMK9Z6I8Q&EL{Wb3THr?pksp^P2kjEXC1^M(Hf)kS^BUVNga|@gikVX42h) zy}VZbuy3PezdTvq9Zc`9xZ5#M8%TdeNwY#8cX{jhlI@YX=Ri;+r*?^z0a_8_!f$77 z{`~Y5Yu#@{y9V`C@V~h>Hh-WrVZE))aBlWV4w@3-TI4pkI7wC!zptz5MxP;f(9l*W zX`2yz=wBTPHHQ4rOIMt{-N3$8wdOwksfGv)tDq<YBpwoBd6;$I!_(lE!_^xn1e03}?UfUilqzxWH z`R4p6-M=cCplTr98`512N5C#r9;%Tu*E%xrRrSP0zq-f+<&$N>j;-iJLeUBX@^1h4 zd*o8vs_PaiSFu#9Ot)e=zOG+%)CU~XVZNb)vl=~Q&49D9SYNG5kn|-~dd(qI)#zR` zXN`Q3Z%q5Cc_Jd96jzOmF4JA15~=vR|)noFPU%aJsHyT=>n!bVk)1 z?`g`cr(X#kzsk`+^4hhWvv`{lZ3$Oc9D`?e8TDeh+9oeLrRqjL^%;UN?gi499E%I|dYaK{T zyIZ5w9Qpa`hVx{Yj5!`lp(#Z`eH?3(gQfArkKOv()m@8drp*=Px>LWIcqT$=c{Iry zHTtJ{x`o7F_5?>C;r))+IE`k}%e9cxr<2&xn;?)AtIOYU?Ou4GF@ff<2N@C;nJ9#O z^6m?|#2GQU*LTX_xIpnhwlADO(Ty8|{w@8RIFmY%G8ch}JmuKNII>L8{iJmRoN}uu zA)PQ5D^CMkNulMC>?>6%zQuH|u&~{r1|^|fEhU*FIu{UVs1@4yuBl>oB5a$TcBGL? zd*zAIsTG4o{#(OOgCq3|B>ci zkGSX>zZXxER3y{a#Xnk=A35u%AOT~amKH6blpUtmuhkWiPq);L+4&g!1Q}K9*}D~) zDfq`JIo*2F%%in;c=k`*+ZO3gowby(<7_wY2xg%m7L$)aj>4IUoQcNZQtyx7#Dkgw zR6;IXHMtX+ZK0syC@kUEW;co<3`!ec2P-W4IER9%)4FkfQH~~csaE1VI8#4AgC-V{ ztiN`GFev@XZ-^Y$yp%m~{wUJ6#89y0Q8C0V^?9Y`*MRNNd93KZbE*sfoo-HfVT}Hz`)KufL-2x%)Ap zH8dT}yG(=I5g3lBxHGEu3jP8s6{*G+RewV}Sq;MFsduy9_WXsgM(OA3KRKUq(h?d1?wUjg>?SH6k&rNhb=$94E{0kc?z*J8;1atJ%03OzC;|6SN^ zB3&~TPIe#dBGGFC8|UJwtzWQanL~OZfis@fV!}h*o7JVX zaSW?rGq)$Nq;Fq>po>S7FFF`abQt;R(ZG%k=^Hs}`pwB|$y;?z-CMSq0h9c9Eu+kicP%^|IH zv4dt{81MzJbTYV8UOb~&s%m<_ZqK(0R-DM!6`P;!-3hZ(F@a5&mxYm)G<<;7@5F1x zQ$xZ;WleSpatL|SDM+X#U^&A4c-cwEu&uG;%=ftzbhVGr2gJMNNjw-XNpwmu|KF(nkmzagtP z2K2f?cxY!C;qhdl(?XB}w%8h#vz!e*l`3s0=t)+N!kzFW4=rvr-$lk0t+%;lpHWB| zE%=Rg{MMuulHu(Ai>2%-D2{K z-Ucr>%#hett0|IBVJl+_OOkKI<_NTQPmnFywJEVhHHgN{MLd_29?;)i^mqeJuLJ8R zv?!|jPZ$3w%7meCUbmY{(~{vIX74B^6Z<#tLi&u4(8DQ*i}Nl}uU*%$yFbz#XTQy8 zahs#Zs5If=A(y*Ey7|rid zEU2N7=Vob_7weL~kVxgTO-D9wTl8m7u9m+YaPD_k!cWW?irQ4W=bg>QDFwyZ6|BMzAWbf zug)Jd(&k_jL_Co1b*^FQKBLssRbw+;ry2{ul8^aXCC(nkcuw4QSRq#m`q+efqG(j@ zK=O|1$B}F948g$f_nocl1`1o;pEN;|2mBdlh}9OEN9j;hn8{}M4O#yXqDxWNvtiFb z-#tU;4{rLawS4FaTzjlPcj9BtdfUi81!4#fiZ1z~=AOIWYF*0tw+M{xusu zdH93>s%fM2s-+I^1AAywq>i|^U(r2GszMbbDR9`rg-TyTCUf26$toP0ja^%<`>irk-q>Z9?L0QW! zLC3_IuImk3H9p$kD$jw*vxXT8;J!Su!hRRm!|xSQ){fX~v@_qOS{{R$G~3=NG9liO64w=#Y4 zQw%~xn5IMf>6XEJ0xPz|f;3QhANq_`?;sAs5Lm<1oXZ2mY1uY5&`n!gb|3OgA2QS) zS04kTC$-o4gW*)5m*-1%ZR|dqtYiq@xrwMV*OA>~K3ZU8$0}1@+3w5l{Y&DJ zT#P1AaMXb+SAdcIan|MIiCJ0=hKHDFPfQ%hz2#vrT{?CSURO>1sRaBkQ=NLGfK3d< zf(Z>gwmKaT)lj@tb5af7U416e8V`BZ6W?+i_}$ZhJJVg+-s}Nv{sEvf(fbmTlJ;*r z&EM+7$A5=@*}1hijPCB)8t~}O{|CIy|Gz6PANU+ACI9)AjM{}8X7}dmCX$>4(#J0! zIC9SI5|(-F*fA!(wwg#AeRIlGQ2U*k_t44n`*(n0C?<4G8u4s=Qg;-ZFppJ-TKabJ z9(R>S#=T_)xawuJu1U=l19y{<2ceI8dlo}~>n88#bLjXug9v_gje7RgqN<9oTDLG% zwitrhTj&)Ka28l8w^aX*-?arEAIx;;(vI!McCp4yc#cnuU-8@U+t6_sCu~;pPCbk> zZhxG#k~*zMIWP?ovy=MI0UPj8FxL+Pg3uT9;Yp01oIJk#%*ozi;s zN+`U`Ib6qpVX?Ay{Pe{G#tqqL2LY~x*TA1=KrYq7wf3GB>kMcN<>*2;L+pscxyGta zS;_0~b~S{K-QncL2!-=R< z+MCeHyM9p3Zpv==8jop-B@Q{(dHylP@%9{H@BEPR7KC9bIA}OTKA*$i!xwTUBe2!) z=hHq`hmg`&2zL>p;CcHdC9c9Aq9H$<VMm70-1w(QGr3<{oyyGqxjVHwGFA`9F4 z*^x&4P`XA{W$mXV1#@#xjWvK`@+Xs~BUmnrWETTfOyfVdlTze=kZ9$;GYp6Czjrh3i(~>72a1hu;%Q9WJw~#XZn35K;CBRqKe^T=R6TK ze2CAav9v+Mr_AM@*_qmbGzX8PGh&JWX~O$D(MW=-)d0s64fhK;2K^*1x0m2sE@i&Nj<#Z%HiS}$%sjhcSC2W7>(vG&uPObatj zR0-0&wDt$_=z{$7AXiA%_M!9OD`#Yv}Nu1#6xZa#f7tXa`h|L z4ll2XsC&OIUS0bDzc=3Wa;424iksK+XbcVHVy%ueN0xP!>=SwZ$qwNG_;*I*bd*7N z=xwwb2$ISWSjf_{AVO&CE;K8xII4a+C&CSNT4Bq^_m-_;gIwR%KC-LkI7@|5b?2Lw zy3A0%#PqYSb`1&HGv_>=6ak)XqKh;f^CXn~jaGEtw%B1bBrvTv-7hQ^l$OzN9H<8x zz~x28JlBpp9pF z%d~GDkZ#wOUrWj|hlPwE-@J+=&hf*>Ex$CzPlQAYS57U(2B|J^&9#e5_Z5 z28X+$NZ%GMRqji|WzMfg;hO^By-94-SFD#rquy_ILG_nCLDuV)++bN{U>-8Mjjz;@ zS=lv-j^V`<2BR8j719e)5g%a8NuvMXUCMz^W6)^L@qvrz3=)NP{g7iAHevhKe6c=K zSrE#;!z3j)1H^#Vjm0{}-53sb<<(oGSZ`SN)RR`(wYd!?HIdy{tazg&`+3px0GYJL z$>+W0D~{9RxUx>&+@_j|fv`U=1rA0l-}QJs7okboeiQlG;nas6>LKQsQZ4@h3*Bg} zX79HLb3f{*v4v$ia8=)Tx^D`D5>>N9$?h7AM@5IcT&?XDvdioYZu!Vw1HHa664?FH zQ3Z#1Nd<@I@$fEb$(Bn+BbwEvi#^{QRPtAAF};31eg@GbBH-OX;lXqbQDU4_!K(Y1 zqsjsrF0*9(Z2K)vM!JT35!0;k+X3CQs#>UlkFM3>_YRzlUdMq(HokO1J#Cj{s@|Dm ztD%uSY}>ODE)I-hK6!V}qp8lfsmct^Jf?D1wNyx$1whnD4!!eeV(yPozfL=LbIg(R z2(3>}>d934YfM9qoJ2-bqK>^)mQ^0<4*yKskuA+RYWH>~Dy7!vKsB{|TgcJ5-e@`7 zM$e&ds~5Da{Emh!xJ4gSwn``k%jj)ed35$&tuL|cCnVhpDI7F}VRn5*t{zK#p&+apO%*21swu5GF z*P$c&7ha)ZZK=+s4|!}T{(Xa&&v=9zVfC?2Y1c0El=-8j@@~Hd2d(HfrozI8`?By5 zwylAK8@7{fi>CyK$G-CJo4Nfd_TcdOL#U3@iOLZQ=XS8_)0+xv;;`WAccVC{>14IaSg%8aXtLSsLbaQj>D9=Y}GWlQTy8LQw|1T)}9LaAKJk8>lh z&bkw0@2|QKf%QkNgf1Oc&7s_J>lioZks;ejbJo?o$STe5bQGMiH~S+jM!U3v-JD^$ zW*^!(u-n?_lXWLNJ94xyjhO8+&ZQOw?5h#)ZFs!ACaWAYK|`!DZ8Uc=toWqOI+c;# zU`L+n-H>be;*cMij}wTZyN!#VV|?gJlRm{JgVpL-=MKzvzHTY3aL7gur9q2jm{P0X z+oAb-iu_`IzVR#Ki|z{Mv~v#HgEUvf>~d0}M8RmiycEbY-v&yl zZi6V?y72cX$_toJiqLB0a0ro?6#g6 zh1AnV}wug`Xgi<=4fDp zedyE>d4&!NwX-S>T&-0t^48vHJBU&7!v!3D4;ri}<*kjmI~qIaZ{CpKJW%3Gw`or{ zv#!C`0+dtp(if!_+H@#Vp5TYFpL7jPXlE}^Z&&I|SIDq5#P80qbR6xgh)vx}0LK)rVbTEhl=PYZ)*N^1uz~xNopO zyV`7!!+}4%!cX`rSJCGjJC2HpwLUvRFongR50U?Y7(P{pifiqA5%*;%@W*?_8-EFB zl@?b~`a8sK4Qc)m2O!1QJ*}QV620%>zwZkEHz38`_MOaAn+q1)zcWU|Dl5)srw*~&zC@JD9mdn&I4A%a!&Y`v~dm2V+ zHcjhMWT?osA;~cvq8`XVprP@M5%mjjt9o~IJ(E^AhT3Q~r93;wFtoQoE_5%AQId!@ z7Ra9{lq5>@X?0nsgiv4apU^l$B?_#ITV;{@Ad$Ir&VEQZD?l?!w1X16I|pc^UWk%n zMDaZ|MFL#5LImVgD*;xCP`bWAycih zoSM&UUc#2^OsT3GY43_0lT@uOF_Dg4Sx)tsbuFymz~Dh( zs+gDlVTVH415!~ZPp`@epJ({I{_R%+9B}U!(Pw66I+594;xq;RI48Z>Yl&Y znR7-@@VzbL2vP>Nv0}Z+E|}+wHhz3u4#`;7GQh8|O|&tr37h>4=ulqeS2PU$6v0YDmMuJ3%nyYDJUnFvsK35v*gLlqHv-WNQ z@prby0;P3cGKH<>tie@U&v1^lMDixa2{Am>dQ1K_Bb=8aTtw=yvT)0Qf8yvFUTurb zx*skCU1Q4=R+!_3;p^ft5WG@t-k35!JY`G;1dzrYcYRbKBer(6x`XTjw-+iY^UtM0 zL53nhq%Jv@d0$>TdC^oOZIThi?kkvF*BFYZ02=L|_b zKCqbk4r04A>PY9t&r;d=+`}wi=|fKnw(EZ{CQ9t*=!r*4$OR6)A|7}_yeOA9MK+ElW*qjdq$I|yh7r~(Nhb~6rr)dGi-Sf6jTTU*nur=*+@Z_8aD z!CS?C-{hrX=e3(ANDD1J({A(qYEa|3#?kd&Ge&ymFAK3bHoJC9bN|p&$-~zA;k7eQYEJ&f zH7T(l`;wwj8yh-=QLS^-cvNP#fCc-|@mB3KYL+ZQ?IrZIuEowyZ9YSq*z^4LqLx;{ z*VB&&+8q7vCl>Qc2KCdFCzh_E=nqaA{9AfO#A)7bKJj~hTNfWp<(q?U)sDwg}{oU}hlG2}|2u=Ri zYFaK(yWwn8B-SI{__3l>uJ-ofK0)06{s}mhLa5Fh$mDV$2(*f?--SMtOGWMmOv|{k z*`{gcK=pP=qganQy&C+GSjofQK0eaIBdvbQix2}Qx0b9J z;~3t)q-MCmzXv(ejyS0>w59qXe+4|19RMw(vwW=l1mT+@+E$|qK`8i!%e}RF39ABh z-QEWVgH7!VJNbV!Y{~1b7mpQeug}i`%;NFR%o7H6VzY%S*=LKavlS$rIZCLF!HeEr zW1sBDL>dXtMD9r4_1Qsd85C0ZtN!D!ca$SkNQ59@wGEnRja++KH8urBsTa))#^T2e z7~$oa8{`h~X~fB^RKa{2QTTPKZMh>Ud#{r21&}B%IcKkXGqNai<7e)4D@p;Go4L_q zXebL3KIJl34A(tYF&&VzMMxgXDo$hLaikzaQD32Xu@5-s1iN#jr1dX?uwHWicLxsW z-#T#qUmh~1R>{`?<&@dey-m#M`rXdVE#=p(1Dz%RFw-p`PW&4(v47)k@PDo^`~OJA zw+8kSzjEUgNhf50hc_Ys$0w0#3H?{L=IL(f3;%I%lKQXmxc|A`9|4%my{1XWzbP9y z!ru(&&DEVMbE&wEPSM2z61MYzOL5)#N@`DNjYw6107&K?uTv&``!}q@;Ki6xKSmAb z_-Tckln)BTn~%yl0alal?f84T`>|1_y2?eBiGba~uN5z^sBHq&sm)sm;c_{vOL~T2 z{Aw&q?!}1_s~ZHrpQ46cV<&nywsde$Q}^Zkiww0eZ>aGML>`?f2wfQoi>s)pct8)t z^Foqg>w})Nu)m(fCm}iRuWFgedK@9z5mWTQ`kgxg9&#Cwk=b@+RZE9Hk-_H*njlZ! z)YkZr(|=czJ?qll-*8rJ5m)&zK(%=B+{J8;Yqs%MqO$JyiBer_3|Pk#+TXT&7ZuAjB%p=E@|ah3P8+;!fn7nYuXck^&(UhwO%&MY{%dAQXIp~g zW@zF`(4{%z=0@}U+g=0cXj4u(m2Va(2pRMoq=xKhfyo0;zH*&)(^KWGRhegF?fuRS zbx)d`n~E;u;^XlzFP-KsBCoj($os5^aVsSr%<3^7Ir8g!p0|B|E*T#+pxJ*ygw6i~Q=;yrH##quL)OEVy zp_N&IXa&`Qhl)ZcqVZ>;gu0dPfk0Hp*idcQ>`*W`+%e6YsyM)756ZHWmLdT@)N7<6WExAQOtXt8@oDv& zXS*P%mEfFV0eP{Pw!=Ibq~Wi$t_@Jp18|(SHKznH`pz5e1hx<7z2Om2u%i<$5#%iD zsa@Ci2`uV&H8&p_v1b%zq@__-97GG`(}~SL#zl)El;XxR{ivKG(&-?z*~h%K;*gMw zur|CVSF>mNF;{r7xOEnz40t`u zAR+_CK0gmEb|IgGG&em|4C!1AVT$uzZ*fc zKnDpXOxV^6?;OK@*~|12zeDGccJzvd*`)$>c0AklJu#R*u{PmVR`k7^BbX;#mLAvr zZMq)1dmL7fZc8Jv9DW3?HoQ}%tPYuRnbtLGwFX2bCnUS}AYL>0ZOx-5hnjEc$l&4C z$P&M}$od&v)Le4zYUc9%1V8}4qRU1(r$K@n9Yev3;}aj}*1MPWv;E@6SDFJRCUmTz z8m#cMAg92FZ&yyH;eB}ZX2Mk6Vu!XpSL`D}52TY=H@Sd<7aDP8q#XJ%Vu&&Bq(KLG z{8!ALo}MN6a)t&3?6Kxb!6+pchl?7L6b*EJ^%?|vuo)YSEX0?}r`1b&raSSH)~fxE z-*==K-}qtM{rY!z6t)$P87On5()ih7qpkt;MW>~is6&o)2LzN>UCPU5pn?{yeD0Em zJ>T}F)%D(HQ=0|)eG!lWZG^94@lb&|7kM`S=r_+@X*RVNvZ+6bL_ngYd=9t5)wKIl-IN@^>e9!by?m|;;N?FC zPqYuv4lk1{>hu$nqzNm5$+5G(dr&Xg<|$19as7{KvO^549Xap09fh$HzR1ok z&i8(%O^UXCNNrF;74PrTI50hkgb(zA4ffBJze;;c`m99eR;250kdu6?9&^VBnlU4` z*|y0ggyeZvHF;14X;J;p6rL%CI}PqXR@l*t@irxwCRS3;M!5|DD!E2L%BxPYVA_BM zoZ3Ssr{~Wi`cW-{LG5s7MX9X)o zJ87*~B%KgbU~$5^^MUfvC=Z zGT85UtwJ$LNj~T{-n;mBjWj3u&N6MVILWqX^EBoT|@B97?(Z1{5 z%j>Ou*9Q@|)E&lO{L*57Wr&-Xp(Ke?wHE(P0)dX*;R-%&*gsc7sQB4B8g|MNHT$D~ z`LQo8))#VkwN!sR{xdrC^i*8TDm=HT`h&yd{SI`0Aad-8a+fTL{2ulwXD$N`pDQKU zshG2ttmqY$-bH4@!-B)7mdU{J<#!{*Q6Hg`e^C{t1=$9 z-IXb2S>gF=#ZtxbINdr{%ZXlPfC-0xM4Z;x(QlCxLIu zvC&Xpm=NI~Ia4S8ESGoWJWI##hGR&d@g_NoE}U|r*hLAFV^FAUOVXe6hvrsH6z=Fk zzJy!|!RMoN4Xp8)*}A~I@|<^-d^A1uY)I#&K$PI%e~hN?2{Pih((F;g5vx~{u4HYd zrR_DYv_^^7;1gW?4Gl|SJ9w!m$kr`-I&SZ!p03tPKbRi#zFTs!6&pfy}%RR<#SPM~~s=5-6(uYO7hy5^n*BjZxQ*t!jvU?GEdyNEx6vuF01 zb(L7mUbb~TgPRz=-H83MR}0}*Ya7&(Bf9Tw0NC@_?^guw*6g&Gf62*+j|`J0`Ju2=7u&&cxrtt>MRU5t{Geq4XOD8)+TP9=*69B;sMo?B2b42jvMp0Wzq8awsqBo?Rvcp7T-yDV_`Nhk3Ce-eOM7Z46Fzn(M`Ps4 zPJFVMCQ=Xo?NGN@o{Fth{dY#Sis$Y)&-MFP6#5XZ3MGgavGdQ%X+?0OR71X}enFA% zXo!h#f9Pzqvz)F%?Qer9t9DsoB;PyBz?~>}k>USAkY8DGaoj4ihC=^FZr~g9w1XrA zJc>Q<(5FK<9-WNzT4$=!2lV#<5_E7H!>91gKfQyxM@AGx1>uw0!+)`T(E6g+pfulM zmmtYZEOv?F4>J!mb$zRC0A|td9NNr!gS?wtrtr#F(LAMSqH9MsUPi2)a_I}_t@w)u z`7w%?Weg>hH=*y@fmcI^-AplrR_CL0IwBQ%YiGA(sE_^{)}&eq`;w35DqUY*zK@qK z6w6V+d3a%Y@d#EntZ=qR)D+s?IXI@aBb3d+ET|RM5 zHn{5BvE{$zZu55WbWb=?t`={8kq|qt-={W*Oxt@~_@AgRxvMRHVLg;X)1p?1ovyk2UGBnevDXSQ z%g17jc3xJJ{U{dg@h>v^zr`H=cTko8phF?-*_$_S2K;;Su6g=&0+c~~27rWq4;cEG z3j;?La{xNw)^TH9w*eePslC1Z)nKkk96Vh!fLXe!WN_>Sv$b_78_7x^c|{)&n62pP`Nw69HQK{Xp2niST`5M_rZ+^8b#_y?^;t zY}t^_QHt~%u8D`f;rnY0`a1W(QK1KYyWJE8r8Gxa8C_^zA!r;cagW~MCL{Gd9(~vP zbyDost%C(B?cPdP9u};65aw7>D~t}~l4kt;B@`epr>%x$1X63+I|d$i){Yi$_aw|u zSplj8y}#N0)9&IKh+(2}3BmhRROnGRN=5a$rlZx=!*x}u*oik$5UM8;+s+Os}<@W#mbZxW~y)Pm^=RR?EOTQ2eIqcznengrSAL?ru zGWJGpZhLj>|7a7`6A{=7s31qayga1x8Hm7$Xtw0pVekzJ@FAJw^h!D93)ztxh>-`f z`I37%adX?nMm`#4iz$em54aoox*QxVPSEZ&F>%X!g)Hip?#a{(3+kZjht3WatRR{i z(yMaMm*$=s0c5um!HZ`kDns7fS{jrJ((Hcc+Qg#O-#xv-Ix6IKOv-E{)<4V8SGBMJ2=V#F<{Tn@{26vKnB0 zjxXQ=I12kGDv+v?`XNFNg^jx$A!2Cp{7YW8nFFNkAX&Y6CkzkBJ-DB9{aQ3n*gxM}hFe^DakI z{x8B0|GOyw_W8dTxA?!lV%5EyPxP0&O#o&R=wykGcg(U5fob`#Z0N#I9zPH&v)$J-&rS8ysqX{wkHgTdaRy(%jyBdaep(IOMqP+*BZHN7v=0(LRw;$ zX^2ICx^Tc)02o>KZE;|qCuRytbu%?yt+CAoMAgjgYnNmk@PH*y0PL)wnS)5rk3otz z*SpmC^%v;RD{Ij9&Nz?}j%Mrwgf zX3&=A6OcR?0$RzVHaiX$Fhc2pSSAo_b9md0MyvOiZFe#ykDSe{2J^nO;fwnp;Uu@Q z!|~yEgn1SR&3ZdH-Eh9UwjXl@S?s)CPkdz4Z(hPF9PnbUFoa-jdBo3o)l^Q(fDCmJ z5tVL@5S7Aw-#$j#gpNq)w{OAidzvnkvm(g4NJ-z1PjX<4IX(Gi3CFBTU zYx-zaS%?N&-2vML2zEoR>5};!8C8t*v|{W0bS_;(zPT4C2r}rPbr2#}tk9TXMM1-z z5Od#;urFalb_R@4i?tOHHeC^tj9$zuYfi1;37RSe7z#kq9CX5gM{Xih1RSysXf#qV zle;^bsrkUWH;hA*0fv5%|8UFlZnPUmg9gp|b}QuP=X-t6(!#E6AvySH$mjlV-B#mn z88Ha`3;q?CLfv58t>W4js9(s)zC@EVN(GaZ0!|y0D=ksBz2I)cBEl~?&cwFP5 zbPcySh6?h@oz%^LgiXYyF1=O(kL@0wHy^kL*zyYQgPoJfwb&+S#iME80V5kQ+8!o-*MyO?5PFbFlS6+0c*TieP57KJ<-Ir9MH9=A3Ft_u?F!zxjbDum)wc4prT=W^SxL9H<>P>Rq&Iy_>4;4xSfnMA$nr zv`~~yfNPXBF|ST0J;DGZ%c=pewb^9(imHY=YBG)Ujuj9vNlI(GaNT#H?MY8qysSo0 zs;m#MFe#AITklIP8YhrkI#5#3MTLVt>lL|C&N)Ys`-*A%#f*^qt^yLGhQp7Gws$C> z-IEaUd&pmQ3sAa*dWrNQ72}>t-O^Fyrl>7a*H_i$yo6j<@5>(O=1fn1+cF2w05>IA zeF1`?tsi0$be$g$O#Bt{U~cf#pzJScLHUOoY!QO!{JCdk(bu*W+X@c5_+Oc<&`>Ju z!8PtBM>IaL8+NfN`T2DoA9D-&$tKM-WT|}}aUV%0xrO^adDF{ezeZX6JX~Mp4hS!! zLMrla4G&C`uZ8@@)Dc*1yQPQbcQh~gR?eSWtqxyqp52~np}~qs(Yqh482fUOJ6Z1i zso8m*ds1@@fR!{HsE2u#jwg;73 zOKW$Cbt?h;PpD{^9WbFt44wIM#~`#;kzrnx5}A?%mqPWJRSm*o9IQWhrn*SqeMR)- zM0}2sRBZw@n>C|_?P~0u*pw>Iuc^FfdfO|*QubAx{u#A*p-=awefsotcf7B7>Jk0n zg>7^wZ!yhGyuy+?mQgc(ENhonj#8f2HvB;Thkkx*Z$XRWWTsq9o_stbvVt- zPzyV+itK;c_u!ay_+{XfTmr33&Y`aLXyytgmzrj`Up1JOaN_k|s{o_(`G}(>>ouDo z!*%g1VjqyZg6iUV8?Xpr|3JQxy>Ut+)yWzg!`B6*SIqkXkqU*aK?FJ(zGxt|*G9TP zsodt;TABnnhHNhR7w50*^W>m5%x)Wl9~*f^s@B!zp^A4Lj+LBsP}WXWw%GX&ar&uL z)cwD>_XnrtGjx!~ z$98vT7nBAe9b!d&)y;7)b0VW~0;kYzrTWXV`3RIf%%TL*7M_y@35)MD`;fsZ&Ple# z5l8)XRkA&7+}1Fl_O+fa&%eZspa51=i(dA2=#MA^!YlrAl&%QRQb7#avMWA(iRmiB zW6ynD@x{pLjaJ9m89YR|n8+~X1#c;lMg2=?qQrx9s{_qQAbKt+`~JP}Su&u-H_6rM zq8U@etbOhF-m{4Vg^kh@cC&fPX)10w@nMobPuaZzy+|e*g^vM|uFxqUgjQ}cnWUo_ zAHcRdFDqSDk{9(t>3G0r^@M=O4xQ2%yAQIAgPLer#PP>ePKFuBTF*qAWpOP^C)j9K zW1pjJTHMC(;4t?{g+*A{XTy7T*L(_fap7s!a9kk!A|$B-F_OI?tHK$8PQ-27CRXIk zH*Tty0_ z^@f?eg`}{iQ~HZvPhov{1Q4}>Ct4wHiWa_EBPv(t@JJy(p2On#6Z!sWgg$H;)aS=H!q-} z{CIhi8rv)x8TBPc+J<(CL##4#VkDW!b9qZ1U=Uc$cnW6k$mkcO1$cg~L{0n2GF3Z3j{;w#J@laPA(jHXHI`o7nQe zKkioDwVG5f?+IA(1d6y!L#=;99e%RX0peHu%EHx8WsS%D!a}3`o!t@BdW>VE!qJtx z;c6aFKC0Ih-M#@h@LL@0riTL_K7Jn?S+Wv-v?Of3*IeV=ND5hl*fdi*-|kEl^xxj| zJ)?QKF!$?4z(4!GbM=I%$5aW3DQcDf-0uugP(-Yb?X&A603m8;J%Zb03fVnjBRiS% zh?T~8F+w)#BA^~IdbBSLxHO7g$Qx7N0<^%#mXD|YXE-9?4j;a;yS@FdqsL0YT~l17 zC2I-ITk|og7WIYB;?C*#JHaCyg|>Jk(1pwkPn8OE_GU(4zwrZdR-wZymIG;UNNu(< z{nP>AGW)gnr*zoKZlM1yuaB*tFi@1(x(e>Q{7<}0bmuISo?)NyYw)I$sgU!< zULzJy9Q%90(8UGRnYk{kh7k@a5j>o(qO+PfX*(M;CLwTi=)gZJoaM8YB+l zZ8*n;K#9L6j0$0OQ!7c&t!Kkk&pzgvf2Ko_W~+^xkI+LOVnP#LH)V9JM1agBcDLaL z4G+D|ypKyc#qpHtSySTb9ha(KK4aac)6!=9fg$@Ku^9||b=ropB777dEezXOj2o*G zZk%hHH-soQuME9?@H3*g6%xsNyHFW_uO{}(vzI=HJ2yK9J&qz4`r_N}A(vXdJ>c}q zJ~sr5(Bq9#^L3RtA<%I2M!rgv#JQ-EKgUKH@7x27q?1{Lp5U(a^Wq3~%)lI| zQqG1TeIFYU4=({DcJjjfFn1`mcq?j&>c4;-@i|L8;R#wMB7X=HVTsn8-QRJiK}ZT6 ze55vt`|b9gcsPxHKa+g1m?A@7{{-2rbJ>Dtt$_XH3rjC>&17uR@64oUsP>fmpXBub>hg7Fg9MZm8S@)@sWGudR^1|GnLRVZ#3eod4Q@ z{}m~2?a?`pT`yby@b><-wcus%N=HteIZ^$gdv{#bU6C*h&fI2CSa0ILg(Qy(eK?J) z|JycKNdMdW@71G)IntZ&Yz@@z75;B~b-7_nef&MU`RmwIb8i>k`t$tP>c7{rzdZ=o r1xEhMAeSIudtLv^WGrihPAiHm}Qg0FN>P6Gu6RSo`q#lC|4 zCfOth{=;#-_s9bU1&;*zhl=tpl>!9?bJ0#q&r?tJzKDg36Nj0li@6ntuahfWje;U3 z>Fa7{;b7%SXKrO<=Pb^!SzXUSXJ;wSpv$kyrRpkcWoviO-`z^nUro!x-@!uIl0i~} zPRv&X-oVMq(~Qp7${A- z0d@;+K7KkuVGeEqUOr*ryL3EU+(MjOLY&;Z?A!t(d|V74?A4J?&0U`Y39rB?7{e-?;vO8 zVc~A)>S^cVOozOqnYoLXr#J&V>3+JEbX@Uvk^fhzkPpT5wu9S~*!cdwRgN-2cAT)z-z+#lzO+fAiM={_}sk0Zgr`>c8*tKR%0- z)4y-w;VJJ8!}!;P{Et_AX!*HXacWq3xOll+Sjl_CV=^M6aTSquw=(l|ao2Kjas1DP zQvc6KrjwOL7DkwkMc2;R(#6Mv^}oEvO3uvFN}K`tJ3E&EJ2$@;H?IgcKRcJ82p89X zT&L<{X=m;CKVBy&!prsFE`=>)Y36D6|9i2eg^0C_yOS9V*v`q!#){L`*@l7c-_s}} z>*DC*4mXBJ7W_=we-Tvl8b{6fN3|9-uk zi-i}m1^)B(mhgIWUQ0o19zH>KD*-`Xb|G{4&YWAAhh4y&kJm!L!kXVg*!(~5|G?c2 zj-Z+2|MUAG2NT&lBKPb(U{(G8b#yeX-2U~QqaEEp+eO680yzfa3>L`xTUj#v>(_Sw z!wmf2jo?4t*2mTg-t>RBDgNUc4;O1sA2W9=X&acT|C>$6`M-O34>Rxo^P~UYE#Cj( z(f{i{{eOJ=f6c6gt(mip6@*nz24p;(NC5heb>aN~F4;eS`!B)jKQD&}h1&G&*Zi-chhWcc&^yWnMiry+!mtnyXPuer~E(r_@zIy{dBO~&?l|)wwp`~}5 zkG0LDU%d-iTYGy9H9=%@^Gw5x>$Il`s;fv^R8~~SCe=gIoT-T!SJRS_t*tGo+&-nl z(Ae1fidwkg3|ge}UZ-f`GEZ2dSxBQV7b-1-=tqMca{E}%5A4e*%k~RR~2rU#oYi1y}7MhEEz=wdRLThO9p9yd*SsYi8V; zC5rPLx9I5{-EM1=uOsquQn}u7@)+Y~X#AZ7sSMa~yVNX)sUQh9eSK=al+@C{)N0qn zJaIpJUn?*=D~{inHC#QeC3;BOV_)X$=V!+A_KSX@ufM;BuC9-E%dDqJ&x+@=r^vf^ z?>;OzJ39-dsW}QzNk~Xwhe|m(+)>EBR;C{p8HvTt&OW^EE%#8acqm(^z|PtEHK}lJ z-!u3NK_vRi*1cNX_bk!2e3WA1;`znJ^`Gy0h@>5zo?3j>v$eCU`aH|hKQtsLL`|@H zz&hqbcz5?ynp9qkjSQxzU?5r{yV3kB%yy35cbItlve|`&{g)qCaWP*Fj&j>#$UN58 z5*)F!^B^Y4_~mBYFidUw^_i_!QKS)l$N)!{Hr_BbgMet>s|;;CJx2y_Ma7xHB6^21 z{m(jg2qI;PDcAGJ)YTmr+q(E)XxzbEjU#wBmRkBqey6?AaA*KOOhGCKBgW{}V2Q9C zH9@xn2DKX3m>g;7UzciZ5=Tctd*C%n|ySn|Hk z0baeE?jVPUh zpN;|+6=M(Cl3=Z1TmmWhg*q`ZnGKEtDos`2z7c2l+i5>n90ODY6 zL{>!wuQuTDHa~w-bTsat_u?utGNGQ2;c{(lvhD5d-a2tHF(I#2(ko$4GBW7kt=W>4 zMXrS8<}$10zD!IcMxJT9G3*)!YRO0}9X8w^L%P9|M@czUr@(4|bpQhsv!~cZa?M-x z_Ddyyj!_%a^~02%@ax9DYD5@mbl5DUxUZC%lykl{UoLdHoHAmgT?s?Y?Q4C4jujOh zJ=^dE9d_l+;^LLcr+TN&)?5@HQvSA3x3p(07M8{7QKPLWy>}F~w*DziGIx3mbNZXL zd~V@mQ=#v-nBjSB{^#7p~{??(CsYaFa|e zmhJum+wzbe2BO)5nPp*7|3YFDLVo|k#867+PHVU=L&h}x+AK)_syotc_^ng7R8(TCyNpJ20+V7q#$TnE*&!-miO?XDaY+f@- z_WJl#E?+Ba=A9;OADyveE z34C>*W+pDhIQ+ck74}wof?Ck7@ z9R;3K3(EusipN~%{8(4_zG5mUWun?=w^MM+^s8Rw?jO--&z_mhG=-C1zwWWO{7@m5 zLRwlH_3vPz#o5s|(;VM+)7<&>$-mBD>{Y%;fuD;L zN$w}dv$;X_jW>@X;;Y}KocNoSeebxpUS7OC*TQS@>uOVTvyzfhqjgE34V`j?=fS*Q zet2Bf?eTrw&>Ft0_xd&U{?29WmFH0+5@2!RTU?6=* zr=$7IO%gvV9htzg*v<8pwN9^6eN2f;$y6J1t*^Tul3LGeadtF#YD!Sc^gG|YHy)7GceeM5uoac$v!mjvO7$=% zYZ%{1cIMCTc946g+0TV@X zJ*HH4k1GUjWSlB0&CV47I(lsR^a^z@_Hre;VFq*x^?$w>52!rdsNUY+Us$i0`ZX~@ z1J9Y_QrD{aKpeB-Ew2rQpfff4m8;X+Ews78mlw#E;;cVQ{PKnCabTdGqvL$t=>{Vw zXZ+uy>gW6pgRaf^g3~iIPZY9Wd>nZA@F4&gkF9CxUvX55R#r^>{QUFt^IY!p_ZS!$ zP`d5QP}asO;){%`dj|)9!GDm>vhwndJDTi{kmoWHq4*xrb5Y~&C}wWQ=5;`qBQIdbsNEjX3&t zszv1=M_i~cABJ;sn?lOfX=$!#@z0aV&!UdEh7IC0@~ur1sV6uJF~K5 zx7ycnUYSE>S)t6&{qid!J(u{Q`YdTu`l0sd-(bzIuAMF6p16!cBjId6D_c6BH0BnC8*QJu_rR0!hoaZTJM3Qm zhb*MjLar#Zw6r2V8+Xs2uVY|fB&4SkR`PWpoHB58Ujz7MZebxDc)}MH6m*N38J*+F zV+dT%)$0NcR*YUgK1=DBXUxIJ?Iyq5+q28clD>W8fiEPdiKMBG`lzcD$wm?^6jg7S z?=AQIXlc>Z)C>bmHZ*h{1ppQ#u>Ab|(y}tQ)AfqoUsNvLwE;dS`+pT5J$lP$4Z#TZ z%+}#y?x#=Db1m_^uv?T`90fVc%F3=05usFKlo%H?3k$y`VOE1ZDQ#$&>Nx@HeXH=G zS^_0aO>uLwcBICScXz2Pxk&o7>^0^RElR{LcgX0?k%U+YGWm7wBle<% zSGSjzt3+bSUld&v8JvHo&VmuE^Fm_#%A}rASN=+wp`_rfM>7ApPPZ(`U1^)}84^2kJmR?2AB-|7t ze7I4%%`tOXOiQILsD`PFcGpR>7W&pZOZDGvx#{i{yHH{u=wxb#Wf0jqdWgRq=u|uT zvC2|Z_VxCV-2ISu^l4>LSs^mph0~w&@}|eDJg(A8Q2Y2C5)6HqsNseTxKX_+frf^5 z@7}!($PcCEx!O}|jQNe_o~Z_iU9{$?kZelTjcl3xkY0aLwF8$OWn07*1mW#u}c(rq$l@4Uf{b(0A+0nMy0u~G#C?vO~3 z@~b}R9Gj5P=5S-8w6wGvFf>g5$X5$2FE6jXzeDj*1(}J7v$M9gwhb*U zk*llrt$wfGzJ*+f2YG34r7v=E(fU(C!L#`I-28kck$CT75d@Gz;SPuyMO{ZHV!&QL zQ{5Hr3Wyr;7M@N)(&x{25fE+52Y_E)LxW+2*=J+?8B6pyBtGP6y1S+1yT{eg3Fz8SnbY!QErgrsjq^pWdDqh0(|5@s$CCcv<``S`T-_3dVDYF&nH|Aw!# zRUCZ$^U2Nmr=D+P5@h=xZJk;^9w1yI0AwW**a~b zQL(Wdv@dDd&-?B9Q}C=`m{h#I{JYJBhNjlzc8qUzk?<-h2}X{MgVX3JpsAyyaPMB! zt9OSg4ABfpNlCzf$jHiy3e`hZ&ce>l#K%VpRW^($XY}Q|RnI8*+xzhPYuB&)Jp5!M zFOP{E9-5Jnq4GSlun<4HC#t^wGX7>T)ZNx4Z}alFhR6$TAne3(Y*#59CG1{q4Z;Kxk!j#S!f78`78dp?* zJkw1kO$6r%_?HotQ!EB%=EyPU>bR{fS9sjF+!j|Lr&wBAe(~9yylj1Q|27FA>1+sW ze0+SKM;l4H#`M5H9PcinBN+;|%ZF7Jm-_Q^%R0R>d$KeUui4Gu%Yev0cs>Y1*PXww zd?b)>tZyIwYOyj{Naf_@q|3M1)FcBj4aN83c&X~*84%^WW!HOgn%CFK$hM1v&tpzb zP6|X8)A^;vPlpt&QH#|qtK=FVB@xLCr5Mf`2_{d_GQMs3XhMr%#ex* zjwHZ;tJxpVl4&5s2EOHYAn)nv5lZ`W$<|AM`*s8j^Sk#tZbM(D!{XrEDlW&%-Wb3k->RficwzDBWw~2yl zGz$h9o4lgx!yI+SjD)pRD7E-rwjdVTki%)^J*pj^m+QX%9{vH!?7t2dq2 zFqmHn^s-zjotDJiq$Mj*_R;+5?moUY z8yQsOw|RMA9!>?PBOn3JC=8|v4#}emXBus7?V7D7yw3&|1UVY5fCrExD(pIq0$9d$ z{`ZTT!^r^H^K};|4i^`P^}sW+d71H1#&x{oj~Ox!hy##k=Lf-zvt|p8*XGZM@891+ zWyKSC;tBJb`yhQ0K!nZDXfg;sj%sMROyam<#D<1{i6X%w^mIo!SR{{x>4+4*y4KN(4>$9EJFXl zfZO4OkIK8rFhYsnFf2g!HRlIou{Xsjfk|vjx^qLslLdk*#Gu~3zWh(0%rDN4V=4Kg zLqbrf39zzQcx?Vq-wZl3yLts30XaZjoXT6|6%{ScMAH6p6xany0i7%0z;UDY(D>}^ zOa%MSfgDQ6)2A2>R-6vSl@jJZuJXEF@Eu_&HK!} zynF9%U+$(~&I2EUkpWy*W7PZ zy*3|R>pVN%S`P_{x|cH1xb-`rl6!`8IJKy$5+O4#PB&Xjxj^i|#>JhTi)fEp% z+}Lk{Y<6z$7y<+K)vG`H`d;?-YDk>#X+lo8eTDGmeFcRpD#;vH5C);B-3G+)&2>hm zA!nkr;wj`Ojqp`C^53jGDIv`@uZ@)0IXGlP`6D>>7e%3FGwrYQUjfSQZvX0+U znh#KlH5tUmwDAX7zms`dL3^O2r1U+SiL6?9ZNNntH@~>(4y>Ye*ZaDt3dbVD?+^OJpq26**~bcMm&*Kc7t1#g-)YQ~0PgDz5`)pcYUYsL~ z6?EncBNT$7zCD?fnV+8wApoFm2EIn@;%E-4bdQ~RrAgm8e2^tvYWK+jzFfU2_GWzC zP~X7d(x$xHgru&n4sZ(+5N_Xp(>)^!#k`bMNIwArlf(lK)Qyb^==KZjf=%)8@IdWK zE)@?M9@Z0Z9BxQtQUP?o1dB2UjMQRIvM~_G2&#g;hmcXQ7F8b(je*5H+wB4>oYvjL z;|8}m1~5T18}w54mRMilbgUem9;_n;<4tk@1W3S8z(KIG1{(G8PAhYAsf+W-xA2c2 zZ(l&XK`HXAhdsChdj&{ak^bvW!N;YNqU-G5@(n}zeUzg4SzIp#AO_UdkQJ7MM%;gk`OvjTZ;t;lQ*i7}yL5S2F zyw4m3*Vf)FdX#I6D{d$rTK+sfGbciRiSp=+8rFI}0v~ zyy9Y;o-FwvKYxA&01Ar@AQ<759bxWNQv|+x{ndf2jYzNfYfDQlK+7Rm0Mhi+hzN*r z%@D`$+uG*!&n?8q>J%(UULF$)j=Q2G*bGVDKv_38H-{n2A<#mUR8*)#T1QZrAsizl zj$hAd+8v5(e|>&bf{l$meF^j()N<2lK9goYqONJ_>XtZ;@Q`yD-qX=R(Bjz~?Ilv6 zj{|;zwDt~J(fOATlrsgV$b#0<3QJ30B_t5R()@01HERsT>=jwJK-cXtAtWSR>`L!~ zyZ9b2BtMIdwS>%Tm#fV5eL2m26Jk?8#fKx*(wUpmTA zt*CVeMO$0j@>m5Y(2sMOkvC_jE-wUI;%PUD!oN8TaR4KG50c)}pEPvCrY`$3bAc2; z1m*7!8X%z*86NTi&e}a<|JwIJ!{@vBpPr8dNgCWGN3tgJdMJv4nh-}wPe{I^tgNiM ze_vPLg`3zwxR+B@RB1BG?)l<0R(|IXvyTwlF)_#r3VSSq^!%2~42_J83{cYZ*x0KPgtQ=7 znYAV|olRYy(?YH`gCOL&(i;vMsocX`K+A#l0CXSY2;bf{sjT_;KAfr6`W{CrAo+Xfl7+6@lE4k^!*RDxJ$^`lmHXSkOaTU%J zdNsb>0|NudPDu0-;Nj8O@xLIqb4j6(&gxGdo0vFfj*MrzeLL~hs~!{+7E0VfUU z%UM`-1_<)V0iXYUE#m5pCL~Q|NQWV*7tosp>0VXD<8bH`cP6=s$4(vS=|6aU!fyhH$;)e;Kph3|E*gN(H zufn%$?;+;_LNX5A*H%I&z{8sZAspd3An_!;eA(O>hJ}NTo$(-D;_3|^3>Oy{sJdC% z*nq};_)P^89c2hWd@jIgx7AYb85mGe2|C|`5lM$#*#=^D##QKpH|4c!*FeSE+1a5G z^}d^#nF-~*TDk-z(G11-n^0IlY)#*4yHlL->eb%M&0Ja)*tJNOU+q^qfxN-{_{bGj zGEn}|>~wc>GVBu#JjThvdQ5foskSQpMNfDvKPA2gp`?uUh|O7m94{`ZklbmGPf*>g zujtgivdMClw-7ZAN4L*V?H4?o>ccac{fnlB>o@0Qici8%Yqw7E4$o!h&I|nqIPY3I zmW)8j0sEv~UgAOuN{q?i%fR=3i#K8wve(vXu1e}-#AMye3&1rxEAl$;JY3?7$@1;l zD?4|ApnbB@lrgiJa#D_$hgV`=hDKmk(H5=ahDO8nONXk;^ly|fiKC#^jkt?XerLQ_skOk%b_K9ahDqQ8HL z*LARCFm-OQIMfxM{|(-brYcJa95aQ=sLGfHYFfLkFO+fZ4f1*QeS=)@>KEb`?9V>l z-_%iY38ruoNE!D(&;|PftUn|e=0ok|;|bt&=;`St{Z88@Ze(Gv?#g)d%(ySo6gR3C zHYw)L&V^YCr7>_4JeSXYX!dpZR-s0r4idEUC#3!SgpmSoXTEi640TI}!_f&m9Zd9h zcXxq1;-a|vZTi)VBazT2 zBdll^q2MSUC3$fKrlcx9j=f)^D)I4Xqixu2{eIWbamwdEebod z0oa7*o@_egORh?vS|C_L_B~F$Zp(yPLJe&Zz;>P~|KEg^v zIRzAEI~MI@DM(umgP)~yG`69tBZD*qx$HOa+i%1J1afk6?x#zn0UXcN$e+hLv01Fv z{%vJx$+3vVuNF?%ZC*|?mu+L7B}o-cx!wCIPe4E4_Um+!_H3@^ZqFOvJxWZS6!f0s zbq*&1DiC2`eOv{Q$}A|D41|_*-LW-rn8$Eed1Yl>i(j#3O;2$wt*qSoR0R>M2SP0X z5elSh2Dkv^6cmD7>g|End213)yCFPJ%AH4gHR?byTkG4N9E~#@)1f#1FWrLqY;-F= zgS9=}-G&y`_zCOgnX|!d3xSkpAdJKQ2NT81q$GJ688m|mXBZbdwYdK)4x{hggM$$o z`5z$Gf^^-t0;v3Hiu3np09uJjNDy3iaZzNv@y$a?L18htbsC&lGD351Eoz>Lx zGpE_4^W)O`*xB2>o#dht&IGAb*KEOC@Z!Z2jeNO({87LzFtV~fgBs#1;6mVE5XkQ5 z=Vx1{&qs+5$>hh1r~7)@5YRLVwze#Hbc;R|6+MSN0Y$cDp(b+MHnM@a{=8Szh4xkt zgZL#x$SOW!5N%{GGzaErQ8}FnGoqP5(+xvm!i@34gEhvHLbk+UeV4O*@=p#dy6kKd-_y@ez@)o zu7vz>Y~m`=R{NCB;LD@Erdm~s61L(L&jM=MpZV*cqpdSb}D$OOi>>3%fh5Q+t z{$*h*5j^RVEagt_DU9;-b$a=f37+@0!2zkdm0*QMAS!PJzpqn<+thQ9aAF}DwQGEK&=-qNS z-*D#V8ykdAlCz|9o+igPeA>jGShLO(2|k;<%_3P(8?#K@Yme%k)0jOo;BvUJ^Dn}pMZ*%sxo0xuwlgeGqwwb1GL*K#|8CGf#p0qUW_F&!(8%dA@aMD?+)$HD6ZwvA+T%L@nryt)}K& z!_eJlu9eKR2YjKqloHDBXyo2ByU(4Y53UbO9z@9SJEaWurtRCV=?(PP*QInxACb-cZCHhLnvbh$_} zdao+-Hn21-XA^x0u@|kmu}S+)fZUrsRpv&LJ9&8FGHnYOd2tUVn?Z7q~4|*H0799844YtiFb;1lz>jsDFS{+Hk z3@YQfA!U5)3~_9y+VCLyFN~(_79;(S#yG}oM`Abp{hB*ug!)&By=}&%0xzEPv&>9r z469$c<}c(Ff%V`!Up}7QkpIi8A%k9hT`b}2+C({#*|*>LQ+}_KwaZqyW2}Lmwnvm7 z7OgYXZt91Bmm_qD#8lP?ySG7{+0go_rO&Xz`e>I=ewnnONhL4FB%9laGNV`b)UH8_ zL*h-18p9?#lcc|osn*nc(7F_w-k=QY5hxmD=3;s7Vg$3V-SxpaslVR1O|F-S>w_Wd z#H%NNR7riHD;+Aj<`9bYpo(vI)%wl!roN9Z=GE;8tR}N_;o-q$p5(Qna9eb0p6^9} z-wNb8dD(3~keAj8S3wUHz;$hilP-GOM2iVXrfOA4K3V5j|LS-umN!<1+LKOvj!bQr zFkF&Y{7@ABSi+|_ax({3Mg_{K1m|L=;e-3;s0}FSwML;g z@KZ~gnuvu4uUuY7i{UTwDlwpIMF0LhObw^Y&TvSm`o_4Ysd^(;8eJnkK^ck&#oFAv zPjfg!r_~>iQJAcU2QY3@Zs|5xr_rf<1W^`+;-GT8yh52Q++ctsWTankLHHrU=s*k8 zP+w$fDMKgD? zaq?x#lq&pEv}ISEU!;PS!bEk#S8>BtD*MM!Nl4$(kDv@spBVb){;)EjAwj9yC(3eH zO;bGbt|4C_|Lq*=b`gRyuwUfGRyfU7&DX$0)@={{Fsel!j^)*VNdAl|j2Vvpon>*aUi;8--rKm2D*DlS8_ zp*gd=7uOkAea`>cah~BA|7e#Y&Ktv~NnQM?FW+Yks5WR(7fdd8l9ya3M3d!+q@)^F zJ!eVfF&Y+K!|BU{U*SsQK00B%5f#iCmBkX6s>bYHO#`CfE9Hd;qv^%CSA1n{e6YR4 zp44$Q;E8E>x3^d=Q7sYX84@}^@HwKp)>O(-m=lw$5)cv;!__F{Z$+QI(a^`y ztKwqxYMY}&M3O_tek(?E_xYrrVqxGUtPO1c+z(j9;*IRLXF5(|uPLj3Lmq>krkudz zFZZX#XSR*azC@TJnY1BoLe}W5yxO%mg}zLT)Su>6j!Hst3XEiTuK>BHTeE&hA3du* z(zSU_*kie(>z99WuDBt(W|ve3n!uquj>6mYNZL|2+)$~w*0ybZM$KLZHxYU7q<)V; z4X!MfEFz2!Z|2Pnwhwt<<2LATV&kGxXK1m3qzh~;!OK=Tb906(VbW~|x@?FJobOr$ zP9OWSL=fenXh$5l&J{1=2N2M?xw$nKZb=gXw?wn5P`*?k{n!>kC6r(v3?=>LsD?{D`fX%36}fpy8x=gq9{-+uiTY$@34DflXs zTB=V&QAoho7IO~Dmle1fcDiK=U!>b~{0y)b5#Yf< zq(nIMV6Fi7^A2d%c#+N0AVedi`|lTwXQxw_iw9#a%%B5 zU{nlmwPfJr+_X25M5-WfGS5283vRKH)zMuO#uR+BnT{vpfqQF`I3;A#{!y62UzTZDUl(<0D)Ex zYDaPZJyW0%fBg6XM8^;Iig6iuA4Ea~b{ptHV6|jn69fGOVlifph7$1cl`|1kBKPO4 zf{fP~Qk}y}7HMhiwtw8H{Cl)8R87h+uw06@sC`koZe>~YwB0^cBq>p+AS_uR%^h=1 z;BCGww@3NpkCVPK-@jUXj~th^ueY0m{S9^%6uR?3m+h?%#6VfT3r<_JiZNDB&Lz-> z5D^5(L>^w=ulj|2f`Wa+!%;AIpw@vn1wM%z-%3jS*1oprfyPN2bVLt6c0^1ALGGLL zgb1)a-GBEf;uOGm5cTX?Ca9J`^nC#}c=hk!;MXxM9^AWZGj+`&lxlnH6t_L;b#m`4 z2@lYm_%(g>XE}fNlanv>j*1d%Qj=dHgDqiL@y_S*KZu@)^Ak+rbc zeVZo`&Rft8gBN$pZ-1U3z54wQ#zl}u?YEWP>+m^@bUATaZyx) zZUr4UU=({cI;zjW$O!HaCNOL)FWdU>ElWe`ii3j#GzCzyAbB8EZp=>^@PL8t02aka zu$5&G{jFO0n8L!z$;``35-uYR+~dQ1EpQwWQ&9Y#X^s>QIs@+}5iRWlh)kBnCq742 zO)s2<7I9s%^d{SrW``DCb5tY#HW)0l>8x0W6gy0pqbICkjRiEGGaJtE7gS4?bTX;q zFUcxDpqlw`!@MlP-I(INxQWn@)u%-4m8?cj)?x07(7QP?B$PcDeg?1@eT~)D(LGT6 zlyav8tU4`QVWFBi8t&geCdCuJ?y>gBdKh>~GidF>#qcK{Ctq6VPm5c5i(0vd*>d+G z!p$XQ;eFM+OLOqoQ{*8Fhm%{S>%@VTJM~h<8Fgq$UT0F_?xB#L$x@q##0VBac|!>L zmL1#pP3-UNUn*1X>~H4q5@m+2E$cg1afcB$o{~h(rzPhqsC>ZaU*D7 znF^$Ysa;%|ypa~$F7GK!t#_9opSF6ye}($oR^~i$&roU}6yGu3}=zQgs z8Z5QiuAf?yKIWoyl)I?pKe}7=`OWq0>6{WS0aE8ZAF|x7zNYJ~TYHa=YKRFcnl95K z#==aEdBy{X-%H@cM^v>H`xTg~MgM(McstqpSefr^|L%R<@D@hH)1xf31HS6}sC`YA znXJ2gmG@CuFe(2zYY^ZGc3jj()%QL7d;I`Nm9Gw&qEUlZlQHlZ)5hgt@z#WyBFFhg5lrSUTO>E32olz5k|SwFKQ?} z@ZSGT;4kfL<{N)=Y)UJN~l+^8UmN8Rg@?GrDHQ$QsYJZ$imk2!{s@`0Dq&m z1I7xA8oxEY-b!K!^k`S_)MDrcU_Y{LI}`kmU)rNy+!YP8EF%8)>%Y^U^U)tym8GTf zQ3@uWWvD+c?weLd@B1egwHxZVvSB>2P6@M)N#lBe{#t-U@i}#)bA`$yA%Kq{Sb~5L zybPFz)Ec7kEQJM~RF1>MX88)TCr&Gn%pgYH?5;jgP#$AK24;rrv=3Ed9L zs)H!tNkB9RAgYiK64M5h#m*E(&|@Eg>;OGxVtd`P5YZ5Wp2{#s!q}MQJqzK>icV|U z91S2&!Sa!G3gCub*z2H(b zvxlA)z&6c&eVU_1wU0(2ZT;h^=z4Dja)$;deXTL4>X`gPL;{eHA@8a7arqT{qj_hc z9nluS`qg6ol?%E)z;*%3E8??So2*R%(XAJ*1md(nx7d2J#_yjt6dI9Ngpy}O**(9r z<0X{A$-`^ik%9E61Ye$OkO(5wVtUg;?kXG8STyBP*At$)?DHkLO!o?yZj{ zKaf0s1*#Ktn)odw>An&5;W$1%20P8mgoFl=&{;V+7C|SeIaw_L4Qb~G$pfOBH=oO7 znht(`1cK@8-@omk^ndsRq(7XfB-k?56OF@asCzM64C?6Q)z87Fvdj>tnyC)*F(js5 z(&Ocx?6s--bi|d@(QzLV@bgru^bnJjI$_0KJaG!#c^eVMbLS>~8C@^h^ zSs4-z7&7KzrWn8x`+`vs?8c3N^NU((^TQLHB}YS)fb5fIVa~U{f4X$)-=+ z2V21nYWTdp#SN4J(&aMByK2`SdTIdY4X_p;A0G^h>bkm-J+^X07#PwCYl(;mO(?d7 z^76LoEa+)~A?q?rOGyEP!3&^gHAH33(a{lO8k}Q*cVL8wrxgTe#Loh5A(SguDH;GL zE)NyciljXUK^_*D0)R83kAhe@Uq0rHSi9j^fXUGPoc{WdZl1Kh``$hg$61rDmc;r;0OmC+=Y3w0#75{8mvQ#Aj9Gi5+Yu2 z@Z$g>4Bg0dAfcmb#Kv)jSU)V51x9-(Q{JWJF%Pgo0~%&Rt1b@*Lej-XpWZqhu1iqwq=UHLz8Yx z3l_B8sm_h1Ndh!1(+^Zq?K1!BsaFv=62ARDS-&E%*1PyDr@X$Km$Tx}^6xHf8arrH zfZ2ntLpPB$py`#Y6HP)9zYoA=Vlc|KZbDH6#!N7@&;E?@gIXrI|H8rE9y#5n%fsP+ zRy?6cnRD#sqWwb+4H;-C13_he-V)sT9M!5IGX@;2HA1BVdo1zIn8SLu2BpGk=RSJu|X_1HOTJ=J0ktQ->lm8zL-8KT?5Aza$*T3jzUgO z{1NvTVl1rkSORJCLrxCjr9@6Ic-*)t;}BocUE>;xk`bij0FyTYPr>s8jkj>Dp;rFp zzMu@s`X9t3LqLEuPQr$mfdB<7kE99+vs}=0%x+MQ_~^k82_|V%Fi9eYh_*Im>p!VV zpcq4VR45)Qahp?sKn*q)#F+wyj5nZ4Aswh_MHE&be1j99h|#3xucO~JmAD(n#fnmHFZ8PU+u!HOuh+ritBCVE|(2(iWUrpp_q7i zpFe;2_ASxCr8Wsfu=hbHc31Eze}I1vYUV`4XHckpF;c{|vCMG5#_POod-R92DIIt^%Sn~v&F_5RgKZ@vXAjrY#eDj6^LJ_!M zsYShG5qq4vdI(t8p@*+;<(`__ZE$;mmqkoW?2V8c12SD;?q~$F;a5HAWz*8uhL0#% z9xb~Qb_GB2Prgz1ScwfG_)ysaupsSszFVdcc99keFc~85Xymb>Dteik8VhP8^xI8C z`D;G+D-LlKBW@gUYV^TI1)iX_t<4<7yBhGPBLW^oV!CJs_|SuK-?=#GI0k1vxUOlQ zS_6CqZ=N|o25QNmR2YIe&s%u5aj+F4dt@A(DG;j>TNePGNbnCpzlP{WWf&}AxyzIq zbpJp%2MV$=p~QnQ+z5SSHW0CpHZrKoVd{{@f?BJb5oYe9q)fR!G9yxR#} z%Qkcq^}*=C5cez^QOTb`6K*RbGvGrdaKq7nA%&6V+!skw4%aWdEg@Y zLRW=6P*4N*RZH&!ZW&mB?+7YcYU=x7nTD4=Bwd-PuJEjd+k!I71o7n|DfB$TJ=VOd z=kE>t-3Oxtn71H9wlp`(es>053$$r_2M6E~AlE|nd)jCU-8c-`Xll9O%#LM=ei|O$ zQ)nQl_Fha0(g_$)|M_H!B+_VTZOPeI;OT<9a#LJ|GX9)LaIPx~QDL;9 zwXg#mH@+KHOUR}LG$|)1chB1mWK$^1N1$sN2(8^fo{e$DpgnyTg4kfbr2?)%91rQffO^p~#s+)%g zBk)RKG(wt-WMm9GW57ZSE|*vu(bv#*02(w79$xd*)Fp$>1IQMz0l<~3G->(Z!2{sd zjsPtoHdNpcYryaa=E=S?2i;PAcDPO>dIub-54^m}_P*Kr*b)E;27~0s2kB~nV30+I zM*QStW|}E5P=Pp&m;jQ(un55#hS<&Ef|&`QsT>$3q-v-@es^|a(m@aevH~Jo7K=F- z1qG<%0A!K=S3v&IlTtD6j+Y*E!g>j90ucD=#Kn#LQDF^WBLRKYG&V*R0_O{O9mL%P zJ|I$3QUt<75`fdsEF`4oPH}pA>hqiHtdQZ5`Xp@E!*3uaCI+etMjjqwI3du#2Fn9X z5|{&lnuYOZ57;wdsexS|jvIv5>>gVd7M2Dm!$QA-Sr&K~LqkI>W?8rZ99q4lTDg4> zO-$l*b93jvczSpsM|p5i2WA;?F!cSPPOq#WABb}MB@RG?i61#rL1uf1f=8SHV@-L%)CD1LK{@)6mw(lK+@w!eA}n-2A=tr>JKQ3e`2jkj81+ zWK7UrT-^yw$_;9b)?!vmMH-3fhqr^UQ#uvkBO@ZMpurBjY??+!>;tw(^iah?a-gxF zFph>D0tfkc>Z-0lm>e8s&&Z?FyFN9j`a32;QWTorQ};484JyA5W(P> zHum+A#3{%+I27!uBNSnKJMex;R~AsC;2nZl0hl?rw8U(~ZA7nI@;kECau(r&q4Nbw zu`G>z#Mleniql|;LtHFKaRR&}m{+080uM~o9|7Y)`Ua@^M$qLZ^cg@@24c45f3b8P zU_JM17*F%ag@#mQq+vu!XppkX%q%3NL=nnJh_VurB$1J_N+qEpqr6n- z^Ki~}o$EU1eX0Nd_xpaIaXVB}mZ7>Q^YB_G0tC&baRw(Z>czG$j;8Y>yWY%;?60f9RVX=K@%R9PH7x-<#_ zQIPOxqafD6r%&zfYsMetr@OvN*uAM~2fRMEk~yEnSo3H^xI%Nr9mEx+MYrJ-NfpGv z)d-Uaw*Gtf?rou6lWABhdE5$KJLQT2fNXc)KLcs`FvTIHNFFA^atYT%YvhIr?~%&$ zD9Qrf&YLxrcC@?0>OF{^d0{g>F-7v`+xfHMhvJ7rZvz9%5sD;iJ!+g8XqX^dO7#Ol z)8oUV9^#u~5~WIs2cQjKce0n)rM>&AsT+mu&5b~gaN7R*LC_OutmtN1@>n9l7zkE_ zV4+JV=i#9P72oNflqTrFfqOia2Na;4bR6$h9$!_P)yH8iWb1mPAH`1}ocN_~!p7rA z8-MEL8$Jx~G)`0hLF^y?Ub~QXhMn1 z4{0A7HEpUkWXSX^SBhXNr>-8WiZY{o-=6BLkKU1BFm>wGMC&t0RoXS5Z@?1`r82#@tA}VfXtThd2v(wST=~NV zwd!rol3e4)Em}0l6D$H4Na|HcQnb%e59>B<-|q-#i)jyHspvCjf}6N&+h03C5&xVUzn!NpDsb#}QV?DA z>DLe3D4fJO?evV%2;IOvqzomYqek$bZ^Pnp+HZhsY z)uIj@$fr7+RI@UC&Ci*FlrR>P!n-s#zGtsqwBxscauA>Ii8;NPi;1^NI8vr=-g)aB zGF+{&w5Ym~d3lpTJ&TxD9~VUEKW=FBtx3Jd8zbHNj47$kb8cWX!7xar5ye}RCQTBk z_d4o0HtM41n#Z*zSTN?G5~vvq(@;ov+%?b*VQX91+CDI>`P!23mxu~Xt_#;x28t-( z1?r=$ih8hzxFulD@kybZ34{EkK{jWmH8JxVdg$${fQn-N$-Ka2Ll4oY30OjVC?}nM z61An3wY3q=06hfR(qhV#+dGH6nMiyf(Dg7hJS6# z&d4Z^6WF)r5f%^xF8G;(h~2mz-L8o!ap`x2Oif;)Or>z4>ZV}dNKg=TlAt1PCc@e0 z7ez!yj%o7Q3#l{+NLkrKdc9GoF7h;P>}G0*f(S{!3e{iVDaRjWW!>UM3N?_=&#UsGhkEi-+w2wPXsUGQ6gRC=VK7L%?=D$haAN7 z_3~_5!yXGmQ&LihD&45P5a0*|=#aElM%BbQ&$3qr;{%k9U0wT$3^Lzs0H0S3r;u<^ zI9r)5Mkr4{kk+V9-3F~Vt8m#z@ef~IS*{5HbC;~KckejLTB@5@UN09*T};NrF$P6J zQ(!H_UpKDhp3L>M(!P`Lb_9>9Z{Nl$E!NtZRa<*=T7#XQcA9rm0= zVk)qhIRy-O+I9Qdpjhiw)1RP~S|_N*ojc<=y?2?D(mu`qRZ%2ddd@3tS=8L;lr-zt zEAsIY5MuONwfy&nB;VS#l$D$T5moXD+<6o3#7Ca~&>axo>(DH&awI_R=r~aEx_xGX zdx1Aa;LLNg>qu^)2oN#>4Ur{gW7U;!GX)^PQjDmj-lIny|Jyxww%v8Go+4g;+)n&+ zXzJTC!H+cBe$2MQz2NRZ-8*wC-zBdg%$+4*|iz>vKntqvH_~quaOVm=KRuY*n6h@rpStEb)@+g7B!6&1D2{U zw_DCkT027IxnTFgTM(Bue0(gYPfz85y+CKoGa*motvCLtWyN?sUEN0*fRIxAXlTqO z3&^~iYJ^^n(T=yb_e7s7I$eL=Q1JG@{WVCV==XpBd3-u^IdZDTU%E7n01%RB-8fj1 zYzXIqKLUsEtJt@cSaIvtEq?MlcnizQ-w32CXPvr_F5%YPI5%u;On;Sg?m*1#3m4yD z2ra&HASp}$xXd{buCwOPkDA(|3?-$!zGHZb5uaMMYIT!tGLsrqymJ5ysML&K)|-B% zfD)+LP5Nj2G$zDmOT3nbx`V^&WPYvjndPBk zUch^=Eq|>HSd{=4MXh?L1*);H{sb za%sK#op$#e2PfXzvv;JeNkP5omI_y2Yh7>ta(l?y%jaBH1t0VZM8~K7WpUrN_^al) zj)&n?e|oS<)Wui=3Vjz?1?R(Lenz27`TpYUe)=z8jxT3;C9V^2?pe2J-T~#SDf7u;FG77||J<`(o*d<~P0zN6iObE#?2(6)oBOc2Y+285|^ZDYaQ=LeQ091 zr{+(-S%a!ei&IwA&si~R=IYAY(rTOBg_R#K`={BuT>sgy#_D&_ujM#1;EuYx^G~|~ z#xn>%fNOr&AKzQ;TlKw7JLa!-7vz^~OF#J_e8lfOiXSu7N(4+4n_V% z^l&3nkUp4@(!|N%!RICcQ3>3(F-ISZ+!z~;URRIazh}Gn?0_Px_mvNxJy7;wtmEWl z8W&HwEFx@@^%sDpNNNt%%M=+X`4kVCr*hiN=`+MX31JtNF)3zSj_dp6hTVHo-SeTq zt{Fe_GDYCcG=xcD9yX%0(d#80e9$K3?GOg+p4LDjN9kuDJ+dIT@bpS73|_x{8T$0; zRLm&HV9AB($dr<=>Vq<}&h(|<1$37jwfy5$@!6pMy1w$qme8MZ<5`T#w>_TVkF3J`=|EqgMFXiA&iLNti@0SS79 zmz{!EbG_li!)R4#@wS0Rz4~wTd#4Fy2HzVN7jG-L2;D|`@PZ48V>f7_UFoxJ|8S<$ z!8Q+v9(riH@-?F|lH8wS!`eAKfAGYgy#uWw_IPaSe8SJleXIY6)t#>@=#T3i>73-< zHN>!Ihn1JLKf8F(x%#@i!meRv!-_6K5J2+6lZX-b!*EbWA1F- z(zgD`Z?%^rtP&zxEnDsIG3r5VTLaID{07gNJEufFntgHFxmd?G<|o=sUhMSXr$@g4 zmut&MoE!S_?C!J8%5=xi`{O&fsCtY{L~XWor)F5p_7`3I z>mO>bY~I#uLQ}5^ZCjjZef4O&Q+UBRUw77wvf7Ft7r6wQnk*(u(s6 z`{63I(bCj6YOS<>vqEJLeWPJZK03cre*8i?BVl0yU)c^+l63)3Lm_z~C`H_QV zWI|UVZ6h-w>8fe#{py@u84flbl(rEsWGYFzVom_As`L!JR#+ry@A=eonCcYg|_=&S;TQG-P)isMw1B94T-6Q-e&#ImK%;dg}RJQ3I z%nis>I-`F`k4Jqvz^2vBxv^0X6Z{9ncKLPomU^T0Q_X$?8TF#~p=MzA*t=ct#oAh@ zt)gdKa_#gfJJty)9NCAu%aqzlWYWTZU@9U$6*xPz?>EEm^%5sKUvNQKvT0)E@#oh! zv9yPLpxp{ zs<>fj`!gEN_#Z1K_1@bgGho=XKEij!u4F}-EtQJg_~UOnJb&>0=TDiIQu07eKyfR4 zNemFgWO*IlH*wxy=MwpeW~u`QNcWGabgzu~>wRaz;~etFTkRhS*Cg7z^o;GixpM^t z6!7=!moFkn$3e%k%(y3?(a1LBZr`DCLu2AzEIOC-DelFob1zQC8FW6EyJ+CcboXtG zJ1oA;?~;l~A}By#GU1VV5T7hs!F?E~7_@{?_#x*)Z;=N^Pi>>D{D3oqr5qksPsF|s z|IV+lmqA*qJ~`ChCzMKnHdtLXfSzqj_~+P{j5hkj?-E|7hK5PZ9+`wu zd;*V-Z&go*OIV`N7*XMggE9>;F3Ws5IwAvHC#dIXQ21kG?d`k4&SgkeZ}br`cHWDS z7F_=OF=13d0Rqvle_3F?^d>Z&KgprTyHTf_-6?ZT&ex5!uAkp3<6_Rk)`cULmtKC@ zHB7VfPUd{jPx=JkZ!u>~X|CPXBa1Juxm4NO<-~}o(QAf%I55d0|G(1wiLl2`Jn>1H ze>XSv>jd#iL#fA@zjfofFR zu2%QsYE36WX);tiKV;l{rwG)9U^;-G6ddz`I1SU?wOqec&N_bGAU|pVerGre&Y1CH zPR=F(={rpaS)TQyFoTA+?y>W=$RC+pEMEWG@9t~0@2w}LdVYQ}Fns05zBNBDC&{@5 zM|;2!)py^#HO!WwDpW@n@jR`%X1-MfloU)4KyqOYw==P}=69V05TB5dYldRusspGy zoIkUgqil9)sC9)V2)zeQO6|$H4?)~0Q0s0;z6lc`_C@bjUAmZpAu|;>^gaaT1isy` z*9P`QWA5rq55}hF&B{;x#g`Ew0hj@KsMGoW{+y+F=i4l;gp4gvz<#;jr>Qy_RO2+V*!c3!F9{ z*Os2T$?f7~f*jawgub|5ttfM(QzQ?O?K9za{o?m9TZsUSmGW(8mmy+M#7uVHRs~ielK`0xggk~G!S(HpLzv?X!~%h`WaV}HtX%QJI(=Fc!l_+XFk+cZ zQpE%X1R&vdIc~wUtMhpjpRw72BQY=D2F8pUK4K8dc+@bkj>4Mf2-6hcGAnMTQgr~^ z3)@dPLZE>p9g!N)LvJI}0lsYw2zW0^B{4Asmlg2uMt;e&Ra8~iGiaI?Yo9@6EdjtM zw-uaTU`@{RV^e){vzYEZXZ1s?ID>G;4*oTGZ2o>C?_{9J)YMYZzS*^##)K0tz4 zf(kL1WJVy!9F;k@MMmP-(}Tz@d<(ZL>$%WeFn#f7SV3f_BoPW1B^0@aOP60-cWo#6To=E+g<}w0o#eI6!xDKf;?!v@S*$*UPhw_AYxUz z1^inezsI;ugUlZQ^$-_YsxCPk*qVqb6f7Q0&WUT(Q}Uqs2=tbrbn*y=>iTh*1R4I( zWzd3V!n!#$Y=!!eA(c)Eb$vVG>)>fEFOTusweMM`)Hop=?kBHa^)nbr`z9`cj_nugu6+K&e)lTK)IvaKO{Y6YGvaUhlu5W>U5 zWynafh{*o5ZfQn$z=&cD#pXj1WSAxNU5lwxH@;r7|E$ARpNMPM!oc zPKm=4jaN4#(W4i^-~rDi3H5naS#SE~7On@7?FKzONjC zv8XCHkKDxoV+`Cemcig_joe7z`wIm3PBLZw__Qx4OL%9!M#Ik#`Y!dckZD$wnSlp` zaF~S;4`J9N%^R;1+E^qQoRBr!v{8NLzj(4XL*BWR&x{hWvO74qSNw`4hT424an%5f z7gu2-o@6%W;HTUwYnE0eD^!(FbBm3M86RtzUsA9=Wo}f)`Z~jIu5IthI$l++-gjM^mzZ(lai98ljNosv;ppm+ zAil866ovMH}Dx-m>ytUcGOEbABubP+RTYh<6CMY-89IjuAU z->%G`_y6Mdld=nS#7Na0s-X=mdwg*&A28;%u6~&6?a0*$ddYz+L!k^PcHTL@NeHx{ z(+)}DLMNmZCu&co@})N7dOyOQZ~Re7YaG~#*Eb0?XKx?g^JZ@I4^)+mW$U`ZKYq*NIuXhOJoEa%}nW)ItRZr!Lm<@pz$_Hh&6s zp7{RYq60*DsSQwFNUElmv6?lDF{5C?l5{AV;fbX(#>pYwk;~xh3BlJbV{kTxgWY8@ z0^H>LWv{P7=$rrg%5p~TjTjj6VjWh0tuHoCy?WJ$SO8onOdt|0CG2)?85Mmxv;F&= zc*dpqGA&{P{eK3F{pznq)JB=a_!n^S066DUP>IL`&lIeuZjw=E5<;oH;p_c*zjVu~ z66OE;4`8tb)3ssxy%|Ykm{t!~bvq);mCqwdLlfW!Qt!a=;Yz`~-*vxt&E=<0pUTl7 z@5KaO$7dDp-hYwHooJ24oo8O)hz1D@=1LPz1B%^dlKh zDH@?ujQ5XxR|*J<=0UriTJ0IPl#sDDQKM#_+T{EBRN*D_k*{(G?>JpC&EEcE z?f1Tm4-9Xhm>Zu5u^C!JIEkmCGO6~ExVN&0!gA)!H0oRgc95I*V+zup>kBn_GWMQ5 zukL0D!PIN&)H?!zcoa4QtDKAWMM2mEOl-soPnh|X!p@5q7s;=QOYNpcQNxsGw+z=b zG^&6=X3`=M^!wQ+?BYU)K;p3bZ%)@14H*|PDrT}I6iIKuoO`$xF{}6QzV^WP@87#W z(5_L-dhtTmV({}*;1iPRKo#!7Z6SQl2AUzEf8jTn&eT*7+Pdg$;$|>|3vkI%D%~Q; zMk!Q${_IMc>BImWAWxcu7p|9DgqLztMezxgLWs^|1}ocyn7fI3RHVcBm&vDkRI&`1 zA?VPdN%ROpN+zjrpDCji;PJ>9&~{a6eAmxj*bq5^O+YDfqs*!^0GNg(l304_CANI| zQizhU+0~Ku+<|8mxTmMOzL7Hy-df$bFQUYEKD`hrj zMlw(XXu{9%F6(D9spPy%qV`j?CDAluh}g~dk9)~MXcM$O0-JDY1k3~o`ucRrWaF+a zanfGu`@0K|g0n5ZN-)d}>T>lxrefabN~ zIBqW=mzN_%bB3U1Av#7b2~|mX=cg>URI=^xLFg1X*$R6DuP!!7NLz``Vi(X4*d3X~0|g0Y zQi@|f`OhBnz#yj;kb8C5|^f|!I$8L<}Mg4^$fV8AIB#%Nw)-Jl)pk6)U%?O~zb2xeG z6h89ePJ5GLvg-Sj$vJRkn0HI0Mg}S2!4h>pPlxmG1or`4qeEzhdVNDU6nhRH)M%O^ z98BT)(O+BG*qDIklWHYigLLC5CcrM1`kTfiQ^1M9N(gN{P{I}C%b+E%^yPty+~s4m@Y@(A zPF#~nJ0UVbqAG2-2M~Y3vZ25@!DqKJ>ICW$^(6u6F&uh8KqGn+*ye>rMR+Nzw=)(d zp4cxzxPOlX0h4lX(?#7n5tQ`?036|Ode z5y3o8+Aco*K)1Y6qz=Ar*0R?~m6$g`Zxmx}eb_Eg8s_m|`dU5?CKFfsxD@X%r0{>e zx+va&mS}&KE!!I$>;_ZAI)Bbna>?DxaY4ACpGTP%dXh~Bh$j8RZgjwFv##a zS#tTCbf=sjhOGQxbOqgaj^BWkSUgRMa|)>7SXV)UVaT4`Sbu=;*E7 z)3gxIt^o}vrQi-_gFWK>?Ni|>lwH1>Fb_G+aLek`rg65SnjQXG+NE=6?pl!Ya0V-+ z*xB(ma?yD9YDi@$iO_Uy-La#PLAMB$h{lbObW?@cU0K$HnJn-xXrE}j6l7FJHPQoT z2MoUve2fRTWm}o~?%+sJ#7NhVdC5|9v z;-*`&t$zLbl#ya-`iN&#^EJ>H;j~IdxDZ@n-I(E#su#MG8G4I{>{!tN0q8i~djQN8 zfnF#RX6uBsGHMNli@+lAuW%KiB(|{!{DFqun%4<-&2he)n(7bNHV`H?hjAt!mk}5w z8U=b_Gq5yRW_asPDA(ilWxpNKXgyikZ1j z=3b{a6~mJbV@<82y8iBh5$hGATdzA-b@HpHWt)g8M_cvZJ9Qc~5)*Il1G-P!8Oi!E zL~Km92pR=IecQJ;Wq8OpR|!gk%>x16#-s-@i+I#}oNk6_7khXP0*Da+B0V0p3Lyfj zRag2Os!d)b9pn*6nopw$@km7=wbT9>w+MkAi1q*YJXp&NZmz9wZC zR=@S=<^=0k$~&33v8V$N`>9i!oXXnx(EK}TE#2L0Oqa^D2O}vtwVc?rnZ{%c&+|ibr-e zKDk$?WI|uh7MH{Rgwi?E@Jn1JZyjZQBh@wg9#f&JakH5egVRa}$F@75?zU~)ZkTqe zIzF`gPFg#6qf;NfhMjDuc&|ve(*s*qoe1lDyV6uWjfq~J-x@xTJM-7DO~MnH!&HrDlgoTd-kR53M*SuWRSY&95Bd~v zxLKIT=$o_KR(N70ePVLn>Q9=(N{?^@rQbo z&`GZjDUHfh8DcWa?9V*k#_@}%#n|*8o~^kh)2yX7~JwWZ)+#|F}Vlb0nvBQUmNX-vfDr^15u{sZGA_DrK2ghVeSP!(8#2TBBPJcerigPe!Dzbo8Um3DJs zd`?MWbh2vhI%0>%cwb#hD}W|M#H=ty z$QH6X2dj>WBc8z3ono>Iy%aPR<8E3A$e3)3M}X)J#M=#gas1k~HL+(K6!P#tZ8)qP z^K#saV{C-%^ zh371-DK&SS?%gwi-eiLb@C3|J4lwm_OU&UG&~DLGiJ~NWeNTvBz)ksRL>UIi-UE=a zRQ400LR~mV#LZNuVqk`e2c98tc4=a$zu!rBN7keFCzp&xyTLF>*f<|Q=8k^%7Q(f; zR_gpGyX%dLwu-xaaqEc{9n=(Cm$|%u(`vh&-|2ViN{Y)WpR~%0x#_xSvRWIX-84aL z{Mktcg8xda6|_L~vFyQM-o#x+j8un4PC8Y%oqHx+OrAZP+Jb)r0lwF-`ioy*3GOj= zGl&q7P7i(kj(9)NC-9*|%*F$zFm1i(s6)+cPJP5}r7)Il1pg@7GQk(?0C_o^Y69;p zof-IKYtUPb={+4!?`o-RWEdRdJ&%o*N2U)X>~l~av|sMxCTNtg>=_x3GJF}+PkszTzbOP$FCP$=&?UN z%I}0#bSopv^W#ZTSxrV;4;=d1p&3yt)J{6Rc;MBRlKcTp0!6EN1gizCxyif zwpetr&Dklt-xqJ2))yM5_1G4nJ54*x#j&K&x}eZ^`yjWW?jApE;}oyuENB?Iv(=Dx zJ-P)nnKVpqyLZaywpEXV7i~{@rxd^Z-JP`Mx2+C)CA4N%!-Aw zp=E!q(I^T{|9O1uq4jbZFtm6{SqZe*BHQiaGconzr)GIU;ehOsOW7p#P89K z1E2D;veV=4eR>4snh2LKx0o>Q^eVwU%L~pAhnBP?)+-_>bax*pu&qp`0ApXR{B$PE zlRm=-7?+y8Zj!oT=5#v?h4Vi@dtW_Mow~Jcja}&v@s#S)Wjj8V=qMR3iH-+;Oo)M} zpk@mwoY+M`Ng-Ya|7Ua3fJhZZ?GAo2m&H|#9OCeLVnFW0n4)KJ6@V(#3Vz0MB?XxR zGGm}=hsV_pdXkvRfQ#@C#5+s~Dv&^Uunjh>YuZ8U9MUYN9<;Aen|Er3&^e=8(<>^SMjELWD-m_)UqG*Sy3 zz8?FNM_OAh&~-4}pm3WjBhQ8n!2rimD9c<5mOURem^s=s8OpdP3f*X zXxmd7Zzd+Z5&WGm$%vc4K|94{&Wg@Ppj+CvU z_@=W6lxIVgD@TA!L`JNWy9$>BcOscg7o->G)NyL|jJwCeBJ3mR(WbDE8ZSC%j(=DJ zMjZXZJL4Ujatw%41j*g__}H9Tz_rf0E;un!hG^2WX)rR!J%BaX@lE~mu4;_S!i7T4 zAh}Cx$^w9*N4MBgUOv)ifu>{9fgzh?6!Ok4#44 z{DCaE#QKFH5u^n%$pzrxh{B^#+n;WLrxhJ3{s8QpQPYS=p;j03|@^j8JIur63i#pIiQVC1*Q3J4Tt*tYUA16$pojN;GZw zLmWcrt{A=(`XJ|iAu7n0N_a@zqP;PXa5ka86$;y_>Do~0zkdHN6z-}jZxsCa2?QOl zbL6_q8QBHInDB&Q^;SS|p|e2bl^Hh~3Ekv+@I9fBY~9*JO|34jeJp^6iX}8q$xN&a z2Ib_rfWomqc=Kate6ltPr3=R{Y6!${SwFIwB||1cx&^8#CO;ys#s#VGq@5z^lR}1_ zip)%fgGWI~3G!cM`D8u^9UCalMVm8)Z`=S=mJP_qsd@gRBcrK7WO=15t^#x4{DZfl zVD+e7y>)OWv%ueF;T_qslb-7V-KdI1?kQuJ2V0H5Ff-tR?S@59+MMiPf4=^tZbS0> z`t^BHb;BVPz^2B_JIA(pKtb$Noq`h&zfL$kwstV17GVgAhKzz%P)u*{gzuek#Mrfa zcQRK==BWxFP}T7WgytoqidnPL!Igw0#{mFqT#{JSUQRVQr@z5@83xIOjYnMY?%gfe zaYi`c36cZU4ycY-U@`^vx}S-|=*<_lj*gEP4=%7qp~#6wP|7gkpj?E%10oPA!b&p; z51=<>2|57CtWw}{SCPg@VCLci<6z3wcJlCb3^OU!(Y+dX|HXVqXR)hmAyfBx zlray&41xf(8O!%tv&~f8ZRq^DEb==Axq>Xx^Z7S`I$_Mx1<9&5SfDb(k;V!AyzKCU zgYxr~c9@-IT9irDvGb4b?f21B-&C%8ac;A@rV8i3XY}jOMz+(AQ}@q4-Ck4g>UF!0 z-H3^Ht{!~s9Gu(Xs{Lb4Yv z)wEO6dMi+A9EXkyC{830p$7kY$?GeiWyy?N;l_inL38e7cZ#A5B$=5`NB$n~6_=Ab z!6rt`__VaN2&#ZMW09$T58s{U2ny?{(}{YIe?G_h#p{z+8I(xIvT}X0 zFOy|J-?%wrkblwgN-xc=f#1@h#7C=7A8|u_$399x5>W)vm5F~6NuH`u_Mb}Z+q#u0 zC(i+JwX416A#;BUAd(2)CJf*JW+|68$%_XB#=i|JENAr}I7wDUn!n|-^WMTfzWvwg zxaHP~H!(Mw(#12-dXT=}mTnajb|0!$y4osm`0U}&K04kwd%tJ$gxkAjXrFH1CGvHE zNz^;yUJvR@y0BIqI!wS_k+;OdfOLHJ>{$#@rm(a7A7OXY)ghP7Pt4y_S!k8B~ zgYAQ(&P?-URhFP#O`Ebcvp)HVXUb?|-`-+m9qHnj_X%X?F_(+YCPx|FKkN+td}pY2{Sn3HEEI*5M>Qamaz;ArwGWRj5x{gAJCF zgvDJ$HX9P_s&B6zS<}{VVawBdn@+uSz-QiyI+st3-_!op<{95r`;?9{nEPYNt9jjy zPH=5wdLezG&H>{_Zex{7?-hB7p$N`WJzr9@4(E0Yc>q`mw$(QnEAuYo%s?!T#nxYI zSfo?%?JrP`@Pdfx9pR8v^3k0mJ5>GK~EH6 z#bSp66nY83c5TQKtz164B4hh8RT+Vvi&;O)Su%; z?3332_0`J3!(ws3!@@-@pYk`T+deGHYOzG4(^(CJ_%r?e+OK-$<(hwC)Wtc0Yq}2q z{n$ls&ZU{|Px{0?c{63x&xi_whU5&qFHh?3moSZn8X}yfQX-WSR8wK|T)cFt0wann z_`;ax$rKizCMjO%CBj7qcrk-N3J%Pn7F!d}yD6jzzG0SyFF{iny|nGjEWnRYYYHp; z|I0?jES+2>1t9|m+!7vt`Z>0suo#H3gkOY_MUvN)8chm$NP59p@n_p1pJV7}`^3{e z^N-`kb6Z(^+N36H$ia*bE-zM}Z5)!@(kI>W(f0}6eof!j<)!zc6+Pw^RCnrFx*?^a z{Mju^Wg)f5+F=?|Z0QIwc!Z6oZbJ^ikekE-SFBdezNM`XLT?OG+NS zZ1#8Y@|1%OsJ)T5!`Q$yPgD|g7((_53=DL93`#%+*#qCWQA1Az)i(b}r>@<0_#1>{ zdbALS1nZ=({N16iV$&S|nmjTJXW5$VV}pl>4Kvvw=Ihb@>g$KNdJXFtQ+pXq_2k%> zU9CqabOr89I+u%rBV-!*be+ z{$Rw2L#%>aKCzvy$ova%&-+Ivw#Pjg~wor>EUWXVSEPBns={cNI)tBqD_2$KGb$-_5!Sn798xP%lEuh;`Tdn<@ zKLz-VOTB+wrBT)`p*rJ#$jB$H^3}j%99#+Ysn4ECv%IjEy^>L(N21bqDnH%JB^KLY z3%|>8I$R{;YG!I2D!~ge((@_YJpt;+gjO33r+&_7O)gz9?wbkw~`P<;0V76-j0wMWdQ?{3Wn0{h$mvn1#v|L2pnaI zI%4((1n9nexh(Y+y#el3f3?Xdl^7#a6%A z=rY9oV^m+ICL$`~4+`0w$Svzmx-7l68>W_pg~d%^&tD=>1QivqgcONbYWm8qz@ze$ z#n%A88EM}{<$@BInpGzRJz_JMqp)j*-~fH+M)l8GjCxFwMB$`4m-$gN;3zCp`jnKq$2vj)T3T8qZ&_paNW<7}{4;6Rv1I901U(vyMfG!J-`j z(bz#PM^*+*I7&UmEBN|@(&mAy15m;0_&~ed0ld@m*{K96H z&E-Pof^Hih*wA|TrrvKwVQW7$DC-DonEJ{0!UYNz_ijc zuhA{~cShqTsx5fcy+@9`v7t|L_nnIpW9*?V3eEA}y(7@#sirt&{8`cMP?56&mzxC z7Af(8bGVR%5+Vm;8ERt{z!Sp1U`sT*J)%@f8NFb^@uv;A!XgFb48v&<6_${gy1s8}WVtuS zpUwyHl!FXago`WlGFT{_YQ8qu`jOY8zR=bHbiyyAlo3;~%#pu$5Qxr0mJ^(aj|uk* zUch6(o#@2?4g5V2CTIu^ay3_o6f!1eF84`(EpKr4<(ERrMql7aY!<^@fC-2v|7bE| zB?3zlWY|x)%~h5k$$6u^{7WtW>lbCpiVUE29`qnYv%vR#=0_lf5t@_usDMb`1ZQR9 zF49MOn~C3|Npj*}$rn=qy#|>b7n}W!8G>M8M7Lv`Y*~sVJ}EvviMj_#pjXO<^_~8# zz_s|l8~NoeQ;aPC+-{i}J3nv`Vk1yzMgd3@R3R1df0z#l?-`2{q)_lAw=sUC2EjQt z@8d^VD=rLWP|*5$Fu{AGYyX&7vTP{7mSLZaWmvQh{D(7|)-C zlsklKNdOcEB=V)To%n$WuV6%hu$#ue<`o@9_(>fl0uKOD@&jqgAIw938sHjjp+GX= zPc#Exe*S#VPopKqX`q=O%yTLZUL^`+83$0OiC~b;?}OGH_hbkWSU_{hLm8& zSMydDZL`xl^k-yZxTZfitJtu6Q*Gg+`7-u-3vfa_DP<89zfDMid(=+^z3pu{`R~L~ zfe1~lQZT*w!AB!cd}Kk3tyVE<>BEtvyu!+@7gB#UEM8gWKGeNpQU2-v%PO{8SX=+7 z8@kYc0=E*4vkUI3m-X;e-o@bLOWHcM-cx&!05E>zQ)(I4fr{<-k#XaGGqfc z_wxRH<9FFSWF@uBubv%Dp+xfj5L5m&JFiLGywU1@w%FO{yqdP&`Ep)N6QeUz=Uv$L zB2FbYHc6=$pHIMeE=k{ea(Ri}Pk1X*;sFv7w#P?U?1Dhtb;YaX!!_S~(@b`gQ5P{? zMqP|^Ma}~H&qUCKTF~aqrLnCmFhzX{Cp?&p1hY0Ak+i0 z1;mwMG3}cyx4~Zu9ZMk!=693>uh#x9l_N<5@`V*}+hyJZi#<9ukx7-bQ&77Jq_ZJP zOD-gk%N$)SmI!eZCr;cotum?VT~onknm1<$x){j|QTm^6902lHCVEG$qTx0baU;Z> z4Vs+PuPCk4uuD;iT6%_0FC__RGQm#RJ>2#b76<@=FKp)kNQE7tFw^)f(%?|SGn1na zN(Ox00IY(Ai)i_*XHno^E&TQro&uvG8Xo~%_&2y)r(x>7lXejy0)N*yq+Wo=S$gWZ zfD@PiAaj$ti2H-IF@@a0mzmG#kJ+jegHI57azGmHeDzji|D*|R6hiGbgFRj=vAc9= zm0#24-|ofE8n?Dov2*ibjVepGn|&FhV$~`Ld$HZ z0G*H!egG~yp&JteS;+4%nDC(V@$))*2?bhb zvLww7#bFXE8&Vhtayw6ja#cu(U59x|Wov!7Ikdv0+Uj!Rnepnmuox&0AU*;$? ziE?Xp?cXn_)z2$*L8|U}reswRtG`xM2rNV!&dc?ULLLpuxmu%D#bBr z!#2Tf9heCo@Z+fGgmXo$J|8{^cU>5b6utsK%^o1;ggDuWCm@9#7_5jFNuyQ2-_|~4 z3_Ih>vc5vK#B)FaDI8R(JN$UxZ{I%cZyu(xX@|!3U?2a3U$eTY-Mii_{(jfsTlJTo z88$S&`>=0Q77p}jRn|XMy=K)1t^Mh+tLUzy18h<4zI^NZz$LzB)Tc~5+0@MgDvVP{ zu2)gnpYCfhu+U<%$Cl2+e$@3nxTur9wMM(T4VvAY8+VTByMQoMGAU$fX<(0z-??XM zj4b(?(NCVMR45FsNM2+nP}^N-pJmLG#V@%sH%{ z?I8n_@qm{93P-ZC)<1JefeXk88~Uv`LksCIoSmI-;u0I0akr`VHI>FL-6;kWZME!L z&IX+s{`>OP_%uXsp+6JL}5sCSpM0z1_mS#Z()sH-PDV9>$&?9>R#_QHtX@e}`2` z<~%_%GJGIvLgDZCnt7GO1jxCA0-ftd4T-f}|JTzgXXt-=hkLK576A=4Bh`c6*FIbI z-~RU%o?$w5f^7>^GKvpes#-8|__=Kc4Go>vyy@U-a5*fe;hTbpVAT$vIwxIdz9iMM zhghTF$GhSjmxZc6U_k?}+0Nn^39ULh3$jb-KReTkbu8KXJTalvPedR%+|L z*7&sWK!jU@Xl~Eo&1wlle4?l0Bva(QGb& z&jnPHW^xHFF5GG0woc6Q#1RfiQyYlmHiAno?W9RNbsO?nUgpP(bwYVk?MPlM(M`~N zSXnXykd_W4FKhKoY~)~pQ-hJiI2AC)cHtklDE9hzfLKPOWBgZj8tkGZR&xks!Ae+k zDL;XOAf~^R?=lleJNhbLT|^upYZP|`I!MJY*d!|!BIGx66G8>BFwsHt3XN@#1O9^y z=`7CGjdnvSAf_&Sa}4wmlF2q2I?>ifyV1BuPoIh8c+SIw_;_oL@sbh*GTrD&C{6dP zQ@7sFnoBh;KJ0nqI2u@IyRI2M08f}w0Cb;Kia7I!To-b&VvQJ+ZjwMRPLYuD6L6= zo$Gvuh~0L*CMj#29v5|PP_JkE&1zX49qn`!%a$FN7-pqq`M^gtinIVMU` zq)1U0uojgjOT=a3C=U+`Akq5#$4O>p$3PZXRnQvW9qJrEx*9Ab(eyPWdy9WG&mN~R z5@ILb8%|Uci8m-@$PUIHnQ{8TAtAuU3+VC@lgJp3PDsclURUkTH-SAM8;68e! zHhB_6sQ{;tR98KmPt8qC?k`OHqxvkb8qW*iX-mDwL%v12Cl%X@1m(9$m%e9X@cCLE)wx+>NHVDc@h^Mz- z{aD6=3%VN}aHOU%k6NF8~6IW@*Nj3v>@G zzINflwy%9}ENkwTeB0W5$K}n9)9k}e>3N)gb#r4+?KXp3fCeGwTkk;Crt;9P<@G!=Nx*y_GqzN&lndd-IgPy5VQ z?ziOd)mEj7E}KSqZCZC{)b!2ED{eZL>hBFsbEF6VJ2c8Tm_p!yH3ObEGgnBudonK^ zT~vM`2}%f4GR4wwdJrCGE@bs?|JFFakQpTJ#Pl?kR;Z?8Mg4SPG zP4NTz6lh5lkBW*Ni8EAD!UW=a_cvf2CFZ=Z}~d(6Sz3lF6#Bx+EatE;zXKZKSvJ#7ddE zvdDv*D~{Y?LhT9PvfvxW0lA>MS9s;y{$5wB4HpcgxPz~T?kVYb_A-4%{b|{U^nXPq zMjAY9e>AvTd3cX<=l)e!{me!cN2}bOb^EJM-5I5>J_Ew%9J(H5VD3LB7uO010<;!m zhZa+UQgsR%$UsFzAw+wIAu0&S_IyAt%^fd*x5!tc9ungzt47mLJwqvDtXYZzQE-!& zz`lGYw9id0o;XEu&3BQ#MYOdvD8hQAe85>pRb9OSEE=Ggo{xc>Dz4foUwQ5sM&X6o zNv2R5(V;7rYMzq8F+mm1(+0>(wikXD7Z!ezs)|yP4Kvxv0dsgx{K_S4PwlQu^|mIX zZbFb@i~WZRE^ha-o!aEerYjb6S|?h}Q+yn7*Lq#D>xm0VoA;03q@$5sH{{WqLCb*- z%`vD1Am+#Pojizn2qm%{#-z2?EDhmXwCU7IHY(|bau}l4T)%#ufiQ(HZ5zy}AmzSj zM^W-J2Mb18OxDFC0CQLF7R+g@JWprsp;qHSd3rjT`Hw$>MaS?LBZd!On?3qTa(q~U zZfJ(o*-YmorJAYB4m^<@qW&aeK?pm_tiSemQf<)tqe;x~U|-5)s@%7B7?l%`wayoK zs?3$gl5-Lh6Qy_n1DmM%fFsEds$eNrJJOW#X>V!zti^a><1a&T)^2+z)!z@{0SlV{6`6 zMmb;3Xyi7f&F3P;$mT&tg;|!lfoH}!WQ<7Ost!T5?gOE##0FLC1)ojNnjxV}vNlj9HiX&&f0#63)K&QK6xKw|vna zI#SGtp}fzx_fl@lay}4TiXq!;-f?4RKXKM&mLx_K&f7vPFOSun@<5nc_gQS{nsP&I{I%?AP!rEPthA1sqj zpg|_L6uSiT$@qCf_BzI^r!K&LZymBuZ1{Ec^!UhG5hK)tjAK@0;!Q2XRf<=p4Odo_ zKZN@F7)PJ7D9#a?QgoD5h;cNU#0e^*AvlC2YCYK!X1nUFx3yiXo38B#hW3A3JtOIN z+?>k}fi1?FuWih;0~Rhk9=b%31?Ysb5l~>+KHJ!WfGeFjh!7`@ghYQ!%m9S|I)_T6 zJaRRAH_d>uW%)(ywTdQuWAJna&;~%93gjnxdvV(VmtmRZ-dx7*s`ITm{C$Vfj_jsF zquZoY6C(&hCsWL0wPRP68^A6Dx|hKuhyyTt9`7;fzUQaH%eOPXD0@__DzJIzK6J+& zc~n$qTs$cwc$h>W%6TU)l>i7VscXX=k*i5~M$*Xmu=^P*$-A~TOR(A0hPN){{;TgjqR_sRR8#Y?&bgUIL9UIPwNENyuIm4x*Y@E zBi=jswF@2-VA5+s)Sd{d`%xNQqpbQiUdGS6lU5#b*vzj(Jp-?+6X&O^H~G}Q)w`U! zA2Le*o7PNk*c_Ys#VtPP6_yM-IarH1bpS)d=(+bIj+K4bdC=_mqO3v7Uo6y5xES_r zf8Ouxx;>ZwDmQ%p*=Lx0#qZ+tB@;bH8_%27t$q5yy$6jSjI>WK^BA$NOzZp4=|M?f zO|!i0!I zc4`8x&EaJ6#693vtY|egenvkE?2;J-g zOAd?w)S2g9o@o$b#7v&X?n;@<%R?m-&BJU*Ot(0-B;{p%+XahyhrgbF|8mr%SFIw{ z20iVXXlDM_DZHn(-vy`IK)?gM_!a$awNAk86Z$f4h1dZwTfXh8XR5w<=pnJ^V*!Yg zlD2JvP#LK0gr>psGme`0&wqLTnmDG4}4=7G>9|Y zjvbJL+Y5k4KTPHv1Kb17$FfQ~ISvu>UnJN@TKgqTGM3`rIH6&ssNNMCsyVZnln{~; zs4voH7MJnn!_pg=U$q;zOEbE4#FaBUwMJ@P%o(TAeA*6=`W>`B`jqVqX|}y(5#yJ; z3l?2&v@gvO7M#FyFk%dFr=T(t0;Z5n&=HU#d;Z=|XJkA^S(?b*6S|4{5YP(Yj}y6f z>T((S)mFc)HGVUQgd~XTp ziEY4`l1yg*t#mApMi%R1A1F-$?Y1N&F1#$XCxl8KW5tU%1X*0R|FC|F9U?6u$6zeU zRJH5oYPuu^SPm2KPvU>kKbu;4XFnP68h)^0VEWmZrt5F|cVFFT@tFkY;5(@eAHAMF z>CO3;X`#QHOi|yFubpYw^kQXu?XEGgHt}Nm)!cIko;{Ei=uMo+i^5}nei6)?{gM9` zwn7d=WtRf3=tIXQjd*0AECv)p)rUgU3~$v@fEUGbn5m`7o#L7#Y@czKdymyXHR7e< zgO1g30E-^3TXYlbTJ6Z+w2&eXbR@;lYAAxj}$n&X;U2-rLB9lpSfznFc=bte~71V;A3%H}@DMua{5ahkF$ z*aI?>1!78+AY^9d$m9q38*R;4!o_+O0aC!JOo7FCj>^M0`dzfIW)`!d{&S?Flfd}1E&zo zH%|a%0vY(Oj)-8C8hUr2MCGBp#C?Z2C`l$oM+6K9C`QN<0Tbu>|FgrVY7`HOlrb2@ zf%KTIuS`B027wf|UPD;j-eadI`pr|uvTj92-^tkPMmBpi!#|gS6 zW2 zj)1v~yGp*<2Xrzpu#{9c{j+8nkUu*rZ4Uk+1Zt_B+;Q*gv z*jzTh#AXMhvgtk23YueY-}q9&+wXM$k+CWspjV;E^PfqL+m5E`%En{X_>HvH!=>GGZkTA z8H^TT-D_Q*OPvJx%D@2!YHos&Fj}X!b*3{8(?;H>yg|jqi!v(KHP>;5K0emBwn{r#VS%}aApRQ|Y)SwZn-0L(!y(y(bRM_;Un+MMiSpiKeJwjHEyT;r&^ z;X6dCY5;gLKsr!ITEUH|E*Fa0S9ne^wLUR9+(o+tGh|%m=vgRK_usk`;4$cfWCML5 zkw|?cSpj-ci$j#gyvD}2EmllGyh^Uul)ApTCIhN1!hb-`AwwyE2q-MO;8xZPiddOd zwln19q{ToB33?E$qae=s08z_pa%A3hMjX2iqkccS;4nMGs208|dy}+4*rj<3d>|~K z-Xo7*ka}Ej71NX#Mndz5-vv-PtZ_d02oxDYXbj36Lh_)*+K#RjGkhhSUw{Ni4g=Y4NgUy|Az5mzKVDaGfW~8SuOWlD?eGHB69WC+ATN zaj_pfal9q5egO4>W~%tEP(Ld{ee-P+{gP}Yn^am>RS83Wzd%kGfA5G50?Ck0$< z;C5{SKMH?(jMQnE_W^oC_wlN#Du_%X0TJ^+nE_6aSK&I?=^$>I7=^^roBPvLOduo5 z4>Cvx$qQSe65s^X3swlMM|DgLC7kl0K?BvoWLp8KYXB=RWi!yaA$t+fF-_nE3iB6r zyxb|YxMcbXl!^>lZg{|S`4kO?X^VkPhI$Kn0NMfogsjlBQzrw8CgJE9)6gAD8e$3q zK_Nyn5lHp{WaHzIN{hHa=+_2z(wvhJQ{3pJ@dFzLqZm*4DSE)1fl`?8rGV&;VyI6- zolz8!%W)`!QG^68SS_r?$QmPQ@}9v=0vOvrpqmlWiMjAa%%tf??(2h*FqsaFl=G2+ zG`z7NLxn;G6Sg2B!+^+oK)NUcmkR5ZQjcJeg9e_clf*l%wV}+-`x6-Ep|%~vB6saL zKQRJI$96a?0Q#H6zXBfiBIBTqhMdNxrd80!KYC<=hHi^#Q5=3IQLV5TY52!E51bu! z6qk_75O%kh9VE>M81x`?5;RluCz$c6|0hkPpv<}#19h>_Fil_q!e)y+i@cHNqIZ+Hu(e zA_td&0&VdiXp)5~Fz$(e`yb^HZp_&*^1u#5Km=v*06!z>0&Hc9XvMS#y9%R{m8(|= zz)Q22W!O)6v00{Q5;Tzv0 zZM49T&rP}D;~vBS0}hQ?6rk2qU8WMK2sqxXH`(PmugAej%=#0q< z9whEAYzrdE(Io3k;2 z!ocrjJNk?iy2{AUCxlxHg8%K59|SEm$b0l*Vq^c)%E3Bt$EH}wyn*Q8w5LYq1?W|{ z?xQh0evC5?#M%q)qCJ?v&Z1_gknXyg8WL1iLS3Q{(g)Lq-?qgd>k{f_I%z>{B?b|t z>d|-xLpz1PFYKUgIFR_HY&ru`N1%C72q(s{7#sY@qQhmi>s`4?rgXqJoR*r#hzY)a z{Q}NqTu5|&fU8G=GSE8VlqJdms#sK=2o(z7F?}0cdfbSh-H`VcNEKi&VW}|U>Ekb8 zxiaARAr~@4Bmh;WA!bZWpl~1tydaHUy>cZ18x-EBq&`EzOTgn{SE+l>f>zPjptq9Om6%uv*o*L#)PQ~tw>s41pqhqaWp9-W`?d4a#+lKo+11bac7HK|53t}ip*_@c#xB`3ivj# zCkR84dlgEB0=T)G^IF>4j;SsJG9gORSSlGnB179jUmnk!w0HoU0Vm-f@TrZO_Mc8R zXyfCtUf0hT3ke=>8WQtjd;l3sjlrbT0wZ_b&qvO93wE$Jof1!6xyeTdgKK!^9a)9G z=1*>{>t`p=(*h;Ub-{J59w$g7a z$Fvg^1he~1zV-olspuP>GaRZ5vzR&W-1}YqQgbC6O%^av2KtHTEM72&iU_y~9YON> z@%!Vfa6~peOp@gnUUmD{dVAl5 zvip)!yT<`HtS1t3Q|1+=rJ|tbJ$D7gG(_@<@KVWHGi%)FDY%(gDE#V!2M^}{JoxQZ z=(cVzJMw}+B$H0&%9w{K6^V$!R#LkLeQpTU{);Y9Ap+pfnZj+z{_%-Ej$ZqKw;PdF zi>B{BN5AL>q>8`&Yy^TXTdMo)N{~4LOKE|{hSqMb#~amEUH7{WG`5F6Y`T2T2go(X z?X!AKPNT(LoAes`Tx1TMUurGNEnLP?>cIc`U|GlWMK``AZ_rBXv{71lwBR;_+WeGu z5#Rk~kK5Yj*P$%O6@exRiu+3VSv+&QmBSmty{3)(xFxQUJybFI6A}#>W9eYPUJI5tjwLTGp!^_yT z3FBa{k#5uX-*nyq2G|Z*1&^4pX$YV}wjL(61dcj{ot6T9rVr`i;e->3un^3Ps_`!g zMMV*QQ{)hNWuy24g}ofCAgpKXZ}<>U(l~uo4B*g;CarjnYIr$2`vvT8;?{vBL~{!c z4#A`jAY1Gl926Q$19beK*60jy4|KqIIIzaJ1O%a}DT-=iVCop>-CuPV$K?~a3e%7j z=N!;wm|W5*6;of*6@lq=qcN=~AAB+~Kp;_dVYocV6w-G+(a@l*r`TRRWWZ8t95SeO zaY5q29njDSjTp)YAsuu-1$aIIoN4+Y*L|N~FRpxZ>)=;RpQZ}JbU(hz%Fg9^XjiJc z`QU7!q1r*mG2F#O?1%UZ{CXN~(?Nyf6M!*kMJQq(Xay=PGI`L^(^DJgvdTs~^8PWz z+9^+4j%-522FO;MaG_&hL&?HWDWL4!2N)*F3~v@>k`3XN%}59WE{_p4`YQ^IBa-sp zzZf?2VU^&{C-@Egbyc}8AbM1~spRxx_zwC;TmH9cesJrY={@4O25<%T3myT*rvcr= zu}YQ4ty>gHj!*#9GPF2IK-ys2hf9(aPAiUG9G|WMTa|*XNQDG&V`&M9eFlYIJMn$d zZ{4l6fpU=2>T$P{MFr|Ts&T&URuiPtO z3FOkO33)%DsNlT3yoe7rd2Lg$YEKfFCMRdCtQ&Au2m6r{m(j6PJ_u4d&bK%~V2ev% zb>6d-lqHxifZQ34<_OP)&>;wDh?)mWcq+!x8(>IHQzX0xVNuZ@TaAO4B17#_?LojG`vPcMLwrBRF3u zCp1kW)q)r21C2Rp+D+l0J29tN1LDOHOQ41o_z><592_(hy z;^(0;9HE~D9);qOY2#m#nLAMrVHQQvzNmt!ON0R%kZNVEN|#RM7zZ1h>t9#_ZR(Ok zabtR{00BQV^GCfv=AuC9KOIDO1!xQcZ`|1`?wcsmm*TL&P=lyvtog(>av@sC%2NTf z8AU&s>+3ea;^oLHxTl~PCsTf~?e&oq4mKM7R0f!h9!M-jcY*qVTt8HL0mj4lj53hk zqX5KVZ`Yc0mBx9{_c#A#;pwIM&0V4XwOQqR*8`hz7Og~A&s~S^vV91_mV2( zKSqy)ORq99Smv|sR)EBTygf0A(6T&?`U+<*@i#EP#6Wr?aiPCP21}HW)!_Je!e(u= z$5oSm_VHIAy{NoZiuu=3RhEsu`>v{AFBNo+0ECL31L6=IfQm_4%XxUVcrI>$)f|Dy z=?0`NA& zVq>d7r`JGPk3k%Y5NEh`K#4(mLV@qBC{YlexEEiAmL!^fIO{XO#39A@9$=n)qo2Q4 z{{ez~A8b2FTAm>N5(f=IsQDfv8__)io4kSc9DDRInidi{;IE;6!&9ND+8S9mVMM$7 zy{#q58tnP8i?Q`!eM-iE#2^O71Mdqo_0RAFAq)g6{2$pA{TEq<5K$b51$i~mg;&$Q z-{I6L0I_6bfdh>!Vu%KdBJ@Vl!)mL4;1&Q@CE1wZ1V>WYZMP4oD510m9)SmdJ{+uS zpC|CfC)5_JgM=4YvypD5xY2s6wiZWR{toRBjy=RxTtx>3ml51v#3aX}r&WSW7jGg( zyb!E2)R`cup|s)s@)O63=*pWAFH!MdYStNw@Ifs}+7M-HPh zXO3Lx>N=k@mhD{AQrBiPigkj57)|0*jt9TCoQqtRMm< z{sD9vHQRrpZo133NzY3$Im*sN%zmN|gJ%QntHNLIIoy{h!_VAGaCC4$SR@9G%ax9# zmhFtKMjMKAA21sVdnb&8u~%Q>E~@B&@)>G{4Ob<1oh*m`3`Nn(z3d*Cvr+X8S}B${ zn5a`#rnCE?XaFALx1*R%!4z1vV{;VnnGk7i%h*j@{mU)6D0 zr0Q#Qxa8Oh0opu#2qF$)onyJ6yWs(yfKo-Nivf5CF4dA{%a~fLzTw^{+6Y>3NQrT0 zRpSt2&B@eiY-%EX7uoUrk1+0!kT#r}0Clh>qY(y26MMXO+|S5SB!x3L9mg?+U+jAU zp}aWksBfgS6CAXddJ~}^_ckEATGRq4gh*Zt@tge2z+rjO^ly2WvRxkX1H&U5GtwAi zMT|8$gobwrN9kUOif9|$xR`PE=;*DT-;HCA#SC<0%CjBvVR-CkwD~HBsq93*@vYH|n+@7SiN zla`?)BD^)TQ%8f z2IoBZ;h@R9w|LP8A~b7NRa*_{gF!D%v8T+k^AN`Ha{}Uj%7%0_QxNXl{Qkk zRu8|UgGpLWS<`BgeR3D89rh(@j_s;k@b4U7v^#Kq@&z9MeHt255?N`SHD=FC@>a() z;(Lvpc%sdIDPF8_e5ObIOvc<7N|1AQ*=Z!{)cS;fu}g%=g5gMyj9VmES|wxu)vvjH!G3 z{!lN+@~4M{zCWHpc~2PdKr@cQBSuDBX6EY7L&ZS%Bj#7U>;BH}ksohPYAazIFLsmP z6jctOO;`7{vC5zrLPr3cn*4T_PkL<9X5Ldj7?Km?Jv*j()X}o<_{@hrv&DBGHU^eX z4^6zNwB3~XGFUw){Fs&1U#|ISY~N2xA{>u zB|S+&(nn`E@BL{!qUl*2qkPu9LkV3)x zDC}|1xP6uQBiSlml+C+=(3K{M3jsfXQQ^L=3quP8< zhsIaUxTa2y`HGx8TUliF^UuS;nboZxU&ln;zpT|itMehAQ>WI3JvuuvIwCpf{>*4Czx0R1p{!cxeFt+i!%q+ZjKx-Qhzo*8=lDgKI{^HJh#>JxxR3#@h6U+p7m3YS=ixk*MB-#`g*M>+p=GsGh!jXLR`BPRk%gj2J)rq{g!YIUVQF)<;Ko( z!`fKI9n4(Z8aWaYN@_fQ$UvbkHb~$&2x)iLQDUi?K$j^?j;r1i>I|wrn{+!4m-U!({W^hnPkP`!%QDUqE z&=>&=R;6ECcoonAtf2iEdXOajzoY^!xYCo1mIldajN0sR%tl^tuZfFd0dG*X`1v;l2UAj-+O`=S zcQNHX=3- zrqXye%U4|fv}q03#0Hg8sS{5OoiAxX*@P1uM+`6?1hc_I6e%03tLBEljf-Dq0>Gb=+{kQrVD5MmVWhUqs2)owCS`w4(xxzci+ zdFXNg(b*$?Dfz_<9j4H|b9O1LDr$CsL6^tGLe3WzT&SVdmxpE>j8y@O7 zYcMsP{X5hTE+pvo)JB4Kf!{+J+n_f>(gyM?`ij$!rLY9irVt?sNIgs%AiKe24qY(~ zF2GL0u+s)5KJ+H=oTvx46M_wL<`nVA9eAUzl)xJ@8R zCEyg!@BH)$@g>G-1!A6wN8mT`uVmU%T>m<~Y76Uy2kDpa^a1h5JR!Bl(1txtbuYAJ$BxN87kCequUbcidpqNK>Ps0_!q8JPF{}(_B z`CTv=uh8xjGzud>%!-MU1JYC{z$W4s06roIA5BnxpjO7~LK{d`4Y^@q3EkfRTT~Hg zE&$EQOB$dfd^-7o2V(peh!YaCM{)qo%F^;O<}pfvt&{ou>63t{36KPp z6d!1LNff@?#N#5F>5?@A5|dQMoj^6fKZHd@T*}Kk6Cf$eD4+l~G~h(KQ(-HEZ+aCI zN(hy#0bSOehDFC)P>L{00R1YlegGlWv2N`F4#NW9bwr2kZ97Yp_-CJwE8M@al<90` z^ryDlj-g*Y9ku75_TrA0Uvs6JH8V54Kj?h*p}`)Fk-TdfD=b(_aV%E+4Hg3;T=jCh#5Ak(hEmH3- zRR66bWw>Nqt1~Hb_<;JFvMVbP{d?45Vl zZ%_=;5~|s(spN8N?d_moC%y#^BJ-rGhq9$d0{w$^nK{zGc*zqiaa zB=UBo>POq(Lq{J^MX^i3sWIW%vo&~~kaJ^pN>Pjd(b>okrMj90vck$yES4j>y8f6_ z-4iCWU%2Je{Is$~S2;R*59B^TNSK8ouwidn13F&67CW$<)m;vXS5$pOv{`5>a4i6ESXjWZUjl>xyp?eNEfn4Ct5#jYnMQgBv=wVIq8bf0r{t~R zeyF&4{^9hvo07{DTSAL9G*oW;cgup;YMb+IJi(>&9C!Oq3E2gy!j6w!p1j@Xm9utr zQt&rUZo^20*oM%|*tpRHqO!TcYYSP@s^43;#V-D(IXo%6HHAfc&%@3KKOGKzYjM!I zb6-|gV=pCT52ewNCS=A`_Xj=aXn*`5xc zAAddXbmV<~_VG^H$V5^bYv!-C+`(seoJC4ZeR2$b;BE~I&$nj^cJ-5mi~$< zP19%vUy!Ys;-su;o@q>)$;h^2)el!0?qC+k zaMMfWoJ~$+XZz+x<_u)gc|>>A+O6{RQS0G|Z&K$!n7B&c`=S5m{*2w7hzAgJ7TP46 z|D`uF*7?X1k5h=fQA~|Z-y(m%f9{QE_UM&6Zx4tbWNxhx%^PmiF;%R6-%*sBl!P6; zYg*dWva8IIdwYzM!{DHXQ9?}d)-=KGIw}wIZY(wx+?wgI{>|aaQ9rNCg832;VsB1J zO4aZi?jMqls*vjBZVv9%-SN5yU^TD z5k#KWAG@VL`sMG6(f8K>P`dO0e&mfcsom);EEcbtg&*3pWjSUzu5UeD$x@ji5Rf{+ z^T?v%xEw0=)oJfOHR?@>b`*xoGycb?c-mU|b~}55w%PK*W<}*?N4f`E_lVvN^N+#~sngF=gU@BS2C zyli6M=GDz-+Am!zh?|g-dffGF-SXknQQOa)U3qY+dX7PB)jw&m_BIWSh2}e76g>^S zmbbGOr{48s-#Xc)4C?6{b*qoA*xz7R;m~(3Df*Z2PESiAq2EsZ-~Gg1Jbn68@7%(F zl?&I#v@Uk?sWBDrunD|(rQw^=$Ta^-?uXs^vFE<7eXy{z{i5u~a}f_C8M7rNhlg42 z+*h=@!lIcqbdH-d);QIRtG0oIT{%Q^Y~ZPoD)*M@9xKz-7(0*iO(zPIqIT{1DY0!kTihx~ZBy|^6)uux+(WSL%@7(UD2YFfGaAKzi8(^ic#QytDN zcc1S|x__$40@MoG#UEuae?4&Gthg~!6T~ybZ^YfwN+HK^vYsOOH?)XoCXmP;#&nhU z%Dv{UPf^|M9g`{L@L_bTR{P*O;N5{Bs4M4 z&FDH>+y^<6c;LeZ@k=>ql!cKJvpbUWi@Z~0lVbDY0yngKunH+>Vr6`c7 zQU<>tq!Yv!VxVaa#xWp#bV1-r9S1T9XAud|ih){_y9c^;_$3e-8nY}V+&jb|fl3rr zEoAH%(d8Sx2hoTsT7Lfdu$rT>92r!gC?ebi8g`(ta8Jq*jprpI`8n~9o`{r_b$VG7 zuZ((`Wf&!XxGz6{iiI!~-j42zu7=T(t!GoGwKCnYn&>UjY`~op$WZ{G>lSm=(!a#FK z^MrFqTO`#eBH;0I;0;8%5g1Xm%UGO2a>ARwvvKZ%72IKG(+}Q_@H0M;ma?Yc`Mjj{ z^O-E(3Nh^$x>8oszD^PBGjy4P;7y`=srmTv6*xc$Xok@!A7~Kxsc;jphAj=+PYUFu zPz1m;7ce%%d>yqTB8ol9p#+0c@B%G?6QV5!zc2{p%jHi%nlVdEI4@k}@L84^tuU7V zfHw=4Y!7fB#(y;x7#sj~b%8}9`E=kZ+UBlBWr98g17k}tMyR&kJ=Gfy#MGA*?vjY!`^#%|yZfI|!CtweNQaH0kH03;A7KNb;9tvbB_ict&% zepN|zbqM-v;0NSn0qmS=UO-R80K+p7tCq?z$X*C{H4L6?;A{X(HoVn&NLmEC6esTk zw_(_{5@qfJ`ap7*0*VDs3rx5vyJg?q>qg6XC0U@crA{8{MYH31#Umy2*_5BY25LNY zV!aOth;s{Vynn^J$f&Cyu>Jm_``ekd+0#3Yws=NlR0|t_(>ynk=q6fj?pCTDuA#5b ze$QAjMaKnJaVDO99GEnhkw_o*JVf1uQ4w()p)e$}F3iXTU;oA_hy#sg^yon?KxoFF zAd7cU(I|G8QnWC+Aqx+*ljv`tbMo-=qU1y{vKB90+Cvm&%qboj<==o6F4l1=d51uW zK^WArly^k^c!IK`?xcJXo|g+b|u0{;_>8 z!<1LqhOc&cZAnH(Qc`)WLDuwSq~xQ^Q?ycqMbrCgMo!<-J+{5gHms6EzNRChGGxcm z1L14D`DXrF=X`hb&Xa(<*d^$zwrp8;0Vpoms%Wjq^aE!MJ_MMFN%cW{d#d&XE1gf6h8ATXjIhvx&v4z!6t%h9&Y zQvm-MBU~6?pryv9$B{yE8F-rikVZ-GRumJn7R(zU6VP%EJlB{mZXbg>aB3%V!mw<& z#j5KZZLDkExN+sG!K$wv<>F?mTZh@4%G%lv#tem5T4?=DF3T?O8sHBcEY!l;@Y;N@ zcohF)UyE0#2VQi6yf*YIdX^z))5F_}OkInb&MZ`?of;$k{Uf$AqV($UX3dZ|oii2Ldmr(<&$+O5<4(@yxA&EZ_^RY2YA@blIQX@f z(W^Ez?NEYxPGZ=STZ)=hB?7(&7N&3X5M>H%Ra}uH;qq%^rGtdVH>KzKRnoN^>kLE_ zUwv%9d?1aN&0itCMdR6l15ZuvCu_VZwc`GK+C?L$S=lAr^{KAFA^yY`+k=AhgLotM z{XK1LS!15vlfiED#C_WS@x^^Mj>ifcLW{Ky{%F{ME+q7o7N;drEB1Av{wx;aRmtTu|_CKjqc-f5+mwg?c=K zLM)_YR)=i78{^ZV7TyqAaHwSX^Y>HigU_lKeB0vA*dU?W)*4?X8+7FWJ3G_1=Au)v zM+8hn6Yr~AT$z~L6D%`78Sf|YwT5%7@?G6f-3^bYCzZw z?r$qO=ul=czpz^4f@;F2kFy2u&C9hn)Y!Q)X*q>oG-0~U^KA?JgXPkVcKeer?5~!b z)^&PZdEmNXr)DbIJ%rky3u^U zm|u_BM$TOkIaen|7Q__qvW~6{eOW7{ckz6PWVcbPpU(ZDVE$^!UdA}7E0<0&sj9ob zY;bzN-h5GL?v;uK((UH^H~1xrN$N;cH0BL;*e%GfS=Y>B{&&pKGOH(((a_q(2?+TqX9hmUH=G|MhaFXSwZ}Qkg>YuILYHHVdtI;NYm8Bkc4dX~uI`on4t) z?W`B9^1OygL?{W%Fuy=lO&kQQYLn7RS;!{*?FB z@)1qu>CGQr<(-t+xMQxZbnNg0ewnG6v8p8g=$7o`D>Ec^-PzFPvDxC|)990_!uxej ze%ZZn zWZ&S72j6RWZt(V*bGpB$$~*ew3bGu8T9#}$F8E0CdLgKS?18#Lr`f!1g9264TMfn1 z8v?U+)1(;|?YGdmc_Db)%gdK9MP4uLS9fsuxw}~YrJT?Og-2TD6Ej|=)rAwmLo!lR zpN2f{^n;5vQJDK3_*^4%fr8q|Agr?3po1WO1m*XV8VCFb28!E-2Z^0)FapG&v~By6 ziwPqJi?^$6%V4Ajf@AR`doj+X@#n`|EbafgTAJSqRW6I<%Qt%Jw3fvyH0szxJC_7u zF_uV8A!F9pGtz`R5am3NfvK+tM4D2O!c3l{&yV@|VJ;lkob883cZindZsN zqSmLt*!yyGz2S$+GKWfS6yPW8ACL{}9gl9x_GpH;J>)YHH??AM!6VDerF|!giWsFJ z&am6JS?H<*D1~Gk%>Kv_n{1OwJ`A*zghYr++1pn9=ut5KeLOm{1f?ryz=#CN1*+N; zh}E6`rdMo^>`#=G^TaGyE?v5`xWW3Dw)wI2Sk?Z>p=Ki&XXP-3TJC1&2RDotu>SnE z+E3%IrI+eO#-OmlsifV~+c*<7-gJ%Hyd>p|1UP4asVM3K%q6$4HC?-V^3cr?t`554 zg`2xwFtq*oBvXmk>Q)KE4k-%v!ERs5$Rlg19{93h*A(lQvK2Ka~+R|ST07W5tPQaL~x z2_}4qe2*!eNN{hsLeu9QWK;<4b6}p9P_X4mM@1u-` z7u*Pj*IK5g*YHHpnNh|GJcdF3LCXmDoM1R05}yZiVy`F(5U4ezYM= z+I!vw9zjoq17DJzEY6cjuvzmV<)8XIO4XPmZ>@i9Xp)p=4d>^>qU|R?*l3@}OuW50aV< z9APr+La)9ZUMjGCSI5#Mt|D|iyWqVmj9w9*^JssO=mi$Z3%(_r?ANXREdN+Wqi~CM zZD(g9zu-HrPtp68*s?Z`%}HyG&x^PIyw72fb2eWzgxhOM^LWFP-Pt^ScGom?b-n+# zb!6czOGwfm29wwWb9)Sj$tRY4G#S7wtHBtTLfXNrylxpy#|tc7jKskL9a*sT#W3T6 z#3SDYRd2k4!jJg4M|2}0VT{68353T1MHPapg#(iX51Jo=hG5zfYZ(wnwA@+A|6q?1 z5ZPSdwHT+dX{hM0I7Mn7_W83C3UIQ6!l&chY7&gb9K!aJE+<%uh%$$qn~!rGs}UIi zBRiGf6(`M~SIQhAedVWZH(UL_d5;abcZSPt)kxO<-U9Z*e6h%fcvrc{PePgpt{6^c zZB0$+y~;Z}_-s=6j_K(o>vlfJ#sjtgmishrCSr{NQz0e;k;hcFWdz*LcS$lg9(a>xrjR%cw^@T@q1O;lX};b*zBugXik{868P)x4<% zyVvcTVOgfO*s7~*V}_dd+J^be7hf%4-O!x8GS4J8hBu$}SD@ea+hrqhx7kKLc7utw z0MiA8aVWz!0Tgk2)e^ZsUlU{I4nuYcUNo493?Thu8ha0C5(RUDafib%c0*BFml>k8 z$W;}xMS4q=9)w#d=LFEFZ5UJ$Wdnl8x4L@9{#AYEn74WCUI*q6QNkIZS|zqO0W4$@ z1e+H!JfsX#h`ZjPIhKI}3o~K-l?`#LA$wmA;};MOanAO&wtHK=XuaAq<^IQg`*Oaz z(bs2sD{9APhhZFbWYq$YqSGf%?pRBnIgZ6MlGru$E0XVc!JVNTToVjp?6hYcp~%G& z9)^uAv5j5JSfp}f4&ufFb0i7B2Hhp7wP4BhV(j z>_iMk&eowHKkOg}n}SI=!z~F*%7|!K#{3<`+AlGua%R4Kh|dhUWnmx$b_Mv;|Ndem zi`EyMaiowxI!pgk$Kf|aC_x-xMATYAZ;BNe-@odwYtp;Bb<^?>zj=&gxm?&A7PcyS z!QZ9V?{D*NXyemPODUCG@Ob3o$)9}eO1FyHSj(F_-oT0#(Y*9F$gUIAQ2JaLj#}Z_ zQ}_zHK}u5u+q4QYOB5d#fa1=<&=sqYxFHm$1S5_$u)+m)(1X-5Ml*N><21M|Ki$Pf zj1FACv_Hwl9ZGJH=Dz^*_@A%31T=|cLxL*-Pt+1jr*jCdBfS6@S0ywjIWmvQmXMsa z38H~M+j}I)6xm}H|B_L_O+_#WUV)un-$TBQ9cnzusaf8iWd#f%a5{B8GPC$cjJ-O_ zn=l}t2SV32Smg<&afDx6ax9z$gsFS=wasRw@+F513^uRJ3;23#O;&am{7N@$l(>OE zr*vdn%pra5wZlsnGnjR>7b+?pSi#Mg$y;1&UfSE^m(g%~=S~CUq$R$16nyXHK1RlB zxXP%Xy0)e2*12;zgZAo2gAc6Cx@VSc=zMnfWW3xah4aQ@7x$LN?K!>Ty0Y@uD;kao z8BZ?E0d_>|x~agLP4nxA(_}Mk20auWVZb2eF3bYgS!p>w9CB-NnbQpli8+ zQ*D3Hg6cb;UyQeY@A#QLb#+7~I{fZl+3rJnPglAg`Mzw)@Iw&^5xv(7wQW;M4{u#= zcHQ~8(FN6`N(-9YSvN@3tS%^P5V~)0(-Lqy>><8q7Mo<>Lp&=bB|^sy9LY)cc16}Z z)Q6Q2OFHC{J38Q4Ftp1D-0F&bd|)}J3PC7n53NReuvx@Ch593-c-9LPXY8L>Fqevm zPy}L(0t5jZfk1Om+fgd2KV{i*^5qr~mUw`XRh*H@9+~l^PcWCJKTiV zmGsSvVqV7)d|xOr7JvqBxc>M*2Y_8SpwRh*^LYHO;FJ+MBUB~h3 z0KZ7*!ftc(ZHpFm59i$1@X{IH&UJ)i!RmyX8yk8~?WlRQPxFF&?e^_(=;+$rCeD{Q zPbIUw>tyANlj9ezm0r-k>3mjU``Y2{Yfp~n7)h;|yme0VB-f3AOP9NktokG}IW-BL z=jD4%JvRh2R|PMeU%hU4;`hlXNsR-KpX)N7J8v_pyk-@bU+on&f26ay6?y+?Ex2~- zO(?&JB_q&*nLpmrTZiv_{~^z2dRSfRtl!H5Y=aIiP7;QBAnyXg(JZAcJXswrS zQDOh=1Ko+nzjq40&7J5i_~~pV`F!edVnDe2Rqrm@qZYc`^{p*WM~07Vkj*;1_t00K zS4A$1Y8PI$%2O>=6MWNr;|z~wM2ef&;>JpSqjm3O^92tYh1s|PGDxUfa#iT6@oxvA z%L9`y>Rz*S$=-~}pVW=GbNFqX(dq|}i%a+G@kKKh1V|^oOA%t5sb;PcHU6|Rz2EdT z>(48a!_Luu16^K?dIet{j|x9cn-tCI4X+ZDX}Iepd?u$?GpglStAXtV`^ktD_lIjN zw|y5Fjgb@h`A(bsmQfo_45XG<12(zf9t^cqIFIwW6641^=Wz@t;>~ z$FA*L#P(|K2QXbx(>*)i?1)dqoAZ)>N(tabVlv6Y@zXd4_^$WW*99rS`0^f$71E&en(b5oY*F$ zc-%fRsFL>=K8=g^GgKBD-dq{hYU#0Q)eYI_J)4nJtgFxXy6?#^&xplo zaKx?SPzk$!asI(;T{d0htMu`=%4HxO0F!kzG3SI5wcEAV4oqUQaZ{bHu?tof$? zOdNV(x$ASwYp?K6bt^~11nqv_+{mf!z!A>)K3h&H3jNPs2hWbfCpWuvopC?Qmy~2} zaoy1CQTv!mPR@RZh9XzK!of(x+-lEpBll~8M{YWK==`#7OHdXo6dKAkdZ^xhFg95! z;`SZRk+GlszaFNCerVYzZ2uv7*V%QM_j8JT(%aP2PW_6T$^Sj``)T^fkHm>RxkZ`j zc@v!0Pi_}xs$0vi{wp(4a{l7kyK(1Dea1c7$11Gb24wn;o@aYb>a7h+oBgN%?_1r> zlvH!*DQ{KJb6b3^q^VpnG52cVsDzQYRFjb_%O301s!YCo-1lT}bnYs*&CPPI7ea00 zUaDV)I`^@6&jB2#e}?Q*6CXcjFEqKGIR_8 z0?snSSEbkHg{cWozHdPR0t#%$ngltgP6afz&A8J&hr~=?+#+jBisV3lYtlGHIze3Q z2cW-4X*s9c_Sr!Sl?wwV9;$z*Tr_nf$rc&Y#gmzq*4AU7Q_t$z+p?W%d_?Art*&`( z)ll&qLYskNrtfaRInFx;Z)3sgy_ZncLqn_QH21;m{LZNDd@dV`s|yZ_rkYwREGRLvs$X$U*!>%07UK1D*k7E(kpuDAx%f>VW4b zK$aDL7)8L#dRuID>v>$s6mJdhgC#0AD9ksraC|K}o4_rk2WG2mys~a6R-M6EMwjMa z*0mm2F3LiZai*qH3N9@B;hmk!dJERI)dQ>u5wast$}p~`cMY4)j(H;@;Ubd`Ki!EkJ39J zRYP8L5X{cY%LC9MVr)%69J(1wHv(r!jB_VI68u1Pa+oplBPswH22g#0(S&l1EGB6k zpd>{#{hy->=2J6!#}!{|8V}z#f1>Xs%@Z|kskbVrT9SObKIMmFZliYgbC=UL%2R`F zq_}va)|u?=Y@*L%+f0u}6*C!fj>Div5iXDz!;xASZg1EmWPTrJ84V5MHsq$7Km|z# zlGGU>8bt+zd$N6oqZ)b_nBLN)3{y^X*nYtYU@6uKTx!s~0Bj@OC;5C~X6=b=o19a{ z;P2umL*$Ec<+{LCm2jbX*W=?U90Ml*34m1yYcV?W`82T7e{G=wEU>QIT>+uz8>kaL zn9lvt1J@iJefWZqdK06bZEKbprc2VR^{3{IcYfjp>!fMHk3h1YIBFw z)deAsLf!=VSpd%XKovH)*5q`6wSa{g0MGrw>=BRM=oCj_HXDhxNe0Q}1BATDY^!QY zzQIsD9PU2YA^0{J>2$iuPC*4Y1?1u#)z0{ccnxHs4A*-UfbT(+EQcNyW(yQyMvn$o z;u(eGhG^Gm5d$~uIy15K5ATM{-+YHw6`J@MG~Bl^a0q{nM*2f+zv|(`n?O~dBnL`) z1XOceBKjGI=2JaE>~aNt46ICnF_?b-}S7hz@auTs-@GEA3YRKxkOd;JLsZc?=BsqXpJ5Q~cyJH$%>F^kcBs zK==d(`7l)#MwL&~k(qnpTy9uX%v5-we8+D*FhM0Zgr~ffG4CrXfo9X*D%~A2;pZO<9D*;`bcAfAeKDIu~g3 zaht^4VnnjQ91_~*0g1!Q#yJ~Xo^6;;=Gz$cVqsyMmRm@W^44CX#x@s5Ho4zH2)#589rQtaT!4tdqiLVN~u}RxNE)<54;=6S^%1ZliJI0KmeV)DRvBO zg(RRWq$I!NscfsJ90o9y=JLu9W?)CIU(Lm}y3ZB@TQefK&x^2f(8n7q=l^1Xkj znL5KJhh+PdHh|c0_ji;999T}9M#V5$AYu*P}$&kf2=-_6?g@)9iW4%fC`r@=ghODYFo{gY{lJj)j8AjW4UPt$qU9jrg)bEY zZ3vv0hor!GC&1?b`XtWOp83&yL=?xP#bMZFa#jq(BQ8`6t4Y0Qf6!%(meWM{xoCH{G@oMFNFb0|oyAck2=ilHk?@HdpR9wRWdykT&qB za!j<~`UzT8h>ApbK5AUQzVP@8V{cWq?e@OM? z6kRzqg9%2d&5kSyuvtL8zq$mu5YFd>u56 zRZ4ISI-Z^Tkr($bY9k!}h>U^DA(z2Te0@aep4hQAH!Lvk-t38Mau2TlW($GgUE!7u zw>hdC@>#xG`0M*z4fuPY)4C@2O25CxdKE0JLAJ31Xel;SjVcA%or`sikKOp~{9u8@ z9Gm~phezp33`?1rb5ivk&ZyM}Vnw9;HcXUaiUE6u2hciya;sPGX!9&`#PRY5D-pRL zUy!IcZ7S6t_{6M~5zqP-m=tr*H+NJB`fKa%O;#3`_2<}>>M4~LR-m1_hP}O{r=a`F zaKp%_&Nb7)vOnCdV=q{#+{lsPaJ>C`=$`Q9yxuh+_q`f$d#ZBnm$!DSog_Fu0HbOH z+f9}!9f6*o+{AE0tN^L2s&C`gt=Aw20ro2H8Qj=EF@C|j;#~a8fj-!rz(Twh>DIuI zio;JZGtH@q=S%l;RO=?&ddjEWk(R&u@Pf2}F|)C6@DGvPk%C`ZF+AeI3yrz!B^@Kj z@$I054l&7W+I_)r?$qF}kAF%ZfjN`%C4-p|}P#0{8>B!>F4E8`-Dz^DP)&JgRskeWc1dx$5ik?u{=$tPUtw z4k=T-lN7z~?mCUe#>d5<)NP+_wF>twuiwZJc#qOJXJ;ph|G}&g?Scn99z5|svdlz# z1J;W#hF958-x9A8V>%e2u z(E*Hx(%zY@Y)}LMIGo+IK(VNb!DFj|fq}JaLp4-*HIScK7(96Pj3nsucIFzk0`oqKr10)*w*Ppw^^7yI9E( z@`M9}4bUTA6PTrVMpGDAmH}#}oMnm}fzt`4c#|I{ie(90S2wqsYM_9!%8o&~ibqV( z4G{GSV9iL-(1|@d{ATL)t5@3~J;W(W5$|vo?2gnkspVWqwGo18Qe`+%8Ws@Th)*nm zBv4f6zW0Rbsx0{Vd@1fygmq%DY(dyJDgn$C=M7`1*gZ5f7w%mD2$7O_eGrUBz`ejG zXg3OXDks3rj6s8Z^-gl}s}o|A}|go`*L_M~Z)82^Es8xHR@i?y-OhaeBe5i$;Zj zWboH8#hQY6n(PWu6`=Oi(IxIdOb|>c8qDiu-M*6V2@(Or#}^&d*ROyin$q+ztPnzf zj+?LBC4UlyB(kX^tV%J3f$cnH7n31Z&3-myGQX#1T=1DHR?uQkZD7Nw6?G4Ju~LvY z21umbMtgwU8;2WK=f>T;dC)^+*`uQA1}}oHP`DczEM18H?H?450KqXtoSG<}Q-|9h zI0-Q$jTn}ZuSW$&H2@s!B~E%j(%-^K_LgTSioUv|O8t1QrqE-lIrLH1fc^b zPX!vTi#XSCE>T7pC6va=%rC*`GJvla)JD_o8S3kYT?`tz0=Ky8UXpiDj`eS0y{xqE z{^5!}vo7m76Ss_vR_NcW7UE&eYizr8bMhIgYszkbe~>cx5diuz>cOQ`hN^(Pw&4^B z=wdtm1bFq7-i~NWOc!W|2Z*)4x0#-?v&3CO2GZ^e0Nb?gHj;UF3 zYJg?EqnQ3+*Qd_$#_|_6V?oXijz2&3C{*zc`G=m7$;>SutmEc#`h2>HLe-7Ln-0H8 zmV-SkoQ&WOcl5!JeQ3hsCX)0ZlS6lgmC*}P_dUoraAuREFO4~g*c2N2rq2atx(Itr z1oMgB9BhgJmms{G-SwXD(Cw;>^3C(auLTCb>Re;`Kxk^EMO~NE><-Qy83OIixKIV) zM(LDqG^brVEgtZ#{aGva-t~wGx6M6uN-MqY!3tt{(c)I2jg<j5I_4+T;;}>hHjRR<3|hK3qH$7?>===Vg0jJQL8jKG%dJL?}50I zpYQ3hTV!G3l2hT46%V(`#1pVuKMl>}w6(<~whgobNxcNmJ?f7n0<&IBI4}BfZ~sR*u*{Zo za4bf?CSdBJ(G3hMB znT$MQ@}wmX1B%N4GlVWA97kwitPuSiCC9QJFSp}n5Z*|Ye(a-W-fCf&#oI5=Y_HrS z9h!OHp|a=eOxdlwY6^QiuN#;0^=RC=l$sh-?u82p*IPf5UZ|!6g!KihDwGdvUyoM+%z;?c=oVG`TUIgJ9%_+m*&+nTK6v zi85057-T6)))Jz{R`#rutW%1avPV+c(#R4M6Czn!ltx5Cma?=;NOrQNJcA-a5%0O0 z`S!kF-}%(<(e&J&=f3~fb)9prbLPlBZJWOwaMD^V!d^E@qG$jT>g?a2vadw|w|{uF zooh)?ILorZX|)X-bJoj zwXYx0KnAkKK!6}I3ir-L@qI2J#0H;ZxJJzgT{%@_S$NaC#L`@HC#cpl2Yz(@i>n9c3 zm;L0>#fy_su6`yz5it0Bkwo2c(c;wPWH*d(A^c4|HA7+o+G?y})4m;F)G7uT69GUT zT4S2aJG2*%%q^=b)?v@y*%%~W_AH|9nQ^?7yG&1KxAD0fJH=;98$W74k+884=brCg z^+kWuX+|fxZaHs$CT@_C^Y`=I54Tru^e>Kx*I$;pV$+*#-QBGlMLNbRof{@ok1CY6 z3IZYRdV&mx>W6!9p(;U+@Y?LO#zJ2Yph5l2HjV~t* zHwJ$HI?azTqzcF0bu09?A6dXU{}0XB3?>DrR>`hA%{1Hk{LJgllo~sk(jw~!JX-b~ z@;Mp>Z;&2eegPDXePEt)Ry9l3f|JC()4u79&2Cs0fD ziz_jA-mtaDP2*zw9(Z9E8q@QFY>4gS#~P6)@xP6P9H1jc3RPa z&X}mCfBo!eB@X^ArjX#F?*>5%$193Mf<$E*T4mHL+LMB>51>QHOA_E9h`~uIwVtRN z=%XmI7$g&7W6JYiQay`_o>p`4xVR^nxhY6Pj%({-Hm>n zy~Z}(DNfF4&ppoDxi%XS#6XsJ*gg`)W*UY?asdbV`1<`8N(zM0B^m4CNF)#RQBfF;5S`0|JtXnKG?bty?}_E(IZ<(@hxIKK&q$nN2+K8X zQ3_oyy~OZyh^%IPhVFFVx7c-T`roeRxc<`5cNPQ{-fti94DzqSRiWSi9PKn82K)v_ zfzPiQY}&3z%q3`GO3s0y2#LrB1_lUU$3_@|@aPVdanwR6q4mHTVs=oQ`!pevB<6H}U{sUg8wd{jNa*IpI zs}kKFiQ=G|&PLiWX~l@N!m%=rL5A{(DUt`8c3p^qO-xK64kY}aUWD`x6ofN$c`hz4 zjgY-z&;nGsX^i*wCwxZBeZGECYuNsRjoEbDs8GNbzKEHGfabJorwf>vX4IwMV^+eE zw-#%DI9UlxMRg%XF;Gnm7I5|=756eO5i%3UyF$Q!Udn)&8n|SmWv``uNVu`0A;#z8 z1OHa+WWw&er03(O!MF2r+&DGp)9}yV8!NdT$WPeYL@D$B%PsGWQ>ELye!G=PjJ?+g`E3c9PY@PURo< zjh*pQ{l_$lN}smw`k2dV6@N`NQTT0oMOV?4vMCSW%o!H^`i4y(Mb|UAGPhS)FjiGm zifzhzx`F#%y8n#YlD*dUrt5FY#%H-PlF_7%`}Wzb$ezBsFL@O^%MKOYtYSRw_jvwm z;KIF@vn<`U?Q3GIkaB^PjXjR3h6H~FE`|$pfwqyh2AjRdR?!yLtm!fwo0q(Vsyhn8 zJQ{^|v1Qlj*nHh>wSQ%^U@pSGYXssiFCI z{uF!B&m#{X?QUCTz1-RDX)n*u$x*}~xu^Ma^uFS%NtJ$Q^0@qs(yJav>lW2Z26XMc zJ_h|qFExZ8sPm6a%&l%?T9>A<>WShDVY9uzYV9gqVNvZVt~#5eI=AM$K1w@G-c|xx zz%l?YrXDGS{Y}3b#CKjZyOJ7ztC=w#pb4>X1ioOb1~PSC^S%GpDX&ekP8pc)bu2of z?LVk|>E7T8j8B)DJc`Rq?r3IMU-PWU#eDu4PXW`ISLtR(*u<8Q^zF&pm1cN^8q=rB zlVm)*P4ia{yBthCeN5x$k+wW)gy1UG@1-`|k{5IqI=KUP0qjQ zfI#?}XPxvAoIX5-;0wd6*TnLRwKeFRuBj{ZRVMjw;!?M7ls?M7&Oy+2D7{JDMRsoa z{Xy3dUx5g8Sm1L2?T_PWhwBBo!~*DXg>gDb0nmHo!xNllBs{Z(pb0#jWhG(-0|YYS z9RnHCWatU~32;SVEMfr7usIZfhaA7w0Jx}rtg5cZAOr9!5>y(AR>7`-ks=W=Xgx|p z#iGPh5FxZXfCE5tw(krr15gIp<;%thIiOq*Mq?&(oaSeC7$-ZUgC!{~hVY_#t8muKn{!yb_0=H@1mcm!$c{8D@(Kp)YbXTnsS;5L$k5a{T%@HvT2LSo1v z@8#y_e?sbKoHg*YV@9XA+HVKz(j|>t{eMXb@hQrN>Ry^_mi&BJ<7`arQRO1`?Ci1m z^tz!e+`5!9NdFXIzF4q}z|3$?VZ9^;mgsKO zll&+l5(6i3pva%cC`!SxFsogCrb_%hnyV!^HW)T(&otPl8L{;or7aAX#7#r{IxJo{ zXqx$1YGrO`%VN%}9$a|P_8WW+QMM_T1pF+7?0|v*s1IQCNm5QO2JQl%=O-HqL9$@a z9A%2+7jpI`+(~s%&mc6Ag|>#>p=b!6Wrkh_3q3zfxp9~?Z;Dn206^|*1P5ZZEDl&0 z`3aK6JW6*|)?PTdp(p^U!A}qvL%z%~o~LIHz5$kyS^-NZaeG0*=aUb<;}m{+?lWW* zi(HBhr&Kr!&E%xNY4D3jg~!A|jexwv0~{=i31i-Yl5FMtb#N{k8Ct;-Hd*?&_LH3D`e#Ddozyx~Am;4! zeD~%u@fSN{I2;zMt-WXZd>)M7ykawV^Fyw7@%`r|jgy|$Wob_bn{2vwAVM2P0xx;Y zGq? z%4!R{B$g(4mpvLQRkrS{7`O;!0me=!sJJV27FmB3)Moj9EAtEHjl!?=l}f8V`p=sc zyiwSiu*b`r%G_ACgZJgtt7Sz+xbh}aJ_Orz)_BMA-KFMtLuHyDo5c6MXtPhPIvewU z%mW5xAJq5^dM)@rj`C(lt+4)Le`-B&j#&=xONWN6cn#uA6$X6*^UKy;kQU-wxz2%U zwe#_=3*o2#z~2$_GQf2;JrCryy^-;|0)sX9M%IStSG$x1c?HbhJH1w)vN^?B)t)AC zg9ef*BDf?rph>w?p48#7iWQ@nargA;E3rctkbf;>Z18*d0stmLpwydcFWsB2(+`KIc$nJa=B6l+e7`^QVD zFNs5+uJhky4-sJRY>*DTEE{FI_V!UeyH_tCGrU*3no3F!uxXzTyIFL2uX~T)nL)+f zMps<-R(B1%XvxPFn!K7t;}1hdI(YK)^P``H1fJ#DAJ&D;KOFBM34YH5(S-^Kd+={n zwF!pt;ihdq+w4{>KE7X!)za;!1cAJw$AboC0Ei*bs|!d}g&{kvJoU|aaayCTpRYP? zi>76_yzJ%G%Wrz!oO0S+dRdBPdQd>H0lZCm@*J`eA@IIp!yw# zRSFX&D#0~_)Ez-^kSoMCB8eyP?-5%8{N^w^0|@&)9)9VWkj8)|W6R zQi%ZU6)IOp8F=8yI8Lq%?K}B?K+9BU&8T#{1HaUxqcN;~vysL&L6uQ+V#(+8l#(ms zS0rUGP1_$UoX4{bBL~H(EOpwZkKl|hvLM18@EL9#WTlRhegfOKgx{K_Z>LinTSQDS zq{01$Qt69n0qZbi{0|xfv=}BAb!bm9kD#JqgPB?x&x$YnXjRG04St~$gHNFgqg_dm zkI^tpPXNL<2}2J{N5@zAAr?!dk-}|ljr`Pu2yC5)ll~A)M#;XL5{4zn)JhfWzDbZ zQ}YSCMshfU_z*yOQ>M-`5KQ#9B0(0ROp|U0^E_I9K!=3B7k2!8+C1Q76vU(uTS6vt ze;gX-#|T+w0ulJAT2O3ca4!8hMsraag;#>O(AI*tE#Fvg_Og= zWl+8y7J^`o3lUsXd;8530(=4jB&CDGO9u@J?TVr8u(GmZ+H_x(KbjS@5mo^W9UZUO zh@Zg9V2b4jl-mnL_oYb!jMAxEsky z2Mm=4?oYa5(R`9_(axjvEN#Kky^c4T|Nb3>6)bXMuy2W55|UmJ+xP<>$m4jhp;~3e zr-&yeJWB>Qydu1BVG95O2JY6}Hb8YCSgVh!4*HiBJx+zZ2CXzqm)Tn9RgO?5-V zsKX;v25=oD0fv4OM&1Y;48d3c8Q>$vFdvcqE> zv#*vcD2|wY|0Dhn&J+jJZc#->RU3C*ZS99)q0`&AidR@|&DCnPd+Pn5$3s&zPL=bx zMw(1iR>dbTwas^rmGzX^-%;K8`t3~l#_ryGh6^T%B9JG`IhG41)#*V#WTrX6f_Lql z%l+k6#qIY31!Ha%?jycM9tTHS+-(!#SVO0Sn>a zx|5A>_;X~R8|0I!@)2{+?-62d zo!7T2RzQ=6E(N$5&cbg^PxJx@cN!TQg7`y~fugeco6fGcJ9Z{G!N=q zcWu?2cM>_m6zXZ(gl%43ZVI&AsYO2)})?6E8eq@ z#maXdI?Y_+c`_#UxTZ-jqj(ZrC}ceq&iVJ+rk7UU`Sb0A(bn1OMzh_urR~;fin!9)kV=l^EL3 z6Oh-_NDExrAigzq4&!E#k5^;7VSA@Uwb4kJxMTUi2=2qCFE=FqIi_JUU;g3uP3PWD zLN*9^B`PZ5v5h$|{Iq5<{-5g_t8`hy1)yrOui!}rpyy}jfV6BqyRPiaapjHPhKIkI zS3k+KX+H7#&Ez!3Ka|({lh06d(4HXR2K4|>Jr;*ckQg$I=?(S-gb-jS`cLq+Py+0M zHfD3gZr}*iy+K=pfu}KC83i(UajqA;EkF+RAuqtZcnIwk23{xv>!6P&7y;)n4R=7w zub}K$LdpUyjset)Xe4#=+TiU=X)Y&_V)^eDM=XjhiKcLt=tW%xQvWjZfrO>I@7=s> zu~F;R&rGuqemWy5bcNgSpG}1ZqAIK{rz;!IqeT!4o>wA135ije<>i+FSJ4&*6EIkU zTye>yG=bEMgledla2sj;qYGkb)YS>}RQX6j2GCG6gJyt0Y+U!A_*(1&aolV77tuJj z=Qd>|xsjF&u7^LwIlVtdSCa6PNeqrV@)<eP)os_`V0(1;vt(y%0w-=XBZQp>QdfD&}3>aC0(PXpoC+b(B=5Y?fqJ;No0me zV*0?VL$NUpi|w1Hz;2}&&6fk!LBT8)o$<7(mrm^o1!JEap^o~ z+)t0j76MyrKK)zF${ zXl^d+4q&=nr*o#}e7#>~vRaxcibx2*Fh|03U9>?^3Bc7*8KKJ=hx(zGGoIuYLx5M~ zfwU%#d88pCzqKf=?5#UgBj}ip83{YcLkL~eudx&A3S0;7MzIixz6P*24IZrXvMX9A z_s)-F4iD_*5uI?aGfBe85J-m&Ye0o#zg5xs^Q`(tvLM#@+Q z%R@pOZ6u`(e7#~~VpwKP53G|mcwK!Nx6l#{z_5Tu;`#ak$NgWYCEj$FyeyNMa+n&GKW6Wlaq5UlQM$^1WUY>0+;Y=bQCD-m zM})r!?($BMGKh|wmw!B}{nW42zW3`1768}L{?flX?GbMaqruG z$jHcfI6LEvb@rZf&EJaEP*cFhAjg1%gTqz?%4)&E!K=YO&1fk9UCA;lhl8VqQt<+k^=oV51`@nxocYgp6t^1${%1_yZ$k}SQA<{_e7C6vWu$!Gzm|{( z5upB@n2s(TFGZUHKAGb-%O;t~hTf)yflIx2PkVVTV=Z!&_EKkaYFl>4F$Bf7hI?*xc(<#O4*<1nS9Dxx7|{ok3@3GqSQO$HtWA7ZyGU z2ZRQvD<($ntbBwdbh($vdUH^B@yG9u74)K&T9 zjm45no9(JogFc+`?wUy?0;3v|cSb9$=aJLb$w6RJuvQm=1+Srhc&uyz0h{F-66rPG z7SbVGG*rdZw0)?kS^37qQ8y2eX;BsP)l+3K^`Y`IC%3M6AWBr6|MRVyK3KtWPOL)X zcja}lexKxz%FDy-LQ>t*@Mv3yC4R#X>`7nFh|+C2;@=DWY*h1wmswF!7~6e$-`c{| zU?=MQjw*)#U&q_iguiz53Yzt?wr%OlA-#n%(KXp%+6q%~Q zjb;)aR5nD!#5qSE?(Wx<0-K~^x%hXWp#-uO``Y@$!s!>~Og1i?r53<;tk=rZXWR=TK&Wuv)s#rZ#JbPs zdJpsFs;>p#N0AMLMYG_ScJU(4pIDZCo4gnjqkY{)3okO8+`s?bH(L$Y=r@|~1)~wL zNTSF7QsZxE4|g!x5aVQpbZ@fjsm@gvbd1hdq0js6JSkE2`iDZpgA(%yHBG%WPCR7d z2A^x{GL&i{4UwSSp7*5#`Cx9IFeO~%>+$E9u6Grztn|fpj=Ex1oP-IFxMbWAHEv*o zg0pGvRDff(E%7hUdk$ZvakPVn>2a^c)nCH)mB#Z!0px2u+BpYOux0dq&}cZ@YLxS7 z$t6zDeSUt9;hshO;7G##Hf{V)8`Q2+5OA4y*4?45uji-H@x4>4jA_2gC)%_3PCMg4 zLV~%m}dx-75DhUhF47%LEUv~Gc^vongc(07k) z_6$rQ@%C~StSYkNevdQ2!oi`JOf9Bj2p*Z1c&jTE^UrmE@4wOps#x##I;tpF&LXdF za#(EeBKXs>8B|-AEN)a;=vM=<8R4uoDKKg-(%PTwK!$zK<{~ELviaPOz zhLXP7;bQi8e?QNsgkIa#ERih3cW(^SIUp(A)UjiOoPf)q#jFx zM@)%n+yd$!?GDairPJ$-Tp;LH>b+zUEu68I1RvB<>l&z~EOQ?DT!V!=$H9aB*T7du zH*Uy5SC`_qM^VP%u+aSBZ;mQuT$bNyG+7`y8=diStCf1Q3MP&!&AYJT2I11)!pAm) z9a~+8rwvW2R^_A>8zkaHKdUsZIGwQF>x*F;3J@r<`3SS7YOONsdp*>tGJ-eQuwFb* ztJcZi#=+FhI9?fY36$gvFe*jAviDjL_w{>ua)0snj69WS4~Oj%3*8dBA4ty+D#|eV z+@$JZ+dz$#_mt)t2SDul!hP}+wcaL~1y!qdl6V27UY{D-qi>MTbf9L1Qg3H9lB!9>+x)5vh7rU^|biY1YSD9VI{#H z38eS!d0*lYRz8gd-YcVcnAS1mPnYAId2eT(`_zFiH;aBp^&MCx`Q9s_758!Wo9%c` z@)k0QpdK8-Ex4=vyAA(oJo@PnJ0{g!h%#sI9Jnx$f0x(y(pnoOmBuS%_r3oxmCxKk zWl=-#-Nq-MHMi(Y_D{Bl$bU{@)fa_U-55y1`uF?W>(gE!ST@C=n#Aj2hvv=h5Ph^+ zP$h?3?sL9dRA<)Xg-W5!gGBIpsxf0VbO)-gWD= zcx^b2@CXnB+?MJFG&Q6RmUx8($tn52KI|tx4i*R8t^0V*stU|6XOqS(G*~mH@8L0P zY1{e%)dNgR%-#*(%+Fz9uX4*^#?w7I%NtBTf6qD%aLAz!=+j|k-Cp@@o`lhY*mZS6 zOztZuVDh}CwSMOuTfu?uFo?eHdH54k2TTY(^B&iBa%xKwG(^g73x0drOw{3Z-IA0+ zs>S<#-rt$~u~DAp)u1|GrB8Uj9F$zolSm}&q^M&kp+{EgfB8&ZvElR9A**njT`T#q zN?=&`Fr~Houyb1ZdRrjl(MGDii@4(GpT)_|;PAMv>CtTX{`K$qH=|O{%DKbz&D~lL zQ^_aXDQ?2MCaTMXSimkWdG%KlJzyVO6*Pp}P}mw+LH$@I8|_q7?~rs{HG6kj{K?F$ zZopgoMnf__Zs)^D=9qmz*U=ou=qexmA6TX5O6cEKi})`L83n>6#}4d`fLVv{fVN$0=&X%rfVwg8du$wnmz zDL@FC#t{rO)OqQ$Aw_q5+Q{*H9Vc+wWR>Z@o96cxpIbVf;B}e-$drAaM+@~@Xo*o< z5i{#{%m9tG&zB?tG3ScV=em7dt{x6=uu11{W2m6lE7?j{39Zp2hey@AV=9>M#fav{ zlt3NzEeu6IG)RFfg%5sbl^9;5xGZ>RplPQTKFeJUF}EQ7mzznt^=qS)cXd_s7u{_< z)1)nO6}Ie{wSmr(Zf26rUnG}v;3K7%$jf4H(Z=?N6Y%G}d%4@alG*;+>f3<~jSb2A z2St$Q%4E8Ho!9mS7Vl28OTv!9k6x;aoS5|Tkwv|16`PI)^$p1VvU&H1D-pg4ez7$| zU(UC>g4+HqHJ8nBr-LOkNJ*B20m2M=b7!|Fs}#iZ1l(GCvCM^buY1BV*Nwq1wT52+ za_=^fG2huOn)vX^M(fy(%L~iUOSVL0gEvTn=Q3L0_7H%X7wBY#0hgm)Fk#WY?!B6G zp}72Y>RLn=Wrog;?(at6-MZIw+aBZCpFno5*58+Ez&<>Inr_ ztLfm^)&^|HPa@lnh~~7#88PJs4U=0~j#0;YBAuInbyfDer+-lusbCQmlG ziGUcpVR1vh^D-@yw=r&Zme_v@y%^UU$;3v6WC9c%&(pn*kZ0$8;};kA@(oJ;hQdfG zD;n9pb}x%94&!gX>z<#^`uZLwy0jRrhM+N1R2xz|`<(i6s>U*Yw*UGh^m0`*<5s?T zA7qt_Y#NqSD`y^5QF#zyJ@Q$I*Z4GW1lYzpfAPwR8>18U|MES^5RacJGVU-tX|1}z z^uET}Os#f4HMOZhtfhCEbfv~aLnsHn_sXi=``}Z_OUER4J4>xi>u_aUla4WCYv<3W z+q2w;N^w?QU)5L)cZ9B&`i#TWO0+>i*Ll@{w|v+b(FZv!alPLGc0D zP7`>YLZ*E@bk(CS@iLcgRW2&|R;*-&L(XTP?)?41mY%HCNai1B&v{t$c*~5(Ue0H7 z5NS0@H*?WR`=aTd&pSlSZf}b4s-_DM8@4U_-4*Bo7xw#n^Uqt)r)098K z9pZR1K`>Czn+QG!b{|d}YNY&dhrS$UQ~ZvL%T}r_U1_n(9h$D6nZBxN*Uj>jsnaG| ztWl8CfcM_km!0d-2By7Rus6T+R5j75J^QR*8>lAf@014O&&2X)`T>z$*GAl+nazrr zuha(0*=V-r73Cc)h7sdib<|bGR=e!;zI^O9BHUZFGuXt^{@m~rMa0)4acHte^KPK{ zmKt2Hh-uI3XWM?eCafJOTz*hnoss*AXr`DNMBXA7Wy?{o>n*$&QY`*b4()l`qCTjY z;>nCkJn;sB=DslzTR%;Hei4r5wY5!DVlAr>6Mra&0{@9P<&3?ag$w%zG34BcEr zU|doAI~Uj#X00)Si6T1rrABg1mS_iVW5~zkvA(M6XuhN8S0lv)dcpZKS)uTe>(Zd( zh5f`CyZT0B8R`ho{Qj9fW}kl44I4@|Ekh7>e7uJ*@)VFP3lyrF3rN-(V@eFf?XGnm zTBtLupbUb8zTe4ksHV5Eu=>jbBw|T(8|aqKUl5P|D!rVIQ-ydF4rD3nl=96+io&I7 zU@rVJ032L2_L#KanZ#ob%6H0ATfxZ|#bX>yQ_8L$1UV_;;5ZRi-6o6OW^;5ObGP^vepTCCtEv~|DOq_8j-Gu8<9ImWUp~5U8f{sb%`h_OmM{k`Ru7d|nC}3WI>e2g? zttO!X`4K*5r3OQOwW5dpiLyK%V~vRLpDQzLx0v@b7|8j&+gn?|`J1PXqcQF-CKPzx z9)=%(-Zqji^Sn#u|DzWD73~=4D2U%HWyJBi=R=X(!4*oRY6r+e_?FAy5@c~i_nb6+ zvHml9datkzG{ZJBJK~Q=oJM}Acu!qqLEnHY8ePS{UB5`|xH1zZJHm@9dxBRWlU<+K zvqB{KDNT@Jxx)F13Gc;<>_t_=0UrR$nf9*!F^BbXL`yQg;?7~(KuB0Xl*RCSYT2Y*LAPO z9E0OM1b53Bx*N(6JIDOnM)U#tSX5@u+1GQji$4rRAdG)`(bRq;);>xoP70JFCFSg~ zwg;CHN^Xg+q}50h9_lSo4_XTP`vpNW^0vMgjXfdnt1L z!_AolIP7B$ig7di4Q9}@+SSODD~y#vA=LYFxwV|YU)?k;Wbn}-MFS`a&V7lBt%8^| z&rLh=|I;bByzRCyBnJ4fQ49nhC}rxx^;{);-5=-cy^>V^Wr1XK7fURBd(;9bFJ z)z7nC^EO!we0&;}0c567-Fl$#ML#M{_U)dZ$i+i~H9kY)x97|8#82oEgC5{_>Oz0h z`BV_D@u%q(8yKguO#Mc!w*mTPV&Vvt{>RNsZpf1C%x?_4(KX8JDNEl-E&=#Rsqe`m z4>4yDVY0t5MUc$nZZkNT%8kx~>-%VlqEHW~5XWdedi5*^@JH31F=~z^#$5DKdQ9!> zUEiD2VX}^D7)DTKpq;=9Qdk@6l_vkm@Y$|IxyeXzr0iJF4%v06>f2X|{LMb``1`a!FP?3Wdv(_f!lQ&IW&u?joid4xzS-P~sP zI@@>2JVojz4+U`__OsW*ly<+;xAIaA(}qfFTK&V*+UBVyCHl`+K2Q-b{3T=+tcH-P z?B3C%voMTFD)0^9*r;2`hFS2*Lljh7ipqjCIC2V_56&eHuE}_JDR;>j_-x>K&ZkAr zL<8^tL|5Qg%akP01V7KrMJuY2v$l-6zL~vVlBB_9INTTRHmC@ate(Kf#;fo#$O9wA z1mn@Cynt?c&~QgGk~S`Tu7io}IhXGb6{80uvXV}b*`xwha}aELIdTG8=<=+(L_H>F z&u=iJRoJy}wYjJ(_Ft|FxWJ$V!_PSrf}?{VM0hyRQhHO?a>9`{t~3I&HIqWBb$?S% zrB-O%guhAP&3x2-U2cN#ST+L0MCJ!=9`08?#*soluA!0Y*j;5qJmy0Ia;i>xmb9)J zQ){=+Zp?^y4d!ks1b~v~ojS@#2fdzJD|Jd?Az(Ax1lj9oK}I1T4G%=vVAy zilt(CNU`kPMv27uUMY3u?bE5xS=Woo{_=TXm5ATYj>>oKQufyXb)H<@Dw38DnIf%B zEsgbpwV*uU16e)L92v@cEo5&-EqO6m=izX!IxWWlZ%12Q%;s2@vL&Jh=^%A4c8aN& zkmWK1?0lSp2QHq}P-U{?R^v&@Cc+|Tf)7u-Oi?jNVIe^ebKJ%XXpj<)0vh(`RIQCm zGA`00QhOj`!adh6PhA~@oE&Q&i@Z%+RGQJ2{XUw?I~$;uq)rRqkXXV`vDfT$()z?WX9iJzXEhRe zfht7_bF~#~?fo1Hx3s)Lq`0CKmzMBfR zeB1#eN4ht+NGDU-p_r;NfKZFaYFpA(WRE?z_m6?lz_=3E5|)Z+Kjo z)aK%r6?UVO>50hvC)s(x*#u@JnhAN>I}yu69$TZWCs82&4_|Hv|I(0^r@lZu+qW;s z@HKXd{5e8%*~*PuM`2#PwUVy+pZzV>v7*xP5aOU4L<)sAZDd7E6W72g2M_OE5x~TJ z$3i#Sk!ysf>R6Koi!=sXQ`Ar^L?cE1KHs`hMe8*Di(!uDCp#S`KzNkYpm}&mj%P^h zIK+y!^^v=u*4mK?SYchbw+t3ZD^k30SU%-v{5@6Wj|Zr6=B8BwPEbcnZdy$!e1f~} zAs4YALj_jptsnyNRWNu-_?>C-8FX;Y!?HC&WcpRtVClf_y9D+&944Z`=-m;Xv|%v8 z@Ul@8-s*m9484hS-^*>(KY%eXu^GvC{`2PZZkl?6{abSI^UvqWD6&Bux6%T}eUkS0 zC{_&2 zITkCMm(zIiFjhiUfrnH16;uXD@1uP;Q|-Wl^cOKLGRWjh7H5!-6k(g2`L+x*2lL^< z{a81GWW_%biG=1)QZ-g^&{0ngs$Vrf;%RN5=1ZouQvAdmox21cO@xc|R4w-IG=pOh zAWpJ$sm*!I3O78P!F)Y=#BL}NT1pF)J0&{-h_)na00KylDVSJ<(0g%LRSSf#;FzNT zv=DC0;myxwnt-g&&eLB&>iJI}=>pFnEyPMN$17!W5YAOPRO9==O_WE*s;RIf}4k>D+u1g|@>`Stx7htw*$tnRXYY2f(5EFbvTuqp@ofG+OfE@~7w>us) zw$i>i@35_Wbn)xQnQS;wL@#h3Kvo4AC^v`L0=c>`VLSe+0%WRLFR=N&Y%;xo=I@9i zack_X^J}jw8K78-!}I6B=P~KFUo`9_NiM>{IN$#m%O+65V%1gJgNnP3hMLuK;4eQtgD}XWA0#f%1n9e)gT! zo0XaC8iAjVU_a=rm`E^j2lr9~+NheUnqtQhBJ`Ht@rxMhkRDMmj-nFQf0~kXT79KG zbEy}r$Z^n~*MAZqR(;`^2Yqp>X$%~lgWb6Cj4ZKw7F(>fc4Y?4+YEC8TX!s^ z=d5_wtn6D^BD3TD{U!A!ql07upuGSLBt$9SLH?T4kH!E)2T3OXz8nl`^<_B z*cvEc_i5uz%12vN%m6d6{5W<)we|(zWa`{Hh`@g&u2%R2j`@+=^fL<4FmNP$CuY{d z1Le8ptIQ3#Oc@X2O@8e48ZPEdW9)c(9=^^GX5>I|Vr!I}YxQ{EzB>61swFez1F3o0 zQYK15clt8`X!*WiErg+hF%-^lQBeqmCH0`d(;X5>KS^2=1lilB*78b8PTLWn{d6hh z9_*mHxj_CyNo9fgGNB8347T!vYM#HPOgO*V9(LM(Bn`>GPIP6RY%(p|AB{lX3Lu*^ zf3&cz+tee*`uQInV%-HlC+`1P2LMUgJ}B3?9BL%-5OtKGNW6)v7_ zQrB}`oT)cwuW6X*4n?#t!iSbc-)P(BnzjF_+HTgB8`z`#W~=L!I+I#mK#x0;t43!z zCCXII7Hg(xixo>3DP2S97MiZqqL-SUdfwJq+72_YGRh@?c%m)cY>;18%6w4EkrDiy zF5PWV5rrLqB*Yb{*Z-D~Kh($C4WFLqfD5XDf{v%nv{z_`%ZmEQhSG7?qkCTvld2@K znae~#^%}S-@+qDgzec;TLocb88v*Lv4h~}a7^tvfzLDF>lZkzccPKT|B72v69~y`; zFDCIRImxhCh;cqj6thK0*owGB%9&CO9&jo0fnPx%oLY3Ht1;R9$^8fM!E>{T<<%}J zTufToM?sMYqBlyPem7*u%<#q`L=AR-GeXs|;hc9^cF(Eqy}WMK%c>F<<_b4zm+k;i%q4NVPc@nvv69(u*n)v*HwlV4mVABb-RMUw-w6^ zyM$ejL5Du^P^Kx-YiSx7QQy9r>bt(N5SHs_@ipGnSVG7AjFHDnwG6E%?>z0OTtR;+ zjfh-l4bvb}Z)sEcZ8f{m`^w?+iqX%<_(v<}=LiQ=om#Yt9+pn8&Bl+N#<|8UVnT9$ zpM7`QgM1=+&sjlRcGZglT9wn~eG^VyQAlHD&};&blH8Ti!B7r#OB2dP2ss?|-{jFJ zKaXrXF#xHlUX88m;KeGRv8OTVeLcN1&==hHv~yEw%zUS#?MEM*5*LFNAltijj(Yi!#?U@f!scTPjv{(|^uYkJf z2Ny?B-NEbxgu^yJCD$0kf1Ju=Y%}I?0jJ*nkH{{w~ zU9x5rSMM@QjX?GpK1BqWWM>BHV80ope>4o|W*;EH(h0Y}ESN@X-7bdP;v0$X55exg zYJ38nn?3*eK+9(rYJiTJuKgo8>^L#b8YBl<-0J1x-^vDc}te|Nc$of@zEdkO3$Cjc)^s0~6aIY7{V+y}QHt>$U^MoypehF-_gHkp!Z?O5KA`j2OL2RAlQ<@g@C$}#3% zp(XlLnP4UBk5`KEwdEJxO2py^zb~{t_qFlTt55zM8SKlekvO=gqT9sI!YYfn; z=)ro)hV4j9Z zC)u20qRNjYYxE)vzcnleZIL1V`-(JdU_V=>*_!gJ$}g!pAL{11RWk)fS+>uvAk&$^ zUheXX4Ct>}NQn@%$5Q=6kWJ24UZg=(>m4Cl;GmCZCK+uRIlyd7*+@S=N`c__m%Zl`dP%gQg^CG-mn5 zUntHAq@+_T+VfyMl6q!S_*3p69UoA*JzhuW!~9VBFo}{?Ch*f=V3{)Hs?sm@0jhPd zgtO6Z#-19rue^T?-YDWs{BS$LXhx#g+X|ui(Bob15;rDx@KR$6C5abBzs@z~uKmqb zAf{SU|3fh!R+@9Fkg?UT=}Aw>cYFu2q0nJgF{m`Qi4F_ZjNu_^YSJmgOJJ@J_0{S6 z2j!Iy+AI7Deyn@dMFrAY&gK~(;y*qdD7he!R45AE8FruWrhePs%lS87$ndzJq>kZO z#IZiJNPk?gs#tIZp|DkSVNVfX5tl*h7#^=*4MGjp!aF%fD`Sl>cg=NoU^U! z2Xp84Yu(s64%I`v)YB7AFD2!wKT-!vNrj5xkLEZdxL!A0W4iaF;WTqM!r_-#|Arz`+hlT)DLX|LR- z!sSJtmduUL^SWAH)8{dOq0nWhTLGjah_1a*frFKHTnVJt&I=dI$42#9cHPlg=tK-U zA12mXEUpx$(fIa=_QUqkB-T?0)rFhgsFOSiQVn`!f>X-vTgyBIiefNWsBam#> zE`z!Edk>O;IAaFab zbmn7)SP$lYhDNSKTHIMyIcM_OEVDJf;T{CqY>SUaDwcJL(XD@AacXwC$=I9YJ)~WEFS5VYg8T=lcVcJ+OD0M;cmkQhwqN z$yYfj#wmoP7qMi>mNU*ne|SR|3~N7Np?gkUFbov9L+Jg1cQc1y|2p#83B4!~B}CC2B$GNQ<}f8&67Svz`jY?+gFx|=>d^HL$uTKXY{hP` zOdOVLw3d&ndHzUeFKyDowUuqbC5w8>4n5u*T>6JO9A1+tw?|uw=_aj^K+In8vU;3@ ze>Wz6U5ot6wdE%s<==Bm4Pk4ZWn~@Ar`?{$LQd0AcI&^pIvu`;)nvSyMGqZ4LS6aa`Xn=i9j^tkRi!nqItos+nw3tAlkseHC&orA_QZ5M?pDOR)Ok&$ zct1Dh{1;IUR|)<)Cb_1_)YH&3oO`b<|LgqHH8;u`*i)vEfa5TX5>Hv$WRuaJtD{qL z<-IZh{-f`q|L@$XD;pivLQlc6>#o)?*TlH|r0Z)MZlKr)`g$Ebz1*=239_V-56(La z57b{fVm%%b&VWXup8qud{{5SC_R#%#y6`^;tWQ`XHa3x9US5I=?=gz?_nq*0~6oiQcm7LAWN{52SIog@J|LPT$b--j=s=O7KD^(xt%a|wvK8)Op z+x@0BaqUNbJncTahIRIH*76xxm`W~SKoscGGl`r}NjZyyZ!{4w(y`&E{Oi}Ru8Sdx zM99P6EVJAlUcsoHK|*!joIkMcyopR5q)KKi;CA`*Wbc1;LTAuG1p4EoOOVwF+2!8Z zz`($e=_1TfmT2;hQlVe&rYn1MYEF`5&j0&)Aa|IORXrsH+NjVJ<415rt=b1h`k%CC z$tP1gO_58RyuLo2dBG@~Y}ujN3RRwA5UrGSv30mYSO6?uO)yG~P%2bw`9<%RL?NKI zU*J<1^!o4_247go(?y!o1l?Ptfv9KUtXJ9{^y!;Tz2Bej&> zleZ6>P`t)wB1K$EWFCFykbi#tZ76cBfx~PpztBceic@C#$@M+OAZlo#Csa}1QglDx zVN5e3Bu z#gr74=Ga2FAu?NfwD#}8Z?D3aBlP;(J5>B^=VtlxOV&4C{zk?^Cc=SQgdBCK-!< zm)<2(p1bZ3M?Lzw>dZp`fCB7ACTg2;})3 zsTOP%wwF2go_W$Gri~lcSdW?I=;igGBs12enE54gH^=^Tqb*38F}*JkfwnAVS#|tB zfNv;S{1GT8C%1RbcbrtU(d&Q5Pr%49-YM(2Wlk@rtB?^Lk-{z1mUtv&Nt$ZiijENF zxvaYH&#=6&D-5I zuXj+y`0_c&bK3wU>3`5lRqny$f68~}$eIx)COxV2EnTe^T%n^J2rUmq=gv<7QX;_n zsAjbw7Fvlwd>;)!cMZ_8PyTKfgWq<>fuj5~BKP)D`94N@gDB&0G*~FSPKKS-Z$Y6o z16<|Ei>87>`KZ@UjaH~$dc1#zL4nNdS|-s8C`?UWEK0~oxyBp}BkebU8zUi!DZVB^ zjE8pyNxg@I*}=lu%hlqr=BH z({;6!!g2I-MO=Mo1;^T;iCu)X;gaUsufl*7WR+`m5mch7Q zc_z%-0c+zBS<=eHEF6XwUi<{jJkqqgn=8n|%dp~0YpP^m}T;R?eO*wwn}J+SsX)e4eeQS@5I zozq_`+&{osi@+@%uV{XF$C9k>N!sXlVK730l9F-(Kk5H|t7^?7icb-x+S7AAJioR( zlk?7Vt^apQ@Rez9GmQI#1nn=~yr(C%RCUW0_vP;)>#^H+VPOb22eZT0^exR>{N3Hy z&5omZz_d_tscq3BDhm?g-L0)AuHWz72$s35Y}&t@7?#vUGd5?L;?J0iPx?SWK5fTJ-$~HZw#+nD@jx${Hzor5fdJ?ZmD5l*+IrLS6A01 zQoD4)(Z}yz78PA>%KAy1r7H<+X-C|K+ij_g61QN!oSz%gOjMMHi7;-Q$HVa#EZj8b zZvBrLk8&KvnHDp42t;QGtXgp&9;V*s9i>`j3Bu~$K80yTMU5h7J=*^R)nBf)J;bar@MXqeWI)&L zx{p~}V_Hvsma%*6J5Eza?uj(q^uf_vJc0i@XM4qNx?-fitCm@BlAAGkFWW4XlJyQ? zSUs;|Xqv9qoDFxoOajmwOm=t=<3P>mouti&sr?;$S^j=2wBi;lig7%@Tk}Y+P{}EU z(QT^gVmIl+KBtZ&XX?R^X+j-#+k>%DcD_u}O({q@`31ob<7RX9p9D<)3uM{oA(IN! zzJt533}?*4PD^Qg|CLT|ynHMVLF{47D^dRK> z-oFGGte@+6R&~4uqp{|Hk(fCq{oXRnZ&74=d^+u(wg&4Xf{tK+fs$NiCnz7Bzu7o( z%{xEXL@|`mHj4W}L}H0dGhTE0q1k&Bl_o%AztF!SMfUA}Sc2Tr+5-)`{o2yP?LlQd zu1OY>Z~~@fm{^vr+Rk@YwEYs&H65GLefGUOmP-yQ+g^zSJELpzBNQn={H6P4Nmw3~ zjV+jDe$AP9={N)k z0iRnKG!8-XHcPgpc6fw_Boe7`XSK3Ld>UXx zIB4(P08$vxN)q@0n^KzCjxi5~YZY%Iiz*C$_0^^(w{rM_A|i}9xUJ>)qp?myvK>D; z0{nW2n3g1E#cHu0eDCk1WqR0dzx5^Iajd;hz%#f-Y!)W^hhdfCG!pak{`^GF>IWnh zV+eDH#aBvhHU!LO@Q)VIea~3LHUHaJd+8U~QC*_oa+|gGMYdJa%v`nhqJjB*hzR99 z3;?VvOA=N>rF8vae^(rM;mH4fF={TdaB}`Jso`syFqwC7h#MBDMIeMpzV{hx{_yb8zl!=*z?A+iQo=+Xg}_I>CE>mp0-adQ;e2*F_v$S>Vn6z1MLAfGkxA ztORpz^7KFCPs%avf&nsZM-AP%ZZXlQ6;xv~N<+lh2k$sBPKQ-b1~55!88E9a0@k1( z*)3Ltu7ArU4x^kpgW*i6z)R6IL3Sf{FlEl~eKkxIYz!Om`JQ5#ajv=NUpU=7_r=-O zTcVIbw8*{h`BK?xhuIuSd*=MlPwY{1z3tc9#_ua%Vn2TVMx!r0p+1*!TW0#4?>c}U zg$JmFY1Y;3Rt=t%8W?3_OAj*I8j2o`=ZBbZ#sA42<^j~ts)ewlI`dNBYC32xegR;sfX_U#Rjx*|_7ZDp@cCfAbzF$L?v3;fe?vJ>?lF5VM%)x4aXBO5&>Ziopl5fQp(O*yf9{tWDn3ygH$8Vp+6WTVDo9>g5obQ`9U_xnqR#?~W3z&%}VD!a>=#zawt zMg}nANTKCP5E>qkb5^ z|MKnyj_dL}@b()1iP9|aCIjUEj`K0k>bv2+t3nUV8e*gG*e~V&`I<##L{yciBFRLb zw(iF(83KH-B07?R9`A|R568gDe@bh@M8*&rF+BLPFYyLy2qo(FIdg_cGqzDoZAV)t zi<}C|)Pb=f8m6Ys6G)CKS|kox(YzXsDTQ^0v7a?L2v`a5W#N}KBt-c&W>PX~`7qI9 zX%6G}QIO<)MYH@aaqyxOAu=|Rj-&gMy;ZE%@kApCt}v^(uuNW!cvC8lNAPzh^Go*9 z?Y796wAQZ3M&jdn-#Spvy+X|~+nok8!bzZTbhC#wRpdnWX_hl!m~Ty4L{t1ET!i)| zG?C~aXWEzZC~hS1_5~#3AYF_#RymcPth2H5hd~V{$V~BI+kaC-@2wGiIY5p(w9X`d zG*Tz*FsWt~Np4=APEI&kLi^ z@Zxp?dyyPgz+XckESTq%z{Iy|M1~6d?)8~B%EulGBuTcZ-M7r0je3?AKZlCN#3 zP>w*%FQ|toTrEFn*R3A6s181fcTfzi8|uqh!lbHYrbsicH>=wk$o!DZ4OftO5(cYuDwb|Qp`kep)gp9BNay|Q#+ zc%4O`;TytZz7-w8CTZSHM@7))?^1aldy7UtUI@L-Ie)YI#3JEl7{rrQUqGA4H9&T2k}D{-{2+d;19jt?KLE%YDKToXrL0MyOBeq~jCgV(6uoKyMIs-E>12{S<%F zS5JeypSk9m7TTy!9D!;as5(zyL$D8%{?nfi2-SGAaJlfQ0WGZA;q?Edgza#|6clwb zvoi@MUe7{^sV-Np)?Rjob?jGjLleNrz{JTMRrqZ2raLAp*!=8Xv?_64SqZ>g+5%Nv zXwfOKSk$|hieEHWDj%MOI@9v6Y8N?u&x;g0@OAT4=dxSOGJLb%iT%OU5pOhj@y=>| z-MEy{h(3Gw9%H-At{>;Wa{4;6G1Nulgze`RJq8qFwo!@q;xVXR^sZp9#>7a+P@0pF(ko4{>=0NF+xc4{N!7&N&1Bc1@ znI^j3SFw$`j6iQ;c3-0`{GiJI^9L(|q_fT`H4GHOT7K*Cx4O0Cx=RsO(Z25Y6%{3n zX#v0c1bt>{WOIH?2%5F##d(M%tuw?}3}-pqQw)QcL>ok}1(KGJ?OO8^;ERmw1;Mjt zOMi}SQIZw~{nEI>XG?R%(+>sfraBt={Q#oE;q0F_u}8F=&-iX>mIBKQvHU+m^SaI@ zFyXu3WG_GN-RE~Tf7HM&{3SwYIOrpqbyh{#Jv^6%r?W!v*(X4pY&;;E0)KM{LCzXG z>Ga!2M$Tv03|XC<^)Mpb8w~sT++5P{%zqWh?fO*#x)*eK4%3Y}-h{`lOuN<%_ZK;69=Qbt!`Oe7H)zy^(6bXrn<6vu)4S>7 zpyLI?Uvf`ZVrNQE1iz3Kw&LVps%fgc)dEjq%lV;98xSP)9cL#4j+ zCsQ(p1mNk36b@f$v>gObr68`xL{OA=m)0bxM?nw+ekdTZu_WM#ibwtK9C80=tlvwo zrN1#*m|^&~tLX8mgE2O3bX3+xYc?87jR`QddM&~sC7UEkr=n3BaZV8-=o;7`oTeei zBsO&tFdb3i5?gA~{EG?&YE8!t58#6sGYOeHemuxtOF#^eIvGVY#$5hGJ~;T50AVeiw6=%DYLVkLBJsb$IWNeNC2l9r9$D+XwwCw_x|Ae89^Gq6o5}oxKpy`q1Uc?k#6DiNOlMokO=H`s zDV*7-0D}Yil_EQu0Uo!y&)=Ji@r)%oj2p^}&I8+{xd~Qc`KwQx(n zSFwg+c@6szqvwkvfW=-W5eB{3a%JN+ee!G)fJHTh!hda5a@uTAmtw6Ug*o0IsYxCeHkP_8TvMcrGys>L>Ep zepC=t5s$fcF$SML;rh$vD0AMFIUct!DX%9UL0lr6h2=*LH?+N+h^QI21+JX_)!+VI zMf1T6!_>&C)bH7um%s#?lBW zk^tqS;22K2m&yAu$Pr5WrV9h%!21;AkHi|BV;9oqH~)_X2usK*PT(5CvP#N!9AK(O zjBugqHWdAq{Fc)OgeWm=nwNS=K$Eom=%DOXl(29SMByR#0u#M-O7ss1Z2zC%T; zawugiQN(i>8@L~|QSd7*$mW@rz05|s;aN?>@dMgQ_MFZ+T@Np-9AzF8flago@DH-q zg~!HxXp+|OTN*d2QZpa+;sRIpy%~8Dj!nB2cXJEiu?*To-g5YVXgbTVHoCT52X}YZ z;;z9R0>!033lw(>!M(xVp~c+`6fds9okDSUiaQk9dG>pJfAb@mnM|_QTyow!#4?K{ z>@+_lLxLASAk(!97zQK)lc$6WEezufo6;E>C1_1ZZ{vd|du%Rv%8dg@1kGN6cFeCz zSXNpNUp_7AsQv7I_2n1QY%-WWw3*X=x_x^+f5U9$V|C!x2v3C%U&LA%i-7~t!tDJjix1|*^yFR zh947>BMkCSjky^%ut{bpST=CYjo4KoWjRL%(+|*7xnhONi^Wok%;KWOgd~IiqGH&78?GCZ49$AloeeY1FPt)(S1caFPgo!4)-bG?FX= z1~xR96+SBQU!ta+ek9&ip;0jy)|}*tp#8c}DkQ&8gb_O5#leyy5(%;BS5Jz@OXqRB zz~%_N!MG-t9!+&75qZL$&r(3m;(lr&YUeSQa`7lzqg}h#@L*ga{SYIElrez3{oH%%j>@>0o(5<_>(;6eNVg zmASekS*|3}A0^(csek6(EGw&TR+Hh8ZdI~X7?DihHU212v(C&mn76K|6DzFZQBfI~ ziXO#~4HepAgF1`_=d&gdVO=%aO&B%b57w~~lt~DY+aW7QptW}O6o=dl7oJY@nT}5@ zfm%RGBX|31WE8v~)((_&7scaZ@Cn$N1{MO%i`R@JPRg?<3UmCqk|w6Vpv^3=E}p6| zX^4$DmD+>mtZ{!OmvBxgXR3w7=y}=xSd6SY22Z_|pG}1`kfpjiD)1$}qp?bQZkPBu z(06wHNjT%Frh%ZV>xxpy$#kk8`wPyA1LgxlQIjc&o6CdX7CxDnqkHYYv3=w$0Y`HI z4+8WQ%zZLXizPTOmxrd!WPe~I%QXH)t~7&b8L^+B*pCMoIAZWQcmYwY;w00JiW+yZ zWa&AGv@WeccFS!9Tc~~Kc|zg@;3k#KW^=O{AD)wig&z3x9OkM=d{ZQlX|&wM zy>BS62ymd26lc5er5yu8ty5NIQ{_8ME$AC@7w9~vz+t_dXchQR<)!Fry_z z=sgJzMhDLY#lYUk9;=Hj+aG4v;r{{|=);)W{b8ueFm+ADO;k(d;b2Q3E`f>5x*OJt zoDh_cqx0D|FNH20hH7kIE2m-(X-e-uFv)hTCTwuk@PLZ4v@N6h_pxkt+-I`V=m<_SK(ZBttb(Y^f>#~VFQCoxMPXN< z$BumHLhW5nHte1L%h<5c@@;2m4PCY~&LRxi&UqHAu4YFL(>c!Of@|cx>9CK=pUUr^ zH4t&z521<(g&LsfAWLOXF+M(rSv;r`QNi@UkzGj&`0VRqgWUvnWRX%2#z_{ouj531#u(k(tZZ8p(%)vv@Bn@yyjb9m!Z$k+=Oa&GrB0ah zYLKIlKR)w3t_ZIfI%Q(;39)giQNiV69Zuw;vJ-W56i5PERAO`M7=a&&bd7kgcl22< z{S0KjHa~a8Hiesr0viSX2!C1YEog;lG$F47dUIT}hpo)4#6R@DJele#5mz#`={}OJ z{19q08e{MJlX!M-KZea*Db&GMKTO@>EXS-hrTq?%MB@zB%v+w8kK(TZHLBJb#1+=5 zT>CM8EVQkXO|osZFB*s*a9C);n1vD#)UXNh$3E@OF^<5uR{|AMBqyJ=-whRg(!(}y zvcWD%=C)dS@O02=sJl>kAiVn3RP=6T?IFi6rP~ehzfU0)P{}Udx%oFc$7|DK{$Ed^ zGmYxB+NDu<>F9+p{u>J+hpu&bnKnU$Two%T59vsS^13Qz5uH#n^hzXtMkSH5ZVZ=7 ztcdiL?vtn9Beowg7Z*^sfg*-M0Q)zo7o7wuE{*KF6Nl%?0HY~v?&66vcDn=G&shDTKmz3$IQPcHge{BT%?n%4F6?`ieuZ@0K)fs~d?jLHFY;PP=OGeeMUIVAw8Zfkt} z94NO#Fzk^?KRHR+E!{$Okh3X{m8eZ;FuENHkW`xOglYJy-ZTr_I*~g9Xs$`VtSR-? ze`Ed&&&J@EO_69?*Z!)X^<|fs8z|p1ERa;e@f3#fjc)aO^4gKfTtCtYz32PFKu5o3 zI4>q>!xTTBEfP8!XF2=^RC24QhQ{a!ES0oIOo6=z&B*H;lYdC0#vwG)su!!%>pQaK zN{kYf{bvXuW&5G+F{n=GD8n9YVfTRAcI=QYg>hx(Fkcu0?5Z0UW)5pJ1pQHrjyE5v+{Yktd#W z{#rGceT;P8k0k`**E3}&pb{6W#Jj$`M5NGKG(danS5#@83v)QNPWtc6Eo=o`S#~va z3@60nGP~N%>+Fdvv30CYDfN^{$^-tKRmOAtPOh(8Zn`fz-q@2RxGe~cOF>u!hE1tt zl+QS>CQieR;M^{%gp^<6mPiy5xym^m;Id`Ci)gVL#=6bAs&lR%=}+ok?cc|P#@wKe zTp77aY2&Cr6*+Ea&>5YSrS=AZYRb8JTn(|qM z9KxtHGX3HkQyYby`AYOD{e$e6v^)v#rU{~x3{_PohT`-SCd(4B_l zH4?szSnY%skiu0{1>+ymiju&*=j>*cNElm-0z0mqVWiAkymHxP=ZolM&??MYqm{AfC_|Xz-MFP{q4k@~Bxvmt2CSdv-Rq zOm~TzV8@zfz5nHC(|Kg{jXly{VTvQg6nY2M#g|1~Z&-fd21d!L(&D2C6-uyi07y)+!+o^X4d{`cX<0tH^LGov*a8o@f403RcA{r`tjB9KgQ zU?GfVFb0K~XH}gH4UDM6_361m^&9%k$aXfMGMCC(k3sl$|0 z#Y0LYg=Q9sa_bj`EiZQ~aSO<^gakR7CWYf5Ij<>+`*fSFR=7t^C8IxyEf4G8G$b+} zQbW$qVOgFy#!i^PoG~nT0n?9;H$!lQZhQ9PO)-wKD>m^Xrg-;gV1bG!7*HlPC&y|0 z<9Ww*Jox8Mz+!R!*<8Zka`vI%#U9Mj(#g&GF)scj&;O)mG(?fVRSl~Da5sC!-o4*s zOf1#7;49$r{((s$G!FXdodtV#g123c@WnIj` zpIV%a3stdI5fpXr-DkL66-0{NtEay|De8NTvFy@Eu;?^@S~kFQIVED+v)*q1Q%+&Z zsOPL=4W6Pym;HK)QOflnf=NW|2&O;s>+6sVFNR~S@NfG}!JtjcxJ>(4#lT~)9ypZr z`tpdh*VH}%1OXfg03 z&|ExAxF{@Y@kNmK!?vueDv(i4_kFSWFm?r2p>(n=J%c@FTB zIc<6TLTr!@NYyCeD>ptvv3w08Dn=CS8dW0~Y%0YTzo$a&0nA~b;n~HynED4Msk7!G z^#xy;My7dfW-OBWaI=RcgTliQXt!YM?)eyZ_bSLrr2}PGNfMb+DH3U(YP+Gb#RF%@ z$Om?EabBAy@UpaS#MD_Q;rGSWhWWNAH6gn#Bu9BP#9Z;5b*&8L{7xVm`qLCK_$bmN za=tS4bezOWAC2{pu(;PfvB{AGu_xT={b#3@gr`{(qlCtlkFb&t%-IkK3JtQ4XB74XTGW|xn+r7haZXqNz z=CbBRn8RfM7=+}8k6`~3f|e1`FkQ?H+1wEfObn!5EHpC$YhK`4%TDZ1IvIw!>ku5t zX_yx7OpMeecN~h?YO~q`R-`H&xAYS4i}(3D8YJz*#e_Fn*jY|_z5G|N$#}opX`b_lG~2B&68m)*3-fbBP%0pn_bD4r^X=m70cWA-wlS!eGEp_ z%n>P$Qx5;A?i0F5uUvpGhlrac5gihh01agv;HUkV8#Fg;GY7{ys#r-UA>%H@hE>10 zgiCFWIGkj|uy%>r#ZXLQ7fpkTeARu?hw(QOnOOUfz7inNe)m>b&z_ zsFM3mx>zua=1(|@4s)^TvBt`UB(C5!W(vS5QjNfMpStECAhD0rYz7;bxSL^#p$?`q zqWa7-iRT5H&*W1Me^UrL0CQVup^QQv68G(FiUXJPyviJN6OI#^!WIzLb)+c-XF8sxdnQ^ZoLOm22rj%ZtzBBg!OEYHmRs25f=IyI8m*YvT)v6UC% zmg5F=Hiktv|KiN)IED+ax`farHlwc7eBxRLATE*D_R>cfII&!0!EE;J$7_!VIuyI@ zS=Y7OM@-I|@|g;`wxh+M90BJ$Rf`Mj1#F_Rr{q=(KFVeIMB0&qR=R( zFCc>8T@xe0+LBG7AaYZS5hu*{TZ#tDEXsy23BPME56hEM9a0#tyY-k;EdJ<}tTzpG z>5#Mo85bh{Io&Zy{<Xcwb^e_yOXLv5ZC!u?iOPYu!x|2>;W!*xZ~)a?+NDO zx05B=L{9VWcRUW#LwAU9{4;ek(vZ}!OPUp&g`I~O38oB|$DDI;Sx^3i8_Rdt3X*4* zR}YObRzW*T7j?zDtJ@XTCRv9Q%T3AuM05CS4wcNY>?WX6sb{%o(UejESxBd)xuhqY zr2U+j!}HmA10I|8A_aYr_dL@`{XImDeP53)y!BDG zf3jgB<}oreJt-pU(S9~MKB;S^%NDC=r>vF4JG_E0w-~kJ@UwILj7+R3^0Gx~Q)h6J zs#09izeQy83}CkH62p$11$XjiOH-8$NAe+`Z0_W$jz20WGe?`!eo1C81IF^}SV|jc zN#M;Dt+j~Upiy+loe20Zmcpx9WI~IVf|YA58GEu=aZ%P!5;uW{`n~O1b+k`<@{FTB zBsHwAs|hFa+bX3!7OgOc<+l!zUS#x_u`ePNz__5gh<7IDMzqL#ULyO+uEeNYPVqN<#2Vc-WHxr-K9ibwxF z+n1njX2vfmNzSUUz>{VQL&PkCBqz(ynaG(K5A!$p9G>F#E(3!at9d*p&{uoualDiym!cz?uUia>Alt>9$Gh8NnQzE9K*GZg9w-mAu3$y}5eX@|E zx~xbRL=)vSIfglGQzIHgEf{=kDB=K8Do-K*7SU`tT(B}xvF~t^UxtfIRRdeTQJD-f zy-WZRZ3z=uBqK&V#fW{3e5QRbybxnQHIf^ZwBWqycuqgAEkBVR$m`PKX2a61g98zw zvs@hr7MWu)0k4?<4pX2Ua&xQnNT^U zc}rwmcs=D2k+*^Lnld*5AorE_WRtU3+(yz>lGG^y1+fo*9UlaZB|;=!kKyfE>@&vl ztCVoLT#zoR6y>JGMAW5-`@u)4(=O0$O|)QZuBB(}+nQ-xWpadgMfX=UqG@IeC zdy5OzF^S(%rjV(AL#;kd7#TFx?2{ZdwZ2d69q-x7P&fXJ^n~dOMT!cGi-H%K`5@$v zyP-bLkjS(fWlR}tDa(75^lY$5i_XNB66Ja_$ytn~C3!v0?=cl-ON-A)&BRe7tg1^N zddLoIv13Sq9Dm_b)yS!Ojuxty|5a6|51rO_8Qb!8G=uoccmt1$W-cVoqnSc7qlH4p z2=^IKBkID>nLc9es^r*WgrXgf0V5h|b&q@fmg}GoI|0*OF3|^T6(o$ZH&|9%&GG@& zZ!Ejnl(+JR<0!;_J)OAp0e}qILJi5s;+e)1bGaLwot(Ra92bKKo+MHq{bKMwrrWpH zQ8zr%MN+xo2%gK|R`G`LWz^%s$0O}Ke+I5A*f9uRaAaonAx~El9uQSLqiK!`lv9lr zT=AaO*QRO4C^s!|1@gU9nZ-Y%<9?9=bh*;NJi6HqP3ccwj%Cq>j}9l9zeyilwyI(p zmHO*k3*s5fq@zI$Rd*-D{B)W{bU#<7WY0U+vB93% z40i!`j+}AyK~n{CK#LmBVn&ZUpGR>>OYQ*=pd16ABLv&Ed2*_1cMcZ$KhBR!_fEvv zh31z{(SgRP8l}FM_Ik$h(&q(UlSpkrI)P5_yh ze4Rjr$<^V3FVwdqyyBzn5HYb^8`*Xj0+AQ7YMLw_Hjq_ul%o@aLev zGkNb9TrhV?F7l?Ayel%-EPb5xjteI~)dFu2;A=ynbn)u@5c&#wg$t?~hSVWT$f3cE zor|sqGA=Zuy(=HfV{T9n`pA8%RnB)qL$bzl#Bu~o)$FkI_H#+Od{vIQcex4& zTZ`kC#gqrn-RL)+5*~zT)Y=6v83G^-5R6FG*wbe(OhBj2NPRMxZj?UW$eWTJ7!ga# ze1nvdi)PEm9zE?LD7~L4VG@ni&E*nax5li;?SnFW_(p*E0ppALB&pargNNRjIZF0h&s8q_lSXT*a|B z6Qs2-!-5>y96YEJjd(`a4)``9S#ljbIdkp$+(h5MWx4(S^>|nyvs5E!nJTsl3 zhljkVA-D8YOcP|G1-{56d0WlDZBRtB#0%unJ@lR@JMvDg1o$uR0n~o z;x}lO+`H1<(z&Yc#A1aBC%b0a+Qb3x^J=B}E@>%?H6lsr`(Fp|pC@+*snO72xfQly zIHKIkXwEd=u@-pHmkyd3LHUt@MUkXoT7_fGB+gEx4|Q zZ#R8Xl{+%eZmT$OGArbIgAo-e2(u97IFWfEg zBEUxEDgtn!0UmEE@zugh=(GBos{zt#_(cUH1ny0lQI)a-Og*GQ;KfXtdAZXsL+(NK zRmC4?Nx{p-7Rz?FMpWqeCLbq4Jx%wIy`pkleMn%^bMYrn&=MW@x3yk46n92Y_99q& z2#$i@N)FZL3k9cqhaei4%hTW^rC#nK73HMUD*$%HL~5dLETlITl|q$M`)O>2klfrB zRh+j*T`3YhcEXDa=fLn;Ik=P}H=Q6gyS-`H_H&Ou!X=y87QmW3jLml>o$5b{V?`h$ zYl)r2R(}03ir*{Sh<1;!wY^zeP$$C>0dHvtqj)c;?vY=v$x>}}cdDXy0cG%qxD_E48G5mGbj~XEM}VPk5`YURd%nHLxT>f|HTyHP)34M1I*J zR@+t-uwVW4T&NiL{-FXfF0+M^ORET9O&%+lom~C{9uyCGDcnrR`tQ-%QB6(d+qHf@+pvZ^sJ%gY#fdPP`d~MONvC{I$4d)a;gtf;wv> z?|)C;(34m1jh(v$FR3#~i|bPO!?VX&VVSmym?C?`U+`^oLCe z+H>=bA0HuZbWnznYz?8a*?JXme!-q`di`<>T5StteBDmE-l_Yi8ubo=;j-)VI^GYV z_<^fl-;RI9FBTR>M0s7FhR^552;k@7%bc0)@z}o4?)L4~eV@<>m@+Z%NR@_-6y}Il zBOFe;&{@M=9c93nLB(n)bmb?*@XBD|67sT3Eh`;aS3YiGUt}L6aoLsmTa*#QXzbe! zdEo)B&ULsvHkrP>J9l}0aI@m4H5t6M&N5exIzfsd^Z5&d@$&KFe@lD6ND7oOjS&DKH4@A7k}h|0Ik5`gB|0Vma~z^i_A}$mV1IDD-(* zIo~B^Tno{d==P($U9al9k;2c2u}~Wy5MoP-10$ae4!$XqZN*#gA9P+Ol$bZ@aYvnn zO{_lpZ(>Mn%78?4RS5gbbcAGTa3%g4xTJ8J{hTtu)+X{T7@e&=zk24wM3UppTwB}r z*Y8y^zuunjOdZ`f=guCU?IIL^5MK7LEFi5s5bWPUpS$e&LQ!mi%I39)XFX_%vsx;X z$Pc02-+kegK#VAk?)mgm2a9=7XCK8>EujMp*H|0$JezH)b}0ZlYEY@Gv@WB4H@MB{ z*->$^_-boFR)JP3`kAX`Hp1R$CPx`(PkIoEsFD9DD4ju#4c@;=JKBSS;_^J^EdIv_ z%z>+|y7b>Vajzdmh;Q_ExD#?o{;4*|Nnm>$!j_yoxa0{+Kx6}B<-uGf(+`fXecL;T zVqPt2Q;Lfs#)>xbUPIYakb^*gSeYUK-X}tG*)#v~$?+l6P9yH3OOOrHkl&f+De6+l zRjLGRy=4HeRTebLxc4;H00X~#c5SWFm~~(&TRL2gg!2~BSCeV~hQ7&R>s*qPD+*&U z-6%5npqvUz_}MlWYB{Tu3lvQpsWGNBq1u1altDV>YMiLxSENvDS6q4V&O#W57r=mB z__e5L5GfK7>{eX?A-Vi_%OW{35cL>NtJ9U5kbL$B^U+u^4TgK!;7qAJGyd3K@+YlY(!NTay#~2=6j}y-76(6Wom%BQSOOAp2%e~HmgHlLDb6clY zE^eZxG-G;ypw9_!4+#P?En_C&0T@Go9{~?)VB0zsaOP&$=k`OewWi~0lrV2IjN9ML zb%f|MfE1iQthL>J5ys7kt7C&KJ+kFplwry3I}?*EoWb%bo0pQnhuW(WdtqBU=vlw} zY2Gpup0W4^_h55?I}qH)eJ-56#VmOl<-PXT8z(qcJ@pbUiDVwpr*Wq zDgFXs<1bunL`^ugR4Qy$+w72$px^z*>7fvm!-sU+o`GV%C2*2Bl=`+@X#hp)p%<|R za0;7N@KCyrIJ^qxw}m%J(d!8Q)pc8KmmHH}N{?W=8Hyp4F(rOIj))8t1^B~wvG4K` zZ(4H4_q>@PoTJ312!#*?0K6Xr(FL&*OjFplh`vqht=NM?2@tK-CfS@s+=LW{Aug20 zK@>%@vmVfi;ZJ+?5X`4y$L4K1PH!rjH&1S_$6(Y^#2WauLnX+*4|EVI@fgKuW`CRG z192y;WyfJW0gs; z2`D1Br#6z;8BncHlt_zkRj`J&y*>M8KiS`q?9MG8*dCxW`9cc^5I6)8!`4~i_(Q?K z5>j(X+gt-Ag0neS8`z9ba^8U-3AJ3p~U@&PWWd*nCjE>c^2150Vay0FtFpA22u} z!}BnSCf4!-ELF{|R9Omh&>{)=e8fB~TW|`QzhIJXKLKcI;V2~K%s>L+$^=NxfXwr!p3smvXKB#CIgDKn zd`YrtNJroT4g}}dsbsE3mfJK{fGHlr_PShr!w*jS*sZe))#rN-5lIE+im70`B$rMF zm9M*|66^2Imdsfw-%bAMQ*D=D6N4;u+wAaeK(cNCP|J6aCSEqOnBDDtXP40YUF%Na z7h9$avMKU3C9h-*!4kJ*9!jQ3RnV7#QLRm}^M#{-l9x}NL7v~nO72UjQ}BjN>$6gU z6a+KHsq6A@JJPtFWl`Z`h>DZ!2Wwjb3WKwXaAu9%Dawk^cVFg_$|E~p5hx(&@-FsF z=G6R>$JbaLsc`a;=-h9MIjuVRma`NTE%bO@&%!lLdWHm)whru?g)wrj;|SUiOS~E6 zsT?>o{qhb^1de?4#5EGy?R}RDfZ@N@Dd2!|CPOgzM}mEihxCHrlLAQb{#~xauP`+l zuddJM${nBXi^2iLqwP2~d<1FX*^f5^`{n;^#cGzt;L~B2rt;@c@;97Zzpjn95+#ak zZa@8NoDhSMqnPX4(k9khM z*CeKONSRk(Gs#8E{q23ixoP-NnLwb4j47|P)04iI%aMm81Sh>iF%0mJwXeu!I_{e#=ZGjWLbH7G9v9eB~g;4RnsCD~*_cl>@&;mQa z(*H&Hz0Tw3(w1&LoifXun17x7fvo zEqyoF(l}O`@S5Pj0bXj{ry@KILJ5cOya>0R=WSlkSXBoQlyN%tIKEd$vKsFl{;h;o z%CsN6%!r;a&j2@9Bdr-eM!d>FV|C13+!+-qEO<-GzO~F%9Ya0vm#TDA-weNRy#sL5 z2SuqUS8)IsW@j|eTvP>^_f7vrd8-P|Avi|4dF}(4&OlT^-Fo@8P8< z>4C;)VG0q?X|U$#xRYAe6u?K`?H&o7aoQf>2T+RjjNG->#}?ib^973KeMcV&&#-Vb zVwNiw9`E@!Y}5jq?s8^T{wf_6*w%2m#BQrmP<>XJ@F$D+S2wZq*S=ox`p*voGA|25 zTMWVqJBeS>MOL}G>!AhJVaS z6z_!UAg3AF%)!%QT8`bwr-2NtT2QV8th zE63dIG6;_U84f2&6l^|E=s?Nh&7mm6NgX$iMQfrgMHTWtb@;rJ+Ux06rhHn7P#^!8pD1KB(T}dlgs^X!gMpWo4gA+R|TLb~9 z>a+9V^F=U8G1#)V_}UZad~TA1^+3(pSI0i&P7@Ap8IzU~|LGKym=P~KW8jbZSvIdi zxB3)zd8$Weog7lhPjQ-dW#n^_JwZR^ZqD`5hdeJxkfi3qq~qQe*^R>fY;3?n%lcX8 z!QJy6dUjc|dFf5_uTD;7?f9h$=0cmoQdj2#IPPmUKS1s$!|Px+RpZ<#qif0&ol`o4 zagHx7{!{XCNnV}2yt;PFHJ@+3+h|H%^Sm4`b?6ViJtg%@q`VuC2k*Uwbe5mqNDrc^ z9#62q0=7>H(I4*V@SKu5+CN4;SxfWllqFPem}t6FPHmiRDIfr|qisxPfUOqXGBN!Wl=So44(|Nkt7<|jLj5-GF4E9C z0uORCBk=t9WY;S~^U@9rzc4W_Mv>^-VZy8JFRFu2t9p4Lv~QJe^rOaj)xNIXtJrYQG5m)r*SgOn-8-{=zE(*c2^a-X)?XQ{mRXt%mHS?EP9o|PZ z%{Mrf%OymCCAGk8f*osisTZnz^G66fyg^OxEw7`n&(d{9tjI(|C`9OXE>B_E5hGS- z$M8B_xPxvDr@Rgekw;e=p!Q@Z4G)a^u`CAXv$pX&_pWibE_Dqrj%r8oGn}yG z{L(E!dO3<$RrM&G!)}I)v7?qmgPJle#-TVuZA0zK!<-bc?`no*(RJ}_ADxe6^7p&V z*VKthG!H|0m%4OZN+}*>Pm#`M$@)Ve@*G?}UrhrzT4bx;S-hp}PE6gLal(h|)P-{R z-&EnizrG;Rvkr&bPEW%~h=Y*KYVwn*{$vFj`FlIb5hX!E%KO`|O2?je zp7c*}{4dcV@W@Q!0RE9q1e%oQ-?w;+o9-@3g-CnFfh`@BM<~+<&k)p&t8wLRa&UD9 zCCYlsJL#CemiB)txDip8{36#^lqdj&Xz~2;wk@nyLAs3usGU(XaLhtM43etyDcJ8ES9DC3|?@o8Lqd zqix2>eZbLNpxy>*_MaMx*AqqGBTEOBbqy%9J15nZTL!RsMBE)xAX3g3Nx(?te^a~? zypn}oIWvpl_8J6G{Jp%Gtg?WU;N?yl??RTdw{@=Eb5MLr*1I*n_~6B;hASGtOjbtA zO>hqm&-S3pJ0LzK!3Ep-M@_m->EL=NJO~k3eh;8z^$Rgs7e}X)@wO*BsZ)*1YuMN&W1fSmR+f7m8i*8KlOc+ zdsTigA8htQKaV6yt(Al2{Koo(2!!c4ZOsVG&x|mq>gH;BKZ08n0A^TY7`j;{U-Gaa zGQF$~d6s7VC5!@EC*J1hfmWoD_G7eMYcl-dI{92m>uTlMM1mWgH`Ee=*E*)>STT1KZ4mM=>P2ye4l zW95y3f^R|bBTh=jBGkg3d15jUtqv;t@Y@y{v4wGaz%MHM_7U+NqE`Edcn>n3$ES9oT|r75vV{rnazBD zwgNT(U`4Va2vibVgJjRNG;SdpjQT7f6{W~-^IF^#jd2T-H&}xe(elfnd#vB zg%^wGhrtGm%e6Q1uPy(^E+h0lM>fex#UbpAOOBRg%s3KDuD3Isg4`HW5+|r}Ed${R zy^jDIxl-eX-W5DF@P$l#a!y~8I-JvMTBH^v--3ccCrmkSLT2d~@?u(92Gy$WszL<0 z6!dFVBbA)74H-Z<;`_068&zwlJYZAg0kOwM5(%1qP&?9iiKyFfKsH6w14jtQ)Pq}* zErQnrK%PUEPK~pMiH2zlCs9?0ARr19w*m+S z;QX@KuG5DG!7-kXIFI_CXHu0Neq<7kAA$~WvJnu>-qGh{GOB(&fhcxJg!@?0aU zoYr;Mr!vu2DRRh1axSF7(Rj#^OF_Sc?EIxS?sE3)*DwCZ_0B^Ffwuz>>xDm|3c|TG zZ|+Mzm&?wAJNxYm&A*WobnbBJUU7%2i~zG3v|L9<2&260lKRz?dQ1@k2$>&bQl=i& zHE7=4$mgEH>tprs2XmyOjmug`0irq%yS6Gh9`3JGfmcXs@g1MHdA}enSkZ6B0^WH^ zh3|@_Rn?2@x+pVoU#c7FQI>lhbh4*-wHTt68cmea7vsGAU+6Egl_0WZ3IR8PDX-XY0U z0Tobj$jyZ;->k-EU_2h72X&#wd|ujGUMt16uN=;!e>hXezIUdIe}85`@_nO?qph;qd#lcE`@*La zHbYxD2p@8jlj4ve{( z;%vktfuSj2cmxUxy04VzNoyN`K)>-fZ0hCb7Mwk2vrm&3Fv#4Rse-?FO^BKiHn8Cz6c z0^-JOxGV2+T!hms&GI+rkomru#}_B?6QD`stJs|;$^0+-p{04fsCk4U@c2+5h0@gD zxb=1WXX_)=j_u+{@S_ujxoIPwFb7S%#>)uY<%z{U^w735z*s+;Pp&b)o!93?{V8xr zY&~fd_rRTnq`4~bj}Oe7`);lO8+uuI+A>pZkmka~gaFnIC8NanYGxEMpBcQ~Sp|Vo zdaz>vS(~W5zOvWRj=2jmmHMWl6e4%4VQ_!dz;fwmI0YUx$zRk}gnU||Kr1I3BbzHn za80dUi{kK2Coy|B76!)+=^=&9m++LkhqFcE1UT-_mPy)Qq z%fB;7)DJ$LEdX98@$U>j24n%%Qxf~KZ4ql(qCJ|4(y&qYs=QmGv(fmKc=@&fTmk7h zI+XcDoMkreu(v-}#eYx)IL!~DEfP-SA(va~5pKJSKyXdrEwYnjVt@ArE&33#q6otk zM=`j|KogwQ96H)(CdWlAP4SWLKTO9qQ`1f%OnMleI*Xo1xHSM)v)6RF$?-+ekUJ^51*79eudE@Y6OOyThhU+gWkbln zq)_9fZ*!&DEGW2_c|kehf!P%#3eF*Zx-@4=sBzcD`~@1LOI&G4ZMq0R>MWfP0it@R zg&_ryGL8P1*|+JU+4*UunJ~P6NAHh3(KE%jKAt<@Ha{4iT*Y6-7iQx@hV?XM+Jl)& zb|^`yV}_o0u<8yg_3*BJf2;p%B%5cf`RsO}2{mBn@}0-Kyos1vF5VeO`^}QXI-KEX zSqKAR@Z0q8E?Ze;=64t`P!_(Y8iiLjRrW8o8NutDf3KC}we05l{G2ztZdu}=&`c89 z2L9%0%X)H(TDh^?0H?6Z{6~jqH@|hct?Uc-sV!C6UnKg{-;J7zel}^MP{nXH?CjTg z`tvBs%*=t{CA&d$-W%1H&M5ilr5S+9^qGQ~-q4bLbK$Qa}ANy}(NBt}cXlL7=>)7UKe{E(<|^2n41G&#po6hRp^T~S&UH!E;) zD~BmUXpKGzV1kVG$Z&NiR0}2Pv*CdnBP1(`d&p#*iGKMTKP*}lG1heaJI85fk~MZN-T&x3)G1rH(x-dRi+fWH?a2h z@`=buEeJd&8gi{QCnh77w+IjI{eM)wWmHt}AN4)7N{L99v~9jtX0>u_eyx~^+~KYMTNOi(#??ruw3FifRaGfi$S3xYrn7Prl^>y5 zG1Mavpq+b>=r164(%YW1=e%gQXtEd;HOrD^z_rWSAq`vg$L$b7lOQE*Q!9OUKGK&A zmMuYl6Gm8tgUec*YxLDV`e~MnR69v=UX^P7+@UXF_*D*@HZ?nWFIST=&3mq#KJ1t8 z=^8Tl)2FZ@H?y)Md;y=-WtlOZG8_38KCQ=#dxyjba~m37LSVyqs1C}kmKWI+I7*5K zQ!A$NPzlbgk4?fs7|LSf1F~iLM>PtX>KC%91HuU}!0#fLMjsDDd0@0Qqdo2{)7c!~ z9kBW~up{R=Y26a~@S!6E=;TS1dljHuKy9*H&*EB6O$lBZ(2$hci8qX$jd{ro-H#pn z0P`59niNAgy=`@6Dz-eIMl*R;7bhBTW1kl)ZFQ{47`2OKL;Cs{|4laCrroO9`8ZIF zn(hOZ@9Y~u>R#O3jy{%#NXI}J*( z!W=scw}r^NEt+r_I_Z}OdbY`Q=ozlE4jc<)5oNRq5aglE)!&dLb!NpctEw&lhN z6_;BQ-4S(v&AR*dt5wbzX&#tG=C}yZThh?KminQ^TAYrP0aMLuMJ1Pdn zpv(|tlWLj(h1j=MBpzK?UqRCtf}ieuSVA`NeolFp5YNgEaOV$LePwzzQezqw2_fxwWC7u~AUcQ1U{5|@IA(&_GN}3EU z10y|JN;3(7AErmgos=lFX;3eTMTj!)&C2LZT1PA)2E&=l$X_ODym>}{_(J*$^&vLe zSM_BIe`9YpSd2BO2U$@Ib&3cJ|Ezbi1;E}jRr?;n8!$a)gegY+`9HEGfW?^v2>RB#7HD<*=t)IvVY1 z|Ki3!x59VPNRm>KA<;?T+gq8W!S}Cm zim?iR`z`vg!ZL?p|J}2SIM;8S{04glS0T3y=>VJ2j9zmmiM_vnpNh+difrYnrJE_z ztL+tQUV}!m9cG~rp8*f|0RMq(#+8sPxdSjg9H#c6L)o&;UGz`MCN1_P(Tqavu#HCF z^RjCcv;lO6Oo}o*4OunOW4eX)ocAKiBmnc+d?cVBh>~hx%;St9yJ{>eO#8Vtw-GCb z=EuO4KT+%FG5iSP&Vu(^L|a8D_KH^dM*x3U6;a&4?Pf-AMLpsGC%F~_p>`ZBy)t* z5L1TVH~msG4dz`xi%)!>liPjJTHmqpNQWgMIAK$L6$HzHyBCNJ@|9Ehq%z~KF((bh z2icV*C?T7*Be)~%LauBzfWdw+A^5!LwJ@T9JofM3`e(c6e1rdGfE0@4QPRkP_`ZYKW=#x%92!y3bA9zcIjW zcAeeP^P{f3*EB{d^T*v`%YJLi<7)0apDo`h{W~Zg2TV@2=nSLfoOK`J|Bwo@ohD^( zM8)+#TvZVBdTFiRuMpd5?S~17xVv^JCE!R9leE<@BsY!fP_rbzJ=LLN=+|z3(_ud~ zyI=8HWayhpAvP~6hqJ9o)OLEBPkW*K~x2_(h@(tF`2cB>?@?9TC&cM5WB~N>?`OT!@I2RDgAR>1QE!@WCC+uw zzN)!OHoJyiaB%W6HXU#Ay8#Q`%zWuZF$KfY&p8q4m` z_H#2?M!VvJ4&^9Lw_J9wEm{Wv1~1^&D(?p5AGDk9{#0wzJ(*2o`NT15$Vy-_S23v$5ZR4=aK0d%bQ=8$+*<1UNmp|ksEe z8RU*XRC5w9O8a7UvEK~Ppxeq|yfsjC`;yNifeHej*3oz{bj5qgv zJb>K?JQ|iP6zbY@?zdZTUX7sAR_o4gz(z z4Gh-Fqsl^`kv(qiY z8V|Kn1!5oahF+B$y}XE#I-Z3hYIPzHu#P``qyeml?v3wJfNX&HCV7N8Wbt3sxq?cf zeh!%@ziyjeLi?})cXJaT@1)g_aC2|dO-@4)?^S5ufdt1pHC|X8)Bl@U+1PV44^>+6 z{0@{q_Lk5*T28YIh;E-3&93rZ`UTQ_0=4xS=C$)^jPaSY2v7F_M$A-;CBMN=^jFEpx9>APDk=CN3#^ZGM84L|K(C|pdCIPKFZi=&uXeVuQ!84popP?(XJ{rtiiy_me2Py@%!PcJ;uMva z{AX#!OQA3Q%I#42&8Ynws{@Mg5KM&T?adU z;&f0?==XAbJ0^@~V@u1hCgpwSJ_+A*JIs!a`a)wQ9!Z#TB(>w;B-gEG^+IS6gB6#d z$gOiS^QiX4%J;uYFkStKW0rg?@0oqWtq0!pVe#=~dKSS&?_|j>`MR7t#&wlEN4X)y z?L#7dLYHV`H<)%V2$5hdbV`jSd2S!mdC=CmfscW_`|JoG-&5_`Psm*%J^_A`rIv1G zB{-;q==#*e)a!BVEG&TQ8#^r5zTFLu3x;O8{5os6gJ8-7tgxrNukq%O$OxJMWt)Al zEf1P*)ywkJPx7OjL)^?iJk&33Pwv~K?jWuRX;-|`H{LW4tyy*-d=vvG7Cz_g->>=9 z+G?V~Xxgg?&NEj2e%szJJRz47NdIK~oAFya{-#H%+^RqTIKB6No9(i)9u5>&x8YkH z1poa6bP+N3%Xh%z+xX;SKA)!)*v>LJ`)zl7-RpqN{doq$|P zB;3!l;MQQxgIF|RMF=N`uf~EAfo^f$kW3;rsNnE;>kvKEe=Nvxs&ClFgUMNMwaxPG z_e-;toye8Fqr}bZo->m#v(^EcEPB-FysX~!xE&!dX6#dRAGO0u2~E9vt1q1@&(;4h0KAUcj!%Y24I}x^xXsno}N|qJB>Wq6q`XP3+J7% zt+e51HFOTabe`~tn*6ZO4L16`7*ipA!+DEe8^i4^JJU=HWPisF%6N{hFSLw4r@BA7 zcb|Oa?cR&Rx}!~Z$6kh_g#w};@`Cv{P@piB6_G>{Pv}7dO~K)pA^qhyvC7z(LG8p0 zyDV5``!N3m!12@U8_M{HCIfa@TNUzow;hKelhqxHLa{ZAzr6&qW8|Zi*Y`29!nkuX zmk(9u=g1}Fj9&so-M!5@_v(h~((vVdN~k^j zt3JBAn1Qh)QGrIfx6bQsS&X?9lh^<<-taMiAdp z);Cb=rr|SCmd(Xt{LU(2iNQy%L+ymrR>iq5LMI6J9oHs#Z^<{G)l1s?BNpVq7CQV= z0_WyeAI4|gh~0UYH;OAVl^Xzy*!u5V>d9m#u~?hFsE2qW>b4uW1e&|mpnOIuAV}8RrCWrY?yjq*a_7{pU+P>a_H`fPOzs4EMe%0zk z9>Xj*_Ey(%>TRm_q8fHlzw0-aFYEK<$Q|l;J@|qc+4a@^(MzNL<0g=UXgPZSYfpE2 z;7g1Z3w~v{#x^RB7Tv$=d;ol-Dv=PAWL#f|rL)|tE=*Xca2bM^4^PjMVZFJMI2mv9 zNT|T2P%qJZucuhk%@pwEt z8b@NftI)?e*98pHivW@M_SVg|B~$_xE7upG&gM6HVrPQIpjeLOx9{cMUd2cd2=dIr zc!4}CA=!@c z!ZZ7@)J?aYuq16ls{FQ(+3~_#VJGDI$2yZ)c(otLF@FcQjdbSCQNLU_@ikhHjgn>9 zf0^Sxx$^}wZ25UpDeuM3r+UU{_?Po-s@2no*{9%{o2kLijMgW4kq6=dck%&Ne5~t@ zlmFO9(0+yCTq#(M-l4Jk$y(bKNs2ax*2_)2n7s~Wq-NG2#lij6ywn^x#+94t%eUx#_&lqmYf_hZ9IW4iWWf>5hlQPbF&lA%pp`-@D^F{t%N%JQ z0@3SFAL$&yfA^HBgMatiGi-%@lGy;@X%!~)bBV>Hy`YYI$I}0wZvjklt=X@66xCv! z6J~izm4b~|Pftgw7n`y~cMV9(_V)sZ}scl5I%+}u8eE|_wnqr(=3M8 z)}K*XCS7(PvjY&)klU~e&;eT+WHH3=vMn>Pq=n4@WXsqfs@2rqHvV+wdxg9S*H7=B-5AjFKzG9JO<4ghee7SUj+4p5uC~}(n>znvITzq6twff*` z-#5frW)z2oy92FH@Sp8wuv|N2p@}%XxsuWwWc{`8oma{yQRtfNKi5H*iDBoiFCbH%%ZYdIn}KX-YYba4pcR9zw?1N zrb{!=339h2^xE~Ya%KagMe|;|{b~Q+(ChPfVzL{uPl8D~z7VbY79c0JW;m}jsgLF$ zo}kXz*lv~cRKzGUy;I9!cL=`F!>m|go6UV@IBny^;mkI0TN$PpxWnpbCdugBTpD9CJozmijgOs0x}_tyP=c^Co7b6teh8?+#3 z6W-;A%rx9~AN);5ZATX!FxG`sd#Lq!9@LHmF7`53g(T+_a;Vd}Laayk0^~;#aR$;I z5KZ3*>H|8Evmg7oXYP&^EGh4Sxtr-#Jo0Ee z;&Mqi_31b%5qLk=3cm1(m3Vu+w%DW~Sgwn5Ts&MLH?y8t%>3aAMV&A@Dn*xsi6=yH z+d82mJX!P6P_5=(f*|XR6*;9!5cyIY zqK;nX(0cO>&ffhEP&?8t1v7cWttex{gdcH^j$Px3MW2Q)+eh?qC@5xvZSPkKE=vS3 zJMZzlOuJeg!))DvPZ*6Ql+11ZLG4W_8*fcpEc$R|?>dlGNi^S+1^4IgLsD_1?vQCS zFxr;=wlfs`Z~GYwXGCSTG&+IwHk;=Auzq>M|+|#=e z{T}`y7m}+v^w_)9Aem)7CdI0+HVpT9Uh{@*|GFgPU>4cWTR0s$K^D}x!MFQaq@W9< zUqLY=2-^0XKl5=z-+LOx2y)g)l(?#gUvXa1+3e_=$vTmkzh=Cf#AX{t=cajZ7x#{O zRq^?9$WvE42=P=MMREwSv?wM~I?|3=$PpF*g^x%c{(S@!1)cot_r0A8Lb^&Dlg+7! z(hAp6;*8cp#yFtxBUbeUO_L^J+7JWR``h?9WX&HD@Si-OFcXPjktA0n}G=nJuFrVPn4LfVID_x9>q0(;+b&C)a8w{)bBNzDEVne8ILs7rY3x z&qWt+zIs_-p27k8U0qhPC7<&$nKcm&Z)+79?*m3Df<1!13SKyA2|-6zBFv@yr&zS( zi`Ydpti-fLl^P|(pROV_A#+(^XBzk?OF)SK+4Ntr108BqFL{J;`CObm_myV7A zsd}i2EBX!L+ink{Tdd+V=A_q&!*@(U0Eg+Xt{=Cy zFNl5{M3dmw%6N9si~c_r077a~5#Kx}bf8ye_X)6YqqZC9<3-I|MLHo0QlS>Bpk={M!ns> zok{Q+062P4~B)kbTP zuBK8i!>O`B3n+^1NOOLOP3e4yBUeI_l&1>nQ%4bNz9wb%_)j_(Z0ZPwe_y~KB91>& zcmCbhXL=vqh4zzYv? ztmgU*s;L}?D4?2A&EWy`Zo)qRcQNLAOTi46UR4_()%=3p;X z>DT()54wR*KCbb$G?x{=TRjtT{?U(8t2J$C;bX;olOVG56w&bFqwqeJEw923o#!l3 zQP%Iahj+8Z0QB54Uwtmf&)c4DyVYww&nQ+-;uL#}L4)(6{9)X=@A)9 zA;N7C!0gYslXZ&as}b*hn^?UGroVNjAAAl!?;;b;ReI?Q+bYiz@Y=iNx5Qv+T{BJH0+DP2D8I?X-MaJU=hNLm;v=JGM-{)=3_HlU*3)u>TKIm*AEEYT2V8OLA=IDj6K5;MeW zsBy+Cm_u`50#cezIZ`LZ74=Tej8dmLLP&`1c&xGh{AOQ!GuXZo8g%ElZP!FWeOGf< zroTDMcxQ>24G`9^pv(n%nwxkmDF^=h?zoA?su>fuVPk|Bp=7*o))V5k@`1W1pF?=w z7<53?4f=au>pP8;R_vXkT2g*ekY#MVNX(0Sqk-tzjdePKRY*Q<+D^=8|HHy z(Z;A%Kjt2aiNDjJ=6f>yNLQmI03iX(8;55rGiOeuSYRiba+rQN@MC>-{I$dRHx?O*~8c&mj6&zusGHx1E!*kRVNNaqWRy z*7O6!D`8Es;ViKoYOj*xr7lhf2{ki`a6bmQWBQ(xG)G=B6TZ|KH+b`WFW_YOUD}$e zS<2P}nsqIXQD(|Sg|BHc;|1|9mv6|GPe}T!qIM{SZFW7|QNddL`^hqd8Y~0tm3?{& zC#fkkj&DszNUL@0?&X*>1DY;wE&r?O&;G~u0{^`+5I?fos6Q^W8ihg!=mr8D$S=ud zkPy>$`W&ciFj5z{a4P!xJFXs7pWBp<$A5XY%}YVj=0d+vkBylL)8=7io9P8399U0n zmvi?Zgq)#@KnMwgTD{?DJJoEdzB_ym$eXb182rP?m|y+Wvx>0B*2wJD8x*X=%NeH04b@R*2nHGi7+y-a)} zRpPuZBCirDTC80A6BBuz%^1DOTl3h4kHK@ugQm0kHoC>2wrhBr;%??bFYxJ%=|HVu z!*{-}-7H9yxFl@bs)23Scifi!D{3!?OxudrR%fV&z07=1kE;;4Y*&SsqT8xK<5M-31HVn`gu>(JtU!BTjAloO z1a3L_e${7&68u;N`AE9-25`np{t`!H=r}5k<8yQnMI#K_8~byJ+zan4YSoJ;!HC;C zVIP9j>y2h=MU^;0EscCc^<3+Z z2ygP?Trm-xjSE@TyFVC=?p1-M1S;!;+lU?{Q}+%#Y!S64Ymx0U?0kaL(e4!_lBV0% zY=CF3#<~e4hgAE1#CD99l$Q)y;^8m9c_%<<#DtFjuaew zUkVo{c6^>Kmm?@9OldmzxL0wh6jUvRFw_aPL4{3d{hZQ|rwFRys@>$xdYXzN| zbjA@OMTh`6ms5SeLSD1x^{%?r^v+lE9cio=7k>0~xBAnXGZ@Af1R5Pc_+Ixk zUtf|?P1pV#`=hj}Nhe+7TYz=!`CnWJjY@1$i0{LP(LB94|Hf1a9ol+xE@zuJmfj)y zqWh5qOJy837wK01=FDh&gFACc_?r=NHCw|2yq!keL(1Kmp(#iq@pqTs+h!{yOMK4< z{ozacE|DRR$PVECWUlq$?~G29BYn~)VtXyIai`t3X4Fv`wL!%no{K+Rr^@9M@XI&x zpHUvoHHy-_w@?p!`iVb40nV=2M*V~HL%OZ;V90G-087!qBSH(kFQjc9ff*4yKw;0* z-kCd6P2~jncVUH${I-I8Si^&;qi~QZ!ozq4pLnogLMG+f{hUnT^_R}8+p7Ap1FJRr{jw^jkB&!o%bAk zuPEVt|4T89SsNmnd|2uz?Z^Rh9=&XU4jd|*5BxctGWTn6u;7{rwz+^|ULqsuk zpp`20K4EN&?SNBcDqRxiE<T}%2DIcM_jICciq>@PJ2~sf>=Qj?_MYS=eF~0HcehXyy9plFIx8{Rax|zSd z<#68p7HgSsq#}1i+~2H$5j3xlzS(3(qpqPU59>>QAKjYdMj=-{SKVx$Ij5dF&U5e`VTYai}@6YDc zU8m2VEAxk<+G|~(E?wDJ3fI8F0G!|Q*kmkfN2Am`>eU)VtDty_+0ay(fq{Uixu_Tt z1v5-vnYVBGc?YrJ44|)C43SVaq3?IN&MbJD&(45W*>yiY6@H1itHAHUYLi4IMQI!G zeH;W86h_9-uy=<8^GUJSPmJ<8n-%FBQ0UvL0_tXsn_;pTs_F_oI3#?+O7 zKRGc9{}ae&^n?yd{uu}!Xj@v(ZCY9nvDF{Ue~12D(umyX%q5Xi%_EXi)r{$9o`|0c zV=UC6U3r~Eobim8qm6U2p8}o7kf%hn4-LM$b&sY8l!DjJk{1s2ZZY$`mtkJ#`hXSL zhwlrwz$(?P`)X>q_BKf(i1Bo&fBFxcGm$@3m)GbGPKqn4cGXj(v)KI2fjEwGSm)&y zXN0JF_$KgEe$3fW!A{fAf70EmY^qQ9q3KD!)!On5d~3djDqgoLgf7SKzW%*&?F7jv)^b?aN@cboP6nm1@c&9>o(V_q zMRn2MMBO!tGMTHzuhw>lW;mzevph8q1_7#5sDyt41YKUE$yX4jc!Vr7u2g07181}2 z<+9v^LRVZ5&_$!XZ3mwiet=M>!~bIN09Kx!Ole%kB;goiZ__I`m-dJ&bffj`twytW z5=M{IZ>1J&mnO0sS$EGrLcoF`b-m>{$Sz5~wyRxuL?ofI^Q^UYp-GQ+Z-&B-iEAxK z`k&oqB^oIT!G;{0CJ(yLGc3K04>nD4kB!fDZOw{T692Epi=E9vVzHPu+a?Zc3o4|S zeEH{%{$%|A+JCDum3^5%!FJbHatRH--9eV`)Bj1l!byH1-TZ&KS=43!Q&a!@bN>Tm z71`;0Za%o?@!03tjRFq8tVJo-TR%AXl~kfNiU(<(yWGBRS9y~ z;bkR2u+Ighi^!@sN9}JHviMNP&re=@4D+$gOM;WJP&FPX&w>zq%Rcq|;qQKGn~R(P z?Ywb3Nzqt_F2~SMe-4|uk@~%l}bt_&%x<_7kz@K_+>#lpq4$y~*;juip zCT03;|D<1$!(sGzx;+x*>2G!S=okTYJ|1&G=P))Oy!Ja3QHbBGnD5Y&?#f`ztR2r( z_+?xTu)38xCgLYZ=gC)E+5z=!DD1#|+U%glLw|%{n%8ZeNp!*G9nGt`UajcP!y1E0 z(|Beo=-ny8U%+4MLqTMLVyE-q7;r#*^>1w1IP8K~52eV9r_9eA+YhXW=|$B$u#NZb z?6i4aa3OP;F+h+<0n6hra`5vag2*gk#nD^? zIK{pA#6I;||N7Ml+tA!06<-Y{=;l^&^f3B*u0!!?##H60Opl=!wTtPO+`Qo4;~uIR ztSL`n;5J^13=dEREp{lPb8Xu$sDS2V7%81kPk5BjX)M|bi1>;q>l>t2d$x-<*Ekf7 z`Rb}(R~>E=ho~^a{<)p%O=` z=YgTKvfbNl?m>*rH>CwO)RWrL%#1a_d~rCWz~)68#%wl@#+-YxE#Ov0_2$AVal8}9 zV!G~+k`Z5BXUb~ox94sIA`GPq4A@kgC=0o^>6nhx)xuM)Gx$rbmVa8k9@FG%Z$Oti zjtC9iiHLKqAx#J&ZU-c9OrSG*VyX*!AO3m1@mM zu$}g@1r_9h0wV~C+y?%#U3f8JEU3h8H&K>j8!t%Nd;R!rO5bHD_JJTWbI!dQ2BbVh zbO`)3l|*KgNis6LIE?&4OTN(rdhlprY+6S-H`zV2v5ws=|J)tBhVWRzs(oi?G!nuS zq_}OQ?mvS5f>gXl!gQAZnB@%^P)r({#rNh@pOkHB|lIqoBDA1mhJ1CBVGx=$Sv zE+!unYHJa%nQ?vo#0e)$J=Q(l)@{+ZG%DNmQU7Iz^|ubOuOsdf69SnY?U(8$zhf8BNBGw zDnk=QcQWn(KibM`Ni<~yxx!3;02b=}=c=^swUK&J`hDZRfOqgFb`A~MCV>|KiGCBY z{h*To^R5ki*T0@yj^=kpU8r(A%>w*65UOk(GR&GseG<4Uu1!fUTaVgdJ$Waq)(Cg+ ztGjkgP?4q{qB70gD>2YQOhnch34)O^=4$nyu)Y)7l9ETCrw(_6<4B++kIEpad9ontFdQVIjb$LaUtmcty04g9QLVPN>vPc;0@mavDbhb|+lJp58(t|XE zHqr&kUNLVxoyYl>9)34Q5|UL@q$}>sS+2JvUZW0-G`7^z%P zK_3;L4N!wAq1a!Sp?tE|@+0WrfrlK_Oaip=jf~~=RpBW~o$pX7KtPGcO9x$W-D(-Y z8CuK@ddWof+U4asS|_S_i7RgDY(iQZD-A@qy)&BWQRhu%YuVIMS09XM--V#cHEuma zHhI1qyjD=XH-IV-%#g|ijf?IUBe%`|OYYOY*FW2OuIc+ujOAep(dN_*2VbVY`-g`yb!$shTy$!{YV74cxMSydjzz)~7z(T5>oNga>= zy%G;O3}!%A6z_c*|L*n$235J34N1$baSiAds$s|M))i}kU^!Npq8yu%KuOS#cnFg} z<6D8iujawx!R__eZX#e2v{=?J-l)fq>qN&FO;EX_D@kKHC(rf<$C=OD>~=bx<;QDG zV|mVc%@WSxq}WI!sYl|65?iDOC>JQ0iP;tM2}|HP?%ULup@ln%>-BKr40M478y6Q; z0r|esiGc&@$qEpx-h0_xr@l#_98jT}hPFW*$GTvA?LkRi@d+IFzep7bS?!gxYk)Dl zIE+hU0obfeRnyw>%{aL6WgOR*Q|{p7oo+mi8eVHVq@b%4oJVCMdJb~)Z$OKOG0ba41^Q! zn@u}Di*{<*(CR_PxfVbFlB_FjA@mG{E+sE%fe_2a=N@+T7oOTsC*9a?G6(xz1&=wJ zB?C<_$iftbHBnuORH1;egl=CKwH(7J12M`w+EwBcDG%=s7dN-TQl@~+uJF;tWR*gi zsFBX!mTW(WiRTL6$5~1MChedJSiz#`WC(oLjQ2E_P3W?lFGUVkY=>D?CFFhczX@Pw zL*7g#;lC*h8Mf}KT*$!A2g*;R4!(9sz!Ghx`_Ym9*uO%lDZ23~7#sRc2s8em4`kcT zAz5wEATz`8t93?Jvcx*8qsl&}@YbM_qOr_#r~+p!mgm9$eKzvcN1^KdyFA)E&5*#+ zqacI(MdVsk-qR;Rhtw(GgMzcd#d#bea{}?BUxL4RI`#^iUTl(!%k@#jiasTzu7UZG zKf>gst@A1GvFrQi+2B;3p7wgy`OmJ^+E683{@OHBz*i;=`K0-O`*5mZg%U0RG;e=l zjI;9@P0cITS7_D%Cpf2B7ZBfQfwa%h+!FSw09|7u__A>`6M7D<8xJtx>~LnH4KmQA z=5-9*=)8ojE!)D4e*nIpj0PF~ie-#pj~@*v@DU^^4|6lm*?7Y2@qX&P$?AQ-ZtLWk zbX@_Z4RC@V#Hzn>H1V&SE{r^J;CvAnXN={4@FwTw;Cog-Bn$n98rRV?CAF0C=P$xa z<%4g;Osvx~nidVxI~0uHtIy)|zxdG?t9mu1h#Ow7{Lh^*1_D;A58$Y8U%7rG@3ri1 zAezOI>Yl=m5^+*nl_~^T%{)g__Vz#En|TMIjQw2kz5Yj1e6}jCvGJ>olvF8TqCSP< z#9w1EP$b&hP&PsAneqPeI6bIJNbrZ55F5Mi*}$AeB*$(!M;4ktS| zUVr}pOJ6%68t?w+!M@uJelH_VV{d&ysxg!x`T+M4S^lwla*u^OE!5Z2S;mTugIySM zFsrjbl5S3W$7%2qmk?;7{XjKemyo-5q>Foi^&0c%0X!D=1~-7?vSr;Fo$tY96&%xhPF9q|I%nP|R(;tgktjIRdt3h{@@yGblB|ufGXw)?QQ<_3A}e zm~NM|f=Wn4stt%HBs}#vGgiqMi>$8r?S=Q$r05pkc(A|V5KF|e$ON!BimEr1v3{05 zZE(Q&upp)>{mq!SV867XHpUl=T;2cb1FMB6-7*F!>-uZ>sj;8Q+ZAR4EpazuuxviT zCLpWc&GxL4JEXmuL07(*n09IB?p|J~+UwEy(G_LC9 zWh6AtpkF#FwM`?gPET~s=~bF`N-moQyGZY#_Q0Y>HKip|!q%kkb1BC!7krEkVxz$E zGb)CzO%RcItsfhd?GlOyV`JFgPt+{aeEx{rdq7(hbEdXV>Q?PA-XVTCcV9gmclelz zgBC)3ifP6`X1xW8_f@XcY(vk_Dv>o*dPAF);m91_3tvdJ!+ot7W3Ja;Y@6kc-O-Y6 zbX=U?Kf@j97!4>7;r`ER*S;w@Ryx3MStfe_unXU5IrF2~}`$2Ccqic9K!Z#%tIR~_{NQ^>W- zz2&iigrAKNx8ag<@VSKPj!$axlSGK~<0Y$l9atnSVTj|ZYKZlOJZ^#WC|Z-7BChf3 zF#1e?b~8$V9W-cxIw9AAJ8~VUXK9eVs*3Qb8TMiPe<>8(*9y0_kcs(ts_pM0|BnS2 zO19D290^nWXS#6dpmJ98^mBOPf%{<;2X#j7HsQXBan#gj6OL`xlBQdQy7o|%p@<&+ zv<2;uAb9-L^;wVuvPdWn_{l-kg_8Cv`3i63$$_R9sS+46XK;^PHgdSb-O=4#OJCUZ zJ99v8qAmp)i3W=R5&9E(!Ll{k_jkz&w*~^Fo^f|e((W&OW^C9eph5oM9PQX{pmeCA z%b$6nO~b}2UV?U`G^8J-P_IjjDRTMq^dCyyH-HJm%js52Oe1E|U{lh9w_W z$iod%sT^0%R&;5l*UTvh-KW;L*NiE4W1VhA#1Q%p;{GY(FcGA9YwPS(i~pTjTP?z! z4fLtmn`&B!W}=~8c>82y2l%$kmMvY_v@GGILK+tK0TI;ea3@9aO6;z#ab*e_J9c?8 z{y65mH2FCGFuPcnv+d!Qw&C4N(7g8N_g5)9r&1pF)`KQIxY?)#E=`S-h4j?Cda_BO-l^S~&*SKU5p^a6%xI_A|w;-5<3+$P!{7H_cL@ zs6k2a>|r6@Bkz8gh^^yq!J~l~ZWXb8nvw$x1je58TMfbLH8ab)_r1=RB!Ye;rPj&E zB6ql+^ADXmIW%7T2}_C^ezkdNs^F9^nr8h^LhT^qkT2CTXy7P*?pZ_P zh+&`N`_lge;Ne_9hI*!(|FXS%HIqzH%D8zTaws|2k`zn$t6zkA({WJwe`X3?n7Ex1 zqLL5~kEst8Axzskq%OTouPs1InhAJQ^+FH#h|^FtV^Ymc&CLRj{CL_t;JA7CBC&lu zVD&6_D`yZkAQX=l_0-!ffL2#2w(t}Xk*)UfSs3r1J!OU03dMF+m-Fl<^%~917e?I< zH7yQHy)6$_%@>vBb1m~?W~oNsr^O1oyXVDpK2%$NG?vL6$Y;XD!$hah7T}b)~{3|hMbF?!JANng8978}0O?H@Zx=8D{4`u9Z{H%&cD zc#PRP-)xa}SI}{ulgv#sC|HO85Okl-c*y2KBTA5_{!?(c2Iu_>2uj0!nS%4ezMxpU z5Td-kZUk}~9gu6V?)v{)d#k9nx~N^477E3Ky9Br5?j$%A*W&K(P9bP1)=;##1TSud z7T4nL?(W``_xt~gbH+HACu8IyBRhMoy|U&r=X}w zph-`myFrK%j=5YUZs$vdY5<)xAikfEmi_y^Ztb4h^zmLr-Ke`dqjVkur7z4oUqy6a zoc1OSU)>*9bh>%8C;f8iT%<-dShWgoZ^uF%Rm{SKTwpH8!p5NXVLo1-cs62Ph-lMG z$U9$eUR92Hf+AhJsjAhiBrGHjAZ74x9$2$3yd1bJpIBm|BGPjQLQBk5U5PN&>mxpd z=Y$>1Mx4hS(Kl0E7Cp%=vI{)S*H}LACE${6x$ z<{y^Nph9}1n#Hp%`^dE9@9HE(6^}wwBKGzXC^DkkT>M{CL5ao zga`Zc=yM01e6By2e&;zPG&nxOVc2W$4N~dFIFQ2MC){fWQ-ol7PJ~xnbnzjc5L@q>8mxR#CB(7me)p0D!I$eNHa@{%IK8phN zqTlYImL|4?$+@0ry5kBlG9<9D>zFsS+K?PY>E!s zeQHkcn4$c(SyDC6&Y$e9HV6rCB~!`6&R4XY?VZ^NW?lB82-LU$2wN8Q;rUy|-ST}U zuK6@A2X=Gcm?crA@|n2b6XBk3`2xtn$mFa~QY4^aTDf>fQanovW6EO`bDJz2dYKN< zBhVv&hy~u6UVhj`ZV5nRpX^*mWiHuXgE>UnfZmd11Zf3-@JGy`77UKZxryd_uOE;| zh>f0O+vQ~uP{mk?#g9RT>;K#JBKe8ykkZiQCkF<`F*JhhL4Lo~shlc={xjfX= z_AMk-u}~>0)nI~$?#eNk}wt_&~AhtyDfG|w?{hx#) zDI@@$EJYk+zWfEF>Bu)Tghn%?0o>e2YPR=OUh)P^VEHbaRIZvXVtP8+IehnP0Wr&6 zn+v;CeuN{b)gW$t6&N!^2XTC;Z+hij2YRAdIv7A^A8#RLH?jJ|XZ1iH5`{CA?95s? z!e_Sjm$8~!p>dC+@N0&2#MABI!ya*SWHa}Lt69*kOloG0kvz}5wp>yHp?Y7a#if~} zGO^o7phN2%lT|RQM91H=aN#}wNyJdz7XCySmF{*%+eoQ=&(84`+1q$4ADOl-!Kw7) zaCzPe8=~r|*O+jA$I=qP+1 zD$!#S)DJ;^09Qvt+NzX*@%hNDO|hp-F@iJL*nK7AQM_ac(jQH3S}5?Z z&9FT_rW`NKKwdZQq`XVd6Wy<|K3r|U$TGy@lMEo|Y0!xQpuw3p!+-F9GlBMG9zR zrox?t@DSpNKyQ(|PeZXP-47Hz`ZjO;Z99=M*)d8(?mE$AuqQjjJowu3RU`r{K@ArW zcZ-S2*harpZxEFlLf|c5XjrxBO5QqabMSeO-e??fOBBEZ*_(@~Ck`>69gX@vF23gC zATh+G$4+B~{+=)I7-j1No6UIU>11QP$>&AcNAuZJmWYh7=9HCsLrjZIyCy&=_3p3J{F zy7soxuuw$Tf)c5-G(;d!^I8wWsO6auJ8LjhuJT2C|M2sq5jW!o|Cz@eLc;zS4dG({ zC33)xM;YdRvn4#>H*518S4G8>6BqL{jzn3Wpe12wV|RzaIxFrRcbd^ieim5Kg@Rq@ z5+4pS@w|$z1M_jO_L&MV;3qPl0fj&c#M>oCeZ}vqO+};U>oQ$B7XI3TRv}I2>!!cH zRuP@>p#DiCnuIh?M z`qN}AOiQW*@9dSpRxt;ppLx8P?`2u~sqf%`H-uio+a_9t7gaIYAor`9NFw&gg_XaV zr;5uFBKn<$H&%Z5NMO3QJpLsF$&M`9>UXeSXa9o~3=-tJoJelQHA4Lu z^Ja76eabljdOD^xVOmga$f`$0;?=`m&ROH<{y-dq~yVRMRX6($;6+#)ntWDWmvQ7FAmx(fZ0A@<$kPD zZKp%E_GWjgudE*(Hvc$}-ZB3`b+zupw2A>i05RBGeV+xL+fMlVZ=rwH`tAv6WW;da zhHYBvB>l0e<`;W^6l$xV>daO4jYPML0~+&YTg002O=mMXB9B+keBR?cN6*N;6(>8O z_KGJCVkKEfPSzhQOji(YXh?|$cvFN;t@S?a4nafiz#Xezbsp0qGLiR$%dAs~J0QA1 z?4&^Uj<8KQSb);pFzP$}VY``ouHE3Z2ku8!lW7KSWFzoYy1~l_`XNE>Ek8)+IGB+(!n4}8@AUqVpgWs>ld43Lft!7;an1|^leae2O#?yLv!Px)q zV^%;rc~#UZ)3hrNtx<6S4=iDjulMu3=Ii@?AkZsvxT9KD&sx$H#=-c13K?GC%lLl`R?xMX&0W(8^Ge5>*_=tY=^1b@gTfUxe7qk z9(CDZEp-1&vPw;v0<5+H&35Iq+ACyAjmq-Ny-tXs)Y(s{K<8M zvlSU;xtvrZgI1J>Kmu>Z_lJ#1iIuWm>bCvqD zq^bE$+QCiT#&R@F9UrIoU7|QdVVP{LP8G`bB+VuD2f%14Ma{>8&s~i9ny)d~zLRB# z?G8~^?@445>hgR5ZW$4r*7NiW0)?V0E79Vf`2i&fjFxMTa;;QcxuVPW*+*!=TFSZ1 zD6D_Tuy?&&pkmQby{NU=b;sArhoMyD?#A(rBA!Nkr=@(FGru#7c76RK$`({UhPH!6 zx0jhFCf%26l7eM_Ws4#u-#oFub%PLGoWo$G5(4d}p&^p~l4Zk{X3 z)uEv|dHWN=zIf8FrrHHZ>Dot6;Y|L$4T>C3J`w+N0E_CS&F9X zIP(^|d}UT&kpN}r&cGbv_ZMjFSnwPU5C_5`DVP~3O(;u_2ObW#Rl6BY1tWi#Gy+ca zzkh5{q9O@>lu4J$2vGXrJk%O>wFq4uVBJiVl=V*S*~|DkpY8k9E!6t&BIaVyS1trQc|~W zApj&~08@t%j;Rg8g}%J-`FxV>W7aNfq`TgpRDMd=QYvU##P z(|EdBAsJlOBdyXJKUH&r2OC9j6|MG3_v=|wKayF!Hl_AD_$YX4?E<#?JtOv2z>xr^ ze`@Lx5MMtN`EWDcyeS8)qRdwt&Uy@nN4T|jJ3t2>1n^VovQ5=K5oz)406Q*Xw>+-{M{Ocym^nlrFg^*4aD< zzt9`s373(9DseZtNU5R1F#`FPEPwKiSPE8eLta_ikVM6FZLO8?<9^IXE0&B#%qR(M z%j-T~Vd+tr(K^LS*CVx-L=Kt^*j^Zb10l&W=(Q0;~{l%fgF z_^Tv;4;3=u4)-1~-{4R=z`(25cJIb7g+mBN{i1eMeOb8x6Yh|%nL_w(@O>dee6xxl zCTgjD46;o8%;63;^FmPLoS~jPI9N8#@z(u{XWOr2s);gsq6M& zdrJ1RK!y-9bbcsv=hS?y8D7+H#!-=aFf;OEj|g5HSH%V=it`y~Xs0QsBgZFtmFNW2 z+(_Scnhj&pd5f&eu7}u=^SH7SlhQ2bb}xTVSl5?bd+!SiMM}XzoYWkuF31~=9?S3C z1kFq9Zxd+8gYH)Lvky1Bbdo0Qfi#I^IfMZtVL zeC-V6P*jynOA|H>x|tch{8Eb(m%e!!)JI~|T#I|p=8xOkkCPIkaT9Us)&^}_CFkA$hWv#1M@Rz%A5(^_%rjE)p%#=6l4QdtWgw#ukwWYEo#j-*TU|AjA&?%qh zu67jW)%IxuFEZ|*IZLBo#7F!|aC6rJ#EG9~VBV0|r^A)K_cv^ho(gli zCcz5uK99Vv>$%0_v;#Q#;Rp{(L|KdCiFAY()70k2$@WRg#Cg;&-Z1$-UH!;S8MjG# zxpwa07&5^^zr)fJ;W~q7lFBd6@P|TodUOM2jkt3deJU=p8rE7YNl;XJV&dS?EoWtI zupHEobMCj?6bx56>-YuXkl6SL4yUJk=1$lxVu1oR;}PGD9Jl>DTDqvojy#@F56*(y z$njV=Tibn`)}&nK&HjXUo?A&*ySgmo@k}Yo_C4ojD(Wm?|4zjB-@l!o`P5@XB)nPC zj`)j#9G+*?a+ocu6J!R0^f_4sI)5oJA5>L5llypmFbF=aRd#(FB7wr$r?eG=?3of zbd@rUoOqH<}VrXfdAvpU(P!b^W=5gOyS4=iI& zDedP)T<@#yjsRL5$<DOfH!+gU5-7#8$dVa9=9KoZLYc{l*s42+-(F(E z$H>2#BuPpXuW(kgaw>S-mYV^@mU+bhI34QX?s}?5M zlS`2g23evLv3q8x6BB`ReVxT$uBT2pR@?*mBwp_=D1z@dMm@gak4{c%>~%iO{eGQE zqNnE~WYf!STJ=|wk&(#|^{c(Q$P)4><`L<$T2-`$OUNjwJQnZm@!W^vHxcSiaf}Tt zNhQleGNfex+IU^5c#ED~<}()jEiV|ve!smTcE^*3$tZs*QO!A>-i3#Fob`R6@?C%P zLBCeII}+1@bPhrdl(k1ux8BN&qMURIc{11|mk7Lfm8*hj9-{sIAu{*iJNY-{q+xEl z$;HH{qFDI9#mMtQx%d3^F!57`O1+}sk6>Q9FRH56FqOk?Qm&3{ss{-h5^Pr-LA;ir?b0`jdG=%df@L`#9c3#u|&i0n*z zaM?~%PVq0#hC?N+$!6Bm8LpsKg+bY-4iuIoMW|;bNt?6+$TLCgHVsQ?8?blydX@8U zd4>iQV;uaj-}LN}^ORLCCH)nsb+A8C@S}mk`I6g)A-r>Z5Z*0! zwOdnDkWkYi{QB-f&h~Gci^IMC-obc3mFpUPrvAu8O5b+cDX*pcTxKnC+(%F#Y*JH2 zsP`k_g2E~ssB90LLS`YD@tancJ2+`t^Dc~4l<{N#R6kHU`UVj>t@Hxx5BWN#5rN1i z!kY8ub##yUV!dn9u8C(l=;1*lU)`ekpH7W&dq%WoI@x5uCHF@6$N9-lu2T}jYQKfJ z#_%n`Y_=!e-cf5cG05^PQuB8-II43<-SMdQD?i|Hrh6 z6U0Og2P(nm2bbFK^P`g_W)Wb*EgMeaR)*Sa^4LfVG&%0Z^H}C2WtJ2bB=;|Hgfu&o z6^Zs3#_(s$IJ&m85G{I_l3;(b>%&)e_P}xyoM<|!1+rJpaA@l^oqw8OfTMmC+8S$! zyw#C4Q_^BZ0{^dyMQKG={^x|t0x%TIYpw?t5YgZiK~(zs~b zA)XVSt^l9u&jPs3(iCT-Sk6B>EulN6CZ#;|g%IZA?4s@b3C5R6R3;9j(DIK&CZKAZ zX-wRWq6*%B=H=RDVrF)G7*9+Spx6!K465~0WFS$jP$DA^HWe#TMk`rkXcl{z5gfAc zkCVFO>L=fFR~NG#KErc`$G`bmDF(n6TI*dF6p_QF7PMMMz7UE`vW+m$0ug^#2CwuV zH0(5$x=$&`trKAGIX7TJqWrk}dIV{u6#q+NCa-Z?Zk`Y#^Gk-TUtV2l>*?*!qR--N ziY-|Hqqr{DUT+0%PFD<`PMUHwQx&(D|Z?KCw}v8?2i zb(@@5GM0D7gpb(dYLBBDMK|2D9I3R%;M(elrhG8Z7qr-PXOlv7Qu!`L)!wq2Iit?K z7>$C+X@wy2PqzOdvkf!6!p59Ptzn(@SJuqWGRp+Ih8t{q=kw2SnXAxL6`R3fV(72_ z{n|>~e!9|j)VSpAQN$Db zHuGLIxiH3@z}lq(B^Zu+R(KjhhVtmSb?+h z)aJbwJZQzHf7@os-aM5>-aP(_y}WD$*w`OkNI)0fppdV({srKc;oW(Ew-66pcIy|S zkIInN&u3CEg@Lrns0>683cry*On4P9ee_8emd5wl3b4lxy2@O0B(0M!tup!DaUjUT z%1WU>l|m&E{3~Ak(Y8dHnOsf?tItTi=$NXuSFI&C_s_}JI2hY&7^vNP&);XqNjy!t zsa#A(5U(+Qi7>;bXr*0kw|XdH`+6v`-(aPwt=%R?|GNotMX@4V%${T5znC=iyGBWu2V$q@6%Sp=h zZpA03?ovCceeTg~0sBFGfiuuli_J3j(@wxZQjOk_2PfrF zYg`g#;CbihvFFKR1H}Uw9P7j|k{qg9cB4jK>VxNj1UuLo50U!*R|NvRP0y$=b(^T| zny;$IQ>PyVX zb^;9A$H5&e<{xiNw)@P>oaS@)R)0%-3{iOjP$vs8= zIY|;(6{}J%gg+e90{2^WS1T_w{4#!y6&)^ZNz&tKaL))eggm2icZQ=`ZT1~vIZ42= z-iY9bjt4BSM#@aab9?+t6Pvsursa<3X2ji!RqO5Imy}#MW(Oq^xJBZ-o5@`?bNu?g zXf;cDVOw(AQ#$M??|Cxtbn>~1B6}Djj86R({U%PGt=r$+`LO1|T`73UPC6BN9@0^DI0H45 zur}$y`cKKhp2*g6>~pLP?xBfivF!J(f@i&&FIV;F)NqZ^RPb>#E;2u!*M{R?gt76h z#SH!7k1Dnp?NTNIT`H|tEvl*z4ZO&grr66{O_~-jLTtZWDT~d<+CX_XI)ce4k&E=y zF-P@2$wDzFFMdH)O7fG299ka6``nE{y}lNdYLbWgKzFO0H)y4%f}oA%9=^^*1Rh)^4nAUUu}}1)i8Sm2FF#_Rv@&g{$0?(Z>eZ*TCxe=w zI=F)2h3Nj}i7%cP&dzp}mHoY%skV(f=Z%zBGltjtqm-=9=xhiTVL<-39e6yd=p{x)q5C5)L_G zPzX<_tgZ`|3PCQoobtb`xBTZL=y*5Jk7Wr>wf`*cew%QkQ~7BJ|H20zh2WDtzb^(y z4)#<^^Q$VA<2!gbw!h}g$50}sy=!>fg$Z1xlsKT21jG~MM;Km^e_&X|B6Wum9JFiHHtZl3S=bczk|01A8)@Spgn89Gv4b~X!2OBw~OCqviS@a-R<$* zJ7@$Ehq8-PrZX|WPpo3w4z*!C{KEdhvX^@R5jW4WU+ivqi^U;-K+VMwWn&V#NQ7Dl zBcb#&lK!RG6Qlwtu)M|v?l>sUB*)2rrDi_Fb;I&3uW1OsKK=bKSgtRPTGMqDoAvzM zGz8urJ&qOcZOkTStQn7_k@@wAP_8g=l!V86|FFE;doK2>lL#+F4JrVMj$+#D^&f(b zUX6;3IfYx`ujav##A3o8A&@&=W6ilh8^G#i39s+;uIaglBdh9av|XOdzbbRDtlljG zxv*$;1xt7F2Dd3r#(kxTpOAcHM3w< z%wuttiJ!bSGe-V*1#*1Bn@mRDy-f|~TN;&5`@*Ge4aqgHiui$zb_ULm!|d>rUX|9} zkjJSU!xl6su!vjDzd$a*`)Goo_(tE)ao>-qg{J?Qf2jSc>lNZ$9jM)Xfu%uK5s3?^iYb`vcUQZ_f zt4?W9;^QUM?)+nr!t(eFs@Oa#T!xx#njclgvSQY{&crYfhV~tL9x)GdA4~&UgeIb- zumH6saNd^YUaJM0z_S3Bxua9K6r;y|_71GEDMja#cqG40h?n8jf>%KCfsqjP?BlBx zU1PV{1Pe)eO%+6L8L3(md4NoRK$rNjYuTzRP#H}=N z9}gK%OlSh8|)5CO>+~xtXX9;IlfUrfNC2+z)FCcG+~{sA&1YU z)G_Mq5%L{@Xy5uV|5A;!t4@0nF4f<=3EW?0g-%exZfryB+kRhGqesW+ssC|cDLx5@ zj{qlGJ@SRhTwqgS4O802JaVO;Aek1#hLD`8nYJYtW-LWBt)n4EWB1=?;0kp-Gu0Jnza3&eZ)!u>YT4=>Km@ z)EEi*i|b5?P^Ob5z^P@$0Yx`Z+OO|ypI}Y@UXiD!*`t^Khkl^1H*ibN(=^a6K{;(P zuo_M+WzSaI8LOJoo_p2W>QC^w2>H(H1h+8WE>;QxN9BseU=3vUypIyEIgx=^q+i8u z3}4I-FH(&W4 z`A+ZDW6|#+L#zWCu!iEXE0%|Hx3zSB^5o?^k^RpB&M=EF%jVH4)-w=i5=HR;~U6xfK1i9=PB3T@LqJd$V$>kgOx3) zk&GtXwxS1*TGGbZ&(9rUko~*vn#+aESl`+mnNPE-!IyXfsI%YSM8VgU)K-@YU*mAD zshZ)VxPAks+lqusB`H`&*l@>xBgKZ#eG;nbg!o|Uwd;UwCjU8vz6WB)G3%U2*yx;g zr=z9StU;z%ykYs8QXSa4Q1O74P!E2=@(q6c<>DclRju;Lnz-H(I^Wxo6=qQv3LH1b zY;d#)KYi3q3BEWb{ZJiKPMth{rlU}OM^Z9(goYm*=zol}hocBqOS#N&sB+uw08mH| z_%hJ5FsXLh$fI&!MU4MK6y1(q5~(`zgts$5!l@;vS3<>*C&`zY$mdMqLY0-e%qIjC z_og9evSD?bjD!L07OfXh8MD^EUr;z7LQBqjw|_cZ?Qs6bUaw5`j-+q@M>co)n=3Sc zzGyzqEeg-{YL;;vvzOjaLCCN~wB`KJ*BT;;`{OCflaq1p@+;nL{2h8ds<2|%f=|a4#T+t{ z0uzBfF41E*mdHp7g)DH&%Vs&nO{Mi;8uFC3zzp0Cg{y)MoEV694Re)`c$MbZa`fyp zeZ8sCk4svdnGy|B9cZ})vX?IR!(au^inS<(x?=|h;#O>+^)c=Ze7y=4Yq%Vb5Bdt; zst4gQsyMoH%N<;Vd8!8oCr1WxPW|;7^J7co7&AXJ5!$s~ zSg%E0rY8CjS7C;csT4TF%iv||)}gY{r1$j$z%~GZ^&j`pwc4#yryvZVBdk9;lJh$)n_h zDOW=k2CWKMSEd9y8cIZ#0_^vk`iGQq3Ul4c4GP>IrK|hCSaj50cV__yOu|~lF6S8P z$~rhQwUV+$jl;RcS_sbn?Tq99ir{8F@c$h{zw1Ak{(tvFfK8qeFZ_JPR)T3(hrKk) gi08i#D0DAW=y@nx4*D}|2=JGJjEZy>$TaMK0iZG+YybcN diff --git a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md index af0e7a1806..98c1db15c4 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md +++ b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md @@ -1,5 +1,5 @@ --- -title: "Manage Surface Hub 2S with Intune" +title: "Deploy apps to Surface Hub 2S using Intune" description: "Learn how you can deploy apps to Surface Hub 2S using Intune." keywords: separate values with commas ms.prod: surface-hub @@ -13,20 +13,36 @@ ms.localizationpriority: Normal # Deploy apps to Surface Hub 2S using Intune + +# Install +You can install additional apps to fit your team or organization's needs. + + +## Developer guidelines +- Surface Hub only runs [Universal Windows Platform (UWP) apps](https://msdn.microsoft.com/windows/uwp/get-started/whats-a-uwp). Apps created using the [Desktop App Converter](https://docs.microsoft.com/windows/uwp/porting/desktop-to-uwp-run-desktop-app-converter) will not run on Surface Hub. See a [list of apps that work with Surface Hub](https://support.microsoft.com/help/4040382/surface-Apps-that-work-with-Microsoft-Surface-Hub). +- Apps must be targeted for the [Universal device family](https://msdn.microsoft.com/library/windows/apps/dn894631) or Windows Team device family. +- Surface Hub only supports [offline-licensed apps](https://docs.microsoft.com/microsoft-store/distribute-offline-apps) from Microsoft Store for Business. +- By default, apps must be Store-signed to be installed. During testing and development, you can also choose to run developer-signed UWP apps by placing the device in developer mode. +- When developing and submitting apps to the Microsoft Store, set Device family availability and Organizational licensing options to ensure apps will be available to run on Surface Hub. +- You need admin credentials to install apps on Surface Hub. Designed to be used in meeting rooms and other shared spaces, Surface Hub prevents regular users from accessing the Microsoft Store to download and install apps. + +## Deployment guidelines You can deploy Universal Windows Platform (UWP) apps to Surface Hub 2S using Intune, easing app deployment to devices. 1. To deploy apps, enable MDM for your organization. In the Intune portal, select **Intune** as your MDM Authority (recommended). ![Choose MDM authority](images/sh2-set-intune5.png) -2. Enable the Microsoft Store for Business in Intune. +2. Enable the Microsoft Store for Business in Intune. Open Intune, click **Client apps** > **Microsoft Store for Business.** - ![Enable Store for Business](images/sh2-set-intune6.png) + ![Enable Store for Business](images/sh2-deploy-apps-sync.png) -3. Open the store from the Intune portal and click **Settings** > **Distribute** > **Management tools**. Choose **Microsoft Intune** as your management tool. +3. In Intune open **Microsoft Store for Business** and click **Settings** > **Distribute** > **Management tools**. Choose **Microsoft Intune** as your management tool. ![Add Intune as your management tool](images/sh2-set-intune8.png) -4. In **Settings** > **Shop** > **Shopping Experience**, turn on **Show offline apps**. Offline apps refer to apps that can be synced to Intune and centrally deployed to a device. - -5. After enabling Offline shopping, acquire offline licenses for apps, which you can sync to Intune and deploy as Device licensing. +4. In Microsoft Store for Business, click **Settings** > **Shop** > **Shopping Experience**, and then click **Show offline apps**. Offline apps refer to apps that can be synced to Intune and centrally deployed to a device. +5. After enabling Offline shopping, you can acquire offline licenses for apps that you can sync to Intune and deploy as Device licensing. +6. In Intune > Client apps > Microsoft Store for Business, click Sync. +7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Click **Assignments** > **Add group**. ![*Assigning apps to groups *](images/sh2-assign-group.png)
          +8. Under assignment type, choose **Required**. For the selected group(s), choose **Device licensing** and then Click **OK** and save the assignment. \ No newline at end of file From d275ed8cd550e24cadd8c44f397c6ac1fdfdbd8f Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Sun, 16 Jun 2019 15:57:47 -0400 Subject: [PATCH 200/303] fix: MD039/no-space-in-links Spaces inside link text --- .../create-manage-deploy-custom-pkgs-ieak11.md | 2 +- devices/surface-hub/TOC.md | 2 +- .../surface-hub/change-history-surface-hub.md | 2 +- .../connect-and-display-with-surface-hub.md | 8 ++++---- .../create-a-device-account-using-office-365.md | 2 +- education/windows/TOC.md | 4 ++-- education/windows/change-history-edu.md | 14 +++++++------- .../windows/get-minecraft-device-promotion.md | 4 ++-- mdop/dart-v7/TOC.md | 2 +- mdop/dart-v8/TOC.md | 6 +++--- ...copying-the-mbam-25-group-policy-templates.md | 3 +-- mdop/medv-v1/TOC.md | 4 ++-- store-for-business/TOC.md | 2 +- .../sign-up-microsoft-store-for-business.md | 2 +- windows/application-management/TOC.md | 16 ++++++++-------- .../configuration-service-provider-reference.md | 2 +- .../mdm/healthattestation-csp.md | 2 +- windows/client-management/windows-libraries.md | 2 +- .../change-history-for-configure-windows-10.md | 2 +- .../configuration/ue-v/uev-getting-started.md | 4 ++-- .../ue-v/uev-prepare-for-deployment.md | 4 ++-- .../configuration/ue-v/uev-release-notes-1607.md | 4 ++-- windows/configuration/wcd/wcd-policies.md | 2 +- windows/configuration/wcd/wcd-start.md | 2 +- .../create-wip-policy-using-intune-azure.md | 2 +- windows/security/threat-protection/TOC.md | 4 ++-- .../mbsa-removal-and-guidance.md | 2 +- .../microsoft-defender-atp/TOC.md | 2 +- .../microsoft-defender-atp/investigate-alerts.md | 2 +- .../microsoft-defender-atp/investigate-domain.md | 2 +- .../microsoft-defender-atp/investigate-files.md | 2 +- .../microsoft-defender-atp/investigate-ip.md | 2 +- .../investigate-machines.md | 2 +- .../microsoft-defender-atp/investigate-user.md | 2 +- .../microsoft-defender-atp/machine-reports.md | 2 +- .../microsoft-defender-atp/manage-alerts.md | 2 +- .../threat-and-vuln-mgt-scenarios.md | 10 +++++----- ...file-exclusions-windows-defender-antivirus.md | 4 ++-- ...file-exclusions-windows-defender-antivirus.md | 2 +- .../event-views-exploit-guard.md | 2 +- 40 files changed, 70 insertions(+), 71 deletions(-) diff --git a/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md index 0b775febe8..6931f6e77d 100644 --- a/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md +++ b/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md @@ -20,7 +20,7 @@ Review this list of tasks and references to help you use the Internet Explorer A |Task |References | |----------------------------------------|--------------------------------------------------------------| |Review concepts and requirements, including info about the version and features you'll use. |

          • [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md)
          • [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md)
          • [Before you start using IEAK 11](before-you-create-custom-pkgs-ieak11.md)
          | -|Prep your environment and get all of the info you'll need for running IEAK 11 |
          • [Create the build computer folder structure using IEAK 11](create-build-folder-structure-ieak11.md)
          • [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md)
          • [Before you install your package over your network using IEAK 11](prep-network-install-with-ieak11.md)
          • [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md)
          • [Register an uninstall app for custom components using IEAK 11](register-uninstall-app-ieak11.md)
          • [Add and approve ActiveX controls using the IEAK 11](add-and-approve-activex-controls-ieak11.md)
          • [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ieak11-wizard-custom-options.md)
          • [Security features and IEAK 11 ](security-and-ieak11.md)
          | +|Prep your environment and get all of the info you'll need for running IEAK 11 |
          • [Create the build computer folder structure using IEAK 11](create-build-folder-structure-ieak11.md)
          • [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md)
          • [Before you install your package over your network using IEAK 11](prep-network-install-with-ieak11.md)
          • [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md)
          • [Register an uninstall app for custom components using IEAK 11](register-uninstall-app-ieak11.md)
          • [Add and approve ActiveX controls using the IEAK 11](add-and-approve-activex-controls-ieak11.md)
          • [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ieak11-wizard-custom-options.md)
          • [Security features and IEAK 11](security-and-ieak11.md)
          | |Run the Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard |
          • [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md)
          • [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md)
          • [Use the Language Selection page in the IEAK 11 Wizard](language-selection-ieak11-wizard.md)
          • [Use the Package Type Selection page in the IEAK 11 Wizard](pkg-type-selection-ieak11-wizard.md)
          • [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md)
          • [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](auto-version-sync-ieak11-wizard.md)
          • [Use the Custom Components page in the IEAK 11 Wizard](custom-components-ieak11-wizard.md)
          • [Use the Internal Install page in the IEAK 11 Wizard](internal-install-ieak11-wizard.md)
          • [Use the User Experience page in the IEAK 11 Wizard](user-experience-ieak11-wizard.md)
          • [Use the Browser User Interface page in the IEAK 11 Wizard](browser-ui-ieak11-wizard.md)
          • [Use the Search Providers page in the IEAK 11 Wizard](search-providers-ieak11-wizard.md)
          • [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md)
          • [Use the Accelerators page in the IEAK 11 Wizard](accelerators-ieak11-wizard.md)
          • [Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard](favorites-favoritesbar-and-feeds-ieak11-wizard.md)
          • [Use the Browsing Options page in the IEAK 11 Wizard](browsing-options-ieak11-wizard.md)
          • [Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard](first-run-and-welcome-page-ieak11-wizard.md)
          • [Use the Compatibility View page in the IEAK 11 Wizard](compat-view-ieak11-wizard.md)
          • [Use the Connection Manager page in the IEAK 11 Wizard](connection-mgr-ieak11-wizard.md)
          • [Use the Connection Settings page in the IEAK 11 Wizard](connection-settings-ieak11-wizard.md)
          • [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md)
          • [Use the Proxy Settings page in the IEAK 11 Wizard](proxy-settings-ieak11-wizard.md)
          • [Use the Security and Privacy Settings page in the IEAK 11 Wizard](security-and-privacy-settings-ieak11-wizard.md)
          • [Use the Add a Root Certificate page in the IEAK 11 Wizard](add-root-certificate-ieak11-wizard.md)
          • [Use the Programs page in the IEAK 11 Wizard](programs-ieak11-wizard.md)
          • [Use the Additional Settings page in the IEAK 11 Wizard](additional-settings-ieak11-wizard.md)
          • [Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard](wizard-complete-ieak11-wizard.md)
          | |Review your policy settings and create multiple versions of your install package. |
          • [Create multiple versions of your custom package using IEAK 11](create-multiple-browser-packages-ieak11.md)
          • [Use the RSoP snap-in to review policy settings](rsop-snapin-for-policy-settings-ieak11.md)

            **Note**
            For deployment instructions, additional troubleshooting, and post-installation management, see the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)

          | |Review the general IEAK Customization Wizard 11 information, which applies throughout the process. |
          • [Troubleshoot custom package and IEAK 11 problems](troubleshooting-custom-browser-pkg-ieak11.md)
          • [File types used or created by IEAK 11](file-types-ieak11.md)
          • [Customize Automatic Search using IEAK 11](customize-automatic-search-for-ie.md)
          • [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md)
          • [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md)
          • [Use proxy auto-configuration (.pac) files with IEAK 11](proxy-auto-config-examples.md)
          • [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
          | diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 5455a7c03d..827a27bd02 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -59,5 +59,5 @@ ## [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) ## [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) ## [Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) -## [Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) +## [Technical information for 84” Microsoft Surface Hub](surface-hub-technical-84.md) ## [Change history for Surface Hub](change-history-surface-hub.md) diff --git a/devices/surface-hub/change-history-surface-hub.md b/devices/surface-hub/change-history-surface-hub.md index b28387f8d2..2d55222b1b 100644 --- a/devices/surface-hub/change-history-surface-hub.md +++ b/devices/surface-hub/change-history-surface-hub.md @@ -22,7 +22,7 @@ New or changed topic | Description --- | --- [Surface Hub Site Readiness Guide](surface-hub-site-readiness-guide.md) | New; previously available for download only [Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec) -[Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec) +[Technical information for 84” Microsoft Surface Hub](surface-hub-technical-84.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec) [Surface Hub SSD replacement](surface-hub-ssd-replacement.md) | New; previously available for download only [Implement Quality of Service on Surface Hub](surface-hub-qos.md) | New diff --git a/devices/surface-hub/connect-and-display-with-surface-hub.md b/devices/surface-hub/connect-and-display-with-surface-hub.md index 86d6848826..5fd13d7b95 100644 --- a/devices/surface-hub/connect-and-display-with-surface-hub.md +++ b/devices/surface-hub/connect-and-display-with-surface-hub.md @@ -115,11 +115,11 @@ Use these ports on the Surface Hub for Guest Mode. These are the port connections used for Guest Mode on the 55" and 84" Surface Hubs. -![image showing guest ports on 55" surface hub. ](images/sh-55-guest-ports.png) +![image showing guest ports on 55" surface hub.](images/sh-55-guest-ports.png) Wired port connections on 55" Surface Hub -![image showing guest ports on 84" surface hub. ](images/sh-84-guest-ports.png) +![image showing guest ports on 84" surface hub.](images/sh-84-guest-ports.png) Wired port connections on 84" Surface Hub @@ -294,7 +294,7 @@ Check directly with graphics card vendors for the latest drivers. Replacement PC ports on 55" Surface Hub -![image showing replacement pc ports on 55" surface hub. ](images/sh-55-rpc-ports.png) +![image showing replacement pc ports on 55" surface hub.](images/sh-55-rpc-ports.png) @@ -351,7 +351,7 @@ Replacement PC ports on 55" Surface Hub Replacement PC ports on 84" Surface Hub -![image showing replacement pc ports on 84" surface hub. ](images/sh-84-rpc-ports.png) +![image showing replacement pc ports on 84" surface hub.](images/sh-84-rpc-ports.png)
          diff --git a/devices/surface-hub/create-a-device-account-using-office-365.md b/devices/surface-hub/create-a-device-account-using-office-365.md index 6c133e978d..ff1e2014b5 100644 --- a/devices/surface-hub/create-a-device-account-using-office-365.md +++ b/devices/surface-hub/create-a-device-account-using-office-365.md @@ -95,7 +95,7 @@ Install the following module in Powershell 2. Create a Credentials object, then create a new session that connects to Skype for Business Online, and provide the global tenant administrator account, then click **OK**. - ![Image for Windows PowerShell credential request. ](images/setupdeviceaccto365-18.png) + ![Image for Windows PowerShell credential request.](images/setupdeviceaccto365-18.png) 3. To connect to Microsoft Online Services, run: diff --git a/education/windows/TOC.md b/education/windows/TOC.md index 1729553e5c..b55cbbfe02 100644 --- a/education/windows/TOC.md +++ b/education/windows/TOC.md @@ -8,10 +8,10 @@ #### [Azure AD Join for school PCs](set-up-school-pcs-azure-ad-join.md) #### [Shared PC mode for school devices](set-up-school-pcs-shared-pc-mode.md) #### [Provisioning package settings](set-up-school-pcs-provisioning-package.md) -### [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) +### [Use the Set up School PCs app](use-set-up-school-pcs-app.md) ### [Set up student PCs to join domain](set-up-students-pcs-to-join-domain.md) ### [Provision student PCs with apps](set-up-students-pcs-with-apps.md) -## [Take tests in Windows 10 ](take-tests-in-windows-10.md) +## [Take tests in Windows 10](take-tests-in-windows-10.md) ### [Set up Take a Test on a single PC](take-a-test-single-pc.md) ### [Set up Take a Test on multiple PCs](take-a-test-multiple-pcs.md) ### [Take a Test app technical reference](take-a-test-app-technical.md) diff --git a/education/windows/change-history-edu.md b/education/windows/change-history-edu.md index 3516574e11..b3dd38357b 100644 --- a/education/windows/change-history-edu.md +++ b/education/windows/change-history-edu.md @@ -56,21 +56,21 @@ New or changed topic | Description | New or changed topic | Description | | --- | ---- | -| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated the prerequisites to provide more clarification. | +| [Use the Set up School PCs app](use-set-up-school-pcs-app.md) | Updated the prerequisites to provide more clarification. | ## August 2017 | New or changed topic | Description | | --- | ---- | | [Test Windows 10 S on existing Windows 10 education devices](test-windows10s-for-edu.md) | New. Find out how you can test Windows 10 S on a variety of Windows 10 devices (except Windows 10 Home) in your school and share your feedback with us. | -| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated the instructions to reflect the new or updated functionality in the latest version of the app. | +| [Use the Set up School PCs app](use-set-up-school-pcs-app.md) | Updated the instructions to reflect the new or updated functionality in the latest version of the app. | ## July 2017 | New or changed topic | Description | | --- | ---- | | [Get Minecraft: Education Edition with Windows 10 device promotion](get-minecraft-for-education.md) | New information about redeeming Minecraft: Education Edition licenses with qualifying purchases of Windows 10 devices. | -| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Added the how-to video, which shows how to use the app to create a provisioning package that you can use to set up school PCs. | +| [Use the Set up School PCs app](use-set-up-school-pcs-app.md) | Added the how-to video, which shows how to use the app to create a provisioning package that you can use to set up school PCs. | | [Take a Test app technical reference](take-a-test-app-technical.md) | Added a Group Policy section to inform you of any policies that affect the Take a Test app or functionality within the app. | ## June 2017 @@ -79,14 +79,14 @@ New or changed topic | Description | --- | ---- | | [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md) | Includes the following updates:

          - New configuration guidance for IT administrators to enable students and school personnel, who use assistive technology apps not available in the Microsoft Store for Education and use devices running Windows 10 S, to be successful in the classroom and in their jobs.
          - New configuration information when using Windows 10 S for education. | | [Deployment recommendations for school IT administrators](edu-deployment-recommendations.md) | New configuration guidance for IT administrators to enable students and school personnel, who use assistive technology apps not available in the Microsoft Store for Education and use devices running Windows 10 S, to be successful in the classroom and in their jobs. | -| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated the recommended apps section to include information about Office 365 for Windows 10 S (Education Preview). | +| [Use the Set up School PCs app](use-set-up-school-pcs-app.md) | Updated the recommended apps section to include information about Office 365 for Windows 10 S (Education Preview). | ## May 2017 | New or changed topic | Description | | --- | ---- | | [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md) | New. If you have an education tenant and use devices Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education. | -| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated. Now includes network tips and updated step-by-step instructions that show the latest updates to the app such as Wi-Fi setup. | +| [Use the Set up School PCs app](use-set-up-school-pcs-app.md) | Updated. Now includes network tips and updated step-by-step instructions that show the latest updates to the app such as Wi-Fi setup. | ## RELEASE: Windows 10, version 1703 (Creators Update) @@ -97,9 +97,9 @@ New or changed topic | Description | [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md) | New. Provides guidance on ways to configure the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, so that Windows is ready for your school. | | [Deployment recommendations for school IT administrators](edu-deployment-recommendations.md) | Updated the screenshots and related instructions to reflect the current UI and experience. | | [Set up Windows devices for education](set-up-windows-10.md) | Updated for Windows 10, version 1703. | -| Set up School PCs app:
          [Technical reference for the Set up School PCs app](set-up-school-pcs-technical.md)
          [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated. Describes the school-specific settings and policies that Set up School PC configures. Also provides step-by-step instructions for using the latest version of the app to create a provisioning package that you can use to set up student PCs. | +| Set up School PCs app:
          [Technical reference for the Set up School PCs app](set-up-school-pcs-technical.md)
          [Use the Set up School PCs app](use-set-up-school-pcs-app.md) | Updated. Describes the school-specific settings and policies that Set up School PC configures. Also provides step-by-step instructions for using the latest version of the app to create a provisioning package that you can use to set up student PCs. | | Set up using Windows Configuration Designer:
          [Set up student PCs to join domain](set-up-students-pcs-to-join-domain.md)
          [Provision student PCs with apps](set-up-students-pcs-with-apps.md) | Updated the information for Windows 10, version 1703. | -| [Take tests in Windows 10 ](take-tests-in-windows-10.md)
          [Set up Take a Test on a single PC](take-a-test-single-pc.md)
          [Set up Take a Test on multiple PCs](take-a-test-multiple-pcs.md)
          [Take a Test app technical reference](take-a-test-app-technical.md) | Updated. Includes new information on ways you can set up the test account and assessment URL and methods for creating and distributing the link. Methods available to you vary depending on whether you're setting up Take a Test on a single PC or multiple PCs. | +| [Take tests in Windows 10](take-tests-in-windows-10.md)
          [Set up Take a Test on a single PC](take-a-test-single-pc.md)
          [Set up Take a Test on multiple PCs](take-a-test-multiple-pcs.md)
          [Take a Test app technical reference](take-a-test-app-technical.md) | Updated. Includes new information on ways you can set up the test account and assessment URL and methods for creating and distributing the link. Methods available to you vary depending on whether you're setting up Take a Test on a single PC or multiple PCs. | ## January 2017 diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 29c261f768..4864b6d4a0 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -56,7 +56,7 @@ After that, we’ll add the appropriate number of Minecraft: Education Edition l **To redeem Minecraft: Education Edition licenses** 1. Visit [Minecraft: Education Edition and Windows 10 device promotion](https://educationstore.microsoft.com/store/mee-device-promo?setflight=wsfb_devicepromo) in **Microsoft Store for Education**. - ![Minecraft: Education Edition page in Microsoft Store for Education. ](images/get-mcee-promo.png) + ![Minecraft: Education Edition page in Microsoft Store for Education.](images/get-mcee-promo.png) 2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up.
          -or- @@ -66,7 +66,7 @@ After that, we’ll add the appropriate number of Minecraft: Education Edition l 3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. - ![Windows 10 device special offer page for Minecraft: Education Edition. Submit a device purchase is highlighted to show customers how to submit info about the devices you purchased. ](images/mcee-benefits.png) + ![Windows 10 device special offer page for Minecraft: Education Edition. Submit a device purchase is highlighted to show customers how to submit info about the devices you purchased.](images/mcee-benefits.png) 4. Provide info for **Proof of Purchase**. Be sure to include a .pdf or .jpg of your invoice, and then click **Next**. diff --git a/mdop/dart-v7/TOC.md b/mdop/dart-v7/TOC.md index e96ad44e5f..5688dce81f 100644 --- a/mdop/dart-v7/TOC.md +++ b/mdop/dart-v7/TOC.md @@ -26,7 +26,7 @@ ### [Recovering Computers Using DaRT 7.0](recovering-computers-using-dart-70-dart-7.md) #### [How to Recover Local Computers Using the DaRT Recovery Image](how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md) #### [How to Recover Remote Computers Using the DaRT Recovery Image](how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md) -### [Diagnosing System Failures with Crash Analyzer ](diagnosing-system-failures-with-crash-analyzer--dart-7.md) +### [Diagnosing System Failures with Crash Analyzer](diagnosing-system-failures-with-crash-analyzer--dart-7.md) #### [How to Run the Crash Analyzer on an End-user Computer](how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md) #### [How to Run the Crash Analyzer in Stand-alone Mode on a Computer Other than an End-user Computer](how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md) #### [How to Ensure that Crash Analyzer Can Access Symbol Files](how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-7.md) diff --git a/mdop/dart-v8/TOC.md b/mdop/dart-v8/TOC.md index b27e1ffa91..e6b9c3194c 100644 --- a/mdop/dart-v8/TOC.md +++ b/mdop/dart-v8/TOC.md @@ -1,7 +1,7 @@ # [Diagnostics and Recovery Toolset 8](index.md) ## [Getting Started with DaRT 8.0](getting-started-with-dart-80-dart-8.md) ### [About DaRT 8.0](about-dart-80-dart-8.md) -#### [Release Notes for DaRT 8.0 ](release-notes-for-dart-80--dart-8.md) +#### [Release Notes for DaRT 8.0](release-notes-for-dart-80--dart-8.md) ### [About DaRT 8.0 SP1](about-dart-80-sp1.md) #### [Release Notes for DaRT 8.0 SP1](release-notes-for-dart-80-sp1.md) ### [About DaRT 8.1](about-dart-81.md) @@ -27,12 +27,12 @@ ### [Recovering Computers Using DaRT 8.0](recovering-computers-using-dart-80-dart-8.md) #### [How to Recover Local Computers by Using the DaRT Recovery Image](how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md) #### [How to Recover Remote Computers by Using the DaRT Recovery Image](how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md) -### [Diagnosing System Failures with Crash Analyzer ](diagnosing-system-failures-with-crash-analyzer--dart-8.md) +### [Diagnosing System Failures with Crash Analyzer](diagnosing-system-failures-with-crash-analyzer--dart-8.md) #### [How to Run the Crash Analyzer on an End-user Computer](how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-8.md) #### [How to Run the Crash Analyzer in Stand-alone Mode on a Computer Other than an End-user Computer](how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-8.md) #### [How to Ensure that Crash Analyzer Can Access Symbol Files](how-to-ensure-that-crash-analyzer-can-access-symbol-files.md) ### [Security and Privacy for DaRT 8.0](security-and-privacy-for-dart-80-dart-8.md) -#### [Security Considerations for DaRT 8.0 ](security-considerations-for-dart-80--dart-8.md) +#### [Security Considerations for DaRT 8.0](security-considerations-for-dart-80--dart-8.md) #### [DaRT 8.0 Privacy Statement](dart-80-privacy-statement-dart-8.md) ### [Administering DaRT 8.0 Using PowerShell](administering-dart-80-using-powershell-dart-8.md) #### [How to Perform DaRT Tasks by Using PowerShell Commands](how-to-perform-dart-tasks-by-using-powershell-commands-dart-8.md) diff --git a/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md b/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md index 3c22c4bb2d..185ace5f1b 100644 --- a/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md +++ b/mdop/mbam-v25/copying-the-mbam-25-group-policy-templates.md @@ -26,8 +26,7 @@ MDOP Group Policy templates are available for download in a self-extracting, com **How to download and deploy the MDOP Group Policy templates** -1. Download the MDOP Group Policy templates from [Microsoft Desktop Optimization Pack Group Policy Administrative Templates - ](https://www.microsoft.com/en-us/download/details.aspx?id=55531). +1. Download the MDOP Group Policy templates from [Microsoft Desktop Optimization Pack Group Policy Administrative Templates](https://www.microsoft.com/en-us/download/details.aspx?id=55531). 2. Run the downloaded file to extract the template folders. diff --git a/mdop/medv-v1/TOC.md b/mdop/medv-v1/TOC.md index a07eff22f1..c6dd794c5c 100644 --- a/mdop/medv-v1/TOC.md +++ b/mdop/medv-v1/TOC.md @@ -73,9 +73,9 @@ ## [Troubleshooting MED-V](troubleshooting-med-v.md) ## [Technical Reference](technical-referencemedv-10-sp1.md) ### [MED-V Reporting](med-v-reporting.md) -#### [How to Generate Reports ](how-to-generate-reports-medvv2.md) +#### [How to Generate Reports](how-to-generate-reports-medvv2.md) #### [How to Work with Reports](how-to-work-with-reports.md) -### [MED-V Trim Transfer Technology ](med-v-trim-transfer-technology-medvv2.md) +### [MED-V Trim Transfer Technology](med-v-trim-transfer-technology-medvv2.md) ### [How to Back Up and Restore a MED-V Server](how-to-back-up-and-restore-a-med-v-server.md) ### [How to Share Folders Between the Host and the MED-V Workspace](how-to-share-folders-between-the-host-and-the-med-v-workspace.md) ### [How to Set MED-V Workspace Deletion Options](how-to-set-med-v-workspace-deletion-options.md) diff --git a/store-for-business/TOC.md b/store-for-business/TOC.md index e42cdb492c..abca437dda 100644 --- a/store-for-business/TOC.md +++ b/store-for-business/TOC.md @@ -31,7 +31,7 @@ ### [Understand billing profiles](billing-profile.md) ## [Manage settings in the Microsoft Store for Business and Education](manage-settings-microsoft-store-for-business.md) ### [Update account settings](update-microsoft-store-for-business-account-settings.md) -### [Manage user accounts ](manage-users-and-groups-microsoft-store-for-business.md) +### [Manage user accounts](manage-users-and-groups-microsoft-store-for-business.md) ## [Device Guard signing portal](device-guard-signing-portal.md) ### [Add unsigned app to code integrity policy](add-unsigned-app-to-code-integrity-policy.md) ### [Sign code integrity policy with Device Guard signing](sign-code-integrity-policy-with-device-guard-signing.md) diff --git a/store-for-business/sign-up-microsoft-store-for-business.md b/store-for-business/sign-up-microsoft-store-for-business.md index ac226cffdb..42f4df57b1 100644 --- a/store-for-business/sign-up-microsoft-store-for-business.md +++ b/store-for-business/sign-up-microsoft-store-for-business.md @@ -74,7 +74,7 @@ Before signing up for Microsoft Store, make sure you're the global administrator Be sure to save the portal sign-in page and your user ID info. Click **You're ready to go**. - ![Image showing sign-in page and user ID for Microsoft Store for Business. ](images/wsfb-onboard-5.png) + ![Image showing sign-in page and user ID for Microsoft Store for Business.](images/wsfb-onboard-5.png) - At this point, you'll have an Azure AD directory created with one user account. That user account is the global administrator. You can use that account to sign in to Store for Business. diff --git a/windows/application-management/TOC.md b/windows/application-management/TOC.md index 110f01c7b0..0bd3d8166a 100644 --- a/windows/application-management/TOC.md +++ b/windows/application-management/TOC.md @@ -37,7 +37,7 @@ ##### [How to Deploy the App-V Databases by Using SQL Scripts](app-v/appv-deploy-appv-databases-with-sql-scripts.md) ##### [How to Install the Publishing Server on a Remote Computer](app-v/appv-install-the-publishing-server-on-a-remote-computer.md) ##### [How to Install the Management and Reporting Databases on Separate Computers from the Management and Reporting Services](app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md) -##### [How to install the Management Server on a Standalone Computer and Connect it to the Database ](app-v/appv-install-the-management-server-on-a-standalone-computer.md) +##### [How to install the Management Server on a Standalone Computer and Connect it to the Database](app-v/appv-install-the-management-server-on-a-standalone-computer.md) ##### [About App-V Reporting](app-v/appv-reporting.md) ##### [How to install the Reporting Server on a Standalone Computer and Connect it to the Database](app-v/appv-install-the-reporting-server-on-a-standalone-computer.md) #### [App-V Deployment Checklist](app-v/appv-deployment-checklist.md) @@ -56,17 +56,17 @@ ##### [How to Create a Virtual Application Package Using an App-V Package Accelerator](app-v/appv-create-a-virtual-application-package-package-accelerator.md) #### [Administering App-V Virtual Applications by Using the Management Console](app-v/appv-administering-virtual-applications-with-the-management-console.md) ##### [About App-V Dynamic Configuration](app-v/appv-dynamic-configuration.md) -##### [How to Connect to the Management Console ](app-v/appv-connect-to-the-management-console.md) +##### [How to Connect to the Management Console](app-v/appv-connect-to-the-management-console.md) ##### [How to Add or Upgrade Packages by Using the Management Console](app-v/appv-add-or-upgrade-packages-with-the-management-console.md) -##### [How to Configure Access to Packages by Using the Management Console ](app-v/appv-configure-access-to-packages-with-the-management-console.md) -##### [How to Publish a Package by Using the Management Console ](app-v/appv-publish-a-packages-with-the-management-console.md) -##### [How to Delete a Package in the Management Console ](app-v/appv-delete-a-package-with-the-management-console.md) +##### [How to Configure Access to Packages by Using the Management Console](app-v/appv-configure-access-to-packages-with-the-management-console.md) +##### [How to Publish a Package by Using the Management Console](app-v/appv-publish-a-packages-with-the-management-console.md) +##### [How to Delete a Package in the Management Console](app-v/appv-delete-a-package-with-the-management-console.md) ##### [How to Add or Remove an Administrator by Using the Management Console](app-v/appv-add-or-remove-an-administrator-with-the-management-console.md) ##### [How to Register and Unregister a Publishing Server by Using the Management Console](app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md) ##### [How to Create a Custom Configuration File by Using the App-V Management Console](app-v/appv-create-a-custom-configuration-file-with-the-management-console.md) ##### [How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console](app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md) ##### [How to Customize Virtual Applications Extensions for a Specific AD Group by Using the Management Console](app-v/appv-customize-virtual-application-extensions-with-the-management-console.md) -##### [How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console ](app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md) +##### [How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console](app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md) #### [Managing Connection Groups](app-v/appv-managing-connection-groups.md) ##### [About the Connection Group Virtual Environment](app-v/appv-connection-group-virtual-environment.md) ##### [About the Connection Group File](app-v/appv-connection-group-file.md) @@ -86,14 +86,14 @@ #### [Maintaining App-V](app-v/appv-maintaining-appv.md) ##### [How to Move the App-V Server to Another Computer](app-v/appv-move-the-appv-server-to-another-computer.md) #### [Administering App-V by Using Windows PowerShell](app-v/appv-administering-appv-with-powershell.md) -##### [How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help ](app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md) +##### [How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help](app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md) ##### [How to Manage App-V Packages Running on a Stand-Alone Computer by Using Windows PowerShell](app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md) ##### [How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell](app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md) ##### [How to Modify Client Configuration by Using Windows PowerShell](app-v/appv-modify-client-configuration-with-powershell.md) ##### [How to Configure the Client to Receive Package and Connection Groups Updates From the Publishing Server](app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md) ##### [How to Apply the User Configuration File by Using Windows PowerShell](app-v/appv-apply-the-user-configuration-file-with-powershell.md) ##### [How to Apply the Deployment Configuration File by Using Windows PowerShell](app-v/appv-apply-the-deployment-configuration-file-with-powershell.md) -##### [How to Sequence a Package by Using Windows PowerShell ](app-v/appv-sequence-a-package-with-powershell.md) +##### [How to Sequence a Package by Using Windows PowerShell](app-v/appv-sequence-a-package-with-powershell.md) ##### [How to Create a Package Accelerator by Using Windows PowerShell](app-v/appv-create-a-package-accelerator-with-powershell.md) ##### [How to Enable Reporting on the App-V Client by Using Windows PowerShell](app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md) ##### [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell](app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index b8cce9175a..bd5208972b 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -24,7 +24,7 @@ For information about the bridge WMI provider classes that map to these CSPs, se Additional lists: - [List of CSPs supported in Windows Holographic](#hololens) -- [List of CSPs supported in Microsoft Surface Hub ](#surfacehubcspsupport) +- [List of CSPs supported in Microsoft Surface Hub](#surfacehubcspsupport) - [List of CSPs supported in Windows 10 IoT Core](#iotcoresupport) diff --git a/windows/client-management/mdm/healthattestation-csp.md b/windows/client-management/mdm/healthattestation-csp.md index fda1c7d218..3d84dac6fa 100644 --- a/windows/client-management/mdm/healthattestation-csp.md +++ b/windows/client-management/mdm/healthattestation-csp.md @@ -476,7 +476,7 @@ The following list of data points are verified by the DHA-Service in DHA-Report - [CodeIntegrityEnabled](#codeintegrityenabled) - [TestSigningEnabled](#testsigningenabled) - [SafeMode](#safemode) -- [WinPE ](#winpe) +- [WinPE](#winpe) - [ELAMDriverLoaded](#elamdriverloaded) *** - [VSMEnabled](#vsmenabled) - [PCRHashAlgorithmID](#pcrhashalgorithmid) diff --git a/windows/client-management/windows-libraries.md b/windows/client-management/windows-libraries.md index c6dc6eab15..b5977c0973 100644 --- a/windows/client-management/windows-libraries.md +++ b/windows/client-management/windows-libraries.md @@ -117,7 +117,7 @@ See the [Library Description Schema](https://go.microsoft.com/fwlink/?LinkId=159 ### Concepts -- [Windows Search Features ](https://technet.microsoft.com/library/dd744686.aspx) +- [Windows Search Features](https://technet.microsoft.com/library/dd744686.aspx) - [Windows Indexing Features](https://technet.microsoft.com/library/dd744700.aspx) - [Federated Search Features](https://technet.microsoft.com/library/dd744682.aspx) - [Administrative How-to Guides](https://technet.microsoft.com/library/ee461108.aspx) diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index 6e4fc5d47e..cca3071cad 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -214,7 +214,7 @@ The topics in this library have been updated for Windows 10, version 1709 (also | New or changed topic | Description | | --- | --- | | [Configure cellular settings for tablets and PCs](provisioning-apn.md) | New | -| [ Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Added MDM policies for privacy settings | +| [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Added MDM policies for privacy settings | ## April 2017 diff --git a/windows/configuration/ue-v/uev-getting-started.md b/windows/configuration/ue-v/uev-getting-started.md index 38d6cdbf27..d67437503a 100644 --- a/windows/configuration/ue-v/uev-getting-started.md +++ b/windows/configuration/ue-v/uev-getting-started.md @@ -166,8 +166,8 @@ For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.c - [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md) -- [Administering UE-V ](uev-administering-uev.md) +- [Administering UE-V](uev-administering-uev.md) -- [Troubleshooting UE-V ](uev-troubleshooting.md) +- [Troubleshooting UE-V](uev-troubleshooting.md) - [Technical Reference for UE-V](uev-technical-reference.md) diff --git a/windows/configuration/ue-v/uev-prepare-for-deployment.md b/windows/configuration/ue-v/uev-prepare-for-deployment.md index 794ec9df43..7e2ed82e70 100644 --- a/windows/configuration/ue-v/uev-prepare-for-deployment.md +++ b/windows/configuration/ue-v/uev-prepare-for-deployment.md @@ -402,8 +402,8 @@ The UE-V template generator must be installed on a device that uses an NTFS file - [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md) -- [Administering UE-V ](uev-administering-uev.md) +- [Administering UE-V](uev-administering-uev.md) -- [Troubleshooting UE-V ](uev-troubleshooting.md) +- [Troubleshooting UE-V](uev-troubleshooting.md) - [Technical Reference for UE-V](uev-technical-reference.md) diff --git a/windows/configuration/ue-v/uev-release-notes-1607.md b/windows/configuration/ue-v/uev-release-notes-1607.md index 84502cd211..70054cae5a 100644 --- a/windows/configuration/ue-v/uev-release-notes-1607.md +++ b/windows/configuration/ue-v/uev-release-notes-1607.md @@ -131,8 +131,8 @@ This section contains hotfixes and KB articles for UE-V. - [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md) -- [Administering UE-V ](uev-administering-uev.md) +- [Administering UE-V](uev-administering-uev.md) -- [Troubleshooting UE-V ](uev-troubleshooting.md) +- [Troubleshooting UE-V](uev-troubleshooting.md) - [Technical Reference for UE-V](uev-technical-reference.md) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index c8086eebd5..be459e9731 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -141,7 +141,7 @@ PreventTabPreloading | Prevent Microsoft Edge from starting and loading the Star | [PreventTurningOffRequiredExtensions](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#browser-forceenabledextensions) | Enter a list of extensions in Microsoft Edge that users cannot turn off, using a semi-colon delimited list of extension package family names. | X | | | | | | [PreventUsingLocalHostIPAddressForWebRTC](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#browser-preventusinglocalhostipaddressforwebrtc) | Specify whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. | X | X | X | | X | [ProvisionFavorites](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-provisionfavorites) | Configure a default set of favorites which will appear for employees. | X | X | | | | -| [SendIntranetTraffictoInternetExplorer ](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#browser-sendintranettraffictointernetexplorer) | Specify whether to send intranet traffic to Internet Explorer. | X | | | | | +| [SendIntranetTraffictoInternetExplorer](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#browser-sendintranettraffictointernetexplorer) | Specify whether to send intranet traffic to Internet Explorer. | X | | | | | | [SetDefaultSearchEngine](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#browser-setdefaultsearchengine) | Configure the default search engine for your employees. | X | X | X | | X | | [SetHomeButtonURL](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-sethomebuttonurl) | Specify a custom URL for the Home button. You should also enable the [ConfigureHomeButton](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-configurehomebutton) setting and select the **Show the home button; clicking the home button loads a specific URL** option. | X | | | | | | [SetNewTabPageURL](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-setnewtabpageurl) | Specify a custom URL for a New tab page. | X | | | | | diff --git a/windows/configuration/wcd/wcd-start.md b/windows/configuration/wcd/wcd-start.md index bfdff060a4..292ef2be02 100644 --- a/windows/configuration/wcd/wcd-start.md +++ b/windows/configuration/wcd/wcd-start.md @@ -34,7 +34,7 @@ Use StartLayout to select the `LayoutModification.xml` file that applies a custo >[!NOTE] >The XML file that defines the Start layout for Windows 10 Mobile must be named `LayoutModification.xml`. -For more information, see [Start layout XML for mobile editions of Windows 10 ](../mobile-devices/lockdown-xml.md)). +For more information, see [Start layout XML for mobile editions of Windows 10](../mobile-devices/lockdown-xml.md)). ## StartLayoutFilePath diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index fef2b942c2..47cc545f94 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -565,7 +565,7 @@ After you create and deploy your WIP policy to your employees, Windows begins to ## Choose your optional WIP-related settings After you've decided where your protected apps can access enterprise data on your network, you can choose optional settings. -![Advanced optional settings ](images/wip-azure-advanced-settings-optional.png) +![Advanced optional settings](images/wip-azure-advanced-settings-optional.png) **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are: diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 19cc428023..3946fe4807 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -849,8 +849,8 @@ ####### [Event 1105 S: Event log automatic backup.](auditing/event-1105.md) ####### [Event 1108 S: The event logging service encountered an error while processing an incoming event published from %1.](auditing/event-1108.md) ###### [Appendix A: Security monitoring recommendations for many audit events](auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md) -###### [Registry (Global Object Access Auditing) ](auditing/registry-global-object-access-auditing.md) -###### [File System (Global Object Access Auditing) ](auditing/file-system-global-object-access-auditing.md) +###### [Registry (Global Object Access Auditing)](auditing/registry-global-object-access-auditing.md) +###### [File System (Global Object Access Auditing)](auditing/file-system-global-object-access-auditing.md) diff --git a/windows/security/threat-protection/mbsa-removal-and-guidance.md b/windows/security/threat-protection/mbsa-removal-and-guidance.md index 7cd0315cc8..b2d4621b58 100644 --- a/windows/security/threat-protection/mbsa-removal-and-guidance.md +++ b/windows/security/threat-protection/mbsa-removal-and-guidance.md @@ -37,5 +37,5 @@ The wsusscn2.cab file contains the metadata of only security updates, update rol For security compliance and for desktop/server hardening, we recommend the Microsoft Security Baselines and the Security Compliance Toolkit. - [Windows security baselines](windows-security-baselines.md) -- [Download Microsoft Security Compliance Toolkit 1.0 ](https://www.microsoft.com/download/details.aspx?id=55319) +- [Download Microsoft Security Compliance Toolkit 1.0](https://www.microsoft.com/download/details.aspx?id=55319) - [Microsoft Security Guidance blog](https://blogs.technet.microsoft.com/secguide/) diff --git a/windows/security/threat-protection/microsoft-defender-atp/TOC.md b/windows/security/threat-protection/microsoft-defender-atp/TOC.md index ff64c95cca..0f9409ab26 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/TOC.md +++ b/windows/security/threat-protection/microsoft-defender-atp/TOC.md @@ -100,7 +100,7 @@ #### [Protect users, data, and devices with Conditional Access](conditional-access.md) #### [Microsoft Cloud App Security in Windows overview](microsoft-cloud-app-security-integration.md) #### [Information protection in Windows overview](information-protection-in-windows-overview.md) -##### [Use sensitivity labels to prioritize incident response ](information-protection-investigation.md) +##### [Use sensitivity labels to prioritize incident response](information-protection-investigation.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md index 275fc11cea..a70b53af9f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts.md @@ -93,7 +93,7 @@ The **Artifact timeline** feature provides an addition view of the evidence that Selecting an alert detail brings up the **Details pane** where you'll be able to see more information about the alert such as file details, detections, instances of it observed worldwide, and in the organization. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) - [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) - [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md index 283772ed84..0df367e9d4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-domain.md @@ -60,7 +60,7 @@ The **Most recent observed machinew with URL** section provides a chronological 5. Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) - [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) - [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index fc752990fc..cf7f97c744 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -65,7 +65,7 @@ The **Most recent observed machines with the file** section allows you to specif This allows for greater accuracy in defining entities to display such as if and when an entity was observed in the organization. For example, if you’re trying to identify the origin of a network communication to a certain IP Address within a 10-minute period on a given date, you can specify that exact time interval, and see only files that communicated with that IP Address at that time, drastically reducing unnecessary scrolling and searching. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) - [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) - [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md index fda84c5cce..eaabada51a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-ip.md @@ -67,7 +67,7 @@ Use the search filters to define the search criteria. You can also use the timel Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events. ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) - [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) - [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md index 7d7bd87571..5cdc7994a1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-machines.md @@ -159,7 +159,7 @@ The **Discovered vulnerabilities** section shows the name, severity, and threat ![Image of discovered vulnerabilities tab](images/discovered-vulnerabilities-machine.png) ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) - [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) - [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md index 69493fe5ec..f4570512ea 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-user.md @@ -85,7 +85,7 @@ You can filter the results by the following time periods: - 6 months ## Related topics -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md) - [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) - [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md index 2dc83b0d07..c5abbcade3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machine-reports.md @@ -80,4 +80,4 @@ For example, to show data about Windows 10 machines with Active sensor health st ## Related topic -- [Threat protection report ](threat-protection-reports.md) \ No newline at end of file +- [Threat protection report](threat-protection-reports.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md index c02a9598e4..046e0f4f05 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-alerts.md @@ -116,7 +116,7 @@ Added comments instantly appear on the pane. ## Related topics - [Manage suppression rules](manage-suppression-rules.md) -- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue ](alerts-queue.md) +- [View and organize the Microsoft Defender Advanced Threat Protection Alerts queue](alerts-queue.md) - [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md) - [Investigate a file associated with a Microsoft Defender ATP alert](investigate-files.md) - [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 20faa27ae0..328f261912 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -65,7 +65,7 @@ To lower down your threat and vulnerability exposure: 2. In the **Security recommendations** page, you will see the description of what needs to be done and why. It shows the vulnerability details, such as the associated exploits affecting what machines and its business impact. Click **Open software page** option from the flyout menu. ![details in security recommendations page](images/tvm_security_recommendations_page.png) -3. Click **Installed machines** and select the affected machine from the list to open the flyout page with the relevant machine details, exposure and risk levels, alert and incident activities. ![details in software page ](images/tvm_software_page_details.png) +3. Click **Installed machines** and select the affected machine from the list to open the flyout page with the relevant machine details, exposure and risk levels, alert and incident activities. ![details in software page](images/tvm_software_page_details.png) 4. Click **Open machine page** to connect to the machine and apply the selected recommendation. ![details in machine page](images/tvm_machine_page_details.png) @@ -88,10 +88,10 @@ Remediating issues in the security recommendations list will improve your config 3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up. - > >![request remediation](images/tvm_request_remediation.png). - > - > You will see a confirmation message that the remediation task has been created. - > ![remediation task creation confirmation](images/tvm_remediation_task_created.png) + > >![request remediation](images/tvm_request_remediation.png). + > + > You will see a confirmation message that the remediation task has been created. + > ![remediation task creation confirmation](images/tvm_remediation_task_created.png) 4. Save your CSV file. ![save csv file](images/tvm_save_csv_file.png) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index bbad08d05e..2bde5e88d5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -23,7 +23,7 @@ manager: dansimp - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!IMPORTANT] -> [Windows Defender Advanced Threat Protection ](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to Windows Defender Antivirus exclusion settings. This means that any Windows Defender exclusions, no matter how you created them, are not applied by Windows Defender ATP. +> [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to Windows Defender Antivirus exclusion settings. This means that any Windows Defender exclusions, no matter how you created them, are not applied by Windows Defender ATP. You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. @@ -150,7 +150,7 @@ See [Use PowerShell cmdlets to configure and run Windows Defender Antivirus](use **Use Windows Management Instruction (WMI) to configure file name, folder, or file extension exclusions:** -Use the [ **Set**, **Add**, and **Remove** methods of the **MSFT_MpPreference**](https://msdn.microsoft.com/library/dn455323(v=vs.85).aspx) class for the following properties: +Use the [**Set**, **Add**, and **Remove** methods of the **MSFT_MpPreference**](https://msdn.microsoft.com/library/dn455323(v=vs.85).aspx) class for the following properties: ```WMI ExclusionExtension diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index ef3d91de6b..d497f7c2e1 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -111,7 +111,7 @@ See [Manage antivirus with PowerShell cmdlets](use-powershell-cmdlets-windows-de **Use Windows Management Instruction (WMI) to exclude files that have been opened by specified processes from scans:** -Use the [ **Set**, **Add**, and **Remove** methods of the **MSFT_MpPreference**](https://msdn.microsoft.com/library/dn455323(v=vs.85).aspx) class for the following properties: +Use the [**Set**, **Add**, and **Remove** methods of the **MSFT_MpPreference**](https://msdn.microsoft.com/library/dn455323(v=vs.85).aspx) class for the following properties: ```WMI ExclusionProcess diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index dcffecd121..7d3b72d249 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -65,7 +65,7 @@ You can also manually navigate to the event area that corresponds to the feature 3. On the left panel, under **Actions**, click **Create Custom View...** - ![Animation highlighting the create custom view option on the Event viewer window ](images/events-create.gif) + ![Animation highlighting the create custom view option on the Event viewer window](images/events-create.gif) 4. Go to the XML tab and click **Edit query manually**. You'll see a warning that you won't be able to edit the query using the **Filter** tab if you use the XML option. Click **Yes**. From 5a2482b2f0248f56da46e49485918c5ab010cff1 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Sun, 16 Jun 2019 14:34:42 -0700 Subject: [PATCH 201/303] More updates UEFI added --- devices/surface-hub/TOC.md | 2 +- devices/surface-hub/images/sh2-keypad.png | Bin 0 -> 8491 bytes devices/surface-hub/images/sh2-pen.png | Bin 0 -> 53096 bytes .../surface-hub/surface-hub-2s-quick-start.md | 4 +- .../surface-hub-2s-recover-reset.md | 15 ++++++ .../surface-hub-2s-secure-with-uefi-semm.md | 46 +++++++++++++++++- .../surface-hub-2s-site-planning.md | 14 +++--- 7 files changed, 70 insertions(+), 11 deletions(-) create mode 100644 devices/surface-hub/images/sh2-keypad.png create mode 100644 devices/surface-hub/images/sh2-pen.png diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 970332a4a5..98e7555bba 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -37,7 +37,7 @@ ### [Applying ActiveSync policies to device accounts](apply-activesync-policies-for-surface-hub-device-accounts.md) ## Secure -### [Securing Surface Hub 2S with UEFI](surface-hub-2s-secure-with-uefi-semm.md) +### [Secure and manage Surface Hub 2S with SEMM and UEFI](surface-hub-2s-secure-with-uefi-semm.md) ### [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) ## Support diff --git a/devices/surface-hub/images/sh2-keypad.png b/devices/surface-hub/images/sh2-keypad.png new file mode 100644 index 0000000000000000000000000000000000000000..595bb193411a8b4741932329e1c363d85543f95e GIT binary patch literal 8491 zcmbt)^-~t3t@?i)70Oojf=st z2&qve{1}6Y$)bSD6c>V7H-^|wmPRc4A=c8%{GgS&p#vX*q0&WmQv~Ns6A`&5ZOtw@ zqSq_N6zlX6gff`5M8LbPIMV05s;aaANv>f9Ou7hiSA;k-cyCe@r}HH)=GATfE#!14r;-e&jW~Yh+XipwnFDKW^hFE2OJ&Hz=$4bTfjI zz_#f0Ad zep@0;G&L^qx_!Z&pWhQGis1>j`kQ$6HNda)P&Ep48f387VoI?H)Pdl^A9;oGMVc<} zRhVAML~4ge!dkZDe2=t~1M=7L-bn%p#v4v=)m+!*>adJI-fC!~eO;7EGm%skH0Y^a zB?`VUV2#4J?t#C5jcsA{)C+DGEW2yJQ!3*kjhDy170+-=l9@6E)Lex(t=%{llVeDdqg6VSoUxECV^N4#|&C#yaXfG)W|v zvizwcEN|jGy|1Td7Uh|tVyr(Gr$x|Yu9HM0jjxEym>I{@< z@MhenQS!Z5e)VD97FUHSOSg@R`*oZ=#i0WhhOB#7kdm(PcAW^ZsYFAww~w=>(JT6V zO#PnAqVR!xgF5Q-TjUIrw6!j?x>npstI*vj1-Nj#*UmLSAoAzv7iGq_eI>?`y^A$d z-)R~|F4T3O!I3C)%%SA$efng|Wa)%au1smn+_sh}=>@V~hD!-MF|BS=etgFmRYMcg zJ`Bb{k)UmEuFC#-2amipAUQYpouB{x{^4OS81Eq=NNrq*4Sh0M4KKvubAEC4kE_bc zZFk?zv(FSTSd6axsd1Y3@P{=ift<7t+scK!p4XQ?84drM@Y%=zbP1lAN`JVr;!l0c z@&@}7aW$8`|HrVd)U~9zi&KMKFW`&EIdds2&W~<#XHg;TkNXq-Yb$7k41&jaIqxCcTUbx9p>n@~V|< zZesy3V@8LAQOi16V^ogeY$U%X_x52lr(sh|nG{3K{6tt$Gq`~@-3cK=Z9HVSbJ5Uo z_nS^oO^|GscfB@Aysx#6ub-~Iur4+hAzMt`fF94LbTBcnYHnIf6;QE6$udv7iI2~o zUsLw6FPp_{8eG82d|uADtuj-}?;x7SMuCB{veR2!uB*>K^>B?- zMc2yUij6D)fWYPZ6h<9oE>iOupyM~?iZTf;BUHUp17lNlM%|rx^2MfbzOehB*lS_= zN$Db#-=-@Mmd#{EBi)B3;IfY z6@Ou!rU~w1o8gqjPfvI3OkrNJ)FHYFbf z`a7N@^YOb9paRZx9|OQt&XrWCq!&zF`?}?PY?g{s`3Fr_rQ4(`0HGpAC=?)o@W#*hIpNkC#2fEj|K4{rX`|B`x2ey-1<$7mt?`<0sq*rMqmcpa*M+NuR{4^sPP^XVqIEtR$=N0&<%gBD zYmdW=+n9It#>xQ*wn&JUxh6OH>8|zsW%!+$;vdRouh7o2$<_T+}?ax~^L_7QO;^YV>Vf+uJL1(q060_ufR zP+c}>=D-;JOQb$M z#BqXr@QEL``U^W;m|hxM0>C<*LO(zKFMPMOX#HM;JPZ&F{LhOtxYEwd@2C^Ra>$}#I+&TEp_d^w*LLN`l6;Pd=wE{w zxO0nNuFd;aggu;XQCFLndaPs#9vz(`K9a{ee$k_j`7Hk@PG0X{MQdwp)SYmV{V2I^ zsLenb_u7JGJ8J*O%q+@Ii~Qndpc9+yCel|rbk}lR?DX9>anY4j`|7Agrb!wiZ~dvPoSvT_?EjHRc21%oA~Q`pP}w#Y97N!7 zP;BK)I`&nQdCm7-qo1wW*XJ)O8(j^wM-sG}lGi|77 z4823nTM{7XbSJV-ZDGqAnvyLZ7+t&|=X0`+H38=_|7pVdBVmUfZ>kLy1s z?HLwIIJHiq-HAl^YpUSDNW|tpqsR+#@yn1=)rCr`O6jsDeK2}(2vr8@2W39p{SOrm z35TP_M!js?qnTRBYgX(Rb=J$>*r@+^5LpKhsfvI5oe&SB^Q(G4UDi9=9M;VeYR=*F zULv@R?Db1bJA?*nKjj*`qYJ4}Yg`Gf;%bqU_i0?uX0dkG$7hysmvsUJ?Ij?+P0xBT zoLb-QyLwWQDvi9h)`>vpo&CLR&4$O!3JzTpVZ^s+2{avsBsdfPSw z6@DIUr}0>(gT@_e$$=kPz)b}N9l$C!iFSqawR{-`wH#2=6vO7B7u#$xHvpByC_U0* z-#+2bLyglbVCfNe)QDlYNsp%#_UnAat^{a0x3ko4V))KYfB7Agkwz3W} zGdY>su|3kqUt~t1018n!{6`XR}+NvoDUs3>Mm-Zc!jZf)8N+ zL~9vmRBAFib}x_xM*<4y+ab@z;#QLN?Kwnq$5D}Hi}RU6R2au1WJ~ zKV+0s;kV_M>r*}emXK7?>5&tv?|2%v^^BJ48G**{rXBtSNx7qDqN0x7rkDYi+c(JHu&?EQt?2~QR6f|Z~kx`xlhX^t_Vu|o8!x- z=wAM_*{h2vnzU$d!@cIXryMP4E>MAVl%lJ1ovz3d%#>+br&E`W+W7Z=p9arLf2&z^ zN5Q(oW`b`x>4W8PZf2Y?6t9U~-)gb|EdpUkP5IX7<@Qc-Nh>v(Y8F)LMCn~Nu}gOj zuG1rzjWaV@OiTQcOL|goHb3yetFk17B z0blM(G}*-!SI)4x4t^S!nqJ2bbCW0askQ@G;TZ*bQ&7!KMZfUPocYd@xy0c3b9+61FlrGM}N(LRAY0IwJe5WKE7v{${CXoZY|f2P+1rjXuBnSj?P_%la-~SI^5^ znh_^aINR}QK}FA$@6}@t1=^&YRhpln*N!iH8_YKQ4l_Sb+3Ru3BzR_CoKH&=QCMi= z4WU`6aS$nf=ZhNs?$OA_zjh>*mBjZj3RDOE814S=7_=TmS<35-t^kXTUgx=t#cRE`8jAP6If&fsl8X% ze59HZITkLulJEk0 zU=Gwj*q;%!ZlCP&sF5&e$!|>Vm^|eG&jZX~Nv!l-exqp)ezw^y6_mKO3To~h2Di}6 zv7BFDtopasl&%;w2jp=D_dlCfaH=t@pUnoJ#sX-@L9e+cJ;dj-E zMECOGU+nNUX_3|vWc)eLgTs|vIJ7fc@x*W{!#~wO*p~pb`XqtB zR1{Yw@Z;k6f^#_2pA_~SAU2-+Kw@6*pIgt>_G4{{JCtWp!#FIy0QNgA66$J+_Fz~P zTGZ7gQe7po-F7i?GqJZwH#Qt}q>B_LZJvzFjd zsTLm?G&dZv(`co%{zr8vX0~%=jlaHy!LbdAJ($R`x){ev+&vOA`%9QH0@kAOHt~6F zZg`HoWj8^8*X{jnOquL-?*tPs`8xCFUk6UQ{Vk?k*;$74zyK~9mf;&oQpWGCrQF^% zS~CN6$Pw%#Uw*#Eq0na;8jzN{Ho3INZ`=Mjq1;~kjNd5UzHK9UmJ_YC+_}=WE$(us zijiCMd(JZPoj|P*U7WStTED{(cuS6DB`RA+p|3-+Gko(Q;h8 zSC@0f46-fqIM0CYgwa3;n-LXTRax-j{`s%Z;|bZp-eDImMpMr5UE`hO@XeA5hHURi zYn#LJ+O;`1uaV2^>G>HAyK5x24;nnOnt#F(2u}1_w41%Sr%#%)1xnXTLPo7s;iLp> zJ@(K?))ueji1&>4N%tkJqT@{Mg!Q=ptX+NMip;G4 zd(?s70TadU$#8C@fH=fO+u({>^TD1}@1ABbXbxt0w!UL>X`D5lF4?D^{+NW3{`|d_ zGHB9Q>gmI+Pj(Cxxj8pb@;T6@6XD(^>Mf=wrl>rdNUH8Y*hFu7{YkAU1zW%V;$iM) zGS1p}_g}n`&k}tQ_a0K01RlL*cv~JYRE+|KrVS@~>C4YWN!OrH7g4e2=gbDHg@LLtt{#_J$g_|3XFd@F8Q+g;{ZTBj=Wh)`5ZxAmPnYyF(iIn)ZbJPw`Mr?A61VbaQ`--Ct+ab0I zOrtA`McDKPk{<%xJp#2mMw-dNBSv{c zP7(WW9<1s3hqWxNUXKW$A{Fd-E3+>NX>a%28))bxC19H?7U6W!Lkb?*y!vPM5QSGr zte}UZE+8qI@LJCYp{T&<|o z5aWYQLrL&NUTF>{;6995r{lj0Kn1zpfyM4%UwuA27BQM*dxUO4a=AsXVl5j0^H zRt)q@%U$S z6Ej5c`bR^EXrXt!-ECW6%Fvg=_L31Kh!vt>$%D!uZ6PkN(wO71Cys(hR7~S|sXk$U zCPxO(@e0W$k<5B~cMsg0kiRl7BX#XR|}gR0{$>qC$%;p_PNnxD5k0!Xer zt!91>cJ=$kiiEu5B0#IQABX`z^mFDc<6+xn!P@;PDu7bb_>&hk)O;?{b@$bgWFZzW zt9z|N6E(Ci$I(ECg|q{wlPF=f=|nHiCCQnRUR+36sA4xJFzO?tNjM01-Jm!09jyh~ zfyeV8)n8+LHo;so#BOGeds4`prsr_v%F~GYL{EN%*~yPcGyTc~Mr)T{V)0_RwZ!vS zoS-4He&z;=iF|+db?+3-^(l-gyKJ=5CqZILztQ{eJf3c|T0};4K&BLR9W}eLy|ytm z3QK17#i*wf!GD*RZl}884R5UToKY%c&6+Z}Gh%fLz_)4cph9nADBaYs*CPvGyTLic zj%MrqBHj^q5Hnx#{ASDBn)_1dU3M1)EU3ggUu@-B|C-g{^#J?AkvYz=#wivt-z$_pwnO@Y*9~(}_ znRhooXi|R!IRC;CNe172pm_`{W6-c&6LfP&k>_$=7Z%j7$autGN)`fkr7N0qXnnq* z-OCALDt9_9mCi#=G#z-$9yhl_j3(eL@EdEI-{2S;k;Re3Hn4C}ld@Rrhy|3`dEe1N zr}|}Q%Oq&cDEqwLAVy$t;X(Tio~Z}9QiYwVYhrF=rHvjj<9z>}fOA80CDTk+cdFjG+7P2clw1}ktYKKe+*`ic=B zYKPrz=E?M-fLW(lBfm)!8x#cOdsEFI=#Nh_KMV8BMv(&Wrs$hZ?RELSuWtG>(s8E9 zdAFO9?F+}Y!uu4Ufj`XQv&hEdr-W|l$hy1lCVPaqox3@h@;{S;X*&e;L-`XVyjR~z zLc~?bN9Gv?uJ@(zJLK;Xi5RzAr53 zDJuL3+b>_tDo=kT;?Vz*aySg&_Y{&}lF9`I?nyRDo$L9b*R>>w@!AcK3YY3P9RJvh z%JSYFHPF|YeE@5$BpZo=r=cmV@a^{sNYQFM(pz5sZrh390^wapA|A$8w?U%wNUO^l zS3%ItD)^4b#vzx-2*<}bSbK&$SZ~E|Un#GsjC{d5PEMaD^6%}9yILH`$RHQd=BTD_H;7glT$B1!~0aNnmDTBJ3Mq286%X) zP=ye_DYn+4*k@kl{bB6d9<>GP%zQ+c%E;!^IB(LicRCZ*Gvr(n+BTy|X{_QAXtOyh z>Y!R}+0{IH5q*v4_V|Ywm_uo}T0s4h-Lu+FzRtI2GSOix#b_nJfXL%=-;m_kPC={4 zbmO0&x3Xjqllbw@VZhrwXvda5dBjlajdAGb-CYK9Yzqp7+ouWEpX0WyB_fspyQoAc z4WrF%$DKRCJ868k!`DRbdkJEm;O_Bjn>t-q{|tLTre6Ybq9qabUH)&TV&-<}+Wvmd zGiY2}6s_)1z!|dK=e@rtatPGUb!uW+3@1|3$=dnK6jv3R+4}9cS40O>vI8NnOJY{Opo>dJ8&)4sM=`8X>Br2$*N)X(F&KL%K znEHdUk^JWw70q!&dme7?4&Evxz>Utpm4 zV{e>hMV4Wd4)O6EGfh@7)k5uw1^cL%y0b3tBn#KE$FX+?vNpl}($^k+@1-ifhUd`4 za%?;yHga|hs#KW%7zEmzCwqa|_7y{V`_R57dYx~NZhEm6T|c9sBnv+V1|#l^^WQp@ z^{;O4CCDF=U${7TCnqe2S`MoNWZ(Z+ardVC|Et9R9}~mma5qq? zC&gUdOKH?S;y=YaDuc*u%vufV@9sJOHzrtrMk3Si5Vr|8JA7F&lCr#pT$PMP*#84O CUDr1N literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-pen.png b/devices/surface-hub/images/sh2-pen.png new file mode 100644 index 0000000000000000000000000000000000000000..1a95b9581e92828d1e1db93b76ee13c2f671d5e5 GIT binary patch literal 53096 zcmc$_RZyip5GFhVgUjH~05iC|ySqCa+}&LV8QdKX?(XjH?(TZv;Lh@G)z*Kt7yH*% z?NwJLo#ah-(%tXVoqzJOVhFG}uwTA>L68s^R{Zki8}yeiUz4DJe74}bc}{%!^6QI) zuz<2##`y-66Pn7_5csn3ce;@h5jr$7XU>CeKKU==fB;Aliri30-0Wh%u#Ny&SjwZFd+k}3yMK4WD|BwZt!Bs^wX51>- zE+11TPVZ}HLjQBL(YFTW;Llzn+CN_f{%g_w{p&x{8x8^SNd(0L+1XCm1HZHwCgHmPf8UvYcH}?FD9$S8d-8lN6N;H z_a3FB`3=mo~%G1y-W{BK1Xo#ZSvd(D~tt&xP2XvL-M zZKvhxm5B`A=BSl9zTFUnkzxc`Y)_0EFecmF-9Y71QTFGK`@81vJi`Rer2GV;buZ!h@4v*RUe5X`4}J~JC0 zyu;5*m7`%RiAyS(X*~px5n2^-#H9#(bp8wxinP^(u3N?sJzJFu8%e(bD-x?KJGIpQR(`b7*M&Y0QV`54`{aiVQ;qraj!S;?EZ)e zo19@YD6e%M9x>Gklf#Us@|F6`H|zm+oo!qckxUco=99({ET&pEd){QLX*a)>cwN0o z8z%H`Bqw~vKk_V07>@EDQdoS^xuUbO$6>$5vY5{l5Rw4hvjk-ND(7bYTXJa&0ULQd zNQC_y5iJ>(umUM37DT`YyaPt=#oE_#m^fvd)gKEH7h{?28L1Lbtoa^JH_DuIKav7E z@4hS`VA|9q)aQ9Fw>9|1z&4n>*kLPedPXN7y+zG=14W96ss*ufIz>^EefpQj1)Tui z!}trgOI0YJnh!lY{s9kd{@QMUR0NyZd_~qSsO2%(6B|^;@cJ*+2qIW9N7UP6%aPC3 zsaUKT7#Q%q?C~nzcG;uduVbrg{O_Riqk)m->(oZ#bS@IKAm%rHB1Bd1TUfHXZ|>U* zQ_T(L=w1x=P6O1uTD7R2;?PNbV=3<|Up!=zbM1n9*&t+4BKp35Mzu z#i~o0i-io1ueS9Ju9ukZFX%Wb;c{{-Dc=S=M{xUA?QCMQRm3cQw7G3Ro#4@9)HzQQ zyC7M~zFbMUW((S5jf{sI9uEPpul+=izI9LNr0*&*{%uP7y(_`^@GDWzQtmnv$$b$lk`pubJI*D!`LDs+>qs=q%m(^Cb z*aH3@#2%5mPjGz#EvMf>MQg7G=bCA<+a>tt?27y^jX!l?Tw3RqyS(A$w2=|Hy-FFY zeW5xxJYoXya9zeE7-faRDb>1o|C2oK#2vQ4w3&iK6L?|>S7CiCJe%EK-CEsB6|KVm zYFLuF^@K<_jXl7uRs-0ayvNDYbFX*02tAaLC0aV>JVUy0it_3$1g%oACw~x^;DXcs zEdWjgT{;|5=3lFHO#qcj?^d=Lhw+cZ-KQk6Pf_n~9Y1dvOh4*F!w3h#MowaO=tcvh zv#ux+T2AhvnyY+KxdFA>X;UXk9L3&m3=n-uCrEQ(oe(m0ZRsG@qd?Mr%#ewwjgyW+ z?9RVG9(O@6EXnP;6LFU)VJvomztysTr7CJahVbrPS74VAlfY^&pj1<=d*rYuB~k+B@wBkNuzh zBv?8sOG1Y_4INxxzcitID@ttO^t$sQuOuEH&|HOg59rac$ad5%iH9nZlyVY0S0Qit zG)mx0yG$E~V(u*)b*sOU$&;+@%KTVAXB5;g+_T7#6VfiQr;836=xYCCrE_?DrwQhh zLKS-ZJJ_#PUMzTF^=5%c#dQ8rS@-*Y8b>xCetxOID4ye)d7xl8-RWMq`#}NHN{UIl zQJQ~1$2RmB?|Uc!rLK9M@8&-%AIi7(^8Ved)Wvi-v~Brn|0v)5O+w@5XC7ijzC=34 z?|z6J1uhC{DWkD_Ydmh0iDjT|Q4{l*|8&&lBJ(|&-cw)O!%QBp#{cBJB56qjK zr#HH5&8*BNllSqRbEW*lOky5$Dk*NmU$Cs<=ncFvSIdjSP-iX2Fd_q@5(2dM#3V)3 z9ubRF5p?VoXom-iR@9=2fKUwri~qT2XPNJU>KBXaE?Pt@0{#$-62F8W)Hd-2s%n6< z&4#WfzHg{)OxNU&WbnxWnt38caD^W6h)!poxEr`3fLB!@xu#23{CKFM;5Vw-^4gv2 z2i4cT=8}gmf@hehnhoeG-`{GTC{UxvyehxGrIQUN zBfpyU-P8C_%f5*N2Kv_tBOehQ(8&eYeaN>+a4i3M3BG>5ZHgbC9D>@G{~ON<1O1-^ zy(0eq<#zvX4z9G|m&Y>+3zJ#S95n{GYL2Hwh*CS~3b$lrhPxfr6g_!3hSh%>`{t&XpYikph7gcNw@_6R})6;pl`){tXWG+OemkaFI*E0sevqe(*$t?0COzl|q zU!20xhg~ITM+&^yd@+dLn|iMQ=1V^n(^P50KaFMPzU3%={&TWtfe+mG{B3IY`~Yx0 z*Ta1Zk2mDlG}LA*s>g&)K}nlioR2p4M+i1-&VRz7=g=-U0}#4l(q}>^hktOkyg|io zog%rhra-$Ag`YkVe1tCxC;IRnQLs#_Kp9IZw^5k|C?w3`OH6=UFbz{D|P6MjD)uYsBN86k0JqFqIe<*Tq zY3*WGc%WAD{Nm-%5to(+fY-Q7{Lj1*hstx`dh4RSb1;TJvrc6cn$_WT?HXS5{3#qx z0c!Y2#DI%Ek9(L^lRoQ8^D!EgEM5WGa*aFw+5;Zhl-d1!>dk8#J+2hDF$D!nra6^b z{hQm>0e~F(lS1YnQ6bTBv7d7 zb^k=9SoK{pOh(!h^EK1xPe=Uw<+}%0P>;7-up@C6$#V1^ZE&A(%HpM_tch)>xCt&- zGs#S?v$MTY5Be}%B`;;Q7L!wSd37Iq zf{c12=$@`h+RV3#SsPB-jwZo3;%tD&5#8>^D!_In?S$EMF>mDB!$Avgbzg z5ERt@sE4G9gtm}&HF}^<4vNdPqkCAN#Oqhss%sfdWRP>Tgw9nFMeF#m*yP|?em@sy1ZZEJUCejUbM;_+kZgwZuy{8 zup&oF21<^Y&isXHF+4`~>g>4ka+j?-njnK>a9e*cQl~vGkt;Vo?USpaoCq0J_}A{U zRRQng#wh{PNsZUIdZuq}l+ISjgFs1hHW&`CTZ#94Vk%5QVziw1hW9??aX|y>q)qIy z4cbj@TwZzpBP)q*y_NalY%BXldRLNchZ>*!J252Hi*>>yi;I)xPmX|hnp0<{+94si ztKb%EJ>PQ1>k|MzsTbng({Q zM0k1oi5K;<2*h3#lxYa%%EnX4H1LT_u zl_-NY_oT|Rsp1D+hNpm+g~-3&q|UD;x94@;oRwNNT3hfZPwHUdc_yfgVSs0EYM5V7 zR93}2)GSXnZLzpsHIg!;a+R9i=Vy;K;;{J&_(-l$a53H3sGuAx<@2u<=N9>v2=m&^dENF5GW02B!?0aj{NSls80kFq)d}H-)JWRf+)}zNNxy7T7SEu&9V3d`{ z(4ssc$OY*aWLt8Y_*zpYf~5@iZoQJjwxwv4TXej$2jle&<^DN)=%`h1SR@Hkmf>T5 zgRoP3q}U}ivEvYNVI=mCua53JNv9th7pR{uD(OG3oibr^aOyxlPJW+>={Mw$e?-98xm)EH%pc2XvOEv1Tn zi*d3sA2~!yu=z^UnLQ?M&l)n>k$891WWeM-_;dWtd(5cGBQ74=BU zsF4b@4qwRxv9bz6wYX%R)x5%?P}MQ<#I;GDI3SHYekp^y&SM7A*a4F-=!Z}uaQ1W0 zteIO8JW?9ZhcvMBssu0B&AH_6qqrTolrymv2_u%1i>V4v2M4;6(4C{1gcWM*moAyw z+3N}%$|Vao*v5H9+C>Q`Lh0n4K0FB=A(6=?XMLlNuJejsR8h*TNo;3IWdMa!f5i{~ zlTomv46%fJnXAm7d=I#Tm4g;tEqgRu^da5nD|$zO4pS0FHmO*m~LY&GysdEcwgWa zY)Pjko+!G<^14GWZ~)pcS8I5EmdTHpuT6MPkMloV^kf_hu8sFi9 zj&`w^7t3?J(#GbUl{OhQ7t=)dZ~Xe@{5_U|*+RF>i-cjm0!yZuG`c-^Y`lZ7;a|gu zxq3hwL$ht~Ko$D$>$RG^{U_J`#VD3Z8dhc-xrg*XhD#Yznj(lI(eP+ro>Pa)Q)Im2QeL}f51%UWcre_K}zy3oHp-U#1xjo5kVGg+<+*&5r$ znl54qZhwmCd}AH-eTEa0>b_*$lLWnhTbECrPUn8gRUF!wdddFVat7qm(aIGX9cQ(~$%6Q(Ru7A*S4gyR(%36@?bOb7D6?a=$9#?-l z0l-7^szt-K$Bjb&fQ@#(awxV3kW81UNi`Lc?1c>R82JPCXPne&X&0WOt;d7IS`vNf zs+z`Db>{9sw8S$bgAfKcW&KU(sWeRTy9GLJ$l3Uog55{HlI0}A1f?p|AK1r?HUHfw zJJv@FyB6POZPqLKoiYb^P9PH$Ab7y&&Z(I*64un5!bL;?6-_|f3lFCbp@=o>nWk-5 zsenx7ZQ=KtPBFS22i`$}syz3L<2E@^+fMlX!E^r4GNH>j+0yQ8kZF0C2#|D&o4F)(z-)t=4dGFHL>ElP1tEh67OrA-n*K=QybQt|CV{T{z zfF`Hg=nf))DZRo^%yqgk4wm_% z`6J1K`)!Ub!W}vo@mv~RQT_goz#_seDJSzyfy-KbBf3?mn&iPSRJH8xb>TJ0D-GP8 zsiWcfs8z_rnh}@dU3?;KV%+NAHpn|fB4lg&)cEk|c55d|a4zGlf~e*5oIw~7iN$m) zi}Prvu4Of7QMbd6`C~nrw>2>7Z9G)M9iQu5wH%QPQLace-oMGk;3TR=+T9I;L&!GI zJwK=dZb@PFN}v$_=4b+3M_w`?TnQ$XMQ?$Qh{|zT{=;-{w^OS%#eMDS0%-lQ?rbTR zbn%=eK_X^<>aS&vqi=8%ja%JBFzD!A`V-Yg?_tMy{C$z%Xh-&NT>YE!4<(9X9EN7c zZ(ZJvQA=XcM5cO7%tLI~Z%FCnN@of>>e2pp&Bo$#yoB!*W98__FRFZ+!a6&Y>s8-W z5cH2DwNjo2*Y@kJCDt&$yPp>V-3<@nBAoDYwBpUKn`rdzPv_>(IkR?jC_Su24*)@= z_*4vzJubYN?2wLA(27aphJEkfyaJpa%`fsRUov3$R+^6{Rg2~J4OM=1IzSTRIPJfu zn=*RrScyj4G2TYW_BTh>TFDaM5qf9&vqWE?Z=kX(y8pTycZ>Vs%Z@_)iDeJ5z(ZTy z3ZVa65JBCox^ddY@x~AC0Dl#|pc>bH7*03Maym}$S1D>M8s(i4 zh}va5phj3r#pyq(W0NB^L-5*no8_$hj7)4G1cm{B1O__zk49S{P%1s1HMJ-Erp^8F zaq_(<;q@wo($Cr$usedQiZcfGmN#r&tL`e^Vo^9TA3S~ej)MpBSL`RMihsAGnlI&T z4ti)*B$2XjOUIenRku{T;nMYK{lWMLH8!E+*8vt=Q$Hm!vnl)bm(s+4wlsS0MMKjR zCK0FX!Cem+@t4IxKj2QYVTHxG=$1Q^x?{}XbMzse6QVVXoghT|6-N}l`c4rezz7ZA zNajRR)GadJL~cE84oTYBi`ZDA|ImbkEJ=R?y%bQhm{q?p@6C`6f%!Y6q6MV%+?W}R z(P8E@0gK!IFzwn#2X}OfjC&KASoIiFjW12tJx#kZ5uI&(=5t9*Zw+Xr3&lbevKwXz z-f3Ta2b9Qk2yutx;B4lOiQ;>c? zpfYe#HRs{j6f5Bsr;OEWG6CPd{&FsAbEDo$4zYVlEPPdS*dKk1!TyY`Il}muOKy8( z#yfQWWyW_MO;H-edW)d+@Oo}8Bq9ligY#{ARce?wR-lkHo_GxMVevCe{E_Q0rR)U` z!UW&6-IjtckKTJpLX-pw<~&F}GxONV$EA0~uPN$lSW1*=g1g6V>kikA;uK}~lnQvA z4FbD)&MOu37Az*cB%(Zx1S@XF|1@WG%n=$L=Zh%&8bbmQOQo-S;*WF7l)5yV9}*x3 zdQa*}@FwXELQ5sR?#SUeX(*=>+rB5~3RWy+r9+jl@u zwV3}sn$6Q>8$uC60;NQufL*LzhnN^JrPjN0QC4qy29oB;phd^oSaHzqv;rLzW*Fj0 zPY8kGNGe^p(Qi4KDItqGLieEJIjrx98f|z=A#^I6T4!CRY+v{#36A^zmFaYNt!0ty zI*sbj!fFdImP#Gy;mbZ)BSd0ctVFWQ7!k-2=ShnltlovP6x+9SVM*k1bwz27KCI6e zAg_6}_pMd|bMJkz(%3R359LLPI)Ac=7vp#oMrE4RDn`d;S@+8~5HwJQbD3Joz{Ome1VW9bbK3r4!cr^!UH*Z{_ zjR(0Wq}-^#OhSWv*piEU)Cak~cO1cgVz-Z;83@ozR~UVFrWBJzJVnqtu}`^0r2Ubl z5fwm0!||gt3CV_8&JLh2+vC1ALkt zt}9Y&>M7$H0Gg=spRWpksMTij&cw^+mp?y!qmUXrc_%}73R*u;n`WEnRzCTEc)c&m z|4ktH|19(S|8nJBN(cFb)ZX_@t(971D$gh*eXcg9Kj{kq->E@ENOCoDKLhUGFn1~m z%9;-Z5#}1-0Rx|vnBe$ti#~58Ym5=efQ7ixQuncC-&F^dQqh`&>Wk#3az2~qs!iMR z<&j+XvyoRVNu}<^r*QQyKB%Lu+74e>C=rd+eOzlbE8pabihguz_0B*%LyWEoo$kr; zSxevcu%Li(YFHXfAcLa-X%E)k^8cy@kZ5zQc0R*kwcZ%%8Ar*8LSaNaH(6V(u-a&i ze;ZXu#7Q@zXG+u5CLY2$8k@8Tw&^At8CwEpo)ReadxhZe)`?Ud*O7k!&+#6gNKW z=!A^$pk!prZu$`uH~LZSKS>bdTIjF@cXq`UNU7F6u0XK*@Fa4GeU-r{@Oon*IM=?@ z9&&n~mTklz={bBqci^mUtAE4|fL2D2X*Fe&XgSzJO2Wfv=S`vj(jDrV5FJu^FRnPS zS6i|{%}ITs;mkxNOhmv1!+Uz8Jk&?LgPvuLTOm&$vNlEIi z;;5`pPoP}txF~Q#jxJ>-BTYp)VdvtPeSfdLgsp4v&t`4l$I}h7RTL{r%E1thDUeOB;h74HsYmy27?RFc~?8saFp72dS8j>?U zc-Mx#j!$8F;@Et$p&^q)&uk-}vIkCWh*5AfkwLZ{oO6sDOf7ovvsc=IDmft=BrnW8 zK_7UH*A6SSbXt|UhMvo*aUw+ie}Ays2mij>-v770z`XmaA-*;}X66BgU5GL~6b(>ozEjod5(sWr%DG=3K%)KXC%oxo zM%}gDn*`Ek91t4CMxG+)pXbis=qC@3n;xS0Y>_{+In{vY)Sle(VkHybp14Wyy_-zk zcMAFIlZBFaIsijke%-^lUJOM#Ynx|6STu& zos}K4yiC62ylYM$gNf3sfSE!;vC%VBo1;-2w%4FAZNWF{#|G~daEJHw%P~E~lRob~ z6P>iC%o`aQWj>wpSBB z0i_Tau}p0Ua&mYQdtnx}u9F8BCu`7FSb=A5#3KM_3CXilag=YZs^Qy zv4PRpIosp*(zo8X@#8i4qbJYP>X!~zjWneQhNgsR6W5#GxeogLDuaz!ZduB*)EjFN z0`GQwvZMBidK!#fK}qpU)p#+0PcW_ii`(T&i;;ySIh8*IX-&7<#nCcM(~#cv+7kjJISTL z0)|<6zQ;d#fy^Pd!>Ue}SYlp#h_|4HfYIc?-z8md7XNY>sdNT0O!1B#3s}QUvooye zWRX_=N#? zCx*kyyny%n+1!1d;G!zBdUhkeNg|f(t?*J^fba&7zp6;Qo(m;;fCBQFZW3M9jm<|= zYUCKN7fB(OwaGDc(F>`!8>-@qy)WU~>7Qj$dc&8W?wEPkwPS~hI;Ym?ocFiM>eMrp z{l=D{8fg9KVb$+8p{R$=2c>K~#^#Catsb`>52ro?DCVN4_uq$7u6C8+&3?)qa88)X z(*&nkdrWtEqD}%HEWirJaf&GXYipn*Fqw@|+a4V0dkhRE)jwR9+9t2cV1rR&`vnu( zCy}{Q=Wq6jrE{RhET_&AI+{I7#k#$U^~DYpF4N92+_HLj4=ZXzLf^l^kZ>uF1DaOF z^aa+2J#iK6xVHzf_R%P9rie@!=dDo>15**ZSaXdYqX**0dlYKgyKG*adQc~Ahc~N7 zBh0=|)X_*d{Ndz$qhUIFQ~D3V!m`O|ajgcd@g|x1Z+5P@9%23!yVE7w5G?0?sHj`} z9SjxXZ_YS%@fpXtS~I1xe@aCT&ZIJjz<_rmonzlqqeIH3)l$4h1 zO;}F!by_~Mc<13><%V*E2+Ix5$PABtr*z=4o}n+Tr@FHr?lkAnH8MGa1)~ZubTTQ? zKbVXl1hhpc(Gp=ZCq-m;F&d42)8D*o_Pc>7%ozUu&3478d3e~WX(Aj9#bEKn;bv~e z6hmsE*TQ?m#$md8|2kg*n+UR)nmrk!VC_s)J&r%Bpa6KF|}^_am~aEKWlrW5+;0p7evgiO2v#Co!t3?58pE`j#2)HjYEV0a3moE@dDP|jVP+gGM1%LgqBa&z zU+Lu%43*gV;0p6JWY?aaW%~5oWBaYXTg!7<8EATN}eDP47Ygz4_BCuq4$Zcgsjwi!2OvB zxpIP%D?Ql!si%cOg zi!BT0T#yKjHuAJnTKz4|csa&1ec~S6RI=l~G!1@BvA$M;Yk z9nU4ScrFg)t@$&1Mu}zBk7mR3v}DYt$Di-#kFGPdon1nKZvo9=>-c)eG*A)7PJ!^> zfIi8Dhh%f+c9D*4%4nFfXim>Jff}S`2+5LrFj$%m{`?IajzLED=2tMc0|$P!jBu*s zS)M052sVeQU>SKdD4!bV;+RIrbk&QeZf-e&yw2mQZHEv@bc?q?@mLwz3y=C&_721x zncqw;4d{;B9Tt6tkFis43Gc`=!&Mcy>0pv`v&r9&S!Acyzssb4x6TH7Lf~2{OiOHaUCO#Xe?G5}|2NE33!)$e?#FAEfJHpa?>8VZyQd{5;krc@iOozvl? z%@`DfomZ%Db7anI6>;Od;_pIHo$?9^T9x7oW|YRDVm&L6GikQl2}ClrZN;Tv<${5R zV^@-iLXkdXLO;oK(RT(aL8(U=r(C#jr_W(iG%Q!IQGXVBg6DEnfxu@q6PKN`rM*t3 z-F{5Ii6?#QfrtWCd@Gwv^X z86ulEpk{crp4G~Yjst|_a>Kk=#9ZJ+INa&6o}`h{y!bo80-i6%Gn2ik`~oZ1cKcGuA1?_Z&1urTdyaJJvx) zE<|U9U}?8lEosM=%bAmNE^i-XZo0Q$WY$FUW%y!{YDCx+Ps_@*Rt0~sq{ax-9W@wQ z$8<~irQuewrLDBsf%$tSc)D!~KwrLrAh{9^#%R08db$aZ2ND6`WE36(OoK%>kNr1F z6;fJKh;S7lKi!~F^BnRn2puPyv_a*558~wRQG4YmMBy3XnHEQ>TdqSUx*2cjmz5Si zgghl7yU_5x5X6{_*zgl=-$KZtpQ^9*DUm1U`Bpl;aa)e&ixmXOLV1#`Q59M}S@p_| z6&eGB83uT?R|v4(nkhY<7bW}2oZuTZ@s+laTkY=^Y05=zPfO*JvVSffeK2TOLH0#CrSFZ5k;uR&NR;IENsAr=Hb`qFEpBr{V?a&cK|CC?KdB{n(wx$>I~CMfcQ{qv>9R*d zprVGIS&3RfZRxoj!;oYy=kvd+RDm$NmnOUYoy^~G8glHlk!xZ#qX^jfH3|soOTG=c znxf29l4NqR5OG_g6MAze)0~K?%bMy%TM9H`BvNqdiZ)DElwjodWF`03?DFF{n@RPF zli_v($FA{>=TBC%mf`3MZx_te8zSzu#`Pwr%2s^xBRn=%krQG?HH3vY>!C@lA1H{q zHiTbX5Q|SX1+Zj`bjHbftQ)w(9;}3l454#t z7~qB1Eq14J#iD|UA&=Bw*ncBwrR6YqN%An8rCwGpLajrlik zcIW}XXUtYih52|U0D4NLAQd%4PM?X;w67JN`qh|Ep=0p+dVBS8S1R(<0wsCM7&Iz_ zM?Ry(R7fe)>Qdn0#Xi_E_P85=_qYB;G{nPV(VHRNnXDJ<>UKj}LU$O73A4`T!ZstU zC9;U{OfI2HP{IU9V==7$as~Ne1DIPc4BLx4SE;XZyL9U?AgQ{`;Dxd}TP}({IZy7j#ffM-9K<2%W2@L*+VatVM|zoIGZW4v zN99VQ(H}UxD}Qw7DM^CXtPkIQJVh^GuK%~CYO~)=lJzy3uP^YT>=&3{`(NLVUSBXm z@&8v6I`T$t@4bBCGDQ+7*+<$m*f|NBf)N=2xb*sq;;HP|N7+PVmcA>sEP z`3vmHIBMCHz+#*yLes!RNBI~fK|LcZUmpTD3Jwj{Uc+8mU)w1KL6^?(=gj8u+V{ zEojzI%KdDk;doat`w>g)LCx?uLDv@#aotPsaj$a-c%1TqhA=q|F(A)!JXP+VlvF)j z-KFm8FFg1h)}_*Ry{+D{DQ zLD*-O&?}b<#J3V9U|<^FT23rS15EA0p*a{nE7kBvpaYsg_2{Tr?5zI&4wRp8YA_MW z|E?4lT;;Ug?c;K}NkazEW&;g*HrZ_S&KQav{0_y9gMj$#-iq;Tc}fDYXKrq((DgUO zBm>3P8ZWTeKpG{s_Cj$*Sp8j!>grgm=_<0F%{I&y2*KH30s@8h|C=D<|LCR7|1-Qb z+1HBSZdHncn!MLx;XYfB2|X5|9=69=wKDMs4GpUX(C`*sCQ+g4-dH(fmY+4?{1XKw zAh-Ey=42n@HChSJ1QrgK;w{7(Yt^!&Z(gPD$zW4b@dD=-9cT9PUH{e^?>)K6P+GUo z^Rj66sDsS>#Fs_V;^1nk?#aRw&2S4_`dp-nLma>sEthk#+JO%=4!~8{@%}po=coZK}p$f(2()6A+Jq)>%p^7HiU|S z;Sw3Oi=$Ypez)U3KQ!()BNV7qtX$^|E~& z`dflYkt6vG=FP(D+eh{7EpuFabgVaJNIV%MIVJ7AmpTR}rUxg6>qgtl*{mW7M);j= z6|^h=@aX8^j@_rpa_%KLg+o=qQ3T?-?s1`u4r9npWAt7l$|Sy zwr&M|CW#OO^){K-r7u?sUzic#!8-I-1sWM$5<{&Ftf7B!EsK~>|*6yz2@^> z1g(YZu|RY%1NlISm1bL3N2&`Y+l4?^Bf}%aUquFZ#<<36^8;2ZXPe!qtVn3Vpv5Ud zp%~jI9vmn#*N@RtYYMYnP5W@qk0mdw!@(Vp+s21+#<1SeBtD)5r=;ey{q>F9o*g?w z>L_=WC9~$Y@87{UbB6R-#hME|7R)Fngu-t&F_tSjsWvW!VkQl zAdv|Cm)ot*H(dW0#4s)^ohrNS&ROSZoX6+K+{NNY!m`Z|HUI!1dyrvp9QZI-A|$5k zZVW3TBI4Vu;abg-Dv5pbXo!}aK!0>*%X4>z7)aSLiuz-N#K!afT>oGcotxW&9Sml{ z=6i?KY_fQZE>5O$Fo%wk*b*(#c$Wnh zKs=%B*EDnl2X9^Z%TdBS_;vuzC`=PLpl+=j5Yl&d=A}>`_oREEFjf5O;c7Qj!6& zrNZ;5K7Z?Ey$oqAc|C%1yGQD)j`xQLTgKIor5+?HUA(VRpssbdBR$i0up3m)pnFF~ zf|T6tN6gb)Y@#ljPNbzffvyCX{VFXt_TL=V zLS1b1i{7wPm&Uwxp)e;!Q${ zmh}r0YE^~s`c-YHcqp~KA&%u3tu4!?9$$yi+d&LYuNHBSy3|Lu% zX=x!iHD+=rVh9|ujmVC=`vr_j7q?iDg+EpF$7ceV4%Hl`a#SL$Z4r!Fw%xAJHxQh3 z(detFIppY|M8<5px#H%FQ@ZOS8g+v}bAAsoXB z7F*<-{|8~nuvi_u{&bA>ENVf&P))CQs@V8f^?QY2Dk`P(#n2V(kT?Z-KbG-sSsz8h z%4tmVw&$WF7eLnA4-28$H+sCwcX(*b!HlVtFjhg7^1V6Dc5{m#sL_Y5X^1Iy%>;8j zrT_NMtjQr`R@S)VA40fONRQxcAcgg~1AD)v3)P_-sA=21AoVL&E;%Y}kWJX#4Mz<#Mij^7Zq_ zi=nWb=&F{#7D`of&G%Dlus>ECU>eKws^`O`&cbz#i48X%+8GQv+*zR(dzIMNPJ6Vw zV{fgz(i(q>I=T#U?iY~8PEq)LoG9IwWh^%++#aKJC%H4J-`wETPRL%5NtP6zm%=tLCx(7$cG_|AhC~;CVGAWsB@bW99B+S-cqE)XrV-Wo(}K?m^$VOAV~I zAARf6vt<6j{Pv&DZ<-dm>`+IJAr8pBZF1?S6fe4+pG34Y44M277wkkx~1C zVt|6K{oKJBjy3Vqsn6kSeZ&ogxsiwt@k|BHz2pf+f?oM=bSZTHz#nv7f^Kfcs6Nlk z_LV*fRGplsFat8&Yyj zw&i;inJBH9VhehFH%+(P)3G*kEGLbwhnUqxEzv77UqqHzucw&$hKA7db*B@1Z1Boz zkf4X94Y2K-a&wc2C6{MCsEWz*&J?ZnWoJNQ-piCO6Vuw*1ACdNlu8QTq`YFT`6s$4 z^>#_UTP6bWVh%DS{sl7hxTsxqtD!OB|EdLOApO%ozEM1wNdnOO=v49~Uv_v!dZ+9rOLk$YJEspG`4m-8hlf4cm6f&clN&STy5y zWgZ7ou}fnp{nOR3%CKZs-MdkQyjU|7I^{_?YdmPjF)GZk0<}|>(h`p>R4@Jufqb=| zr@;3$z#kVEe3xC={^2a;0kjUSBJ!^fz)z)b=8&b8-PhI{E$#t9EUzD~_n^){8sXe| z$<=UDr%@;0D^u9?ofiZ?QuZf@BAmgLD8k{bn=Rkb_*mFuqq3#Xe)DXv zJ8|3u5s2#9dm1pp%@uZX-AS$MFa6!ge=4kYePhVr^C7J8Ce?>hWpqkmVoA^p;hUVZ zy9!CDt=W^7ra zWI8F|;o;2tWQ0tkS)cFKa((LhX>N&#c3KF_6bDL`J1Fr965k;|{>_?jc`d8?dcKgx z{~{rgL7*<*x8phalb5e?z;Q9#0=L#=d$1M@s55*au(Hz4!jsHnh(&h!+wkUTS6qCp zsQQzJ*H^j21e%@u47)RF^vZy+h1hSVVwB64}j%aeN8 z3WkVv)1ZQFLTW82!X zadRHdkGNx;r}a_~H41C2nlK-t4H|eYQveDJ(t8H`k4j-JppEQQqLAX8eMJp@!^J+`+7h4T%UcJQwU)v4Hn1TorA{}J1l{z?3@ZAUmvgMGrvBt z2a{>kPiDJGMfkrGdVAMS9;PjO{4t5CTBV^8@bK{$U6*w`T+8vv#&FF($&8PU_m7Um z*V*x}Z>UR`z5!8~IX`LYMp;u->ao+p;$q&!^RmLtJduzawU+7k&o?zapNGZNWB#?2 zqNm0&6{u(;F3M0IY(4k3q{5LE5F;mskk6V;r^WUcgBH>`we z{iA#;p>2ltTT>=Gsz)~EO0$M%d$j%rv;fseDsqVA4me|LWk{H#?G`opk8DzGqlPrV za_(90sWqKihX2oTek&$pab%d+!|t@!#nTb<9NLIBFD3H>4JBV)nQMGp%X@4w`LBP^ zFZ@UEdI}l4`tX?B-XGCxxQ|1LLuKGb*bQw&EK5FNPZKUS`oE8-0Y=jst697rS&^6w zaY<>z^7AE3JNp4=7F2+jY_*cUuaLQ7Pri5V0*P29v*HR=jpcmMKu_{|x>6~i4}p+h zxJs+(WVt1W+jrC0dkhD)2s0v~IcewaBAvxjVr#Bw;=SsVONuau-A22dl;{y85Co{& z+$NyT_m+oted}D;u0q!CFb$MJnJv9i`|ecVjY;-*vP7=pzV*us)l;IoX%lWc3EAC zN*__)rPPdNCU6nu{vHTL92nLb=>R>F&Sz1FUQ2#u%uN=-o!hL|C*!!66c+M69MPD( zN!6}*>p~XG07R{=X}7kR)sqQ8;D|`pRO_dxrY z3U!7iE>TU)4>TS>1|y|Bz?3av5C}GE9%rw%{fNYkrn|IaD4B%flwgTvgaHkCdYhh6 z1Z)}DJu)SxQ)?=v3PSkB6p~*dN*Xj4Djvg0&hNCUDv{P%t5JE@x(%(BPZH*ZHudjrhLT8}L!7)fUoVHdD^hN*%mCv2=4~ z3oqP%>CU^sm;I`prj<$btI2X%Z9O6x8E>3v6d`i1C$A8IF@Qs08Tp?Rrn#>W?Q@0%%r0N#c4)Zi1^eCACfAKIIi7_4X%UDb5ufsW1){MGdz z@g3(rB<;ZQ2g9l6z-O<@m$t+hngo}TQ|HpW9vj5KaoX)TuiD??RF#Z$Ww;cI!JCr!T;DzI7;n&6w`Cm{W6+J9=@;_a+FD1pS7=C6f3~oKVs3iJ4 z_eso{^n3-)z1Z*ei#1xz|1+h_xYin3K3S^bfyZU{+>QOH?ij$OQ7@l7W2?XxuzgoP zmnplDKD8jg!4Y?KBq5hd>Qon_mHbLdux;d~)AxO06NAAlk^^vCCMKig3Pe&sm{cQ~ zC{p(H`yzUO9%bq-_%Rea$I#`BB-eMH=nXye@b=SIL*gI(2}tl>c>{eVhY3taEK1y5 z&E-%KAayxW;MQ9KJA732vR%l((#`OQj8RhVSeSH9R>e*a$c{nJ%(WXvrTGGYiAtRs4*z2CjApVoC!Y@~T~ymFRV!{* zcZi=bWIchYr>f#itQK=Y4BhYl#3FqQ%x3f~ZTb^wTa#_5tvCvcO0HLT0$8nQgW6rr zKC3+L$WI-TeCZw^o4s$xC@uect^5ZzRJY$}32zpS!={(;M*0V8bs~YQ$FZ%L$HXPN zOr;M|_mvI7T3}KZ24%Ju`H-*5sYEO$f=rjw(5iJf4~&>o%}R0t=EW+pX@$#cZ@-9~ z_g30^9nrk1&rd{GFQtaO!O}X#01wG)5k1b75lPaec6>RcZA3& z4mKaHi+tsd0Wr+G2dx2i~h9CtcT};}#corV&i_tl?^J2zad%}#g;^}o1 zSdhx&2X{j7h;rF%JN;FQh(^;c)Q4GAp2fXoNYwftxw3LJPTrJFGcP6s1t+EH%EFo4 zspsykn6t;c$*&V44!`FZg2g-AXMl$A0O}}my3Pi!jA-4tb+%(dJ1K+$mnUhCZ#|Ar z#jwgFv%T#C(Wkc+mcCm>-(8ic7ZVi#lgGs~5rZzn>2X8M_tOIh48q&H#^d0Mgjq_c z()q79aQKtv10e!~ZaU0PoY`Q{{of~Ve)V)It&=sgKsrD4IOm;qi*3El8+*A5bgo1! zL97muM8YTap@$MT#czvKO>jsx9GY)@Ca}d#NJn?$b6CF6yxsPbROot2MbmJ6VG4Iaf6P zD`q^ahj6UnKr9={^uayyk3ngUAs#HTq<%yv-gGE2ZOxBP;?-|r_R)k<{K9yp<1Wt^ z^~`;w!Da`f^XknSxSs63Tl4;1q(v2Oz>#mZu=wy_NI1xn(TK+$w~RHkjsK7fKa29} zVtZ_giphz+eW^SC`Ja#xgP7FR;ySZL)i?5&AC?>YpIApNG8cPfF0w7$9 zBDR@Qw!$c;{!-AqU~pV<&efbt+*29JYn=j}0d*OHE;O^l+n=l1udp)dU%7gl+$uF{ z$zfsk7<77t7`6MuU%iVJd7Y1IR%o;;NSJ2oE-oxZsW*{Gv{ZIaQUd>(pbaA$4I|^d zm#k%5Sv?(G*+@D5)&j%?fI%oWsL8s7h!;Hy%C*t*LC-MHs$^i;Zgln)NvED{_k2k^ ze>o>v&ZR(TBRIBc`n9uTPQF=VA9rmTUR}quYLoAO?F*XHZ%Dt@RgJ~KA7b!#E}w&~ zxt~Mb;SKw@Wm>3NAtgU(H4XSvv;0s7a^JhR5UO6VtbWWR70;|mKb0Mh$^0SPdbui8 zg-|NU2d+IMuXI8u$8P5Jf9nm!sjoYbMf1z}2=6UMqm#EAUQJagWiP7XM%mVdx85AnOn z*ubRf4X2S~QagkWlF5AW9R5oj^9Sft2LWYL`hpXR&Xr0EXC%IYB@;ZBXQ?_%_< zq7%1}y*iwAy6!EHnQ*nO8gYt9V`#|7S@Si?-I_=vL^ie1uzCQkDn%u=a7YBjIy@%g z941XIb`nuLB{{x^^GCAQYn^&N%AnPTlJ+DggPwkOclV9+sV`o2a}{QdLo8lCK8wZj zXzqm@$;klwRFoj9KL7Ts?$ttDeF(_83315=1Ox<`Om=WHGrrA^2luk+UM)~m0RVqm z58Qz{Ye(lE|J{piXk=AyYT|r}dg9;|Gdz!a6+-?ugi3yVPesOrdMUd9#~!2YaoXY$ z_$V=H*MEza9Qo}fEbN@hRgPRTJwpchKbN@immb|B#jUI_FJ{+P3~Jo^x0VomeyC>w z`i7QpyZ|)xk4O$55bTTFB)xns6GrJrE)MBkp>Zo{QWp2m&uS&UHf|Se3QWC-9f@V7 zL$k1Y$sgZafX`ilmcKW5>&x!2|H|gvZJVadXU=F((9q#^@aBtQmZVxAv~%@VE~$~{ zVIK2CSq(PMGXuX<&LN29HZ!F2CL1br0UR0}AzLVoZ?8)&*F+(If z1k)kILh@Dqir%=Gm9kp5B?iFb#%wmt%ckL8mIh~RYGTkl9~eovl|f4{MsZNp06P}X z(bvI5FNIw&MaEAo2k=oJOII48Pp}3>L_TctN`^McLI8o`XZbQxh^;HvGzacUs-Bd8 zZDc68uCAnNum_Dzj;HrB6U97Zu)Ur(whxR86HhH8w}#>MIe3(64z>CDZ@J525YQYO zByedMD`cfCZ-Ri8aBPd?{7@;4oUNvghEu=9pY=v4Ke5gcGf#O=mB;b2g}<;tce>&< z-qGQMt4pS%9ZgI{}!&kjWOykb;2H8pT}-1oDQg4EVUt<`4UXppL0+ZMH+l9Idgl@{i1YUX|o99tIGnFU=+rD z*dSE%i9P6{Qq}Zm=hXCNeQOXFQL)qp1cxpn-@BRO*$1r3e@F}*6=`s~;)zU%D*WaP zi#Dsi^=w9O7V`n((lcG|W49uDpnlzoLFMqIhTEFrEZT~_T=vYm8PYy%L}#r!ht=cv z6sFYhg-qNGic-XRxT&5cVdd|`#NDA7tFFDmpT%0Q zq!7ZFsKfhpRxIU~-q314W>GK$qwEd^Et4OHmZk%QYm$nTg8MC50-Cy5x=qRzs!K81 zJ&4nq+@K@Q458Kt<#sI}%JiC0&}q;I@O)#GF=dm=i+A?|{yMw7vREo;!;BfgeMMAM zL~@7rpV#yVMPgKa8&9eR1_3&n8@z{@+3mK36=sp;a=0Z2qj3+g92eHW-8kGHqQzcH zj5XY>FpUl9CBLF>-)VK5MRhxN0dB9QFOU1#1wX-IO1Jgv48bpX8jDRP*eA2ujt@Kc za3tQ}VUaMs!*E^EPhM>0%TGyH8t$-`4WoW_vLyx3N#~MB){>4uN!#aYcz|Id0*d~= z<$2%9+1$VAt=ilVL6xe+-D{h1`u>jA0(lS2E)C7*_7y0B!$c}PUUmz50^6N!7XNXx z(d=uF=AaO0W^H^>BK(*#UoEDOS^oEOmjNH`)g$ueh!X?a7-_SLZ)JP;Hy~siQ3mTD zM?m~Su}nX(2Iuyogy}{R{9aiHPoX!W134qVYt5P?_h^e6KaqENG$WqIzdM26x%AG}ryM=?7+ zr78m%8QH;(O`<7BMz5hlu0r|Fk=&ls_nk~&Cau4GvEp?3$){K@{Z;hsxHD~Th3C=g zC}`1WcZ0*DJ5ju+Gke`KW;jbmY0r>J;f#7lBDeCyjEs~x+db|_zjC390lV#j=!e8s zRMc{fJ|#cD+y|&YBCr()XE>dOQc_M%E!A9&nF$k|ZzrJs1H_yxYjm9y?g7uYeM9!UbRp8=VfkhmPyzFe8;pXl%uMhF%y`wQONPvpFT zm}4x}LX2_lGzfu#xO!Iz@@CFOT@bQI{sg=Q3(3i`&y-s$=$%zo+1z0~C;aG->>VC{Oz*Ne zuD-j;v5HN4;j6D_UL+EH=~iMX`L!Zmps8CaLyeaVzLu0qS_I}$qt{i2qj0H5x%WjV zvmqHq$~2E)C&0l)z14G{WrYlmBiHX%3cf2F3Re4}+_sqq%+B>tPD&Ws9~0ZY!zp2;RR6hWZL-1@!fWJPW_3 z7V(Nw$2Skn#wys83y-Ue$1wd;cqBd74x$(m$RrcUG~>QufbS@YVeC)zKQRFuo9NH~ zL}MWcsQ(-Cf9vx9*P7-?kkc1GypTh*grxA-Z=JR>TZ{TQJ*&)a>KX; z9RY>&=V{EgaPycTva=djqp0JR*Kjy|?ilzHyZ2Bla}skY{fs5M$=a&juaCAgINmdq z^udW7E77X2gymP?5yG2sdE`mLjl@{>;P(of^sAt{_w`t8USEodN4z8N%Gv>Rmj|pyv{LtqiJ2L}qkzK6Y^J&zLKK_6{!8YplUSPsw^x;E`fXV(8WnGg*5#7A9 zKxhf^--SO2E zA9_`0yO}oHc1fdwmKD*U$__miPFAG7dvqF8&;=3L#1P^??M!w2s)D!=s&}yO+bsBR z+ExCko>%G2WU2ZS5ch0&|9-0)@gI(rgbsjs6NqrBymEM&Jde$8&$R3U&UvH|08gkc zVRTcau@sBjcb$wm`dcTb5#<3(Z)7)qeFA26?D;9A_K_W})pmd;lE0wyWBI5DY30}8eAG+I(6)NRci z&SEbw*gS8f%6=MyR{K7cCBI%clQ_JiFa18Z_H}f}Mz*8=KGeZonc=6Vae6b7nh_4% zCqP2VXSldxU}qL?{j`d>+kLE(t5 z5Ke9(h3q%9LYW3E`rYwrhSpi%`1Zq3zf`MG_*Jg=hBzISye~aCbFP>p#g^IJS=q<@S{p_Czn+kAKzCCz(Vd+HXF8v2gB`Efbkr zUsEZeAU;4cyu(s~2k?C!mMgc5Zf!gIdPI91TMv+uyN0IxM@f5A5F3Rb_dgr z5#3R(KyanxsAb=X&K?jb3DCwFQJ*pHdt@QQ1yC=SqWWyvN)gi;Z$X)E*3%jPaxKo2 zrLsz?-Z#vkBgb(*+;_{|dzj^~Y~*H53*+gDT(oL&;AO=q7*3y)-7fa4@oYVOvweS& zoz$-lj%$SrY9NGf_Z?h+__(9D#>nHrxSm)W5H(vWMw6}G%A3xoLTgla^$2nt(`BVG>Q7Hx z>TSHsw%Ztdw31#XGBaJhc_a|@@^!We-DzAgrDJT3HtRlBszEosPt(@VfNNT>jEApZ zAQK}^Uq{?fly%_TM;?5!o-yclbA|nKFf<_M;>8z+1`)5o3xM&i`VqIZ2El_YdA(Qk z-hPR;`nt#Jb1ve^_Pcy3qi_@I=t)+a(|r$zdUZ#wjt`9gRG1nvjK4i3*or}EbOLgq z=`bqYH!>j`;b8EJbf^wV?1G-rYJu!`a+hmUQ>KCjvf$;xw z0UFQbdZwEk)V8V_Kt>Eg~7+rPd#ojoYM37wX+ z2AZs$+MDR!My+h5S_hYWQmN52AVUXOusbfOED(mwSDpUz(M}ce_=z%odGM6T^~=>( zVyx5VxKL+zwprS}>FSSIYEP?sY&^C@*!B^<$;>J)mbH(?tQAz?dJ2j6h_&yF4cM;Y zQq(hVaz?b)d}-;<${h4Nwol+_xJX#FN-)M|hw>&1M{R^aQ?jZw269f~@HlXwO{)#Z zCDOkklZE}17%z({GRIXc{BRoV82OBJIF-6r&ML&vFCAU9d-wFyw zp}qyl+sQ<^KJsg-4~p|*mZPA_?52Mrc`d-UF5!x9k(1?K28L)I)3-e7*5n%h?=)I$ z%M-iW@B`%cKus6PmoLa# z&%71h+rqzFVaqnE?^~?DHC@Riz3RmuF8tsLY$)uNw2Ktizz8loZmvK27ejHWrL;gD zzjNs&NvjduufELayQ*i%TI69hYVQeo)a6B)ZFrTW|NOB4FJrrS%J$5nSCio7uetk{ z#^pocC7j?uw;nSS;wPxe#vpmTF>MpnmQu9RgznuyA1FsEev`tV)+Rtl!A}!yvhCN` zmXK_|SiqyYLBJ~xs6xLf@im*?5X0+?54L-dgZr$6G`aU^;rqY{Wv4e;T_W9(X;7R8 zVuG#hRG{muF-LBz;SVNV45|<0Q>nM0M@Lw4HXHH-xms3P9jK7WX=d}6*HzqD98A_{ zWOQl+N53zB4=|_C4zm0ul=uuSGgf?0y_pecMZqZ04K3ik8Ic6m5l+9Bz)|jX-0_3B zQWrVOs{nzO{>5-1S74k4&NXptQgJJE%Gk8!IP1_55@Q|oo7FlB>+ zbe>mLXJo%x_i-vY+VyD~cJZr&LL^M&zHt}GRuuje$%3t3j&1(RN*m&H3fvNe-E%tZ zXUwNwB<$%JzR=bzrqENu#Q}7%RCf8D`8;J#`}r_80|wDE*XfRhV>&j$KYKeDyWbY7 z)J$^0RHYoXZrehiok#;w&>&^C9MC4IGlvs~9Vz=fJ_qt3gFd8_hq;hc_f^o=P|A9T z?_R@4Tr!53#wh&KyF)Tw=&Cnx4iO~~>*-X%)V9sPIgX?Glt-h3Ce2Df#>DxlJhrXx zn`+(w_^7L4%onlqOdQ%9a9Zs+`%mPo$5$YNJ-cXHw;)EOCUA1^j-)20JCXrdcdS$*c@(i%T(AtXBv|+3!YA!>?_l^zmP*2OAi;- z(;hggD*2Pek=REkZSQ-@DK5hk(Nu!CwxGT7t+Uy$50y-)KTe8H#=Hw*} zjX`N(<>rpamCjsvxm?wJ8w57F8>-3eN@PGipSI9M3r)$v;w6q_dwB~E)xvP|mUXC7 zb~6JO^t=y?^*ZHQdEQt!;&sV5f^W2V@OdALHR<)k7wyq;h<;M$$2Q4x>uH@+^FT>1 zWz16D$z~Vzi87MJ=0}8>m6@G4pKcux+u@P+Py8PL3J;b;H1}j@oq(bBazZy~k<9&4 zSll-wz<2l0Su2eNPZIdIm5^pBF1}}1sM!T{^CXtI&XIumun=oGniHV3bB%h&;P^uC}sIY;2gg(Ry2) z9e5W^g@m53%HTc?2>EUF_q&P-3OBhY*Ff9HuN~V=w^e5vW+4sVyo?pY?WAn{wb`ex zcAc%ZFvURM-mBCaixaD--kakr%_#=l*nNy^9MIdg!P|ui+#5;eX~V0sI4m+`3Ztp& zuOeL6BBK%CU&9v$w?Pbl#nO+)*8GUf0*-W~aIn}0e@rQCnaW}a(fTn|y!!QsErO?^aV>2pMb7`W#vO+iJ?_L!NcpbPk{!q_n|@ao=ctaI+_HbMnwB_H?y5Rg~5 zb~&|df4X}riL)Vr^m|E(r`fZ(|9o?C(-2fgVOjI1qJz- z_U-eL_R7;{%aiQys^}qVc{`XXl@9{JkkHfXUv_O=9><2cvdM zY)aTlWjiz+jyfR`(XJ)h=2je@2rWrMev^>);7Xpyuqiy*X^D1(DiDd#4b_PoW|smP znYIp1^0@FDSd&qZYi`B#GQ)G$94mW4@%tGKZ4)CKH6)7D!Sc)1VbAp6A1PVn76w`j zK)Dz6Q-pq)G6XSmjSWVZ^a`}@*rVZGHRHpxokTXK#I!g}0}{#ZARcf|lE!--4)cvP zQB=yYQsYYub$4H1(z}!XBEX4xOA;*}k|MnQFd~xqp$Dm>COEP*h!wfXEZcJWMtWHPqA+kJ=|`l7)VJkU#kb4g!f@<2xY|AM}NVVUnwXp7)qa2khSzB zW+lP?3p6Lp5kV~55k8dHCLlq3Mq}xWMdVukbX1;p@5%!7xU!hQH`Pa(_iRQ2NZ24# zztDTmb;su`UfLQ0(||yi|+eoO7o1XXK8#=^W=1dxu@KdAf zQ-;8?mN;{M>&QQh2R_G3;=md?R3^jNTkA}*lkpkRhGI|{dY;>Su4Yymn*ysPhmcPF zpA=IEp8+i3do(u5`<5BkUT>OQ{#YjI&~DlrWF~&M_e`^MhNy*zD!@VV{rj*CNDXhyYV>NVWCnS0(&PAQhHkkM-r8V7K zz)WV1LyZ-|nwkPI_3_f{b}1Gd0T}FWa6>KDy!b3HC|x%V;w-Y>#{2DiwW{Mx(4kwn z$x}#Hx1Wj8FR%kv_fgzun1c-K73t4T7!IgAOGZlMQNu{)i9s&8vLRA>f49^H+FYPxxYox0gec15YdrP6s%^A}w8@-IWE~*H}y!HAw^L z>!#>bSF{L&FdW~*52e{R%6!YBIBc}%qxB(Q`tFC}P1}Z5x~pUN39vBw+4k#WztzdP z-hAEOe{^cBV!6(sA>RDvTiqp6h zljPBW2x6s*tVyNgVEF1YP!@vG7OS^=V8)=|7%lo1@skX2qT$7i^rl0q9ZXx)wq{q zZ46Y?Xf8V*j|)tP7Wbd7spbEQ5waFKak&%vZQK;L8gY-b(C)Wvr#SI42R0^A{X@_r z@%yr?>cZv!rUcY~^Fb)$M4WvLtpxqSIez5iT zSLZ$575vG=YPNY?R)(>T@Si2X$mZs&+i)YO)X}JQ41Dmgg$G{Ku<2 zU2D4K?EC6K0cnR**8ofa*oYnsuigIV=*?M(#Yt2yu4Z7?pRl`1ZKgksw>*Y zMmHe<b|M?CmE?<#G#LOOI{P`QQERe+Y|wtv>gh9jY{*6_ zKa_Ws7R=Xw)^wCuC@1`PsI^sxXIp-EKSautumiBtY&V3SaLb`woklP^`T(`EnM*d* zeM;5e!)tWg9cF{+ zCUU-^a5xk^DL73fUKZ6#EjoM`VKvF9GlREFSrP zj*?y8b&=cy0aG*@otD(=(*PO+317Z%gxC$;TO0Cd=6X0uN_ zS^>xCg_C)m2=;uYgSdVD_}&zF5SuJDFU?Y(S{>Gs9pcmnku@wX39Lei7!hJqQm1{k zv>#6Nu#Dw`?8B~0ots1s$ZdKH9N58`kR2ye?0848ia3q~`e)nL!#s?Hj*mFqOr{5I zcs}(vYE`_Fl|ZFNF>P+k6)VbAhQi*}W$<$gtWpG2ypc_V#p0Ah&-P)#y0WI_aJ;0~ z?NK5SDcq<6PaEC9wxYdiSTJumK27vGtjc_y`}c?41pz;=GESW$@St@)!S{}=r-m<* zYa&e3N;bH>iAr76ZWW%HM&hz2lrbLg6t8*OY4TG-0=F`%&23_MHFNKgONX%-853Vp zM+?Uk60#cda_2~qF`k=OeD2`Ujm| z;NRoDkYym?msqD<2}}N-M#D@tBh!Zt_Fgl!m$XR>3{koOrAiG&I+}@kvUC>%Wp%iEiiogJpP&J5RP0na!c}>!;BbH@v_ysG4rYH{jSEeF60S zBWL>=;roVOY)6yANOA@KKqafxq<3s`GQwuh3A%}t9EoDV$l}fJmev)TGjdRINn!y( zL~m9P9wT(n>nbTss8^3VshQ)~OjL3g9s7&dG|p5S8&2f{swC;uUm|+`Bmp&szRK>< zG$v!1^5*i`o*^)!VOqy0A5a@38FHpcbY|pd9x|_-JBEEPJ3aJa*`iiJRSRqkqH}G_ z$Pf@gyC5LcNZEijpL*xtzQ`DG7>KQ2!O8|t{WK_L^dM+Zvv@YU$;X|D?X=}^ED##{ z_KdBh^rz0X?_syl?pR33i*)sr%W}7P!+T1EL#L#ne|(%7nG9dM|Hol2Vdii)f@H$KxHvW0(1^7RQ6iM^5pQr8GD4zwJ2a-NsI2(DV3#vqnFNrXf0SxeV2J5%&YGQE zQJiiZE8Okit6trG$l{Dmj*~Hw#wcf|+K;Edg!s9?Z&oOs>X;|IKYOr4DhWA(S| zL$yQj8$Oimn9fR5cCHg7XVU$TnjFr-@B!o`^SR^{bl5Fp3B{E2zAA2~|QT!stSig9#|38f0Wg?D587drP)N zj+_#ORO*Y&IiW67NI!GAeNyTt0%HT_I3uOG0KTW!LTsl|rc5Lp+&iQECG)V2v^+iS2Bn4@!GL|SNVUtdhjZ4YshprsbE*vW_WAZb zeHFquZO?R28r?0MvNP5(^M%Fkf3D4H8mm?W?$}N2X7=kupEpRPG#qXlaL{BXd^)v* zj?~jpfCd)!c0Z;+5~aHXfgp9M;kVK`(J2QTMoMA9bvq5dvcv6diO+#0&)uR4GHUX> zJceRq2by#;9)^cY8ksRjr71*k6~(N!_(?zlVz+l`B`cOPyj1#&e-Q3+YZT(RGQL?& zpLxlzf)}}oIPomW#5X*shF2MWjXN|=tsVb>YB?g*|I5Pa?O+1k5 zIIj+~z%9mMmQjB#S79T;P)r}ZV=TEZP2Y!ULcBmUpEDk!J+OeIFww@B(T>sN=x?i$ zaKT4re3?5{8k(he5ri>L4g_4zvj2~glw06i0d~@9U&0LRZWZ-dW>4h~03~+qFIjr= z#`~q>8}psI2<=qb+$17=dHA7@J4qROQf(|28{$4_^pn*#{_HPe@3AiU?1i%J zG{>Mi!yDn|tWI%DIfxcHe8Y)bA1bE_Dx+*00I}_pos6!xzf&r`z441X1s!5vov=#= z+w`T67sy5gt1U4;{w*}bcn_77^ZG88R=@{r*En))IvmAi9SG!!pMo8^`zQy?f`&gl z=xd@~!TyI#`5U4+H{ORVQ;pVmbr%W6$?*>q-|*v5kJILJ7^;(FFB45%oYIg#L+I~cyF)(NBv$1 zpUc*J$V*}|~r-qR@8d(xMeQ^{;YJf*{V3sPZJ zqzvEWT0z~)bJuX}-K~$^92&;QEIy$w&i6O#?i^_bc2Wz4tSgDck-VYoHF*Ctc%At; z>k_0$va2lhxq(=-mPnkC^9J3tHSWkWdMFc5`}TRfjSVO$k~q9HY~X^^Hvq~cLY=ARfgDGy7hJDDek40 zcS4<7EFlY=%r0#;{jTh1(whb8^$TY8x}oY}FFr6VB6mJClqq*5{dIV<6+=?S3E2s8 zpo04Qiyfis+trKlZ8@a+B=SD&1^0qBt!G@vs6lJ(!Gwt?L@JMU)})BC5z4*GC}$=lrrMbv5ohduW=&W9h9P>|y<&6_c@W8I%V zf^OYjo2lB6&8QZHf+H}BlbQ7@K1)|pt?n^#VJb~XJ{SJRG(vJ(cMQbnyBW0m|Z7%ghhYscq}OkVouTFq}?`*=#+UcyJOEK2ZoaY7yYD z>k45ho0hn1HCIJ19S;vo9-TjWQOOm~W!HFC1y4JJcumliO^v z8_hHV|B~@hi&v4zOiccib%2n23z&ThVSJi@w9eE=SPzTTK^;0}w?z=ic;#c(o0OC$ z;^xl&dFsYPWqxgQ1Fh`GJAy0Xm;2FIq(ZYVJULVmrWDBetcI$?`ZKY1q(zV%Rtmo2fkNV0-8J_(Tg5mOJ)v zH&)JM?`R9y9@6IZ7VmBHu;9awv2F+Kb-jwyxqP_lMK5NPVac@zfLLsCW~tIt>g4sr z;9BSSZHf(bjUScAGkdQ5IkR`?U+51U!oq=T!spI#bhiXz3arSisHd!LsfrEI_kMsn2=cf_XSBv^JM0^h%!Mj4^y3$XpS!Uq@=sjWA&Uo?V)_qggO%akv|r<{mJvhujOdxlGy4)0 zcv(}8Q(eywY+sPR06>zUp&?BBsIK>-1?snUKXqW9YR;1N4uX1sSJ(XQ&eHeeknikE z506ltPLqp04q4Vw?F!ui)?A{;bONi*1MPB|uJF7SeDbRk1LRUU++BD6()gih*+|g4 z5v{MhJ5___#}uTu-;?`r)u!^hlKkG76Feh&|0L68)|3)86Hb#lJ%y!w6>_%CMVTG+ z8qAn#>s+QU46j%N$`H?~(>}S_PML-$d`C5C?k`K@SpsTf0V$#KWQdUb;wREoUp$8^ z+U$rAw-5H&JD%SQLPR;r!vH`*EiIgEH|N4baMfX+@WEl8IGb^wm^qZaR={T%0{0q; z^QS44S%^&WWd%>E#w4<`4kxDF>djJ%z}(<+Kqll~SOnXxpmGCOV$h1aQa$0k=3oU5 zymtvpoi=Vvqq$h?Aa(WI||%;-O+S+yi${Puph*p z9XfCnJCSa^`&|GaomGaOMtas0WI=pnalhsy{b#-G<~qLp?kWBS$H2^?3n?fl3L#sN z=z7}CB?$f`D}35&X?e-<$P`R~{}eorBF7MIh>=R;QJo0qLX2u} zHU+PEF!+j%?z5>iIF0{9fNT{aQz2?lfO69%mNLf;%goE1NqzQJ;@GeTBHQ^kV)5~w z=UJ(9Txfn_cy3vR2Pk70I;Iw<)mw8L@@x4|yWtX#%EF1clI%t5Fh1N#Lb2t&CjIj8 zX!Fk>&qg#Bd!b5DwK8(Bk|8_~j^!r|sH6P(SEMoSIJpm~9Q2Oz0i&&$6uMz3nM_9p zX#Dj8{+p`x=%IfF+{oVK2+vs_N`w>@eu38sDXn)^}%nNQM_9CpAwo6|tm(y&w(qL|VA(BZyNtWItLVi}2LE)JAV3SN^ zRvSWMM#j$!Ijm(*#3ebb2Hsp!A^m15~h^Jcpntvn{Mbx6)~yAv0RQ98p^*tH_6%2`OUUXf$=E|gH?bf`-G&7%{aJe=pmBnZ?Ahobi- zHb+^5Gl0ieaJ;eVYqQmYDrd_q8dwpcBiZsMvg=AJO&jsIoIHlGA4w1I3A~wv_OnD}bA1aNzsz zb1dHbj#lo=2hzghmt1$BIo=%H)X&ZG3kQLGT4b{rf{`Y7a&I04;Ta@Svf%CD1@d3A zxNU-y1!ay-NIsYJg)v)DFpql_*h&cz=c&{CQqIh1-ZTra)*%>E8T~VDXGbM!3E>^; zq>AR-|Mdxd+E;cPFC~%OJkkwHvhGwsPj=!KScqT-HqT-dll&%uX=}E%kCP-?yfHY& zgzyVJ;~=AQw}%CCp`>}T3*A91seV>55~I{{Ii~Tf2{}HIOp9UmHXAtIyBE-Oj*qxX z&TVr#oWU4I$N~$!Fn?)P#9@^9OH3%ZYn1jlPj zfa|t0x+h@#MaTQQ%0`u|weg7~D~#U1$W7WAgbcCXuY~pTIxzH0!FWr=IOaciu#dlH zWFk`cK4|ODB!g4-KMyjPSWqB8xdTT-!5JM&LrwWYbJdMLD6(lO34j)Y1*ZJ9)p0_q z^!ZoDef{g04>nd;9`*MV&mYT1qjh!x20ocWfJ{i#8U=UFo8LjOr-=K+4NoGZp%Gqa zMBZPZXBLvkyFl}WdU$SE^B?k&8B64r##_ApbUpf^F6((%JdMfxg9^#v6B4mI@0Tj2 z(X_L*y83VzC@NQfDF@;`2Ckz|Gc`8H;Erdu1u>XJ{*J_Bt&Vkwe<8Wp^5(-d)}l)x ze`^Q&8^~*ISD?QcgYINb8~=~Jb8614i`I5*+qP}nwr$(CjgFmkY}-aB>DcMmexjYX zzWV;bKHNvER@FLKH96)S_qeZ%qwV3~?RTW);YeLAN;ms|z{Y)etHgbU%DKNUb=P|R z1x?<7v7VlDpj!6NHl1G-*9f8Ad~H#DAh?|lgXs2YzFsd#OjKfwkFR4_{UZxSMSGKf zO}IEQQot7jif;Xn?y5vIX8hB%e23>db#QH6ZeNP{UukIw|IN)VRA^$+Nh7Oe0N*wq z7f}&|+~G)uvAKwb11qOLAR*pEoxcHw+Dx`$c%uC!=Siilqa)~dh59WrsAe*USDTS@ z<*E@B(C`0JEg-fjCiNd2QJD=u!`B?WzK(C3)UycXTosnLr=Crgp6 zHqdm0_ABfNWo&>MTt%3;A@)mRkg1@BmIM+E9Gk(PgL{q!B@if095*;U2B%i_&9ORO zk7w*UY9tGa|AW7LyCOOeAH-rcC#z5*H&~0-$Gk4mG7g3imR~5Br3~ZB2}vtERIp>9 z!{G>SPu~Zs?`VZK732w4z3-Y&t-_DyfK-zFlB6ug%2 z^7nX!E^2`rs}_Og2CRcEnGRv3yy3J+i)S5PWT8K16XSrBl`SVWrnzD@)wbf@$9=z~ zjU1jP$gg<|pl~Yi3GKDaVlAsVx|8_nwqUno$@lOKRh9cJR1syS71gBqfGziISn?6l zbb^`lKu@&fw&L-VJiTXQB5;e=dh zLkblHVq0l74(DGfN1Xaq7QzU{^=j-43=Goyx3=^cuC-OM;;$|;4o_}>%`1CppkXU_ zJQ0DXoKz9mGuK_~#H#yVp9*495b=@VXg6uL=C4F;wL(n4YyoMCc_UnlN09d2LRaa) zQ;n7xY8cP%S6V94JUYteegd@@qbSqN53d(!8gEB~U3byBaAwr3Ma8Z&RuVA=M^g5U zE)mWb?pfzlK(u%xzrMvDuVGkw1q{ZLoqSl(>GY#Am$g19$pgskv^rtBP1P8mdh-c! zR`G(P!t{pmNWXS=*{^li@rS&iN7W!GFvGb z!r|}%iAunYMj?wbdEElRVJ%>mXyS=mDAUYc?}nS+wKBh>h<$W{HD_Lm^gMbykdA&n zyf<8k;Jh%O%(Q1Q+q2J=^N&XvINR3Zfmdl)ZX4@|hCTQ;UWm}WNF)1V#qQ=s+9xaW z+Q=gNn{YlG$iAIaP)#Le=7(-rRb}@wu@_a=IZsTV5_fDZ~?=A{2vWT1(`0N~Lk5j1f-dz~l%EL`2%cZS^-1c-k zhlR1AWpyR7a+V_`VG)T@`^Ow*m~(CBQ~+*J@kS1ZK$7`Uy2_i+xv_c1I%^&LfqAkH zHzPH(I&|wi(DSMzzi*994xuFTvDj3b!*7u6)>dH06cll7sDe6cN%3ms^RqtlEV^TP zKln2Ytbz*qu5atj#D$}oJ zHw_4ZTZIcq@n08 z_b-jWNil{1Dqg}cAsA)Z(o$0l5gCpMn1qHMYLobNA{u&hO)_an+MNS`{-9?-oIok@ z+7Y9eq$(Gq3~cog;CQW_E1DtUh|(g`=!nIuK(>t=+%9@$B;`(>?n z4sQ-8R0GwPVv+L@)6vfosz+(m2FcNfgYJ2+FH%}T>N{p^0)q^J7+PBp~Cv%}6`A4yEG(t*I0>$JkOd9Bk zmD@@+DI#ZrVWwls)uk&$gc4G*$e1o>;o-zyL^-GKKuQnu=P>z~E(H88US0mvzD-GD zoN~Gu2{%0?3Ob>N!_FJDAzIzT6+UB~F@Ph#FuMIC2ZX)`7f@@Zto)#5J!-HF zhugcBP$AMt2_pnm($B?S5g#NCZHxmH79|K+FSg$kEEVF~4j=?$qeRs3QPGM)sp+72 z_;gR}?@>4@D$r3?>~vy1lJlu))<$MD0c>m5N9I)N4@S1O2&lA>9Xj_!#cgQYs&r-S zEJx&kPNmC!#tupu5W;<%#+7g;cbm5@s;2J|HC$!7SjxRh`IY zXNbu}%;7ny@H2Gu#=mDqhr`^`tmO7r7clD-C+-y0P|~d8jO}a09c(~c+!1c?T#lOj zMO4GWvdGYAUK^@TU(Wjske$$IG%8V^P5O3jlW7ZomB|<(-rmVDv>MEVW^^! zXXL@q!G*1pLHOABuTAabn#n2l419=<&cPfF5w+BO!BsM%v%=&ij3F%RC7kGQw8Y3o zqb0y>RS95J50dl>gR1f%aa7hTH8{MDF$e@Y5=YqJ4-Qa_O)TIoHFZCu6G@oEaIjep zQIhC^YxFLLH-)%Yiiy|}s@_`c=q!ty5L9;^U z$lQ>HgqNVs4AejBL#q&slnBWfnVi7P`zSE^|HhUMiR&;sN~0R!Y!&W}*a6J6>43|~ z9wX^&?A;ls0|F>HFa>!QWc4*-SmKd5ILf~pfQExYYbGA;xZ8xV<8uS;BxjL|MZYC%$1{|>fph*KuKDocbRa(# zuB8$ufF8SCv1O|3gkNI39PspIENl>plaFOtV6sCJ_;6y1yS^UQya*Vqr6cze1MghG z_ooO5dw~ddijh0`TG4XWjWxn$XV8xe@xB>-wfA_(InRPLB`%B?4B@U$81w`{$XT0= zl%4iAe#+Vb9$1!+{IWLLgpw$Q?fTFo=3e1QMdgjih>}L~#$GO-4{f~IR9GK`KF0Q| zpKgjeYf%spKBIQ$!b)n$plJpB6N3;+n6C1!0b$Y`ez`l3+zQ+ZL+v+d1>VV@m;!Hm zSRgyPA6<#PZd&D0FH7*gkYi*h`vu3-1{D#fwNVI zOJ#QPZve|tmiLfmW}@!mqLlPxaN8o4Uuyt|&KfpDBzdxL<87vGgX1aWWcnwRrx)ZV zr+kp>BB-5V9~^H9OVKJ2Ni0#^_a$l^)XE8s(n+}KMbpX}rXg5s2xKJ0pc6^AbN5*z3#uK_61XRN7)!Ksgpac99q9WxKYn(;m-nkl{cCsaWh`ATM(gL zq7+47FgjZbcSNhtWcEelw>I59Wt8n=Ov!P>7aHPcYWGHlyF(0md)H&k#L67ncm#~# zxD7NKiW{XMEy^H>rK(vsbd-T^xhmu2I{tU9;R22&&CP&S{Gt7y@nDBXL+#GvvX3R5 z!(-%?85H&K>?-xr0AtVKSH-- znGl7l2rTfWNW|eEanwD>+z@=)Rg%tGN-ch=Z!`Ouo2+I&2uHs*Apf3OV0#je8tur< zIY;Bq$MX8oU}?s59>rF=X|j_*efbQ+82bJsA&n<%>4+LWVYRTNTvo%R{G!l_RkqLm z3^9F5Wa&;ZZT34-?p`k>>urCA&e>x%_0*%ycIl=VB=wJg`;3YxuC@Y+=j~MIT?O8r zq!w5_v9_&Lmx7gb$jK3pS*dStU+I(tgT>^vL&Fr{+V14e6IrO_0^$cIbHp5?x6MB*_8?v-L)>PeF@I^5M{5sa1mEt~ZZv zY00Dy5lIZgePoU4ef6{*5(3s&Qg|W}Nsf&Foc^-CaHQ_^T}@h6utY0l%eBc}OXwti z?l0bu^x=#0z-ucwpjE=>`?G9G;CyT9Nru~tHA z`!nc&e;mk~3GXs3Ih;F^NgHAx{cEEpD>M*Y^556KmKof6kxH#IotP8*WHs@er?B6Q zC(2>aU^@VH`BcE8UP4OoHHOvxns!dn*hv@{JeU9Vl&9#hP@asLG_i}B!r+gQnmTz# zR*{9Izaen1k;BB|Hwj$KnEXqOP)7pLa;kulOLbJY_3Z!x-PlO(k8wl(qUs_QAdJ1J zo|;+m07znZctP3lJLlDv>PN_%44DQ1CIwrw+^qStY6SDtb^(M99G*5cy-`la@WYI-_tmS>T*8x$#HOtYiwSpS^MR<%sA! ze|LTKLQC&5r-K2Ron~wTnlKDW3*xVYcQ&dOzwjSsp_a_nD32r*aNgV{6j`he;jex6 z8^KHM{~{k{Mn;H~O$x~VL%^1cpc9Z=iiMS~QV~7E9-o-;`1xDc^wgM>R6~hpa#s#R zVm)}XTq4$wk&(7pwfpgSH8_%8j^9=h^cjmkBXx~%zHD8< zY#HMV&NFx?PO3CajCok)pNag$_hb#y)zr%St#QP*UeS%0JlVMu8z^PUWcpOzR148Q z66E7gnzvV$rO|oVpDK)$-rGb5f{SMNLS z%UsjuZfXDr(G!4y%u@9c1^w;;Zt3@%mxVf{Q9Uj4=|4@cp-|@$w7k3kxMZNu2MYJC4&KXDiOiZdCRrpu1%)RUkr== zZL8PH`2&%%bR*8o#5)<=JuTQJtsNdqEdkh&a(mXLo?fbirmZ*b##78n(vkgzeRA>h zS_DGb@Mqx8SJ~NwaZG9@)k$?|_DBYC2j=duBC}@yaqP|b7BHDLS{fM1_H!Z=X9Sgg zpBM@5oy>hu8S-L5ugbUxI5fBnNiaPz67HAC_4F1FMi0r+BIc(@A3e6dSjb`7_Dvis1fssC zlis*pPY)4m{uL>#I*|V$|)~W;)3dPIx=}X-5Vb3=?d>KegaF30`sWT zDFGcVE&7=MOub`MwA+jUo;bGlZ(w+hZm!4cJ8`>%$~vAsM?y64Uq1BE7~|l0FD}rA z3nyhTl7vXn4qZ*mNSk5tqQwr6oV{V6LBpeH?3jSwxo#u^YNL^!q60Z`X5~VmH0bFO zbw{SK`7lO)9Rd?alO(7jCzsBov&-jvlq+sHqX0G#=jkR-!!Bgj&Nd7s$JO!1xLhUh zd=(}|KQG!BK|(__`}c`Dq#{s}6j+he1pX6XniEsW@p0U%-}bF4r0$COCKYk9GZ=#0 z1zr=;#suu8?oWf6+Z)Yr6Rbr7d=LXEPHulzI^`C=y^-B{SOfxqh0nk;cCkTR_7%-= z_!!S=o)3p1$kIsk=wy^Q6X-rHQfjU;5?J4!cBN`BTP`1j5|JxQdthr7-$8?;feFRQ zU>qbEYRHE3!1YQ!K)FH)dKWe?QeiCVp92#n_rTT&)U!S1VKX-VqjXXHFO!W9rl=*y zJp*|JPaJHS(IPDNJNuSr_u$%e=opej<6U^wnOA^681!S)8D{{`uj%W>U^l0;mh#yZEx7{m^)$jKnz@w1nIG&i~S)MqdfRu2wDUlw1suMRtF5=h< zEKdtGYzVwzv`HUjm;47Bs_yxP8XgbC;YL(aZqjr-@uIKiLCkOXj9Pp+|M@2IUFJ|@ z{}(ofDWJwSIC2DgX76hfx95ew>Zb$yr zF(_190F&q3Xs9CwZj;+rV5kE@Aui15lxRav!;tZb7v{2Bfis4yP}5(!2Xh6HN!Cj9 zC}>oC3%>UxJuA(AJ&m^U+^!MAUQa}Gm?#5{;5)yVF;R83Tp}%wq4oB!>O|aBu#Nr# zAz=JtYORIzq{Y?B!4Wo7M|{e)Gq(E&MJOrBwf0LiNX>5B3!_fd(nQ8r)4wxB!qm-H zSM1vxYFSc)4rO4-5~*DN97a)BH7ZxvRF0DKXp1id_c)U2-*#`%12(XiZ((9l4~#ex zbXC}SVTv@7=Do2-U;Eiw2RKL`U4BO~CJd1Lhx3OAMpm0Qx{pRFYpZnv;;LNu(Uy1E*LK$emMg?D(N7b`fiEd@6QRy!h6hAEz*|YeACCKL#gXlPA#6eg6*z z6JoKOKKO=!KsFN@2qClpREtAPY41a^>d_RvltkX9|YX$kcki+wZb z#$3d_i0-F;iHb!a4-Ti>YRxkY5iM@*VYNyTWe*;L(yg(GU~KhfP=f z;B0IRNskB8GY*%jyA-Q{2x4VA|NmM5eB5e8&Q$?otIJl{lN&0grZ?AOMy(hheCOgQOr}=dI)sN8|1X(QevJ@0+;cZ5sy3=nmj0pA(9a>43ko^kjq>* zG;MH_$_?He-e1C5Q}sn#JEx12Fb{-dMRF$bw#s)&N$UX);itetRnGKbB}XT~SX@G6zWNYEiT~ zyOMteXRTL6=`@JG4&!q@7F~Q1Z17DIYE?%-fPlgKBck5; z1yRqw7v5~LGWq%tc6^3<$bCzvB!$T}5{mFwf0js6>1=!jKg!{6iHPo7djg*n2VW}$ z?su6ZmCsm*>>`Sjw9Vim7NaUJSuyD}jSMP^=g~r?l&Wg6`qG>9b{p^AN?7gv0b2TV zrj=SBk`hs;({QGr4K=&T@Lk z_iMGm<9p+~6)OB=P1v8H0p6+uNkFLq#zRoAH}bn!<9E@&P}BhBzYGm;&tMK>TS0g3 z)I2liAsL*9&IcpjTOCkVep^U5Cgb?V)udoL?knpmCB$0~`MYP~2x&Y>^2d_~py@h- zLW|?Sy4VJT?)Z%>_C7Icz1ZPh_E=*k7nOoh2=?4nrIi_&feKlrEv;)p{TVUM&t@>awHN7>jb7IfnL~ z63aG~?uqDN@e+{u`@=$bQ^-)>>E|Ml@iLI8kwlOF-GX|pxxc{a)g3Imi7UN9(QYz@ z8JJi*5;Y{>9cSmE&bJ6Y%srhsM8Y1a@O@^^VJp&1JJP*?GZQ5TYs7&*^1OsHGE#+$ zYqy$kD%H_BHH3*z2FEJ+CE{&hO+{+yd4eb-@^Uyu?1AUJN*6_H>-4zjuM&`M^Udsz zHSGg+Zp0oY*2cC)N)E0kX)^`k8%3?=fw9m`#?Qo-Db<<2OufR}=-M~b9nc6~{qluz zt;|r;LL|6=ye<1jbLSC+ek$!Gz*a&lVv#c2>qq79J5;LM`v=wIF?90aaXfD#i{$ZX z)2Bh6aNEOBp-`527V74zw=@z$nU-xi5%hcFhJNseo||Bxnw;N}(cw<}8737JS$+GI zY+HA*9#@9JoQ`6~Z!y_cCkETCAIxrI6(O>}Uwm6ZTttWphc3{fh&Xw3`+cyJGq7(x z;6$edANajw&b5S)ucy_>cI}B?*5RlFn~Ld$YsG8k$@~x*O1hLnTXO?Pa(*8*~c$+DT^| zc13e>ypD3pX9k9S!Gj!Egd-O64FrJ#LPVnil!68c9Mo^JeV{kz(u&42=)L+o1E6(& z6rH0#6|c!h$X4uA_gMCfVQ;_o#b)eBY`ccP7d`K}Seutkku2Ax{vtV$EC`t5o^}NH zBa7HiA$>E!|K7<@Y-@^P{gael6f#jMvL0-pT&>(%(?P7y|6A!{%ObSULVmy12Na_` ztXMo}$0-tvxE6fP_Y5c(Res??zuwXp7_`z`0lW-wXGg~LvqyzutcSbQ!QuTP6FdG_ z6vybp$E4!Dq(S@kM@&&oqB`_?(T^^uGnJMv?Ckc86$aF1!Efo}$7AA_z{CZ(A109h zXy4e4LyaaccnDU)u-24uFE^mbq?e{YYs^6+oz&fcfw%nn`62p{K(;uri)dp z&lx!mI@(H_zRjDGwOS&&IjrJqHgwW~6>4WL8i?RCt*LRTBpGda(zU-kf?+&XLlHBwe4 z4u^G9=q1~;!1)VP27O~bvy-$d?*Klkk&xF5YIkXK&!XEXow-3`(@}r zWM>KNf-Lam>d>VcK*DDCOzzw(ZlR+suNYCU(eM zCVtRt?6Z#6Z^@4U(S*KKh%~~Li;y{fd#8s9;v+~1*I#_~%2<9Y&Rotk(5thX7ccZH zI@eL!*-bW_i!|m*(<^(6(yeq5kO2T}$eV9f69SNU5r`@|?bcyr_#+l-GaLQZn~Wb_ z23Wx=|H3veLBZ@+$iyR@nYjhg{;IRx`xzGsxlL$=mAZ=5@$o#7&P18Y1bgXJ?+Og{ z(efo6u!xU`c+fM5Mh#!oQJkDv>G;8N8~vI)FZ}&I3vw$6N;V!1fXf*+?(`%|HRtdC z{LcZ!!jkCoT0FNqJxV2*6^GjzDewh@g_Si4*&pO0a4mL1MSuqHDSk$dh$?Pq!eb@s>vhFv6cu}Lcx8{m5z9oH`W2i`dTzDsr#dnn zU0k7bZ!oMg^#l!-_|t|bB78*e5go!Vby#3M()BOLO^OLFZ?w!&`Nh@G#-xih7b!EC z)2IaBww90eE#+esY&G_OrA0I>W`efW5)T>0APPCZwDYSN1BN%08v^stNsJL8_%8p^d<0KjMNl-ES0tf<)3$gd9-S6puFE4QEE5=fY0dwcV^PE0KLXV}B3iFNnoF$7*~wAOyS2kN`)5hjt;Z}R!WNJ0VoKQ5s?P4l z4#r^iWAu7)^qKkwq;Yt=Xm`FEro(p= z*xRdhWCL~yJ=Dr0mN^%znsnkX0Q8452TnG3=Y%S9me$6=s)!jA@tGO`Q2HhZCVoJhGpLbj2-Z@I2J z-G#edj@eJ99PGZH$W#p0;~E$Xc-n}d_SW6uEOxcy*a_nY4f3Hp1|19MN7{`k-6EnG zgWAXtx-}feF&e4E76#~?-~_UFAluR%Nm(M;&fr%4n$a?zE{jOZt@!*nD1Or29ILZ_(d;s2u>Xp}$q<_N>V?g~9e07K?Bjn2wD&Qd>tYKVp@(JD3Wi%OvdCfgqh^2* zyn;ZsV7&uF4NV@#9S?QS<|M0svyWn9Qt~PQ$b^5 zbXuvfH5Xm`_KvV*+kn*ffI|dodz;Nlqw&7e$ zuuP3mCYvQGz4V_cI{CfNYy#$i8#M<#=~W``eH8<`Kw87=z}pgG*eR`JX$DK!4+K?9 zvnvF}OSAdxvyS2QICx*btOc0V#NrP?wL9~OQ~$X&{6PL&?lSEI1w#`ddt67~6jYr^ zn3fTdZiKuBU$R*+wox_gTztr@^>XFw6OL#)9_05M-wU{d9V-KQmp`W}rX5)D!=A8Bkr__<~&ZZ2kw7>dTu7x-vxlc29` ze7Z3*e2YJ|88YP_6i@F3Vp`ekc=&!?a3Be3dpj6u`(CBR)`R`~0)v9hF|M9>rt;r_ z>u8eqbdmNqxJKWP^4XNY%LbUQOL6S}1#+OOC)z7t*lNcX=treF*zf1%33VN;oX2X! zTzOn_$8j~re93c|khHVC|F*n;_RW0GH`9oxt$^2wTcAqs*NCSM9Nmp8pYmY-?S*J= z%o80SL(V;~yj2`WhJu+XeEt}}BBP>_B^#43@bAu0IR#nvdPkAee8sfH2Ap~_%2y}_ z#@4R!SF%OQyQitNg>SXO0ZMZLvD@SN0(yCJ zRtFjbTFRDzeAg4cbbz$qYED{8S_fJRV|A*87Y$q4IvFu_Y~mk0*agTGQ|Qv_RnJyonK0e){7>PJ_!0zm|`$^O=?Fp#!nr3XUvi&ukhf z#38kEnZYO{E{E|&G*w6ZHwbB#%k4J;2Oi6pDb(JkJyk^Yr8A`fbhr*K*s~8ID@39Y ztmY~{R$N86av3`l84G7gf zt6`ekZ|3@8?8zVP=a1OafJsjHNAmgeVhp5;^xt#P2x|Zh?Efi2A(+5}|5Jp*MF9Wb zXa6Z6{B~j&&)mfzSyfr1#7HRc;l^M?kU$6$HLr}pgq~~} zBYyP5N*WZx+S=4Gu&_!xIuP*^!|)v{*+*43!npF)i^7sE?mDZ1A`F?N{PeYYMp*9f zhD1RsWkLoHz?7_hp$WP#O8!FCLYASLd^PalKw2aPm=dBpC3-G>}>aNL^iBFmQ;$KYvhvfSX}jbOFS(ci%F?KQ?4y zm%~^`C&$j{25M?iVIyEa{Kb-*nmARM79RE&{Vo(%79W62`LDdrPHZ_jxxzoaanQen zsL%!{C(p?F-uqz-=0OV>_tHSOWmRTcctAWkIk93#7pyM~gwcOc1Vn;_m<)PCy8`~% zAp=Is%xc_NJZ4x!zc@u>G3X1`s0ir6&P2#5DRC|5^TkC(Kz>l(A$NznL$}7HMrLMe z72v-1=wLkiyIuGR6BC zW#2e~hTpg{;V`Ql8VlBwCDG@14Vo{9gsp2dXfRgpIts$<94!Cntlh(PYL76IFfcN< z&h;yNnd24UL;M5?x!1L~PLxX|_CwbRS6{btbM^GPJOlNpuZ!f4Nf9I9-p1w2nduw7~W zefRV|Q$!fEEl7^$Sl}<)+@DT|y@BAZ-5ke+!E<(6Cbu;szeWIT91eRIhRtA-rjBso zd)@oXcd+Zpyz3@pwsv+yTho8VGj}_m1O@|8a| z0P=2bY#8(gP`J1`I<7Hn94sP7c~BjlD~HdH1r7}Xt$Pn(3s!1U(((~iRooejy1|8o zg*^0!`TX6Bb^4HTc-$!DqoY#N(xT4N#3`w&N_u)>Lqj5DWFtQ`d10bG{zY#E!R*w) zUX+uECs>vZ2W#u9c|K!7T0Vk;O@-3b_kM4TJljh3F7F4XIhO4XXDYsPZx;bEH)ffM zRNA4f8I+f6$^BtOfrF30{4kZOqco2qr6>e^o`Ly!L|l%5cx+Znrx=JRv=E{2 z-=!^J<6k^6g3njSax^TRaPa;=g2Io@+n1L^oL~r1gjLlF`N66`loxu! zg&LV0_8WzYH+@^Bl0Mr#3dvk=JI*NN5a73a5;hFaXJ6BMYby55*B}3nA^Xp-H5l7TKO-9 zGq&E+W%VcJK%OvWP1{#+I_~snT%4pUA)W3h>iOZdIew#`%oiL!^M8JVGWoqqu{rL9 zxWch~Fb;2?N23j_VlvO`lgfBqlDp-tsFGlX}po$Lb#TJ}EzW z(A!G&!QGx3kPiae#Tf3ze9sOqoT+#2nZSIvsNE?j4LiKtV$fo-Ud)c`YEVt#b>Ns5|eL;Lz220bZJl6zG0d za#gFC*ck3+HG83PCRkY4j_$vqt*z{oOfw`yuitZ3e<~VWPZTE1%(r6D)1P;+0bPYM z2(`F}m`EEE^q}e01q?HFdYvKcwi-p2^#)dJ6PY=;^ZC5v_V7>F+mbiS6)Pd*C$1RV zwtv6I_J<=ETC7<+y1QK!BHUQs8HMNx+(OC&ocMhn#k90sYjnTS`@VeeG3Z{wK!mRV zBMUz6Zf+w(;INB<1Guk;iGnun)%#^sP;BRW%T=js_lJl-gdHAB`nCIEMZNGPeo7v0 zn)Lfj@>dF>BU+IRLbL_TLMp9TYFu!1YANgzbsbF<7Pd5+07}} z6&5D37QCFV;EF;ZR<$@CI_sh>Z!q~j%gy;DrRRnFJe{v-dmFOTPz2h5mw&HsZXO;c z{xjP7=v?cxg`|+r4eROQ1En2$5c2;4*V%*?iAI`^-}DhIIQCuQ2fhR zK>=aTkSi1(x9?wyxsrTCTX^)KSGrR}`w0e=4`K07blg=Ytm(h}s0+-#sp87qEAcLn zM|Kt@t2w7PRD-!jcqS$~jkR}^D8K9QU#Btq10Hq!A>4s>yRIzF%t{aMk7c1?VGnCS zXwn0!Q*oqg>F7JioZUuc{E<%EKw24;cEhGtfq#~4C~%RioSfm+RS2G|*jPX@#mBj_ zZHwJc?uNgG-&%L+^L=WeEj>dLX_-PTqVf;Ptg{g2NXahV?AyrlKMt03>13%WhwU!o zskBKb#6+PSj#}H}9Y!(XsF z^YTD_eR;1RrlH(dGX(!=>Ae$27}n~>wi*V6CznK+PNp1lxu1h&S|#-L6Xfrp7V!9F zAkHtJ1S!a|#|O3q(2yV*q@@zWkIT(VjYp%7bBm{*w&;Ng&lC7_?PBmmEV(F;5(x?x z=vq&kxj2}Vg|XWvP{{vsTD{oF53NiQ`b5EDw~KN;nJfAUVW_C7t6Jax+^c|Bn8#}5 zmQk~^_C8{Z^zd+iANFw*3*3Bx}PLLndwasI%ihg57>zP^V}o+I3I-@erE zU@BIJ?ECGGS%%pwZ${ylzu8{?2xxAiBIsua0@h9Z9{26)z86;*)v*M=UPbM88}n2l zPT9K#umwzz6!LinwNY$Q0RrfO-(umYM)no&eXcJE3v|g6$fGA9avth8V)Ys zYdW14t8ix1F{kJRt3~T5+SY`vE`Qjsudl5S(e$F4OFO$wz;p?dH-TXgsU*U|reptL z{G|t zL-QCf^-u|ZexQ0>uFb(e2jcU>(9%|)1PJ8u%@qj327VKPfr0HW?1Spj>>iFQ76MIoA+#F=hNKf%T9uQGD-T7c*Kmcj5(t$th{&WGaBpDs9stgI$nBWILh zf!M`W%|&k{$@Z3-zTZv=C*~$aq^*%Lr{o@XR4-(Gd|((1SNE>Bsd9PzBc|E3k{kZ* z4&h%+pEy_Re2$a_X?+~f^Rlt?;~T1|q!{1q4b+ODq8xTg{r(G%bGG=~9T$(+Bh0n* zC+0h8tEqf)f63?1Rjp`E53r2_VB_%y;NkYKPaNA6W@y_Kb$OkU0G|Cz6vo_XXw`Nq z>D~Z<73o?HDk7EWuuYpv`tvPmW;Qmo-M|<8fVU@1zt=@N1tLoMUvUK6zC%k(#eAfH ztK;P;_W8stXMGSY=W@p;l1sR3qeQAI)micMTh++OqkCL4r|BfYvqr;Nzv$gSN*hlN zYu;j1*Pbep`#x5Pw|`I1&x?8}Ab9fF$WxZ8bXG(@{tO%^-(j|$oVtbr&+d2~#39GX zk^p~3I{kZYO-kIpH=LaQ%@OZg$5$Ux6&01Ai?-%Ye`}wkrv_uv+aDyNO90eznC$T1 ze9P)&1+iz3XD;Utw3loeYMS(roEpO;4N!l>UrjH7T~6osRrzb2Z4Yct4?fPjK7<9S zXa#&;=S^_m=gSZ|isM`w>+ZhqFFLpDxaVq#zcUvH8% zI<2{~c#9>Hh;v6K77kWBv7phhe#^n(xn7+6-W0uA-Erl$MlpxgRuCkZ4^dgn|wr4!eDm_)B7{&#NsL zTFhBXD+KtoHm1|@G|y`5S^O8E4n}2%@ccZPKEdyAZz3eg&M-4Qoe$iBReO6z4&YLl z&~A)58POJe{syQ1zjZ~w{;s_!b^^ZPA3rM;bAq$7Ab+AE%+-L_j98}X-NG-yRd#($ z{>kV&aYw>GKBY3Gv-qO;J+!L)aH#?10vMZZ4)yo^8Zl3McH6t4$2>XrQ)+@aQ`OH|K;LHBYZlI`k6`E$f!C*Kn z=3=8MuOrcy}9tT@Gze5%Q-x7L1IZDzPOK%#M|P0t18t-MWuJtzXt*qFRrl! z{McfWay%xRNX^B}GTXm(dNl6gDs$ecf@gb#X^4BR;W}mio~zHM5)`o9f}S34!yHKs zubcH4_S^VR#YFh$&b-0g_*mFkkLwn}L3_tz@d{p#Hydfpuik|hIbJVLq35LULJ=)p z5MtBgA>G&=Y%IoV+i2;29erAiu*5ktGpvY1F#oAU<=|{4H#_Yr62{MF(ABzlrQ{<0wwZx|1{Q}f0oS3U zwYLslJ@$0it$S`POY?Qq1$>fWb^!ZqzVyBL&%Nh93e{U^O>+RB2C4k>U%D9 zQ=y}wX@k7}j@}i%Tx%R&t*L5pWTbnkDr|Z)*D&~^?;k#0KQdtw_bzQ}0{2k0uDW`A zA>j3>S!H2Kb%k>GtT@2&=c1I4(G?xuV@m+0+rS-x%~#<)ETs2%x!yLVxBT_T;{+QX zWt$o(sywsgSJZWA{8wT~O~wPg{`?>5zxk8lsdhU(-qhaeWe$%E>{6=x+t%EBfd225 zsekh?A090!wpS0fwJj~n^()9_(!YOK_mqot-|n;?T@(LLb!Ym{cA`h|pKD4xcZjx@ zA+|BoYVA_XSVr6`u{08~HMQQ>(hyZ$xQP%voy(=I88dW@C8UU@No$LdHe4Nw5)`q7 zBsv6Wiq9n0M#x_c^c5=Q+>!Tu3dy*_Vv4Nh&Yz-|d=h4e#G!6eUczhcklq zu06%cOXZ)Qlxo83?1t*3Lv`Ar0)ZfRdVY3;P9fnqrqPU9t0SbylIPl&+a?@=Ky({x zcV#|Kf^VJKqBF^<@>$MlLJ{GrAAb1B$BAsNQ7LVeS}xfKJxO= z?<^=dQCk+`;IbS+jd^L!KqUk+Z(M*n0iv;}(Ypf{j_%G2fkV7#H;L zzxz4<%RgX}{;jyJbyw39Kz5#uDZK8s$U7AqWN~_kV-kyP342f+WQhpIPB&Cm=DWm9 z&p)gff(d;g6{E0KUs*R*o|*WuJ|k z+oH>5C8hCuja289rJZL?{Zhm>lu{;@BV23bc0I|H-RK#SpNBG+N-+tuB(qJ@lB1aV z;)@eq-HUD@ZH>&~r_vu=M^Q$BEwsVF``QRK(S!m;6Dx6?B@Y`*{hdW^E_>KL@<*-r zdj}tX$EUx%Cs@dcrJ$lcSvUJ7a+>XUxy1+DkL)XK-rJ+ATF0D>Hm^=}EtI6jJ%^cP zFXR&V2eC6hVSTK;*MmDh$A^V^u7CtLUDB2lo*mq&l5m(~F4*N2?t-o(=6s{oLv|&6 zpup%047Y9WOW~tY3Fj+2_j)p5L3Xvn@5s_Q*_h=5*^`i2K{{s^6Wjc0CK1#`0E{0w zNuK3rD>@2oJUkTHj(4-*qt5gcb~;l_uG!t)x9?<1x`D%y+MhoCW&YeZoPJ7X1q_oY zS#LZ1q7Y=ZHE@d%TWbKFW3%IKgKwlEsFf#UHjkDT)~iAuf*%Xvou^u8hew1~v$63v z9b|IL;r`(NRwIbp4eXb_Gf~wJV<{K)gxm$mZ;iylvMq5TK;R~Be;a?XlG+ux)j=fs0FiP#o`r{ zbj+$gf71uE)wFiBn}EzIK-oGwr{noL?9Ba@36HeVvKKbce)C5D`g1KEuhFiSGlxj^ zCTW;4nXL)qd0dkSCl|9}rAqx7!%D-L^w;P=W7Y||jtcXJ;3zS=jhe$x4M3rfncUm) zWKYGzS#T!((BwS%72oYnV9pyo@06T(43T`Wn6xD2zSt-yhUH-C{v?>h!d?6typdgE z5QSbOfT3Pc+s% literal 0 HcmV?d00001 diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index 275f02b2b2..3710435c3e 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -33,7 +33,9 @@ ms.localizationpriority: Normal ## Install pen and camera 1. Attach Surface Hub 2 pen magnetically to your preferred side of the device. -2. Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. +2. Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. A red LED indicator light on the pen warns you when the battery is slow. + +![*Surface Hub 2S pen *](images/sh2-pen.png)
          ## Start Surface Hub 2S diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index 6faf4ea3e9..31c48d4110 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -37,3 +37,18 @@ To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** **Recover Surface Hub 2S using USB recovery drive** New in Surface Hub 2S, you can now reinstall the device using a recovery image. + +## Recover from USB drive + +Surface Hub 2S lets you reinstall the device using a recovery image, which allows you to reinstall the device to factory settings if you lost the Bitlocker key or no longer have admin credentials to the Settings app. + + +1. Begin with a USB 3.0 drive with 8GB or 16GB of storage, formatted as FAT32. +2. Download recovery image from the Surface Recovery website onto the USB drive and connect it to any USB-C or USB A port on Surface Hub 2S. +3. Turn the device off, hold the Volume down button and then press the Power. Keep holding the Volume down button until you see circling dots below the Windows logo. + +![*Use Volume down and power buttons to initiate recovery*](images/sh2-keypad.png)
          + +4. In the language selection screen, select the display language for your Surface Hub 2S. +5. Choose **Recover from a drive** and **Fully clean the drive** and then click **Recover**. If prompted for a BitLocker key, click **Skip this drive**. Surface Hub 2S will reboot several times and take approximately 30 minutes to complete the recovery process. +6. When the first OOBE startup screen appears, remove the USB drive. \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md index 75eb49c4e7..152af9ce0b 100644 --- a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md +++ b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md @@ -1,5 +1,5 @@ --- -title: "Secure Surface Hub 2S with SEMM" +title: "Secure and manage Surface Hub 2S with SEMM" description: "Learn more about securing Surface Hub 2S with SEMM." keywords: separate values with commas ms.prod: surface-hub @@ -11,4 +11,46 @@ ms.topic: article ms.localizationpriority: Normal --- -# Secure Surface Hub 2S with SEMM \ No newline at end of file +# Secure and manage Surface Hub 2S with SEMM and UEFI + +New in Surface Hub 2S, you can use SEMM to manage the UEFI setting of the device. +Use the Microsoft Surface UEFI Configurator to control the following components: + +- Wired LAN +- Cameras +- Bluetooth +- Wi-Fi +- Occupancy sensor + +Use the Microsoft Surface UEFI Configurator to turn on or off the following UEFI settings: + +- Boot + - IPv6 for PXE Boot + - Alternate Boot + - Boot Order Lock + - USB Boot +- UEFI Front Page + - Devices + - Boot + - Date/Time + + +## Create UEFI configuration image + +Unlike other Surface devices, you cannot use an MSI file or a Win PE image to apply these settings on Surface Hub 2S. Instead, you’ll need to create a USB image that can be loaded to the device. To create a Surface Hub 2S UEFI configuration image, download and install the latest version of the Microsoft Surface UEFI Configurator from the [Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) page in the Microsoft Download Center. For more information about using UEFI and SEMM, see [Microsoft Surface Enterprise Management Mode](https://docs.microsoft.com/en-us/surface/surface-enterprise-management-mode). + + +## To configure UEFI on Surface Hub 2S +1. Start the UEFI Configurator and on the first screen, choose **Configuration Package**. +2. To add the certificate to your package, you must have a valid certificate with the private key in a .pfx file format to sign and protect the package. Click **+ Certificate Protection.** +3. Enter the certificate’s private key’s password. +4. After importing the private key,continue creating the package. +5. Choose **Hub** and **Surface Hub 2S** as the target for the UEFI configuration package. +6. Choose the components and settings you want to activate or deactivate on Surface Hub 2S. +7. Use the USB option to export the file. +8. Insert and choose the USB drive you’d like to use for this package. Note that the USB drive will be formatted, and you’ll lose any information you have on it. + +Upon successful creation of the package, the Configurator will display the last two characters of your certificate’s thumbprint. You’ll need them when you import to the configuration to Surface Hub 2S. + +## To boot into UEFI +Turn off Surface Hub 2S. Press and hold the **Volume Up** button and press the **Power** Button. Keep holding the Volume Up button until the UEFI menu appears. diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index 2e3a44c1d7..04567185cd 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -19,14 +19,14 @@ Designed for team collaboration, Surface Hub 2S can transform the way you work ## Room considerations -Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces may require peripherals such as an additional camera, microphone, or room systems solution such as Microsoft Teams Rooms. See the following table for guidance. +Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an additional camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity table to determine if you need to plan for additional peripherals. -|**Room size**|**Participants**|**Proximity**|**Additional requirements**| -|:-----|:-----|:--------|:------| -|**Huddle**| 1-3 | 1-2 meters | None | -|**Small meeting**| 3-5 | Up to 2.3 meters | None | -|**Medium-size meeting**| 5-7 | Up to 4 meters | Peripherals optional| -|**Larger meting**| 7 + | More than 4 meters | Peripherals recommended | +|**Proximity**|**Additional requirements**| +|:--------|:------| +| 1-2 meters | None | +| Up to 2.3 meters | None | +| Up to 4 meters | Peripherals optional| +| More than 4 meters | Peripherals recommended | As a general guideline, install Surface Hub 2S in a space that meets the following criteria: From b376b30adc7385a85091b36f34928fb5b5c9285a Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Sun, 16 Jun 2019 17:56:04 -0400 Subject: [PATCH 202/303] fix: MD042/no-empty-links No empty links - Some powershell examples were split oddly - Add heading markup - Remove empty links in TOC --- .../ie11-faq/faq-ie11-blocker-toolkit.md | 8 +- .../surface-hub-site-readiness-guide.md | 4 +- mdop/TOC.md | 10 +- ...sults-pane-in-server-management-console.md | 2 - .../app-v-50-security-considerations.md | 32 --- ...curity-identifiers--by-using-powershell.md | 254 ++-------------- ...rity-identifiers--by-using-powershell51.md | 272 +----------------- ...system-components-to-microsoft-services.md | 2 +- 8 files changed, 40 insertions(+), 544 deletions(-) diff --git a/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md b/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md index 7e3946d6d2..67093919f3 100644 --- a/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md +++ b/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md @@ -20,11 +20,11 @@ Get answers to commonly asked questions about the Internet Explorer 11 Blocker T >[!Important] >If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment. -- [Automatic updates delivery process]() +- [Automatic updates delivery process](#automatic-updates-delivery-process) -- [How the Internet Explorer 11 Blocker Toolkit works]() +- [How the Internet Explorer 11 Blocker Toolkit works](#how-the-internet-explorer-11-blocker-toolkit-works) -- [Internet Explorer 11 Blocker Toolkit and other update services]() +- [Internet Explorer 11 Blocker Toolkit and other update services](#internet-explorer-11-blocker-toolkit-and-other-update-services) ## Automatic Updates delivery process @@ -50,7 +50,7 @@ other update management solution. **Q. Why don’t we just block URL access to Windows Update or Microsoft Update?** A. Blocking the Windows Update or Microsoft Update URLs also stops delivery of critical security and reliability updates for all of the supported versions of the Windows operating system; leaving your computers more vulnerable. -How the Internet Explorer 11 Blocker Toolkit works +## How the Internet Explorer 11 Blocker Toolkit works **Q. How should I test the Internet Explorer 11 Blocker Toolkit in my company?** A. Because the toolkit only sets a registry key to turn on and off the delivery of Internet Explorer 11, there should be no additional impact or side effects to your environment. No additional testing should be necessary. diff --git a/devices/surface-hub/surface-hub-site-readiness-guide.md b/devices/surface-hub/surface-hub-site-readiness-guide.md index f865f7d7a6..2b99c01aa6 100644 --- a/devices/surface-hub/surface-hub-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-site-readiness-guide.md @@ -89,7 +89,7 @@ The 55” Surface Hub requires two people to safely lift and mount. The 84” Su ## Mounting and setup -See the [Technical information]() section, or your mounting guide at http://www.microsoft.com/surface/support/surface-hub, for detailed instructions. +See the your mounting guide at http://www.microsoft.com/surface/support/surface-hub, for detailed instructions. There are three ways to mount your Surface Hub: @@ -97,7 +97,7 @@ There are three ways to mount your Surface Hub: - **Floor support mount**: Supports Surface Hub on the floor while it is permanently anchored to a conference space wall. - **Rolling stand**: Supports Surface Hub and lets you move it to other conference locations. For links to guides that provide details about each mounting method, including building requirements, see http://www.microsoft.com/surface/support/surface-hub. -For specifications on available mounts for the original Surfae Hub, see the following: +For specifications on available mounts for the original Surface Hub, see the following: - [Surface Hub Mounts and Stands Datasheet](http://download.microsoft.com/download/5/0/1/501F98D9-1BCC-4448-A1DB-47056CEE33B6/20160711_Surface_Hub_Mounts_and_Stands_Datasheet.pdf) - [Surface Hub Stand and Wall Mount Specifications](http://download.microsoft.com/download/7/A/7/7A75BD0F-5A46-4BCE-B313-A80E47AEB581/20160720_Combined_Stand_Wall_Mount_Drawings.pdf) diff --git a/mdop/TOC.md b/mdop/TOC.md index edac2c521e..91a625282c 100644 --- a/mdop/TOC.md +++ b/mdop/TOC.md @@ -1,21 +1,21 @@ # [Microsoft Desktop Optimization Pack](index.md) ## [Advanced Group Policy Management](agpm/index.md) -## [Application Virtualization]() +## Application Virtualization ### [Application Virtualization 5](appv-v5/index.md) ### [Application Virtualization 4](appv-v4/index.md) ### [SoftGrid Application Virtualization](softgrid-application-virtualization.md) -## [Diagnostics and Recovery Toolset]() +## Diagnostics and Recovery Toolset ### [Diagnostics and Recovery Toolset 10](dart-v10/index.md) ### [Diagnostics and Recovery Toolset 8](dart-v8/index.md) ### [Diagnostics and Recovery Toolset 7](dart-v7/index.md) ### [Diagnostics and Recovery Toolset 6.5](dart-v65.md) -## [Microsoft Bitlocker Administration and Monitoring]() +## Microsoft Bitlocker Administration and Monitoring ### [Microsoft Bitlocker Administration and Monitoring 2.5](mbam-v25/index.md) ### [Microsoft Bitlocker Administration and Monitoring 2](mbam-v2/index.md) ### [Microsoft Bitlocker Administration and Monitoring 1](mbam-v1/index.md) -## [Microsoft Enterprise Desktop Virtualization]() +## Microsoft Enterprise Desktop Virtualization ### [Microsoft Enterprise Desktop Virtualization 2](medv-v2/index.md) -## [User Experience Virtualization]() +## User Experience Virtualization ### [User Experience Virtualization 2](uev-v2/index.md) ### [User Experience Virtualization 1](uev-v1/index.md) ## [MDOP Solutions and Scenarios](solutions/index.md) \ No newline at end of file diff --git a/mdop/appv-v4/applications-results-pane-in-server-management-console.md b/mdop/appv-v4/applications-results-pane-in-server-management-console.md index 5bf7b2615d..bd376a200e 100644 --- a/mdop/appv-v4/applications-results-pane-in-server-management-console.md +++ b/mdop/appv-v4/applications-results-pane-in-server-management-console.md @@ -36,8 +36,6 @@ Organizes the icons in the **Results** pane. **Help** Displays the help system for the Application Virtualization Management Console. -[]() - Right-click any application in the **Results** pane to display a pop-up menu that contains the following elements. **Move** diff --git a/mdop/appv-v5/app-v-50-security-considerations.md b/mdop/appv-v5/app-v-50-security-considerations.md index 3359e49b81..f7291b163e 100644 --- a/mdop/appv-v5/app-v-50-security-considerations.md +++ b/mdop/appv-v5/app-v-50-security-considerations.md @@ -126,35 +126,3 @@ The following will help you plan how to ensure that virtualized packages are sec During App-V 5.0 Setup, setup log files are created in the **%temp%** folder of the installing user. - -[]() - -[]() - -[]() - -[]() - -[]() - -[]() - -[]() - -**** - -[]() - - - - - - - - - - - - - - diff --git a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md index e0ab454188..8380e16dff 100644 --- a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md +++ b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell.md @@ -41,332 +41,119 @@ Before attempting this procedure, you should read and understand the information 2. To open a PowerShell console click **Start** and type **PowerShell**. Right-click **Windows PowerShell** and select **Run as Administrator**. - ``` syntax + ```powershell <# - ``` - - ``` syntax .SYNOPSIS - ``` - - ``` syntax This PowerShell script will take an array of account names and try to convert each of them to the corresponding SID in standard and hexadecimal formats. - ``` - ``` syntax .DESCRIPTION - ``` - - ``` syntax This is a PowerShell script that converts any number of Active Directory (AD) user or machine accounts into formatted Security Identifiers (SIDs) both in the standard format and in the hexadecimal format used by SQL server when running SQL scripts. - ``` - ``` syntax .INPUTS - ``` - - ``` syntax The account(s) to convert to SID format. This can be a single account name or an array of account names. Please see examples below. - ``` - ``` syntax .OUTPUTS - ``` - - ``` syntax A list of account names with the corresponding SID in standard and hexadecimal formats - ``` - ``` syntax .EXAMPLE - ``` - - ``` syntax .\ConvertToSID.ps1 DOMAIN\user_account1 DOMAIN\machine_account1$ DOMAIN\user_account2 | Format-List - ``` - ``` syntax .EXAMPLE - ``` - - ``` syntax $accountsArray = @("DOMAIN\user_account1", "DOMAIN\machine_account1$", "DOMAIN_user_account2") - ``` - ``` syntax .\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\SIDs.txt -Width 200 - ``` - - ``` syntax #> - ``` - ``` syntax - ``` - - []() - - []() - - ``` syntax function ConvertSIDToHexFormat - ``` - { + param([System.Security.Principal.SecurityIdentifier]$sidToConvert) - param(\[System.Security.Principal.SecurityIdentifier\]$sidToConvert) - - ``` syntax - ``` - - ``` syntax $sb = New-Object System.Text.StringBuilder - ``` - ``` syntax - [int] $binLength = $sidToConvert.BinaryLength - ``` + [int] $binLength = $sidToConvert.BinaryLength - ``` syntax - [Byte[]] $byteArray = New-Object Byte[] $binLength - ``` + [Byte[]] $byteArray = New-Object Byte[] $binLength - ``` syntax $sidToConvert.GetBinaryForm($byteArray, 0) - ``` - ``` syntax foreach($byte in $byteArray) - ``` - - ``` syntax { - ``` - - ``` syntax - $sb.Append($byte.ToString("X2")) |Out-Null - ``` - - ``` syntax + $sb.Append($byte.ToString("X2")) |Out-Null } - ``` - - ``` syntax return $sb.ToString() - ``` - - ``` syntax } - ``` - ``` syntax - [string[]]$myArgs = $args - ``` + [string[]]$myArgs = $args + + - ``` syntax if(($myArgs.Length -lt 1) -or ($myArgs[0].CompareTo("/?") -eq 0)) - ``` - { - - ``` syntax - [string]::Format("{0}====== Description ======{0}{0}" + - ``` - - ``` syntax - " Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + - ``` - - ``` syntax + [string]::Format("{0}====== Description ======{0}{0}" + + " Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + " Pass the account(s) as space separated command line parameters. (For example 'ConvertToSID.exe DOMAIN\\Account1 DOMAIN\\Account2 ...'){0}" + - ``` - - ``` syntax " The output is written to the console in the format 'Account name SID as string SID as hexadecimal'{0}" + - ``` - - ``` syntax " And can be written out to a file using standard PowerShell redirection{0}" + - ``` - - ``` syntax - " Please specify user accounts in the format 'DOMAIN\username'{0}" + - ``` - - ``` syntax + " Please specify user accounts in the format 'DOMAIN\username'{0}" + " Please specify machine accounts in the format 'DOMAIN\machinename$'{0}" + - ``` - - ``` syntax - " For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + - ``` - - ``` syntax + " For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + "{0}====== Arguments ======{0}" + - ``` - ``` syntax - "{0} /? Show this help message", [Environment]::NewLine) - ``` - ``` syntax - { - ``` - ``` syntax + "{0} /? Show this help message", [Environment]::NewLine) + } else - ``` - - ``` syntax - { + { #If an array was passed in, try to split it - ``` - - ``` syntax if($myArgs.Length -eq 1) - ``` - - ``` syntax { - ``` - - ``` syntax $myArgs = $myArgs.Split(' ') - ``` - - ``` syntax } - ``` - - ``` syntax #Parse the arguments for account names - ``` - - ``` syntax foreach($accountName in $myArgs) - ``` - - ``` syntax - { - ``` - - ``` syntax + { [string[]] $splitString = $accountName.Split('\') # We're looking for the format "DOMAIN\Account" so anything that does not match, we reject - ``` - ``` syntax if($splitString.Length -ne 2) - ``` - - ``` syntax { - ``` - - ``` syntax $message = [string]::Format("{0} is not a valid account name. Expected format 'Domain\username' for user accounts or 'DOMAIN\machinename$' for machine accounts.", $accountName) - ``` - ``` syntax Write-Error -Message $message - ``` - - ``` syntax continue - ``` - - ``` syntax } - ``` - ``` syntax - - ``` - - ``` syntax #Convert any account names to SIDs - ``` - - ``` syntax try - ``` - - ``` syntax { - ``` - - ``` syntax [System.Security.Principal.NTAccount] $account = New-Object System.Security.Principal.NTAccount($splitString[0], $splitString[1]) - ``` - ``` syntax [System.Security.Principal.SecurityIdentifier] $SID = [System.Security.Principal.SecurityIdentifier]($account.Translate([System.Security.Principal.SecurityIdentifier])) - ``` - - ``` syntax } - ``` - - ``` syntax catch [System.Security.Principal.IdentityNotMappedException] - ``` - - ``` syntax { - ``` - - ``` syntax $message = [string]::Format("Failed to translate account object '{0}' to a SID. Please verify that this is a valid user or machine account.", $account.ToString()) - ``` - ``` syntax Write-Error -Message $message - ``` - ``` syntax continue - ``` - - ``` syntax } - ``` - - ``` syntax #Convert regular SID to binary format used by SQL - ``` - ``` syntax $hexSIDString = ConvertSIDToHexFormat $SID - ``` - ``` syntax - $SIDs = New-Object PSObject - ``` - ``` syntax $SIDs | Add-Member NoteProperty Account $accountName - ``` - ``` syntax $SIDs | Add-Member NoteProperty SID $SID.ToString() - ``` - ``` syntax $SIDs | Add-Member NoteProperty Hexadecimal $hexSIDString - ``` - - ``` syntax Write-Output $SIDs - ``` - - ``` syntax } - ``` - - ``` syntax } ``` @@ -384,12 +171,3 @@ Before attempting this procedure, you should read and understand the information [Administering App-V by Using PowerShell](administering-app-v-by-using-powershell.md) - - - - - - - - - diff --git a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md index d40e38cbd7..5cabf37196 100644 --- a/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md +++ b/mdop/appv-v5/how-to-install-the-app-v-databases-and-convert-the-associated-security-identifiers--by-using-powershell51.md @@ -3,7 +3,7 @@ title: How to Install the App-V Databases and Convert the Associated Security Id description: How to Install the App-V Databases and Convert the Associated Security Identifiers by Using PowerShell author: dansimp ms.assetid: 2be6fb72-f3a6-4550-bba1-6defa78ca08a -ms.reviewer: +ms.reviewer: manager: dansimp ms.author: dansimp ms.pagetype: mdop, appcompat, virtualization @@ -41,335 +41,96 @@ Before attempting this procedure, you should read and understand the information 2. To open a PowerShell console click **Start** and type **PowerShell**. Right-click **Windows PowerShell** and select **Run as Administrator**. - ``` syntax + ```powershell <# - ``` - - ``` syntax .SYNOPSIS - ``` - - ``` syntax This PowerShell script will take an array of account names and try to convert each of them to the corresponding SID in standard and hexadecimal formats. - ``` - - ``` syntax .DESCRIPTION - ``` - - ``` syntax This is a PowerShell script that converts any number of Active Directory (AD) user or machine accounts into formatted Security Identifiers (SIDs) both in the standard format and in the hexadecimal format used by SQL server when running SQL scripts. - ``` - - ``` syntax .INPUTS - ``` - - ``` syntax The account(s) to convert to SID format. This can be a single account name or an array of account names. Please see examples below. - ``` - - ``` syntax .OUTPUTS - ``` - - ``` syntax A list of account names with the corresponding SID in standard and hexadecimal formats - ``` - - ``` syntax .EXAMPLE - ``` - - ``` syntax .\ConvertToSID.ps1 DOMAIN\user_account1 DOMAIN\machine_account1$ DOMAIN\user_account2 | Format-List - ``` - - ``` syntax .EXAMPLE - ``` - - ``` syntax $accountsArray = @("DOMAIN\user_account1", "DOMAIN\machine_account1$", "DOMAIN_user_account2") - ``` - - ``` syntax .\ConvertToSID.ps1 $accountsArray | Write-Output -FilePath .\SIDs.txt -Width 200 - ``` - - ``` syntax #> - ``` - ``` syntax - ``` - - []() - - []() - - ``` syntax function ConvertSIDToHexFormat - ``` - { param(\[System.Security.Principal.SecurityIdentifier\]$sidToConvert) - ``` syntax - ``` - - ``` syntax $sb = New-Object System.Text.StringBuilder - ``` - - ``` syntax - [int] $binLength = $sidToConvert.BinaryLength - ``` - - ``` syntax - [Byte[]] $byteArray = New-Object Byte[] $binLength - ``` - - ``` syntax + [int] $binLength = $sidToConvert.BinaryLength + [Byte[]] $byteArray = New-Object Byte[] $binLength $sidToConvert.GetBinaryForm($byteArray, 0) - ``` - - ``` syntax foreach($byte in $byteArray) - ``` - - ``` syntax { - ``` - - ``` syntax - $sb.Append($byte.ToString("X2")) |Out-Null - ``` - - ``` syntax + $sb.Append($byte.ToString("X2")) |Out-Null } - ``` - - ``` syntax return $sb.ToString() - ``` - - ``` syntax } - ``` - - ``` syntax [string[]]$myArgs = $args - ``` - - ``` syntax if(($myArgs.Length -lt 1) -or ($myArgs[0].CompareTo("/?") -eq 0)) - ``` - { - ``` syntax [string]::Format("{0}====== Description ======{0}{0}" + - ``` - - ``` syntax - " Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + - ``` - - ``` syntax + " Converts any number of user or machine account names to string and hexadecimal SIDs.{0}" + " Pass the account(s) as space separated command line parameters. (For example 'ConvertToSID.exe DOMAIN\\Account1 DOMAIN\\Account2 ...'){0}" + - ``` - - ``` syntax " The output is written to the console in the format 'Account name SID as string SID as hexadecimal'{0}" + - ``` - - ``` syntax " And can be written out to a file using standard PowerShell redirection{0}" + - ``` - - ``` syntax - " Please specify user accounts in the format 'DOMAIN\username'{0}" + - ``` - - ``` syntax + " Please specify user accounts in the format 'DOMAIN\username'{0}" + " Please specify machine accounts in the format 'DOMAIN\machinename$'{0}" + - ``` - - ``` syntax - " For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + - ``` - - ``` syntax + " For more help content, please run 'Get-Help ConvertToSID.ps1'{0}" + "{0}====== Arguments ======{0}" + - ``` - - ``` syntax - "{0} /? Show this help message", [Environment]::NewLine) - ``` - - ``` syntax - { - ``` - - ``` syntax + "{0} /? Show this help message", [Environment]::NewLine) + } else - ``` - - ``` syntax - { + { #If an array was passed in, try to split it - ``` - - ``` syntax if($myArgs.Length -eq 1) - ``` - - ``` syntax { - ``` - - ``` syntax $myArgs = $myArgs.Split(' ') - ``` - - ``` syntax } - ``` - - ``` syntax #Parse the arguments for account names - ``` - - ``` syntax foreach($accountName in $myArgs) - ``` - - ``` syntax - { - ``` - - ``` syntax + { [string[]] $splitString = $accountName.Split('\') # We're looking for the format "DOMAIN\Account" so anything that does not match, we reject - ``` - - ``` syntax if($splitString.Length -ne 2) - ``` - - ``` syntax { - ``` - - ``` syntax $message = [string]::Format("{0} is not a valid account name. Expected format 'Domain\username' for user accounts or 'DOMAIN\machinename$' for machine accounts.", $accountName) - ``` - - ``` syntax Write-Error -Message $message - ``` - - ``` syntax continue - ``` - - ``` syntax } - ``` - ``` syntax - - ``` - - ``` syntax #Convert any account names to SIDs - ``` - - ``` syntax try - ``` - - ``` syntax { - ``` - - ``` syntax [System.Security.Principal.NTAccount] $account = New-Object System.Security.Principal.NTAccount($splitString[0], $splitString[1]) - ``` - - ``` syntax [System.Security.Principal.SecurityIdentifier] $SID = [System.Security.Principal.SecurityIdentifier]($account.Translate([System.Security.Principal.SecurityIdentifier])) - ``` - - ``` syntax } - ``` - - ``` syntax catch [System.Security.Principal.IdentityNotMappedException] - ``` - - ``` syntax { - ``` - - ``` syntax $message = [string]::Format("Failed to translate account object '{0}' to a SID. Please verify that this is a valid user or machine account.", $account.ToString()) - ``` - - ``` syntax Write-Error -Message $message - ``` - - ``` syntax continue - ``` - - ``` syntax } - ``` - - ``` syntax #Convert regular SID to binary format used by SQL - ``` - - ``` syntax $hexSIDString = ConvertSIDToHexFormat $SID - ``` - ``` syntax - $SIDs = New-Object PSObject - ``` - - ``` syntax $SIDs | Add-Member NoteProperty Account $accountName - ``` - - ``` syntax $SIDs | Add-Member NoteProperty SID $SID.ToString() - ``` - - ``` syntax $SIDs | Add-Member NoteProperty Hexadecimal $hexSIDString - ``` - - ``` syntax Write-Output $SIDs - ``` - - ``` syntax } - ``` - - ``` syntax } - ``` - 3. Run the script you saved in step one of this procedure passing the accounts to convert as arguments. For example, @@ -384,12 +145,3 @@ Before attempting this procedure, you should read and understand the information [Administering App-V 5.1 by Using PowerShell](administering-app-v-51-by-using-powershell.md) - - - - - - - - - diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b8f7179b74..fe1902aaf7 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -606,7 +606,7 @@ For a complete list of the Microsoft Edge policies, see [Available policies for Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to http://www.msftconnecttest.com/connecttest.txt to determine if the device can communicate with the Internet. For more info about NCSI, see [The Network Connection Status Icon](http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx). -In versions of Windows 10 prior to Windows 10, version 1607 and Windows Server 2016, the URL was [http://www.msftncsi.com](). +In versions of Windows 10 prior to Windows 10, version 1607 and Windows Server 2016, the URL was `http://www.msftncsi.com`. You can turn off NCSI by doing one of the following: From a8638ae3763bf3fe4b1aa4bda9cf756201e8cc9e Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Sun, 16 Jun 2019 18:29:20 -0400 Subject: [PATCH 203/303] Update devices/surface-hub/surface-hub-site-readiness-guide.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- devices/surface-hub/surface-hub-site-readiness-guide.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/surface-hub-site-readiness-guide.md b/devices/surface-hub/surface-hub-site-readiness-guide.md index 2b99c01aa6..44e8717278 100644 --- a/devices/surface-hub/surface-hub-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-site-readiness-guide.md @@ -89,7 +89,7 @@ The 55” Surface Hub requires two people to safely lift and mount. The 84” Su ## Mounting and setup -See the your mounting guide at http://www.microsoft.com/surface/support/surface-hub, for detailed instructions. +See your mounting guide at http://www.microsoft.com/surface/support/surface-hub for detailed instructions. There are three ways to mount your Surface Hub: From 37679304a5da763e2cf098fed2da21682b8e88c0 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:20:24 -0400 Subject: [PATCH 204/303] chore: Replace "syntax" with code fence language --- .../support-for-client-reporting-over-http.md | 2 +- ...he-connection-group-virtual-environment.md | 2 +- ...-connection-group-virtual-environment51.md | 2 +- ...ation-publishing-and-client-interaction.md | 14 +++---- ...ion-publishing-and-client-interaction51.md | 14 +++---- ...ng-microsoft-office-2013-by-using-app-v.md | 4 +- ...-microsoft-office-2013-by-using-app-v51.md | 4 +- ...-microsoft-office-2016-by-using-app-v51.md | 4 +- ...y-using-the-dart-recovery-image-dart-10.md | 2 +- ...rs-using-the-dart-recovery-image-dart-7.md | 2 +- ...by-using-the-dart-recovery-image-dart-8.md | 2 +- .../release-notes-for-mbam-20-mbam-2.md | 2 +- .../mbam-25-security-considerations.md | 2 +- .../mdm/alljoynmanagement-csp.md | 6 +-- .../mdm/applocker-ddf-file.md | 2 +- .../client-management/mdm/applocker-xsd.md | 2 +- .../mdm/appv-deploy-and-config.md | 18 ++++---- .../mdm/assignedaccess-csp.md | 26 ++++++------ .../mdm/assignedaccess-ddf.md | 2 +- .../client-management/mdm/bitlocker-csp.md | 42 +++++++++---------- .../additional-mitigations.md | 2 +- 21 files changed, 78 insertions(+), 78 deletions(-) diff --git a/mdop/appv-v4/support-for-client-reporting-over-http.md b/mdop/appv-v4/support-for-client-reporting-over-http.md index 85014b79b4..1afa6d3679 100644 --- a/mdop/appv-v4/support-for-client-reporting-over-http.md +++ b/mdop/appv-v4/support-for-client-reporting-over-http.md @@ -34,7 +34,7 @@ The client starts collecting data when it receives a “REPORTING=”TRUE””a The following schema gives specific details of the package and the application data that is sent to the server. -``` syntax +```xml diff --git a/mdop/appv-v5/about-the-connection-group-virtual-environment.md b/mdop/appv-v5/about-the-connection-group-virtual-environment.md index 34358bc9b5..d8d9974471 100644 --- a/mdop/appv-v5/about-the-connection-group-virtual-environment.md +++ b/mdop/appv-v5/about-the-connection-group-virtual-environment.md @@ -38,7 +38,7 @@ The connection group that is used is based on the order in which a package appea Consider the following example section: -``` syntax +```xml ``` diff --git a/mdop/appv-v5/about-the-connection-group-virtual-environment51.md b/mdop/appv-v5/about-the-connection-group-virtual-environment51.md index 4e889a147b..3489f151b7 100644 --- a/mdop/appv-v5/about-the-connection-group-virtual-environment51.md +++ b/mdop/appv-v5/about-the-connection-group-virtual-environment51.md @@ -38,7 +38,7 @@ The connection group that is used is based on the order in which a package appea Consider the following example section: -``` syntax +```xml ``` diff --git a/mdop/appv-v5/application-publishing-and-client-interaction.md b/mdop/appv-v5/application-publishing-and-client-interaction.md index 17dee15c45..b19f40b8e8 100644 --- a/mdop/appv-v5/application-publishing-and-client-interaction.md +++ b/mdop/appv-v5/application-publishing-and-client-interaction.md @@ -811,7 +811,7 @@ This document focuses on App-V Full Infrastructure solutions. For specific infor The App-V application lifecycle tasks are triggered at user login (default), machine startup, or as background timed operations. The settings for the App-V Client operations, including Publishing Servers, refresh intervals, package script enablement, and others, are configured during setup of the client or post-setup with PowerShell commands. See the How to Deploy the Client section on TechNet at: [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-gb18030.md) or utilize the PowerShell: -``` syntax +```powershell get-command *appv* ``` @@ -1174,7 +1174,7 @@ The short cut is one of the basic elements of integration with the OS and is the From the package manifest and dynamic configuration XML files, the path to a specific application executable can be found in a section similar to the following: -``` syntax +```xml [{Common Desktop}]\Adobe Reader 9.lnk @@ -1194,7 +1194,7 @@ As mentioned previously, the App-V shortcuts are placed by default in the user The App-V Client manages the local operating system File Type Associations during publishing, which enables users to use file type invocations or to open a file with a specifically registered extension (.docx) to start an App-V application. File type associations are present in the manifest and dynamic configuration files as represented in the example below: -``` syntax +```xml @@ -1323,7 +1323,7 @@ App-V supports specific software clients and application capabilities extension Example of software client registration of an App-V based mail client. -``` syntax +```xml @@ -1510,7 +1510,7 @@ The example below shows the combination of the Manifest, Deployment Configuratio **Manifest** -``` syntax +```xml [{Common Programs}]\7-Zip\7-Zip File Manager.lnk @@ -1522,7 +1522,7 @@ The example below shows the combination of the Manifest, Deployment Configuratio **Deployment Configuration** -``` syntax +```xml @@ -1537,7 +1537,7 @@ The example below shows the combination of the Manifest, Deployment Configuratio **User Configuration** -``` syntax +```xml diff --git a/mdop/appv-v5/application-publishing-and-client-interaction51.md b/mdop/appv-v5/application-publishing-and-client-interaction51.md index 66b1ace5e5..7188685403 100644 --- a/mdop/appv-v5/application-publishing-and-client-interaction51.md +++ b/mdop/appv-v5/application-publishing-and-client-interaction51.md @@ -811,7 +811,7 @@ This document focuses on App-V Full Infrastructure solutions. For specific infor The App-V application lifecycle tasks are triggered at user login (default), machine startup, or as background timed operations. The settings for the App-V Client operations, including Publishing Servers, refresh intervals, package script enablement, and others, are configured during setup of the client or post-setup with PowerShell commands. See the How to Deploy the Client section on TechNet at: [How to Deploy the App-V Client](how-to-deploy-the-app-v-client-51gb18030.md) or utilize the PowerShell: -``` syntax +```powershell get-command *appv* ``` @@ -1174,7 +1174,7 @@ The short cut is one of the basic elements of integration with the OS and is the From the package manifest and dynamic configuration XML files, the path to a specific application executable can be found in a section similar to the following: -``` syntax +```xml [{Common Desktop}]\Adobe Reader 9.lnk @@ -1194,7 +1194,7 @@ As mentioned previously, the App-V shortcuts are placed by default in the user The App-V Client manages the local operating system File Type Associations during publishing, which enables users to use file type invocations or to open a file with a specifically registered extension (.docx) to start an App-V application. File type associations are present in the manifest and dynamic configuration files as represented in the example below: -``` syntax +```xml @@ -1323,7 +1323,7 @@ App-V supports specific software clients and application capabilities extension Example of software client registration of an App-V based mail client. -``` syntax +```xml @@ -1510,7 +1510,7 @@ The example below shows the combination of the Manifest, Deployment Configuratio **Manifest** -``` syntax +```xml [{Common Programs}]\7-Zip\7-Zip File Manager.lnk @@ -1522,7 +1522,7 @@ The example below shows the combination of the Manifest, Deployment Configuratio **Deployment Configuration** -``` syntax +```xml @@ -1537,7 +1537,7 @@ The example below shows the combination of the Manifest, Deployment Configuratio **User Configuration** -``` syntax +```xml diff --git a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md index cd697fed7c..0c1c022bae 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md +++ b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v.md @@ -227,7 +227,7 @@ The XML file that is included in the Office Deployment Tool specifies the produc 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2013 applications. The following is a basic example of the configuration.xml file: - ``` syntax + ```xml @@ -688,7 +688,7 @@ To exclude specific Office applications (for example, Access and InfoPath) when 5. Add the Office 2013 App-V Package with the new Deployment Configuration File. - ``` syntax + ```xml InfoPath Filler 2013 diff --git a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md index a5afa4ef90..ec2a4316b5 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md +++ b/mdop/appv-v5/deploying-microsoft-office-2013-by-using-app-v51.md @@ -229,7 +229,7 @@ The XML file that is included in the Office Deployment Tool specifies the produc 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2013 applications. The following is a basic example of the configuration.xml file: - ``` syntax + ```xml @@ -696,7 +696,7 @@ To exclude specific Office applications (for example, Access and InfoPath) when 5. Add the Office 2013 App-V Package with the new Deployment Configuration File. - ``` syntax + ```xml InfoPath Filler 2013 diff --git a/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md b/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md index e13e27d1f9..b90fa7c2e2 100644 --- a/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md +++ b/mdop/appv-v5/deploying-microsoft-office-2016-by-using-app-v51.md @@ -222,7 +222,7 @@ The XML file that is included in the Office Deployment Tool specifies the produc 2. With the sample configuration.xml file open and ready for editing, you can specify products, languages, and the path to which you save the Office 2016 applications. The following is a basic example of the configuration.xml file: - ``` syntax + ```xml @@ -633,7 +633,7 @@ You may want to disable specific applications in your Office App-V package. For 5. Add the Office 2016 App-V Package with the new Deployment Configuration File. - ``` syntax + ```xml Lync 2016 diff --git a/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md index 1b7f39a897..2a8e35021d 100644 --- a/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md +++ b/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md @@ -138,7 +138,7 @@ A file is provided that is named inv32.xml and contains remote connection inform 2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: - ``` syntax + ```ini [LaunchApps] "%windir%\system32\netstart.exe -network -remount" "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" diff --git a/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md b/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md index 2fac900255..d8cdbc0ab0 100644 --- a/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md +++ b/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md @@ -131,7 +131,7 @@ A file is provided that is named inv32.xml and contains remote connection inform 2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: - ``` syntax + ```ini [LaunchApps] "%windir%\system32\netstart.exe -network -remount" "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" diff --git a/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md index ea9f968420..5cf1247cb4 100644 --- a/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md +++ b/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md @@ -138,7 +138,7 @@ A file is provided that is named inv32.xml and contains remote connection inform 2. The following is an example of a winpeshl.ini file that is customized to open the **Remote Connection** tool as soon as an attempt is made to boot into DaRT: - ``` syntax + ```ini [LaunchApps] "%windir%\system32\netstart.exe -network -remount" "cmd /C start %windir%\system32\RemoteRecovery.exe -nomessage" diff --git a/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md b/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md index c67aa2acee..7cb8d1004c 100644 --- a/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md +++ b/mdop/mbam-v2/release-notes-for-mbam-20-mbam-2.md @@ -38,7 +38,7 @@ If you are using the MBAM Stand-alone topology, and you upgrade the server infra WORKAROUND: After the upgrade, run the following script on the Compliance and Audit Database: -``` syntax +```sql -- ============================================= -- Script Template -- ============================================= diff --git a/mdop/mbam-v25/mbam-25-security-considerations.md b/mdop/mbam-v25/mbam-25-security-considerations.md index f87672362a..05695a6beb 100644 --- a/mdop/mbam-v25/mbam-25-security-considerations.md +++ b/mdop/mbam-v25/mbam-25-security-considerations.md @@ -134,7 +134,7 @@ You can configure the MBAM Recovery and Hardware Service with the name of this s - Configure the group after the MBAM Recovery and Hardware Service has been installed by editing the web.config file in the <inetpub>\\Microsoft Bitlocker Management Solution\\Recovery and Hardware Service\\ folder. - ``` syntax + ```xml ``` diff --git a/windows/client-management/mdm/alljoynmanagement-csp.md b/windows/client-management/mdm/alljoynmanagement-csp.md index c2b7e64c26..1c55f8740e 100644 --- a/windows/client-management/mdm/alljoynmanagement-csp.md +++ b/windows/client-management/mdm/alljoynmanagement-csp.md @@ -80,7 +80,7 @@ Boolean value indicating whether AllJoyn router service (AJRouter.dll) is enable Set adapter configuration -``` syntax +```xml SyncML xmlns="SYNCML:SYNCML1.2"> @@ -104,7 +104,7 @@ You should replace \_ALLJOYN\_DEVICE\_ID\_ with an actual device ID. Note that t Get PIN data -``` syntax +```xml @@ -123,7 +123,7 @@ Get PIN data Get the firewall PrivateProfile -``` syntax +```xml diff --git a/windows/client-management/mdm/applocker-ddf-file.md b/windows/client-management/mdm/applocker-ddf-file.md index e714495ff9..0a2f4eefd2 100644 --- a/windows/client-management/mdm/applocker-ddf-file.md +++ b/windows/client-management/mdm/applocker-ddf-file.md @@ -19,7 +19,7 @@ This topic shows the OMA DM device description framework (DDF) for the **AppLock Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). -``` syntax +```xml This example shows how to enable App-V on the device.

          -``` syntax +```xml $CmdID$ @@ -117,7 +117,7 @@ manager: dansimp

          This example shows how to allow package scripts to run during package operations (publish, run, and unpublish). Allowing package scripts assists in package deployments (add and publish of App-V apps).

          -``` syntax +```xml $CmdID$ @@ -141,7 +141,7 @@ manager: dansimp

          This SyncML example shows how to publish a package globally on an MDM enrolled device for all device users.

          -``` syntax +```xml $CmdID$ @@ -183,7 +183,7 @@ manager: dansimp

          This SyncML example shows how to publish a package globally, with a policy that adds two shortcuts for the package, on an MDM enrolled device.

          -``` syntax +```xml $CmdID$ @@ -277,7 +277,7 @@ manager: dansimp

          This SyncML example shows how to publish a package for a specific MDM user.

          -``` syntax +```xml $CmdID$ @@ -320,7 +320,7 @@ manager: dansimp > [!NOTE] > The user connection group has the user-only package as optional in this example, which implies users without the optional package can continue to launch the global package within the same connection group. -``` syntax +```xml $CmdID$ @@ -397,7 +397,7 @@ manager: dansimp

          This SyncML example shows how to unpublish all global packages on the device by sending an empty package and connection group list in the SyncML.

          -``` syntax +```xml $CmdID$ @@ -433,7 +433,7 @@ manager: dansimp

          These SyncML examples return all global, and user-published packages on the device.

          -``` syntax +```xml $CmdID$ @@ -444,7 +444,7 @@ manager: dansimp ``` -``` syntax +```xml $CmdID$ diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index 644edc9197..69ae1d1fb5 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -166,7 +166,7 @@ This MDM alert header is defined as follows: KioskModeApp Add -``` syntax +```xml @@ -188,7 +188,7 @@ KioskModeApp Add KioskModeApp Delete -``` syntax +```xml @@ -206,7 +206,7 @@ KioskModeApp Delete KioskModeApp Get -``` syntax +```xml @@ -224,7 +224,7 @@ KioskModeApp Get KioskModeApp Replace -``` syntax +```xml @@ -246,7 +246,7 @@ KioskModeApp Replace ## AssignedAccessConfiguration XSD -``` syntax +```xml @@ -698,7 +698,7 @@ Example of the Delete command. ## StatusConfiguration XSD -``` syntax +```xml @@ -760,7 +760,7 @@ StatusConfiguration Add OnWithAlerts StatusConfiguration Delete -``` syntax +```xml @@ -778,7 +778,7 @@ StatusConfiguration Delete StatusConfiguration Get -``` syntax +```xml @@ -826,7 +826,7 @@ StatusConfiguration Replace On ## Status example Status Get -``` syntax +```xml @@ -844,7 +844,7 @@ Status Get ## ShellLauncherConfiguration XSD -``` syntax +```xml @@ -198,7 +198,7 @@ This setting allows device installation based on the serial number of a removabl If you disable or do not configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. -Peripherals can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it allows the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. +Peripherals can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it allows the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. @@ -494,7 +494,7 @@ If you enable this policy setting, Windows is prevented from installing a device If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. -Peripherals can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it blocks the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. +Peripherals can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it blocks the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. > [!TIP] @@ -596,7 +596,7 @@ If you enable this policy setting, Windows is prevented from installing or updat If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. -Peripherals can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it blocks the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. +Peripherals can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it blocks the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index 6f746062f9..69b9a21645 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -2850,7 +2850,7 @@ ADMX Info: This setting determines whether IE automatically downloads updated versions of Microsoft’s VersionList.XML. IE uses this file to determine whether an ActiveX control should be stopped from loading. > [!Caution] -> If you enable this setting, IE stops downloading updated versions of VersionList.XML. Turning off this automatic download breaks the [out-of-date ActiveX control blocking feature](https://docs.microsoft.com/en-us/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking) by not letting the version list update with newly outdated controls, potentially compromising the security of your computer. +> If you enable this setting, IE stops downloading updated versions of VersionList.XML. Turning off this automatic download breaks the [out-of-date ActiveX control blocking feature](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking) by not letting the version list update with newly outdated controls, potentially compromising the security of your computer. If you disable or do not configure this setting, IE continues to download updated versions of VersionList.XML. diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 3781130045..99b3c5e4f3 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -632,7 +632,7 @@ The following list shows the supported values: Allow the device to send diagnostic and usage telemetry data, such as Watson. -For more information about diagnostic data, including what is and what is not collected by Windows, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization). +For more information about diagnostic data, including what is and what is not collected by Windows, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization). The following tables describe the supported values: diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 82449daa56..23687813bb 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -1655,11 +1655,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) @@ -11032,11 +11032,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) @@ -23030,11 +23030,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) @@ -51684,11 +51684,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) diff --git a/windows/client-management/mdm/wifi-ddf-file.md b/windows/client-management/mdm/wifi-ddf-file.md index df735b07d8..dffd9c60c8 100644 --- a/windows/client-management/mdm/wifi-ddf-file.md +++ b/windows/client-management/mdm/wifi-ddf-file.md @@ -104,7 +104,7 @@ The XML below is for Windows 10, version 1809. XML describing the network configuration and follows Windows WLAN_profile schema. - Link to schema: http://msdn.microsoft.com/library/windows/desktop/ms707341(v=vs.85).aspx + Link to schema: https://msdn.microsoft.com/library/windows/desktop/ms707341(v=vs.85).aspx diff --git a/windows/client-management/troubleshoot-networking.md b/windows/client-management/troubleshoot-networking.md index 9562483162..57398a2764 100644 --- a/windows/client-management/troubleshoot-networking.md +++ b/windows/client-management/troubleshoot-networking.md @@ -29,7 +29,7 @@ The following topics are available to help you troubleshoot common problems rela [802.1X authenticated wired access overview](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831831(v=ws.11))
          [802.1X authenticated wireless access overview](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh994700(v%3dws.11))
          [Wireless cccess deployment overview](https://docs.microsoft.com/windows-server/networking/core-network-guide/cncg/wireless/b-wireless-access-deploy-overview)
          -[TCP/IP technical reference](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd379473(v=ws.10))
          +[TCP/IP technical reference](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd379473(v=ws.10))
          [Network Monitor](https://docs.microsoft.com/windows/desktop/netmon2/network-monitor)
          [RPC and the network](https://docs.microsoft.com/windows/desktop/rpc/rpc-and-the-network)
          [How RPC works](https://docs.microsoft.com/windows/desktop/rpc/how-rpc-works)
          diff --git a/windows/client-management/troubleshoot-stop-errors.md b/windows/client-management/troubleshoot-stop-errors.md index 42fb6ef17e..26d48d6ccb 100644 --- a/windows/client-management/troubleshoot-stop-errors.md +++ b/windows/client-management/troubleshoot-stop-errors.md @@ -142,7 +142,7 @@ You can use the tools such as Windows Software Development KIT (SDK) and Symbols 4. Start the install and choose **Debugging Tools for Windows**. This will install the WinDbg tool. 5. Open the WinDbg tool and set the symbol path by clicking **File** and then clicking **Symbol File Path**.
          a. If the computer is connected to the Internet, enter the [Microsoft public symbol server](https://docs.microsoft.com/windows-hardware/drivers/debugger/microsoft-public-symbols) (https://msdl.microsoft.com/download/symbols) and click **OK**. This is the recommended method.
          - b. If the computer is not connected to the Internet, you must specify a local [symbol path](https://docs.microsoft.com/en-in/windows-hardware/drivers/debugger/symbol-path). + b. If the computer is not connected to the Internet, you must specify a local [symbol path](https://docs.microsoft.com/windows-hardware/drivers/debugger/symbol-path). 6. Click on **Open Crash Dump**, and then open the memory.dmp file that you copied. See the example below. ![WinDbg](images/windbg.png) 7. There should be a link that says **!analyze -v** under **Bugcheck Analysis**. Click that link. This will enter the command !analyze -v in the prompt at the bottom of the page. diff --git a/windows/client-management/troubleshoot-windows-freeze.md b/windows/client-management/troubleshoot-windows-freeze.md index 31c0d456f6..576ee3a7c0 100644 --- a/windows/client-management/troubleshoot-windows-freeze.md +++ b/windows/client-management/troubleshoot-windows-freeze.md @@ -129,7 +129,7 @@ If the computer is no longer frozen and now is running in a good state, use the 3. On some physical computers, you may generate a nonmakeable interruption (NMI) from the Web Interface feature (such as DRAC, iLo, and RSA). However, by default, this setting will stop the system without creating a memory dump. - To allow the operating system to generate a memory dump file at an NMI interruption, set the value of the [NMICrashDump](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc783271(v=ws.10)) registry entry to `1` (REG_DWORD). Then, restart the computer to apply this change. + To allow the operating system to generate a memory dump file at an NMI interruption, set the value of the [NMICrashDump](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2003/cc783271(v=ws.10)) registry entry to `1` (REG_DWORD). Then, restart the computer to apply this change. > [!NOTE] > This is applicable only for Windows 7, Windows Server 2008 R2, and earlier versions of Windows. For Windows 8 Windows Server 2012, and later versions of Windows, the NMICrashDump registry key is no longer required, and an NMI interruption will result in [a Stop error that follows a memory dump data collection](https://support.microsoft.com/help/2750146). diff --git a/windows/client-management/windows-10-support-solutions.md b/windows/client-management/windows-10-support-solutions.md index afcec998a5..7d787f544d 100644 --- a/windows/client-management/windows-10-support-solutions.md +++ b/windows/client-management/windows-10-support-solutions.md @@ -49,26 +49,26 @@ These are the top Microsoft Support solutions for the most common issues experie ## Solutions related to installing Windows Updates -- [How does Windows Update work](https://docs.microsoft.com/en-us/windows/deployment/update/how-windows-update-works) -- [Windows Update log files](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-logs) -- [Windows Update troubleshooting](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-troubleshooting) -- [Windows Update common errors and mitigation](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-errors) -- [Windows Update - additional resources](https://docs.microsoft.com/en-us/windows/deployment/update/windows-update-resources) +- [How does Windows Update work](https://docs.microsoft.com/windows/deployment/update/how-windows-update-works) +- [Windows Update log files](https://docs.microsoft.com/windows/deployment/update/windows-update-logs) +- [Windows Update troubleshooting](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting) +- [Windows Update common errors and mitigation](https://docs.microsoft.com/windows/deployment/update/windows-update-errors) +- [Windows Update - additional resources](https://docs.microsoft.com/windows/deployment/update/windows-update-resources) ## Solutions related to installing or upgrading Windows -- [Quick Fixes](https://docs.microsoft.com/en-us/windows/deployment/upgrade/quick-fixes) -- [Troubleshooting upgrade errors](https://docs.microsoft.com/en-us/windows/deployment/upgrade/troubleshoot-upgrade-errors) -- [Resolution procedures](https://docs.microsoft.com/en-us/windows/deployment/upgrade/resolution-procedures) +- [Quick Fixes](https://docs.microsoft.com/windows/deployment/upgrade/quick-fixes) +- [Troubleshooting upgrade errors](https://docs.microsoft.com/windows/deployment/upgrade/troubleshoot-upgrade-errors) +- [Resolution procedures](https://docs.microsoft.com/windows/deployment/upgrade/resolution-procedures) - [0xc1800118 error when you push Windows 10 Version 1607 by using WSUS](https://support.microsoft.com/en-in/help/3194588/0xc1800118-error-when-you-push-windows-10-version-1607-by-using-wsus) - [0xC1900101 error when Windows 10 upgrade fails after the second system restart](https://support.microsoft.com/en-in/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) ## Solutions related to BitLocker -- [BitLocker recovery guide](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan) -- [BitLocker: How to enable Network Unlock](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock) -- [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker) -- [BitLocker Group Policy settings](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings) +- [BitLocker recovery guide](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan) +- [BitLocker: How to enable Network Unlock](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock) +- [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker) +- [BitLocker Group Policy settings](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings) ## Solutions related to Bugchecks or Stop Errors - [Troubleshooting Stop error problems for IT Pros](https://support.microsoft.com/help/3106831/troubleshooting-stop-error-problems-for-it-pros) @@ -92,8 +92,8 @@ These are the top Microsoft Support solutions for the most common issues experie - [Modern apps are blocked by security software when you start the applications on Windows 10 Version 1607](https://support.microsoft.com/help/4016973/modern-apps-are-blocked-by-security-software-when-you-start-the-applic) ## Solutions related to wireless networking and 802.1X authentication -- [Advanced Troubleshooting Wireless Network](Connectivity]https://docs.microsoft.com/en-us/windows/client-management/advanced-troubleshooting-wireless-network-connectivity) -- [Advanced Troubleshooting 802.1x Authentication](https://docs.microsoft.com/en-us/windows/client-management/advanced-troubleshooting-802-authentication) -- [Troubleshooting Windows 802.11 Wireless Connections](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc766215(v=ws.10)) -- [Troubleshooting Windows Secure 802.3 Wired Connections](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc749352(v%3dws.10)) +- [Advanced Troubleshooting Wireless Network](Connectivity]https://docs.microsoft.com/windows/client-management/advanced-troubleshooting-wireless-network-connectivity) +- [Advanced Troubleshooting 802.1x Authentication](https://docs.microsoft.com/windows/client-management/advanced-troubleshooting-802-authentication) +- [Troubleshooting Windows 802.11 Wireless Connections](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-vista/cc766215(v=ws.10)) +- [Troubleshooting Windows Secure 802.3 Wired Connections](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-vista/cc749352(v%3dws.10)) - [Windows 10 devices can't connect to an 802.1X environment](https://support.microsoft.com/kb/3121002) diff --git a/windows/deployment/deploy-whats-new.md b/windows/deployment/deploy-whats-new.md index 53c27e86c3..00ed8b7866 100644 --- a/windows/deployment/deploy-whats-new.md +++ b/windows/deployment/deploy-whats-new.md @@ -23,13 +23,13 @@ ms.topic: article This topic provides an overview of new solutions and online content related to deploying Windows 10 in your organization. -- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://docs.microsoft.com/en-us/windows/whats-new/index). +- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://docs.microsoft.com/windows/whats-new/index). - For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history). ## Recent additions to this page [SetupDiag](#setupdiag) 1.4.1 is released.
          -The [Windows ADK for Windows 10, version 1903](https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install) is available.
          +The [Windows ADK for Windows 10, version 1903](https://docs.microsoft.com/windows-hardware/get-started/adk-install) is available.
          New [Windows Autopilot](#windows-autopilot) content is available.
          [Windows 10 Subscription Activation](#windows-10-subscription-activation) now supports Windows 10 Education. @@ -49,7 +49,7 @@ See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, whic ## Windows 10 servicing and support - [**Delivery Optimization**](https://docs.microsoft.com/windows/deployment/update/waas-delivery-optimization): Improved Peer Efficiency for enterprises and educational institutions with complex networks is enabled with of [new policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization). This now supports Office 365 ProPlus updates, and Intune content, with System Center Configuration Manager content coming soon! -- [**Automatic Restart Sign-on (ARSO)**](https://docs.microsoft.com/en-us/windows-insider/at-work-pro/wip-4-biz-whats-new#automatic-restart-and-sign-on-arso-for-enterprises-build-18305): Windows will automatically logon as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed. +- [**Automatic Restart Sign-on (ARSO)**](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#automatic-restart-and-sign-on-arso-for-enterprises-build-18305): Windows will automatically logon as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed. - [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period. - **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally. - **Pause updates**: We have extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you will need to update your device before pausing again. @@ -88,7 +88,7 @@ The following Windows Autopilot features are available in Windows 10, version 19 Windows 10 Education support has been added to Windows 10 Subscription Activation. -With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](https://docs.microsoft.com/en-us/windows/deployment/windows-10-subscription-activation). +With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation). ### SetupDiag @@ -135,14 +135,14 @@ For more information, see [MBR2GPT.EXE](mbr-to-gpt.md). MDT build 8456 (12/19/2018) is available, including support for Windows 10, version 1809, and Windows Server 2019. -For more information about MDT, see the [MDT resource page](https://docs.microsoft.com/en-us/sccm/mdt/). +For more information about MDT, see the [MDT resource page](https://docs.microsoft.com/sccm/mdt/). ### Windows Assessment and Deployment Kit (ADK) The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. See the following topics: -- [What's new in ADK kits and tools](https://docs.microsoft.com/en-us/windows-hardware/get-started/what-s-new-in-kits-and-tools) +- [What's new in ADK kits and tools](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-kits-and-tools) - [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md) @@ -178,7 +178,7 @@ The following topics provide a change history for Windows 10 ITPro TechNet libra [Overview of Windows as a service](update/waas-overview.md)
          [Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md) -
          [Windows 10 release information](https://docs.microsoft.com/en-us/windows/windows-10/release-information) +
          [Windows 10 release information](https://docs.microsoft.com/windows/windows-10/release-information)
          [Windows 10 Specifications & Systems Requirements](https://www.microsoft.com/en-us/windows/windows-10-specifications)
          [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md)
          [Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md) diff --git a/windows/deployment/windows-autopilot/add-devices.md b/windows/deployment/windows-autopilot/add-devices.md index 8024b7af27..ba8e94c735 100644 --- a/windows/deployment/windows-autopilot/add-devices.md +++ b/windows/deployment/windows-autopilot/add-devices.md @@ -28,13 +28,13 @@ Before deploying a device using Windows Autopilot, the device must be registered When you purchase devices directly from an OEM, that OEM can automatically register the devices with the Windows Autopilot deployment service. For the list of OEMs that currently support this, see the "Participant device manufacturers" section of the [Windows Autopilot information page](https://www.microsoft.com/en-us/windowsforbusiness/windows-autopilot). -Before an OEM can register devices on behalf of an organization, the organization must grant the OEM permission to do so. This process is initiated by the OEM, with approval granted by an Azure AD global administrator from the organization. See the "Customer Consent" section of the [Customer consent page](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/registration-auth#oem-authorization). +Before an OEM can register devices on behalf of an organization, the organization must grant the OEM permission to do so. This process is initiated by the OEM, with approval granted by an Azure AD global administrator from the organization. See the "Customer Consent" section of the [Customer consent page](https://docs.microsoft.com/windows/deployment/windows-autopilot/registration-auth#oem-authorization). ## Reseller, distributor, or partner registration Customers may purchase devices from resellers, distributors, or other partners. As long as these resellers, distributors, and partners are part of the [Cloud Solution Partners (CSP) program](https://partner.microsoft.com/en-us/cloud-solution-provider), they too can register devices on behalf of the customer. -As with OEMs, CSP parnters must be granted permission to register devices on behalf of an organization. This follows the process described on the [Customer consent page](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/registration-auth#csp-authorization). The CSP partner initiates a request to establish a relationship with the organization, with approval granted by a global administrator from the organization. Once approved, CSP partners add devices using [Partner Center](https://partner.microsoft.com/en-us/pcv/dashboard/overview), either directly through the web site or via available APIs that can automate the same tasks. +As with OEMs, CSP parnters must be granted permission to register devices on behalf of an organization. This follows the process described on the [Customer consent page](https://docs.microsoft.com/windows/deployment/windows-autopilot/registration-auth#csp-authorization). The CSP partner initiates a request to establish a relationship with the organization, with approval granted by a global administrator from the organization. Once approved, CSP partners add devices using [Partner Center](https://partner.microsoft.com/en-us/pcv/dashboard/overview), either directly through the web site or via available APIs that can automate the same tasks. Windows Autopilot does not require delegated administrator permissions when establishing the relationship between the CSP partner and the organization. As part of the approval process performed by the global administrator, the global administrator can choose to uncheck the "Include delegated administration permissions" checkbox. @@ -42,9 +42,9 @@ Windows Autopilot does not require delegated administrator permissions when esta If an existing device is already running Windows 10 version 1703 or later and enrolled in an MDM service such an Intune, that MDM service can ask the device for the hardwareh ID (also known as a hardware hash). Once it has that, it can automatically register the device with Windows Autopilot. -For instructions on how to do this with Microsoft Intune, see [Create an Autopilot deployment profile](https://docs.microsoft.com/en-us/intune/enrollment-autopilot#create-an-autopilot-deployment-profile) documentation describing the "Convert all targeted devices to Autopilot" setting. +For instructions on how to do this with Microsoft Intune, see [Create an Autopilot deployment profile](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-deployment-profile) documentation describing the "Convert all targeted devices to Autopilot" setting. -Also note that when using the [Windows Autopilot for existing devices](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/existing-devices) scenario, it is not necessary to pre-register the devices with Windows Autopilot. Instead, a configuration file (AutopilotConfigurationFile.json) containing all the Windows Autopilot profile settings is used; the device can be registered with Windows Autopilot after the fact using the same "Convert all targeted devices to Autopilot" setting. +Also note that when using the [Windows Autopilot for existing devices](https://docs.microsoft.com/windows/deployment/windows-autopilot/existing-devices) scenario, it is not necessary to pre-register the devices with Windows Autopilot. Instead, a configuration file (AutopilotConfigurationFile.json) containing all the Windows Autopilot profile settings is used; the device can be registered with Windows Autopilot after the fact using the same "Convert all targeted devices to Autopilot" setting. ## Manual registration diff --git a/windows/deployment/windows-autopilot/bitlocker.md b/windows/deployment/windows-autopilot/bitlocker.md index a3a91da1f5..11d6e7b42f 100644 --- a/windows/deployment/windows-autopilot/bitlocker.md +++ b/windows/deployment/windows-autopilot/bitlocker.md @@ -25,7 +25,7 @@ ms.topic: article With Windows Autopilot, you can configure the BitLocker encryption settings to be applied before automatic encryption is started. This ensures that the default encrytion algorithm is not applied automatically when this is not the desired setting. Other BitLocker policies that must be applied prior to encryption can also be delivered before automatic BitLocker encryption begins. -The BitLocker encryption algorithm is used when BitLocker is first enabled, and sets the strength to which full volume encryption should occur. Available encryption algorithms are: AES-CBC 128-bit, AES-CBC 256-bit, XTS-AES 128-bit or XTS-AES 256-bit encryption. The default value is XTS-AES 128-bit encryption. See [BitLocker CSP](https://docs.microsoft.com/en-us/windows/client-management/mdm/bitlocker-csp) for information about the recommended encryption algorithms to use. +The BitLocker encryption algorithm is used when BitLocker is first enabled, and sets the strength to which full volume encryption should occur. Available encryption algorithms are: AES-CBC 128-bit, AES-CBC 256-bit, XTS-AES 128-bit or XTS-AES 256-bit encryption. The default value is XTS-AES 128-bit encryption. See [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) for information about the recommended encryption algorithms to use. To ensure the desired BitLocker encryption algorithm is set before automatic encryption occurs for Autopilot devices: @@ -51,4 +51,4 @@ Windows 10, version 1809 or later. ## See also -[Bitlocker overview](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview) +[Bitlocker overview](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) diff --git a/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md b/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md index 5cd9c37d9a..f2f6408b2f 100644 --- a/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md +++ b/windows/deployment/windows-autopilot/demonstrate-deployment-on-vm.md @@ -394,7 +394,7 @@ Optional: see the following video for an overview of the process. > [!video https://www.youtube.com/embed/IpLIZU_j7Z0] -First, you need a MSfB account. You can use the same one you created above for Intune, or follow [these instructions](https://docs.microsoft.com/en-us/microsoft-store/windows-store-for-business-overview) to create a new one. +First, you need a MSfB account. You can use the same one you created above for Intune, or follow [these instructions](https://docs.microsoft.com/microsoft-store/windows-store-for-business-overview) to create a new one. Next, sign in to [Microsoft Store for Business](https://businessstore.microsoft.com/en-us/store) using your test account by clicking **Sign in** in the upper-right-corner of the main page. @@ -462,7 +462,7 @@ Click on **OK** and then click on **Create**. #### Assign the profile -Profiles can only be assigned to Groups, so first you must create a group that contains the devices to which the profile should be applied. This guide will provide simple instructions to assign a profile, for more detailed instructions, see [Create an Autopilot device group](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group) and [Assign an Autopilot deployment profile to a device group](https://docs.microsoft.com/en-us/intune/enrollment-autopilot#assign-an-autopilot-deployment-profile-to-a-device-group), as optional reading. +Profiles can only be assigned to Groups, so first you must create a group that contains the devices to which the profile should be applied. This guide will provide simple instructions to assign a profile, for more detailed instructions, see [Create an Autopilot device group](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group) and [Assign an Autopilot deployment profile to a device group](https://docs.microsoft.com/intune/enrollment-autopilot#assign-an-autopilot-deployment-profile-to-a-device-group), as optional reading. To create a Group, open the Azure Portal and select **Azure Active Directory** > **Groups** > **All groups**: @@ -564,7 +564,7 @@ Windows Autopilot will now take over to automatically join your device into Azur ## Remove devices from Autopilot -To use the device (or VM) for other purposes after completion of this lab, you will need to remove (deregister) it from Autopilot via either Intune or MSfB, and then reset it. Instructions for deregistering devices can be found [here](https://docs.microsoft.com/en-us/intune/enrollment-autopilot#create-an-autopilot-device-group) and [here](https://docs.microsoft.com/en-us/intune/devices-wipe#delete-devices-from-the-azure-active-directory-portal) and below. +To use the device (or VM) for other purposes after completion of this lab, you will need to remove (deregister) it from Autopilot via either Intune or MSfB, and then reset it. Instructions for deregistering devices can be found [here](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group) and [here](https://docs.microsoft.com/intune/devices-wipe#delete-devices-from-the-azure-active-directory-portal) and below. ### Delete (deregister) Autopilot device @@ -758,7 +758,7 @@ In the app **Assignments** pane, select **Save**. At this point, you have completed steps to add a Win32 app to Intune. -For more information on adding adds to Intune, see [Intune Standalone - Win32 app management](https://docs.microsoft.com/en-us/intune/apps-win32-app-management). +For more information on adding adds to Intune, see [Intune Standalone - Win32 app management](https://docs.microsoft.com/intune/apps-win32-app-management). ### Add Office 365 @@ -826,7 +826,7 @@ In the app **Assignments** pane, select **Save**. At this point, you have completed steps to add Office to Intune. -For more information on adding Office apps to Intune, see [Assign Office 365 apps to Windows 10 devices with Microsoft Intune](https://docs.microsoft.com/en-us/intune/apps-add-office365). +For more information on adding Office apps to Intune, see [Assign Office 365 apps to Windows 10 devices with Microsoft Intune](https://docs.microsoft.com/intune/apps-add-office365). If you installed both the win32 app (Notepad++) and Office (just Excel) per the instructions in this lab, your VM will show them in the apps list, although it could take several minutes to populate: diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index aa49b12f4f..fb3a5b3593 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -303,7 +303,7 @@ The Task Sequence will download content, reboot, format the drives and install W ### Register the device for Windows Autopilot -Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. Once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. You can enable automatic registration for an assigned group using the **Convert all targeted devices to Autopilot** setting. For more information, see [Create an Autopilot deployment profile](https://docs.microsoft.com/en-us/intune/enrollment-autopilot#create-an-autopilot-deployment-profile). +Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. Once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. You can enable automatic registration for an assigned group using the **Convert all targeted devices to Autopilot** setting. For more information, see [Create an Autopilot deployment profile](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-deployment-profile). Also see [Adding devices to Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/add-devices). diff --git a/windows/deployment/windows-autopilot/registration-auth.md b/windows/deployment/windows-autopilot/registration-auth.md index 413adf3a32..452de96733 100644 --- a/windows/deployment/windows-autopilot/registration-auth.md +++ b/windows/deployment/windows-autopilot/registration-auth.md @@ -44,7 +44,7 @@ For a CSP to register Windows Autopilot devices on behalf of a customer, the cus ![Request a reseller relationship](images/csp1.png) - Select the checkbox indicating whether or not you want delegated admin rights: ![Delegated rights](images/csp2.png) - - NOTE: Depending on your partner, they might request Delegated Admin Permissions (DAP) when requesting this consent. You should ask them to use the newer DAP-free process (shown in this document) if possible. If not, you can easily remove their DAP status either from Microsoft Store for Business or the Office 365 admin portal: https://docs.microsoft.com/en-us/partner-center/customers_revoke_admin_privileges + - NOTE: Depending on your partner, they might request Delegated Admin Permissions (DAP) when requesting this consent. You should ask them to use the newer DAP-free process (shown in this document) if possible. If not, you can easily remove their DAP status either from Microsoft Store for Business or the Office 365 admin portal: https://docs.microsoft.com/partner-center/customers_revoke_admin_privileges - Send the template above to the customer via email. 2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link in the body of the email once they receive it from the CSP, which takes them directly to the following MSfB page: diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index 40ae947ed4..ac1c72cda0 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -48,7 +48,7 @@ In environments that have more restrictive Internet access, or for those that re
          Enabling FIPS mode - -Cipher Suites in Schannel - [http://msdn.microsoft.com/library/aa374757(VS.85).aspx](https://msdn.microsoft.com/library/aa374757\(vs.85\).aspx) +Cipher Suites in Schannel - [https://msdn.microsoft.com/library/aa374757(VS.85).aspx](https://msdn.microsoft.com/library/aa374757\(vs.85\).aspx) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md b/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md index 9a0cea7281..122b141332 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-terms-of-use.md @@ -20,7 +20,7 @@ ms.topic: article ## APIs -Microsoft Defender ATP APIs are governed by [Microsoft API License and Terms of use](https://docs.microsoft.com/en-us/legal/microsoft-apis/terms-of-use). +Microsoft Defender ATP APIs are governed by [Microsoft API License and Terms of use](https://docs.microsoft.com/legal/microsoft-apis/terms-of-use). ## Legal Notices diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md index a550e32f0c..e97f64fda4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md +++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md @@ -24,7 +24,7 @@ ms.topic: conceptual > Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) -Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). In general, you’ll need to take the following steps to use the APIs: - Create an AAD application diff --git a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md index c3b917aac9..fffb9de72c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md @@ -25,7 +25,7 @@ ms.date: 04/11/2019 [!include[Prerelease information](prerelease.md)] >[!NOTE] -> Secure score is now part of Threat & Vulnerability Management as Configuration score. We’ll keep the secure score page available for a few weeks. View the [Secure score](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection) page. +> Secure score is now part of Threat & Vulnerability Management as Configuration score. We’ll keep the secure score page available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection) page. The Microsoft Defender Advanced Threat Protection Configuration score gives you visibility and control over your organization's security posture based on security best practices. diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md index b13eb91164..b1b6bdea64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md @@ -61,7 +61,7 @@ You can use existing System Center Configuration Manager functionality to create 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOnboardingScript.cmd*. -3. Deploy the package by following the steps in the [Packages and Programs in Configuration Manager](https://docs.microsoft.com/en-us/sccm/apps/deploy-use/packages-and-programs) topic. +3. Deploy the package by following the steps in the [Packages and Programs in Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/packages-and-programs) topic. a. Choose a predefined device collection to deploy the package to. @@ -115,7 +115,7 @@ For security reasons, the package used to Offboard machines will expire 30 days 2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*. -3. Deploy the package by following the steps in the [Packages and Programs in Configuration Manager](https://docs.microsoft.com/en-us/sccm/apps/deploy-use/packages-and-programs) topic. +3. Deploy the package by following the steps in the [Packages and Programs in Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/packages-and-programs) topic. a. Choose a predefined device collection to deploy the package to. diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md index 0958ac0a89..ab927de17d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp.md @@ -30,7 +30,7 @@ If you need programmatic access Microsoft Defender ATP without a user, refer to If you are not sure which access you need, read the [Introduction page](apis-intro.md). -Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate work flows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate work flows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). In general, you’ll need to take the following steps to use the APIs: - Create an AAD application @@ -106,7 +106,7 @@ This page explains how to create an AAD application, get an access token to Micr ## Get an access token -For more details on AAD token, refer to [AAD tutorial](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) +For more details on AAD token, refer to [AAD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) ### Using C# diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md index ae8e9f68c9..4b2377c9a3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp.md @@ -31,7 +31,7 @@ If you need programmatic access Microsoft Defender ATP on behalf of a user, see If you are not sure which access you need, see [Get started](apis-intro.md). -Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). +Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code). In general, you’ll need to take the following steps to use the APIs: - Create an AAD application @@ -130,7 +130,7 @@ This page explains how to create an AAD application, get an access token to Micr ## Get an access token examples: -For more details on AAD token, refer to [AAD tutorial](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) +For more details on AAD token, refer to [AAD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) ### Using PowerShell diff --git a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md index b17168bee0..58362fcab8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell.md @@ -40,7 +40,7 @@ In this section we share PowerShell samples to Set-ExecutionPolicy -ExecutionPolicy Bypass ``` ->For more details, refer to [PowerShell documentation](https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy) +>For more details, refer to [PowerShell documentation](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy) ## Get token diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index feddd27cd5..72a68df56d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -50,7 +50,7 @@ Sensitive information types in the Office 365 data loss prevention (DLP) impleme Default sensitive information types include information such as bank account numbers, social security numbers, or national IDs. For more information, see [What the sensitive information type look for](https://docs.microsoft.com/office365/securitycompliance/what-the-sensitive-information-types-look-for). -Custom types are ones that you define and is designed to protect a different type of sensitive information (for example, employee IDs or project numbers). For more information see, [Create a custom sensitive information type](https://docs.microsoft.com/en-us/office365/securitycompliance/create-a-custom-sensitive-information-type). +Custom types are ones that you define and is designed to protect a different type of sensitive information (for example, employee IDs or project numbers). For more information see, [Create a custom sensitive information type](https://docs.microsoft.com/office365/securitycompliance/create-a-custom-sensitive-information-type). When a file is created or edited on a Windows device, Windows Defender ATP scans the content to evaluate if it contains sensitive information. diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index 358e414a2d..d629bea4c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -127,7 +127,7 @@ undo | Restores an entity that was remediated. ## Use live response commands -The commands that you can use in the console follow similar principles as [Windows Commands](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/windows-commands#BKMK_c). +The commands that you can use in the console follow similar principles as [Windows Commands](https://docs.microsoft.com/windows-server/administration/windows-commands/windows-commands#BKMK_c). The advanced commands offer a more robust set of actions that allow you to take more powerful actions such as download and upload a file, run scripts on the machine, and take remediation actions on an entity. diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index aac7917bca..c72919ffb8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -82,7 +82,7 @@ The attack surface reduction set of capabilities provide the first line of defen -**[Next generation protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)**
          +**[Next generation protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10)**
          To further reinforce the security perimeter of your network, Microsoft Defender ATP uses next generation protection designed to catch all types of emerging threats. diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md index 9e5d1c75b1..bec39c02a1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel.md @@ -70,7 +70,7 @@ Review the following details to verify minimum system requirements: >Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro. >Don't install .NET framework 4.0.x, since it will negate the above installation. -- Meet the Azure Log Analytics agent minimum system requirements. For more information, see [Collect data from computers in you environment with Log Analytics](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-concept-hybrid#prerequisites) +- Meet the Azure Log Analytics agent minimum system requirements. For more information, see [Collect data from computers in you environment with Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-concept-hybrid#prerequisites) @@ -92,7 +92,7 @@ Once completed, you should see onboarded endpoints in the portal within an hour. ### Configure proxy and Internet connectivity settings -- Each Windows endpoint must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway). +- Each Windows endpoint must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-gateway). - If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Microsoft Defender ATP service: Agent Resource | Ports diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md index 389a39fd4a..409f485d23 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow.md @@ -31,7 +31,7 @@ You first need to [create an app](apis-intro.md). ## Use case A common scenario is scheduling an advanced query and using the results for follow up actions and processing. -In this section we share sample for this purpose using [Microsoft Flow](https://flow.microsoft.com/) (or [Logic Apps](https://azure.microsoft.com/en-us/services/logic-apps/)). +In this section we share sample for this purpose using [Microsoft Flow](https://flow.microsoft.com/) (or [Logic Apps](https://azure.microsoft.com/services/logic-apps/)). ## Define a flow to run query and parse results diff --git a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md index 1c62e63285..bd86e1319d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md +++ b/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell.md @@ -37,7 +37,7 @@ You first need to [create an app](apis-intro.md). Set-ExecutionPolicy -ExecutionPolicy Bypass ``` ->For more details, see [PowerShell documentation](https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy) +>For more details, see [PowerShell documentation](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy) ## Get token diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md index 93c50f478c..cccb23ec60 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md @@ -69,7 +69,7 @@ Area | Description **Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list to see the details in the **Remediation** page or click **Show more** to see the rest of the remediation activities. **Top exposed machines** | See the exposed machine names and their exposure level. You can click each machine name from the list and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine. You can also click **Show more** to see the rest of the exposed machines list. -See [Microsoft Defender ATP icons](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal. +See [Microsoft Defender ATP icons](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal. ## Related topics - [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index 2549af8feb..3168a333af 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -106,7 +106,7 @@ Windows Defender Antivirus in Windows 10 uses a multi-pronged approach to improv For more information, see [Windows Defender in Windows 10](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) and [Windows Defender Overview for Windows Server](https://technet.microsoft.com/windows-server-docs/security/windows-defender/windows-defender-overview-windows-server). -For information about Microsoft Defender Advanced Threat Protection, a service that helps enterprises to detect, investigate, and respond to advanced and targeted attacks on their networks, see [Microsoft Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) (resources) and [Microsoft Defender Advanced Threat Protection (ATP)](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) (documentation). +For information about Microsoft Defender Advanced Threat Protection, a service that helps enterprises to detect, investigate, and respond to advanced and targeted attacks on their networks, see [Microsoft Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) (resources) and [Microsoft Defender Advanced Threat Protection (ATP)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) (documentation). ### Data Execution Prevention diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index bbad08d05e..2de7ee3945 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -286,7 +286,7 @@ If you use PowerShell, you can retrieve the list in two ways: **Validate the exclusion list by using MpCmdRun:** -To check exclusions with the dedicated [command-line tool mpcmdrun.exe](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus?branch=v-anbic-wdav-new-mpcmdrun-options), use the following command: +To check exclusions with the dedicated [command-line tool mpcmdrun.exe](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus?branch=v-anbic-wdav-new-mpcmdrun-options), use the following command: ```DOS MpCmdRun.exe -CheckExclusion -path diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md index ef3d91de6b..e17107ac16 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md @@ -158,7 +158,7 @@ If you use PowerShell, you can retrieve the list in two ways: **Validate the exclusion list by using MpCmdRun:** -To check exclusions with the dedicated [command-line tool mpcmdrun.exe](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus?branch=v-anbic-wdav-new-mpcmdrun-options), use the following command: +To check exclusions with the dedicated [command-line tool mpcmdrun.exe](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus?branch=v-anbic-wdav-new-mpcmdrun-options), use the following command: ```DOS MpCmdRun.exe -CheckExclusion -path diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md index 1a297b77d7..caae6efc4e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md @@ -166,7 +166,7 @@ This section lists the default exclusions for all Windows Server 2016 roles. - The Distributed File System Replication (DFSR) database and working folders. These folders are specified by the registry key `HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\DFSR\Parameters\Replication Groups\GUID\Replica Set Configuration File` > [!NOTE] - > For custom locations, see [Opt out of automatic exclusions](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus#opt-out-of-automatic-exclusions). + > For custom locations, see [Opt out of automatic exclusions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus#opt-out-of-automatic-exclusions). - *%systemdrive%*\System Volume Information\DFSR\\$db_normal$ diff --git a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index b1dc15b985..5d16f8d6e6 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -197,7 +197,7 @@ This setting will prevent a scan from occurring after receiving an update. You c ### Exclusions On Windows Server 2016, Windows Defender Antivirus will automatically deliver the right exclusions for servers running a VDI environment. However, if you are running an older Windows server version, you can refer to the exclusions that are applied on this page: -- [Configure Windows Defender Antivirus exclusions on Windows Server](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus) +- [Configure Windows Defender Antivirus exclusions on Windows Server](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus) ## Additional resources diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md index add0f3f650..4a6531ad42 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md @@ -39,7 +39,7 @@ Download the installation and onboarding packages from Microsoft Defender Securi 2. In Section 1 of the page, set the operating system to **Linux, macOS, iOS or Android** and the deployment method to **Mobile Device Management / Microsoft Intune**. 3. In Section 2 of the page, select **Download installation package**. Save it as _wdav.pkg_ to a local directory. 4. In Section 2 of the page, select **Download onboarding package**. Save it as _WindowsDefenderATPOnboardingPackage.zip_ to the same directory. -5. Download **IntuneAppUtil** from [https://docs.microsoft.com/en-us/intune/lob-apps-macos](https://docs.microsoft.com/en-us/intune/lob-apps-macos). +5. Download **IntuneAppUtil** from [https://docs.microsoft.com/intune/lob-apps-macos](https://docs.microsoft.com/intune/lob-apps-macos). ![Windows Defender Security Center screenshot](images/MDATP_2_DownloadPackages.png) @@ -83,7 +83,7 @@ Download the installation and onboarding packages from Microsoft Defender Securi ## Client device setup -You need no special provisioning for a Mac device beyond a standard [Company Portal installation](https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-macos-cp). +You need no special provisioning for a Mac device beyond a standard [Company Portal installation](https://docs.microsoft.com/intune-user-help/enroll-your-device-in-intune-macos-cp). 1. You'll be asked to confirm device management. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index 647debfcee..ac87bbc9ed 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -39,7 +39,7 @@ Attack surface reduction rules target behaviors that malware and malicious apps - Obfuscated or otherwise suspicious scripts - Behaviors that apps don't usually initiate during normal day-to-day work -You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled. It's best to run all rules in audit mode first so you can understand their impact on your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they may perform tasks similar to malware. By monitoring audit data and [adding exclusions](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) for necessary applications, you can deploy attack surface reduction rules without impacting productivity. +You can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how attack surface reduction rules would impact your organization if they were enabled. It's best to run all rules in audit mode first so you can understand their impact on your line-of-business applications. Many line-of-business applications are written with limited security concerns, and they may perform tasks similar to malware. By monitoring audit data and [adding exclusions](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) for necessary applications, you can deploy attack surface reduction rules without impacting productivity. Triggered rules display a notification on the device. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. The notification also displays in the Microsoft Defender Security Center and in the Microsoft 365 securty center. @@ -185,7 +185,7 @@ This rule blocks the following file types from launching unless they either meet - Executable files (such as .exe, .dll, or .scr) >[!NOTE] ->You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule. +>You must [enable cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule. >[!IMPORTANT] >The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID 01443614-cd74-433a-b99e-2ecdc07bfc25 is owned by Microsoft and is not specified by admins. It uses cloud-delivered protection to update its trusted list regularly. @@ -203,7 +203,7 @@ GUID: 01443614-cd74-433a-b99e-2ecdc07bfc25 This rule provides an extra layer of protection against ransomware. It scans executable files entering the system to determine whether they're trustworthy. If the files closely resemble ransomware, this rule blocks them from running, unless they're in a trusted list or exclusion list. >[!NOTE] ->You must [enable cloud-delivered protection](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule. +>You must [enable cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus) to use this rule. Intune name: Advanced ransomware protection diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md index 3e7dd85f9c..6dd4b9f19f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md @@ -42,7 +42,7 @@ The limited subset of rules that can be used in Windows 10 Enterprise E3 include - Block process creations originating from PSExec and WMI commands - Block untrusted and unsigned processes that run from USB -For more information about these rules, see [Reduce attack surfaces with attack surface reduction rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard). +For more information about these rules, see [Reduce attack surfaces with attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard). ## Related topics diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 00e0789bab..3029df4d23 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -45,7 +45,7 @@ Controlled folder access requires enabling [Windows Defender Antivirus real-time Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how controlled folder access settings would affect your environment if they were enabled. Here is an example query diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 43cdc009e2..6e52ff5447 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -42,7 +42,7 @@ You can add additional folders to be protected, but you cannot remove the defaul Adding other folders to controlled folder access can be useful, for example, if you don't store files in the default Windows libraries or you've changed the location of the libraries away from the defaults. -You can also enter network shares and mapped drives. Environment variables and wildcards are supported. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). +You can also enter network shares and mapped drives. Environment variables and wildcards are supported. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). You can use the Windows Security app or Group Policy to add and remove additional protected folders. diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 6240e524cc..f04321a5c8 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -73,9 +73,9 @@ The following procedures for enabling ASR rules include instructions for how to ## MDM -Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule. +Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-attacksurfacereductionrules) configuration service provider (CSP) to individually enable and set the mode for each rule. -The following is a sample for reference, using [GUID values for ASR rules](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard#attack-surface-reduction-rules). +The following is a sample for reference, using [GUID values for ASR rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard#attack-surface-reduction-rules). OMA-URI path: ./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionRules diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index 0c1ff68ba4..29ed15335f 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -72,7 +72,7 @@ For more information about disabling local list merging, see [Prevent or allow u ## MDM -Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-controlledfolderaccessprotectedfolders) configuration service provider (CSP) to allow apps to make changes to protected folders. +Use the [./Vendor/MSFT/Policy/Config/ControlledFolderAccessProtectedFolders](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-controlledfolderaccessprotectedfolders) configuration service provider (CSP) to allow apps to make changes to protected folders. ## SCCM diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md index 7bf07fbce8..d211891329 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md @@ -49,7 +49,7 @@ Windows 10 version 1709 or later | [Windows Defender AV real-time protection](.. Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). -You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. +You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender-exploit-guard.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled. ## Review network protection events in Windows Event Viewer diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md index 15fd8b2886..58f95ecbc5 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md @@ -39,9 +39,9 @@ The following tables provide more information about the hardware, firmware, and |--------------------------------|----------------------------------------------------|-------------------| | Hardware: **64-bit CPU** | A 64-bit computer is required for the Windows hypervisor to provide VBS. | | | Hardware: **CPU virtualization extensions**,
          plus **extended page tables** | These hardware features are required for VBS:
          One of the following virtualization extensions:
          • VT-x (Intel) or
          • AMD-V
          And:
          • Extended page tables, also called Second Level Address Translation (SLAT). | VBS provides isolation of the secure kernel from the normal operating system. Vulnerabilities and zero-days in the normal operating system cannot be exploited because of this isolation. | -| Firmware: **UEFI firmware version 2.3.1.c or higher with UEFI Secure Boot** | See the System.Fundamentals.Firmware.UEFISecureBoot requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Systems download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/en-us/windows-hardware/design/compatibility/whcp-specifications-policies). | UEFI Secure Boot helps ensure that the device boots only authorized code. This can prevent boot kits and root kits from installing and persisting across reboots. | -| Firmware: **Secure firmware update process** | UEFI firmware must support secure firmware update found under the System.Fundamentals.Firmware.UEFISecureBoot requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Systems download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/en-us/windows-hardware/design/compatibility/whcp-specifications-policies). | UEFI firmware just like software can have security vulnerabilities that, when found, need to be patched through firmware updates. Patching helps prevent root kits from getting installed. | -| Software: **HVCI compatible drivers** | See the Filter.Driver.DeviceGuard.DriverCompatibility requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Filter driver download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/en-us/windows-hardware/design/compatibility/whcp-specifications-policies). | [HVCI Compatible](https://blogs.msdn.microsoft.com/windows_hardware_certification/2015/05/22/driver-compatibility-with-device-guard-in-windows-10/) drivers help ensure that VBS can maintain appropriate memory permissions. This increases resistance to bypassing vulnerable kernel drivers and helps ensure that malware cannot run in kernel. Only code verified through code integrity can run in kernel mode. | +| Firmware: **UEFI firmware version 2.3.1.c or higher with UEFI Secure Boot** | See the System.Fundamentals.Firmware.UEFISecureBoot requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Systems download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/windows-hardware/design/compatibility/whcp-specifications-policies). | UEFI Secure Boot helps ensure that the device boots only authorized code. This can prevent boot kits and root kits from installing and persisting across reboots. | +| Firmware: **Secure firmware update process** | UEFI firmware must support secure firmware update found under the System.Fundamentals.Firmware.UEFISecureBoot requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Systems download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/windows-hardware/design/compatibility/whcp-specifications-policies). | UEFI firmware just like software can have security vulnerabilities that, when found, need to be patched through firmware updates. Patching helps prevent root kits from getting installed. | +| Software: **HVCI compatible drivers** | See the Filter.Driver.DeviceGuard.DriverCompatibility requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Filter driver download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/windows-hardware/design/compatibility/whcp-specifications-policies). | [HVCI Compatible](https://blogs.msdn.microsoft.com/windows_hardware_certification/2015/05/22/driver-compatibility-with-device-guard-in-windows-10/) drivers help ensure that VBS can maintain appropriate memory permissions. This increases resistance to bypassing vulnerable kernel drivers and helps ensure that malware cannot run in kernel. Only code verified through code integrity can run in kernel mode. | | Software: Qualified **Windows operating system** | Windows 10 Enterprise, Windows 10 Education, Windows Server 2016, or Windows 10 IoT Enterprise

          Important:
          Windows Server 2016 running as a domain controller does not support Windows Defender Credential Guard. Only virtualization-based protection of code integrity is supported in this configuration.

          | Support for VBS and for management features that simplify configuration of Windows Defender Device Guard. | > **Important**  The following tables list additional qualifications for improved security. You can use Windows Defender Device Guard with hardware, firmware, and software that support baseline protections, even if they do not support protections for improved security. However, we strongly recommend meeting these additional qualifications to significantly strengthen the level of security that Windows Defender Device Guard can provide. @@ -64,7 +64,7 @@ The following tables describe additional hardware and firmware qualifications, a | Protections for Improved Security | Description | Security benefits | |---------------------------------------------|----------------------------------------------------|-----| -| Firmware: **Hardware Rooted Trust Platform Secure Boot** | • Boot Integrity (Platform Secure Boot) must be supported. See the System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Systems download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/en-us/windows-hardware/design/compatibility/whcp-specifications-policies).
          • The Hardware Security Test Interface (HSTI) 1.1.a must be implemented. See [Hardware Security Testability Specification](https://docs.microsoft.com/windows-hardware/test/hlk/testref/hardware-security-testability-specification). | • Boot Integrity (Platform Secure Boot) from Power-On provides protections against physically present attackers, and defense-in-depth against malware.
          • HSTI 1.1.a provides additional security assurance for correctly secured silicon and platform. | +| Firmware: **Hardware Rooted Trust Platform Secure Boot** | • Boot Integrity (Platform Secure Boot) must be supported. See the System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby requirement in the [Windows Hardware Compatibility Specifications for Windows 10, version 1809 and Windows Server 2019 - Systems download](https://go.microsoft.com/fwlink/?linkid=2027110). You can find previous versions of the Windows Hardware Compatibility Program Specifications and Policies [here](https://docs.microsoft.com/windows-hardware/design/compatibility/whcp-specifications-policies).
          • The Hardware Security Test Interface (HSTI) 1.1.a must be implemented. See [Hardware Security Testability Specification](https://docs.microsoft.com/windows-hardware/test/hlk/testref/hardware-security-testability-specification). | • Boot Integrity (Platform Secure Boot) from Power-On provides protections against physically present attackers, and defense-in-depth against malware.
          • HSTI 1.1.a provides additional security assurance for correctly secured silicon and platform. | | Firmware: **Firmware Update through Windows Update** | Firmware must support field updates through Windows Update and UEFI encapsulation update. | Helps ensure that firmware updates are fast, secure, and reliable. | | Firmware: **Securing Boot Configuration and Management** | • Required BIOS capabilities: Ability of OEM to add ISV, OEM, or Enterprise Certificate in Secure Boot DB at manufacturing time.
          • Required configurations: Microsoft UEFI CA must be removed from Secure Boot DB. Support for 3rd-party UEFI modules is permitted but should leverage ISV-provided certificates or OEM certificate for the specific UEFI software.| • Enterprises can choose to allow proprietary EFI drivers/applications to run.
          • Removing Microsoft UEFI CA from Secure Boot DB provides full control to enterprises over software that runs before the operating system boots. | diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index 24b4c8ebd1..1a7b1eae79 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -21,7 +21,7 @@ ms.author: dansimp Windows Defender SmartScreen works with Intune, Group Policy, and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Windows Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. -See [Windows 10 (and later) settings to protect devices using Intune](https://docs.microsoft.com/en-us/intune/endpoint-protection-windows-10#windows-defender-smartscreen-settings) for the controls you can use in Intune. +See [Windows 10 (and later) settings to protect devices using Intune](https://docs.microsoft.com/intune/endpoint-protection-windows-10#windows-defender-smartscreen-settings) for the controls you can use in Intune. ## Group Policy settings diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index ceb1488e72..be6c791392 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -61,7 +61,7 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic ![Windows Security Center](images/secure-launch-msinfo.png) >[!NOTE] ->To enable System Guard Secure launch, the platform must meet all the baseline requirements for [Device Guard](https://docs.microsoft.com/en-us/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control), [Credential Guard](https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-requirements), and [Virtualization Based Security](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity). +>To enable System Guard Secure launch, the platform must meet all the baseline requirements for [Device Guard](https://docs.microsoft.com/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control), [Credential Guard](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard-requirements), and [Virtualization Based Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity). ## Requirements Met by System Guard Enabled Machines Any machine with System Guard enabled will automatically meet the following low-level hardware requirements: diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md index 5ff581cba2..afe4ed2a79 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md @@ -27,9 +27,9 @@ Microsoft recommends the following configuration for level 1 devices. Devices targeting Level 1 should support the following hardware features: -- [Trusted Platform Module (TPM) 2.0](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-tpm) -- [Bitlocker Drive Encryption](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-bitlocker) -- [UEFI Secure Boot](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-secure-boot) +- [Trusted Platform Module (TPM) 2.0](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-tpm) +- [Bitlocker Drive Encryption](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-bitlocker) +- [UEFI Secure Boot](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-secure-boot) - Drivers and Firmware Distributed through Windows Update ## Policies diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md index 55172a03e1..6cf7155a9a 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md @@ -27,10 +27,10 @@ A level 2 configuration should include all the configurations from level 1 and a Devices targeting level 2 should support all level 1 features, and add the following hardware features: -- [Virtualization and HVCI Enabled](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs) -- [Drivers and Apps HVCI-Ready](https://docs.microsoft.com/en-us/windows-hardware/test/hlk/testref/driver-compatibility-with-device-guard) -- [Windows Hello](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello-biometric-requirements) -- [DMA I/O Protection](https://docs.microsoft.com/en-us/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) +- [Virtualization and HVCI Enabled](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-vbs) +- [Drivers and Apps HVCI-Ready](https://docs.microsoft.com/windows-hardware/test/hlk/testref/driver-compatibility-with-device-guard) +- [Windows Hello](https://docs.microsoft.com/windows-hardware/design/device-experiences/windows-hello-biometric-requirements) +- [DMA I/O Protection](https://docs.microsoft.com/windows/security/information-protection/kernel-dma-protection-for-thunderbolt) ## Policies @@ -110,11 +110,11 @@ is anticipated to be slightly longer than the process in level 1. | Feature Set | Feature | Description | |-------------------------------------------------------------|-------------------------------------------------------|----------------| -| [Windows Hello for Business](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification) | Configure and enforce Windows Hello for Business | In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. Windows Hello addresses the following problems with passwords:
          - Strong passwords can be difficult to remember, and users often reuse passwords on multiple sites.
          - Server breaches can expose symmetric network credentials (passwords).
          - Passwords are subject to replay attacks.
          - Users can inadvertently expose their passwords due to phishing attacks. | -| [Conditional Access](https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/) | Configure and enforce Conditional Access rules based on
          - Application Risk
          - Session Risk | With conditional access, you can implement automated access control decisions for accessing your cloud apps that are based on conditions. Conditional access policies are enforced after the first-factor authentication has been completed. Therefore, conditional access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access. | +| [Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification) | Configure and enforce Windows Hello for Business | In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. Windows Hello addresses the following problems with passwords:
          - Strong passwords can be difficult to remember, and users often reuse passwords on multiple sites.
          - Server breaches can expose symmetric network credentials (passwords).
          - Passwords are subject to replay attacks.
          - Users can inadvertently expose their passwords due to phishing attacks. | +| [Conditional Access](https://docs.microsoft.com/azure/active-directory/conditional-access/) | Configure and enforce Conditional Access rules based on
          - Application Risk
          - Session Risk | With conditional access, you can implement automated access control decisions for accessing your cloud apps that are based on conditions. Conditional access policies are enforced after the first-factor authentication has been completed. Therefore, conditional access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access. | | [Exploit protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard) | Enforce memory protection for OS-level controls:
          - Control flow guard (CFG)
          - Data Execution Protection (DEP)
          - Mandatory ASLR
          - Bottom-Up ASLR
          - High-entropy ASLR
          - Validate Exception Chains (SEHOP)
          - Validate heap integrity | Exploit protection helps protect devices from malware that use exploits to spread and infect to other devices. It consists of several mitigations that can be applied at either the operating system level, or at the individual app level. There is a risk to application compatibility, as some applications may rely on blocked behavior (e.g. dynamically generating code without marking memory as executable). Microsoft recommends gradually deploying this configuration using [the rings methodology](https://docs.microsoft.com/windows/deployment/update/waas-deployment-rings-windows-10-updates). | | [Attack Surface Reduction (ASR)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard)| Configure and enforce [Attack Surface Reduction rules](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard#attack-surface-reduction-rules)| Attack surface reduction controls help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. There is a risk to application compatibility, as some applications may rely on blocked behavior (e.g. an Office application spawning a child process). Each control has an Audit mode, and as such, Microsoft recommends the Audit / Enforce Methodology (repeated here):
          1) Audit – enable the controls in audit mode, and gather audit data in a centralized location
          2) Review – review the audit data to assess potential impact (both positive and negative) and configure any exemptions from the security control you need to configure
          3) Enforce – Deploy the configuration of any exemptions and convert the control to enforce mode | -| [Controlled Folder Access (CFA)](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard) | Configure and audit [Controlled Folder Access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard) | Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. Controlled folder access works best with Microsoft Defender Advanced Threat Protection, which gives you detailed reporting into controlled folder access events and blocks as part of the usual alert investigation scenarios.
          All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder.
          Microsoft recommends the Audit / Enforce Methodology (repeated here):
          1) Audit – enable the controls in audit mode, and gather audit data in a centralized location
          2) Review – review the audit data to assess potential impact (both positive and negative) and configure any exemptions from the security control you need to configure
          3) Enforce – Deploy the configuration of any exemptions and convert the control to enforce mode +| [Controlled Folder Access (CFA)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard) | Configure and audit [Controlled Folder Access](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard) | Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients. Controlled folder access works best with Microsoft Defender Advanced Threat Protection, which gives you detailed reporting into controlled folder access events and blocks as part of the usual alert investigation scenarios.
          All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder.
          Microsoft recommends the Audit / Enforce Methodology (repeated here):
          1) Audit – enable the controls in audit mode, and gather audit data in a centralized location
          2) Review – review the audit data to assess potential impact (both positive and negative) and configure any exemptions from the security control you need to configure
          3) Enforce – Deploy the configuration of any exemptions and convert the control to enforce mode ## Behaviors diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md index b5c294ad6c..e7cc86bf0e 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md @@ -27,8 +27,8 @@ A level 3 configuration should include all the configurations from level 2 and l Devices targeting Level 3 should support all Level 2 and Level 1 features, and add the following hardware features: -- [System Guard](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows) -- [Modern Standby](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/modern-standby) +- [System Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows) +- [Modern Standby](https://docs.microsoft.com/windows-hardware/design/device-experiences/modern-standby) ## Policies diff --git a/windows/whats-new/ltsc/index.md b/windows/whats-new/ltsc/index.md index de2548056a..5e5fc5b59d 100644 --- a/windows/whats-new/ltsc/index.md +++ b/windows/whats-new/ltsc/index.md @@ -47,4 +47,4 @@ For detailed information about Windows 10 servicing, see [Overview of Windows as ## See Also [What's New in Windows 10](https://docs.microsoft.com/windows/whats-new/): See what’s new in other versions of Windows 10.
          -[Windows 10 - Release information](https://docs.microsoft.com/en-us/windows/windows-10/release-information): Windows 10 current versions by servicing option. \ No newline at end of file +[Windows 10 - Release information](https://docs.microsoft.com/windows/windows-10/release-information): Windows 10 current versions by servicing option. \ No newline at end of file diff --git a/windows/whats-new/whats-new-windows-10-version-1703.md b/windows/whats-new/whats-new-windows-10-version-1703.md index 46e7f7bca5..0e1be04497 100644 --- a/windows/whats-new/whats-new-windows-10-version-1703.md +++ b/windows/whats-new/whats-new-windows-10-version-1703.md @@ -126,7 +126,7 @@ New features in Windows Defender Advanced Threat Protection (ATP) for Windows 10 You can read more about ransomware mitigations and detection capability in Windows Defender Advanced Threat Protection in the blog: [Averting ransomware epidemics in corporate networks with Windows Defender ATP](https://blogs.technet.microsoft.com/mmpc/2017/01/30/averting-ransomware-epidemics-in-corporate-networks-with-windows-defender-atp/). -Get a quick, but in-depth overview of Windows Defender ATP for Windows 10 and the new capabilities in Windows 10, version 1703 see [Windows Defender ATP for Windows 10 Creators Update](https://technet.microsoft.com/en-au/windows/mt782787). +Get a quick, but in-depth overview of Windows Defender ATP for Windows 10 and the new capabilities in Windows 10, version 1703 see [Windows Defender ATP for Windows 10 Creators Update](https://technet.microsoft.com/windows/mt782787). ### Windows Defender Antivirus Windows Defender is now called Windows Defender Antivirus, and we've [increased the breadth of the documentation library for enterprise security admins](/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10). diff --git a/windows/whats-new/whats-new-windows-10-version-1903.md b/windows/whats-new/whats-new-windows-10-version-1903.md index 7f6354c1f2..61b20e6870 100644 --- a/windows/whats-new/whats-new-windows-10-version-1903.md +++ b/windows/whats-new/whats-new-windows-10-version-1903.md @@ -36,7 +36,7 @@ This article lists new and updated features and content that are of interest to Windows 10 Education support has been added to Windows 10 Subscription Activation. -With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](https://docs.microsoft.com/en-us/windows/deployment/windows-10-subscription-activation). +With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation). ### SetupDiag @@ -51,7 +51,7 @@ SetupDiag is a command-line tool that can help diagnose why a Windows 10 update ## Servicing - [**Delivery Optimization**](https://docs.microsoft.com/windows/deployment/update/waas-delivery-optimization): Improved Peer Efficiency for enterprises and educational institutions with complex networks is enabled with of [new policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization). This now supports Office 365 ProPlus updates, and Intune content, with System Center Configuration Manager content coming soon! -- [**Automatic Restart Sign-on (ARSO)**](https://docs.microsoft.com/en-us/windows-insider/at-work-pro/wip-4-biz-whats-new#automatic-restart-and-sign-on-arso-for-enterprises-build-18305): Windows will automatically logon as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed. +- [**Automatic Restart Sign-on (ARSO)**](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#automatic-restart-and-sign-on-arso-for-enterprises-build-18305): Windows will automatically logon as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed. - [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period. - **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally. - **Pause updates**: We have extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you will need to update your device before pausing again. @@ -127,7 +127,7 @@ This new feature is displayed under the Device Security page with the string “ ### Identity Protection - [Windows Hello FIDO2 certification](https://fidoalliance.org/microsoft-achieves-fido2-certification-for-windows-hello/): Windows Hello is now a FIDO2 Certified authenticator and enables password-less login for websites supporting FIDO2 authentication, such as Microsoft account and Azure AD. -- [Streamlined Windows Hello PIN reset experience](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience): Microsoft account users have a revamped Windows Hello PIN reset experience with the same look and feel as signing in on the web. +- [Streamlined Windows Hello PIN reset experience](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-videos#windows-hello-for-business-forgotten-pin-user-experience): Microsoft account users have a revamped Windows Hello PIN reset experience with the same look and feel as signing in on the web. - Sign-in with [Password-less](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/passwordless-strategy) Microsoft accounts: Sign in to Windows 10 with a phone number account. Then use Windows Hello for an even easier sign-in experience! - [Remote Desktop with Biometrics](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-features#remote-desktop-with-biometrics): Azure Active Directory and Active Directory users using Windows Hello for Business can use biometrics to authenticate to a remote desktop session. @@ -143,7 +143,7 @@ Several new features are coming in the next version of Edge. See the [news from ## See Also -[What's New in Windows Server, version 1903](https://docs.microsoft.com/en-us/windows-server/get-started/whats-new-in-windows-server-1903): New and updated features in Windows Server.
          +[What's New in Windows Server, version 1903](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1903): New and updated features in Windows Server.
          [Windows 10 Features](https://www.microsoft.com/windows/features): Review general information about Windows 10 features.
          [What's New in Windows 10](https://docs.microsoft.com/windows/whats-new/): See what’s new in other versions of Windows 10.
          [What's new in Windows 10](https://docs.microsoft.com/windows-hardware/get-started/what-s-new-in-windows): See what’s new in Windows 10 hardware.
          From dcf628a168f71fcf4eca8c058729d0c9e9277781 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:44:12 -0400 Subject: [PATCH 206/303] typo: Double word "and" --- windows/configuration/kiosk-shelllauncher.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/kiosk-shelllauncher.md b/windows/configuration/kiosk-shelllauncher.md index 1e484e0795..6fd35e9786 100644 --- a/windows/configuration/kiosk-shelllauncher.md +++ b/windows/configuration/kiosk-shelllauncher.md @@ -45,7 +45,7 @@ Shell Launcher v2 replaces `explorer.exe` with `customshellhost.exe`. This new e In addition to allowing you to use a UWP app for your replacement shell, Shell Launcher v2 offers additional enhancements: - You can use a custom Windows desktop application that can then launch UWP apps, such as **Settings** and **Touch Keyboard**. - From a custom UWP shell, you can launch secondary views and run on multiple monitors. -- The custom shell app runs in full screen, and and can run other apps in full screen on user’s demand. +- The custom shell app runs in full screen, and can run other apps in full screen on user’s demand. For sample XML configurations for the different app combinations, see [Samples for Shell Launcher v2](https://github.com/Microsoft/Windows-iotcore-samples/tree/develop/Samples/ShellLauncherV2). From 49ce1f0285035ce8369b77bb07e7a610f1fece7e Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:45:33 -0400 Subject: [PATCH 207/303] typo: Double word "kiosk" --- windows/configuration/kiosk-prepare.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/kiosk-prepare.md b/windows/configuration/kiosk-prepare.md index 7475992145..c3491784d7 100644 --- a/windows/configuration/kiosk-prepare.md +++ b/windows/configuration/kiosk-prepare.md @@ -251,7 +251,7 @@ The following table describes some features that have interoperability issues we Customers sometimes use virtual machines (VMs) to test configurations before deploying those configurations to physical devices. If you use a VM to test your single-app kiosk configuration, you need to know how to connect to the VM properly. -A single-app kiosk kiosk configuration runs an app above the lockscreen. It doesn't work when it's accessed remotely, which includes *enhanced* sessions in Hyper-V. +A single-app kiosk configuration runs an app above the lockscreen. It doesn't work when it's accessed remotely, which includes *enhanced* sessions in Hyper-V. When you connect to a VM configured as a single-app kiosk, you need a *basic* session rather than an enhanced session. In the following image, notice that **Enhanced session** is not selected in the **View** menu; that means it's a basic session. From ba86c2cfdfb1d7811d2e320510727bc8a9002fff Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:46:22 -0400 Subject: [PATCH 208/303] typo: Double word "the" --- .../client-management/mdm/enrollmentstatustracking-csp-ddf.md | 2 +- windows/deployment/update/waas-wufb-group-policy.md | 2 +- .../microsoft-defender-atp-mac-install-with-jamf.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/enrollmentstatustracking-csp-ddf.md b/windows/client-management/mdm/enrollmentstatustracking-csp-ddf.md index 36057caacf..d395f091cd 100644 --- a/windows/client-management/mdm/enrollmentstatustracking-csp-ddf.md +++ b/windows/client-management/mdm/enrollmentstatustracking-csp-ddf.md @@ -387,7 +387,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic - These settings are read by the Enrollment Status Page (ESP) during the the Device Preparation phase. These setting are used to orchestrate any setup activities prior to provisioning the device in the Device Setup phase of the ESP. + These settings are read by the Enrollment Status Page (ESP) during the Device Preparation phase. These setting are used to orchestrate any setup activities prior to provisioning the device in the Device Setup phase of the ESP. diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md index b983785b2f..b9df3fe9ee 100644 --- a/windows/deployment/update/waas-wufb-group-policy.md +++ b/windows/deployment/update/waas-wufb-group-policy.md @@ -104,7 +104,7 @@ At this point, the IT administrator can set a policy to pause the update. In thi ![illustration of rings with pause quality update check box selected](images/waas-wufb-pause.png) -Now all devices are paused from updating for 35 days. When the the pause is removed, they will be offered the *next* quality update, which ideally will not have the same issue. If there is still an issue, the IT admin can pause updates again. +Now all devices are paused from updating for 35 days. When the pause is removed, they will be offered the *next* quality update, which ideally will not have the same issue. If there is still an issue, the IT admin can pause updates again. diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md index 57f36fcbf5..a0c446dd3f 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md +++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md @@ -74,7 +74,7 @@ The configuration profile contains a custom settings payload that includes: To set the onboarding information, add a property list file with the name, _jamf/WindowsDefenderATPOnboarding.plist_, as a custom setting. You can do this by navigating to **Computers**>**Configuration Profiles**, selecting **New**, then choosing **Custom Settings**>**Configure**. From there, you can upload the property list. >[!IMPORTANT] - > You must set the the Preference Domain as "com.microsoft.wdav.atp" + > You must set the Preference Domain as "com.microsoft.wdav.atp" ![Configuration profile screenshot](images/MDATP_16_PreferenceDomain.png) From 81a1edb5d546906cabd680885fa8c11fedf10cc2 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:47:06 -0400 Subject: [PATCH 209/303] typo: Double word "device" --- windows/deployment/windows-autopilot/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/index.md b/windows/deployment/windows-autopilot/index.md index f3911a5db3..0b030458a3 100644 --- a/windows/deployment/windows-autopilot/index.md +++ b/windows/deployment/windows-autopilot/index.md @@ -45,7 +45,7 @@ This guide is intended for use by an IT-specialist, system architect, or busines
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
          For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about problems that might occur when you connect to the Internet through a proxy server. -
          Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information. +
          Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information.
          IntuneOnce authenticated, Azure Active Directory will trigger enrollment of the device into the Intune MDM service. See the following link for details about network communication requirements: Intune network configuration requirements and bandwidth.
          Windows UpdateDuring the OOBE process, as well as after the Windows 10 OS is fully configured, the Windows Update service is leveraged to retrieve needed updates. If there are problems connecting to Windows Update, see How to solve connection problems concerning Windows Update or Microsoft Update.
          @@ -63,10 +63,10 @@ If the Delivery Optimization Service is inaccessible, the AutoPilot process will
          Diagnostics dataTo enable Windows Analytics and related diagnostics capabilities, see Configure Windows diagnostic data in your organization.
          If diagnostic data cannot be sent, the Autopilot process will still continue, but services that depend on diagnostic data, such as Windows Analytics, will not work. -
          Network Connection Status Indicator (NCSI)Windows must be able to tell that the device is able to access the internet. For more information, see Network Connection Status Indicator (NCSI). +
          Network Connection Status Indicator (NCSI)Windows must be able to tell that the device is able to access the internet. For more information, see Network Connection Status Indicator (NCSI). www.msftconnecttest.com must be resolvable via DNS and accessible via HTTP. -
          Windows Notification Services (WNS)This service is used to enable Windows to receive notifications from apps and services. See Microsoft Store for more information.
          +
          Windows Notification Services (WNS)This service is used to enable Windows to receive notifications from apps and services. See Microsoft Store for more information.
          If the WNS services are not available, the Autopilot process will still continue without notifications.
          Microsoft Store, Microsoft Store for BusinessApps in the Microsoft Store can be pushed to the device, triggered via Intune (MDM).  App updates and additional apps may also be needed when the user first logs in. For more information, see Prerequisites for Microsoft Store for Business and Education (also includes Azure AD and Windows Notification Services).
          @@ -88,8 +88,8 @@ To provide needed Azure Active Directory (automatic MDM enrollment and company b - [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/en-us/education/buy-license/microsoft365/default.aspx) - [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune). - [Enterprise Mobility + Security E3 or E5 subscriptions](https://www.microsoft.com/en-us/cloud-platform/enterprise-mobility-security), which include all needed Azure AD and Intune features. - - [Intune for Education subscriptions](https://docs.microsoft.com/en-us/intune-education/what-is-intune-for-education), which include all needed Azure AD and Intune features. - - [Azure Active Directory Premium P1 or P2](https://azure.microsoft.com/en-us/services/active-directory/) and [Microsoft Intune subscriptions](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune) (or an alternative MDM service). + - [Intune for Education subscriptions](https://docs.microsoft.com/intune-education/what-is-intune-for-education), which include all needed Azure AD and Intune features. + - [Azure Active Directory Premium P1 or P2](https://azure.microsoft.com/services/active-directory/) and [Microsoft Intune subscriptions](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune) (or an alternative MDM service). Additionally, the following are also recommended (but not required): - [Office 365 ProPlus](https://www.microsoft.com/en-us/p/office-365-proplus/CFQ7TTC0K8R0), which can be deployed easily via Intune (or other MDM services). diff --git a/windows/deployment/windows-autopilot/windows-autopilot-reset.md b/windows/deployment/windows-autopilot/windows-autopilot-reset.md index 8e06edad48..d58d236a4f 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-reset.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-reset.md @@ -48,7 +48,7 @@ Additional requirements and configuration details apply with each scenario; see **Applies to: Windows 10, version 1709 and above** -The Intune Service Administrator role is required to perform this task. For more information, see [Add users and grant administrative permission to Intune](https://docs.microsoft.com/en-us/intune/users-add). +The Intune Service Administrator role is required to perform this task. For more information, see [Add users and grant administrative permission to Intune](https://docs.microsoft.com/intune/users-add). IT admins can perform a local Windows Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment (Azure Active Directory and device management) so the devices are ready to use. With a local Autopilot Reset, devices are returned to a fully configured or known IT-approved state. diff --git a/windows/deployment/windows-autopilot/windows-autopilot.md b/windows/deployment/windows-autopilot/windows-autopilot.md index d728e20c8b..7ad46ca665 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot.md +++ b/windows/deployment/windows-autopilot/windows-autopilot.md @@ -61,5 +61,5 @@ Windows 10 version 1703 or higher is required to use Windows Autopilot. See [Win ## Related topics -[Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/en-us/intune/enrollment-autopilot)
          +[Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/intune/enrollment-autopilot)
          [Windows Autopilot scenarios and capabilities](windows-autopilot-scenarios.md) \ No newline at end of file diff --git a/windows/privacy/Microsoft-DiagnosticDataViewer.md b/windows/privacy/Microsoft-DiagnosticDataViewer.md index 07465d680b..f1560f3a73 100644 --- a/windows/privacy/Microsoft-DiagnosticDataViewer.md +++ b/windows/privacy/Microsoft-DiagnosticDataViewer.md @@ -46,7 +46,7 @@ Using the Diagnostic Data Viewer for PowerShell requires administrative (elevate ### Install the Diagnostic Data Viewer for PowerShell >[!IMPORTANT] - >It is recommended to visit the documentation on [Getting Started](https://docs.microsoft.com/en-us/powershell/gallery/getting-started) with PowerShell Gallery. This page provides more specific details on installing a PowerShell module. + >It is recommended to visit the documentation on [Getting Started](https://docs.microsoft.com/powershell/gallery/getting-started) with PowerShell Gallery. This page provides more specific details on installing a PowerShell module. To install the newest version of the Diagnostic Data Viewer PowerShell module, run the following command within an elevated PowerShell session: ```powershell @@ -106,9 +106,9 @@ The Diagnostic Data Viewer for PowerShell provides you with the following featur - **View your diagnostic events.** Running `PS C:\> Get-DiagnosticData`, you can review your diagnostic events. These events reflect activities that occurred and were sent to Microsoft. - Each event is displayed as a PowerShell Object. By default each event shows the event name, the time when it was seen by your Windows device, whether the event is [Basic](https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization), its [diagnostic event category](#view-diagnostic-event-categories), and a detailed JSON view of the information it contains, which shows the event exactly as it was when sent to Microsoft. Microsoft uses this info to continually improve the Windows operating system. + Each event is displayed as a PowerShell Object. By default each event shows the event name, the time when it was seen by your Windows device, whether the event is [Basic](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization), its [diagnostic event category](#view-diagnostic-event-categories), and a detailed JSON view of the information it contains, which shows the event exactly as it was when sent to Microsoft. Microsoft uses this info to continually improve the Windows operating system. -- **View diagnostic event categories.** Each event shows the diagnostic event categories that it belongs to. These categories define how events are used by Microsoft. The categories are shown as numeric identifiers. For more information about these categories, see [Windows Diagnostic Data](https://docs.microsoft.com/en-us/windows/privacy/windows-diagnostic-data). +- **View diagnostic event categories.** Each event shows the diagnostic event categories that it belongs to. These categories define how events are used by Microsoft. The categories are shown as numeric identifiers. For more information about these categories, see [Windows Diagnostic Data](https://docs.microsoft.com/windows/privacy/windows-diagnostic-data). To view the diagnostic category represented by each numeric identifier and what the category means, you can run the command: @@ -186,4 +186,4 @@ When resetting the size of your data history to a lower value, be sure to turn o ## Related Links - [Module in PowerShell Gallery](https://www.powershellgallery.com/packages/Microsoft.DiagnosticDataViewer) -- [Documentation for Diagnostic Data Viewer for PowerShell](https://docs.microsoft.com/en-us/powershell/module/microsoft.diagnosticdataviewer/?view=win10-ps) +- [Documentation for Diagnostic Data Viewer for PowerShell](https://docs.microsoft.com/powershell/module/microsoft.diagnosticdataviewer/?view=win10-ps) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 4b6a124ff2..f1235dc0c9 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -2457,7 +2457,7 @@ The following fields are available: - **Enumerator** Identifies the bus that enumerated the device. - **HWID** A list of hardware IDs for the device. See [HWID](#hwid). - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/library/windows/hardware/ff543130.aspx - **InventoryVersion** The version number of the inventory process generating the events. - **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. - **LowerFilters** The identifiers of the Lower filters installed for the device. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index a88ae5d6a4..95ed49d2ee 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -2497,7 +2497,7 @@ The following fields are available: - **Enumerator** Identifies the bus that enumerated the device. - **HWID** A list of hardware IDs for the device. - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/library/windows/hardware/ff543130.aspx - **InventoryVersion** The version number of the inventory process generating the events. - **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. - **LowerFilters** The identifiers of the Lower filters installed for the device. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index ac8f4d3e3c..9c3e26b053 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -3415,7 +3415,7 @@ The following fields are available: - **Enumerator** Identifies the bus that enumerated the device. - **HWID** A list of hardware IDs for the device. - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/library/windows/hardware/ff543130.aspx - **InventoryVersion** The version number of the inventory process generating the events. - **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. - **LowerFilters** The identifiers of the Lower filters installed for the device. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 765419c245..528ff1c1be 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -3914,7 +3914,7 @@ The following fields are available: - **HWID** A list of hardware IDs for the device. - **Inf** The name of the INF file (possibly renamed by the OS, such as oemXX.inf). - **InstallDate** The date of the most recent installation of the device on the machine. -- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InstallState** The device installation state. For a list of values, see: https://msdn.microsoft.com/library/windows/hardware/ff543130.aspx - **InventoryVersion** The version number of the inventory process generating the events. - **LowerClassFilters** The identifiers of the Lower Class filters installed for the device. - **LowerFilters** The identifiers of the Lower filters installed for the device. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 9f8a2900c9..1f22117765 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -3352,7 +3352,7 @@ The following fields are available: - **HWID** The version of the driver loaded for the device. - **Inf** The bus that enumerated the device. - **InstallDate** The date of the most recent installation of the device on the machine. -- **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/en-us/library/windows/hardware/ff543130.aspx +- **InstallState** The device installation state. One of these values: https://msdn.microsoft.com/library/windows/hardware/ff543130.aspx - **InventoryVersion** List of hardware ids for the device. - **LowerClassFilters** Lower filter class drivers IDs installed for the device - **LowerFilters** Lower filter drivers IDs installed for the device diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md index 53034ea742..9f89972a1f 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md @@ -18,17 +18,17 @@ ms.date: 3/1/2019 - Windows 10 Enterprise 1903 version and newer -You can use Microsoft InTune with MDM CSPs and custom [OMA URIs](https://docs.microsoft.com/en-us/intune/custom-settings-windows-10) to minimize connections from Windows to Microsoft services, or to configure particular privacy settings. You can configure diagnostic data at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article. +You can use Microsoft InTune with MDM CSPs and custom [OMA URIs](https://docs.microsoft.com/intune/custom-settings-windows-10) to minimize connections from Windows to Microsoft services, or to configure particular privacy settings. You can configure diagnostic data at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article. -To ensure CSPs take priority over Group Policies in case of conflicts, use the [ControlPolicyConflict](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-controlpolicyconflict) policy. +To ensure CSPs take priority over Group Policies in case of conflicts, use the [ControlPolicyConflict](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-controlpolicyconflict) policy. You can configure diagnostic data at the Security/Basic level, turn off Windows Defender diagnostic data and MSRT reporting, and turn off all other connections to Microsoft network endpoints as described in this article to help prevent Windows from sending any data to Microsoft. There are many reasons why these communications are enabled by default, such as updating malware definitions and maintain current certificate revocation lists, which is why we strongly recommend against this. This data helps us deliver a secure, reliable, and more delightful personalized experience. Note, there is some traffic which is required (i.e. "whitelisted") for the operation of Windows and the Microsoft InTune based management. This traffic includes CRL and OCSP network traffic which will show up in network traces. CRL and OCSP checks are made to the issuing certificate authorities. Microsoft is one of them, but there are many others, such as DigiCert, Thawte, Google, Symantec, and VeriSign. Additional whitelisted traffic specifically for MDM managed devices includes Windows Notification Service related traffic as well as some specific Microsoft InTune and Windows Update related traffic. -For more information on Microsoft InTune please see [Transform IT service delivery for your modern workplace](https://www.microsoft.com/en-us/enterprise-mobility-security/microsoft-intune?rtc=1) and [Microsoft Intune documentation](https://docs.microsoft.com/en-us/intune/). +For more information on Microsoft InTune please see [Transform IT service delivery for your modern workplace](https://www.microsoft.com/en-us/enterprise-mobility-security/microsoft-intune?rtc=1) and [Microsoft Intune documentation](https://docs.microsoft.com/intune/). -For detailed information about managing network connections to Microsoft services using Registries, Group Policies, or UI see [Manage connections from Windows operating system components to Microsoft services](https://docs.microsoft.com/en-us/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services). +For detailed information about managing network connections to Microsoft services using Registries, Group Policies, or UI see [Manage connections from Windows operating system components to Microsoft services](https://docs.microsoft.com/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services). The endpoints for the MDM “whitelisted” traffic are in the [Whitelisted Traffic](#bkmk-mdm-whitelist). @@ -43,76 +43,76 @@ For Windows 10, the following MDM policies are available in the [Policy CSP](htt | Setting | MDM Policy | Description | | --- | --- | --- | | 1. Automatic Root Certificates Update | There is intentionally no MDM available for Automatic Root Certificate Update. | This MDM does not exist since it would prevent the operation and management of MDM management of devices. -| 2. Cortana and Search | [Experience/AllowCortana](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | Choose whether to let Cortana install and run on the device. **Set to 0 (zero)** -| | [Search/AllowSearchToUseLocation](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-search#search-allowsearchtouselocation) | Choose whether Cortana and Search can provide location-aware search results. **Set to 0 (zero)** -| 3. Date & Time | [Settings/AllowDateTime](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-settings#settings-allowdatetime)| Allows the user to change date and time settings. **Set to 0 (zero)** -| 4. Device metadata retrieval | [DeviceInstallation/PreventDeviceMetadataFromNetwork](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventdevicemetadatafromnetwork) | Choose whether to prevent Windows from retrieving device metadata from the Internet. **Set to Enabled** -| 5. Find My Device | [Experience/AllowFindMyDevice](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-allowfindmydevice)| This policy turns on Find My Device. **Set to 0 (zero)** -| 6. Font streaming | [System/AllowFontProviders](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-system#system-allowfontproviders) | Setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. **Set to 0 (zero)** -| 7. Insider Preview builds | [System/AllowBuildPreview](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-system#system-allowbuildpreview) | This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. **Set to 0 (zero)** -| 8. Internet Explorer | The following Microsoft Internet Explorer MDM policies are available in the [Internet Explorer CSP](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-internetexplorer) | -| | [InternetExplorer/AllowSuggestedSites](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-allowsuggestedsites) | Recommends websites based on the user’s browsing activity. **Set to Disabled** -| | [InternetExplorer/PreventManagingSmartScreenFilter]( https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-preventmanagingsmartscreenfilter) | Prevents the user from managing SmartScreen Filter, which warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing," or is known to host malware. **Set to Enabled** -| | [InternetExplorer/DisableFlipAheadFeature]( https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disableflipaheadfeature) | Determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. **Set to Enabled** -| | [InternetExplorer/DisableHomePageChange]( https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablehomepagechange) | Determines whether users can change the default Home Page or not. **Set to Enabled** -| | [InternetExplorer/DisableFirstRunWizard]( https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablefirstrunwizard) | Prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. **Set to Enabled** -| 9. Live Tiles | [Notifications/DisallowTileNotification](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-notifications)| This policy setting turns off tile notifications. If you enable this policy setting applications and system features will not be able to update their tiles and tile badges in the Start screen. **Set to Enabled** -| 10. Mail synchronization | [Accounts/AllowMicrosoftAccountConnection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountconnection) | Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. **Set to 0 (zero)** -| 11. Microsoft Account | [Accounts/AllowMicrosoftAccountSignInAssistant](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountsigninassistant) | Disable the Microsoft Account Sign-In Assistant. **Set to 0 (zero)** +| 2. Cortana and Search | [Experience/AllowCortana](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | Choose whether to let Cortana install and run on the device. **Set to 0 (zero)** +| | [Search/AllowSearchToUseLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-search#search-allowsearchtouselocation) | Choose whether Cortana and Search can provide location-aware search results. **Set to 0 (zero)** +| 3. Date & Time | [Settings/AllowDateTime](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-allowdatetime)| Allows the user to change date and time settings. **Set to 0 (zero)** +| 4. Device metadata retrieval | [DeviceInstallation/PreventDeviceMetadataFromNetwork](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventdevicemetadatafromnetwork) | Choose whether to prevent Windows from retrieving device metadata from the Internet. **Set to Enabled** +| 5. Find My Device | [Experience/AllowFindMyDevice](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowfindmydevice)| This policy turns on Find My Device. **Set to 0 (zero)** +| 6. Font streaming | [System/AllowFontProviders](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowfontproviders) | Setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. **Set to 0 (zero)** +| 7. Insider Preview builds | [System/AllowBuildPreview](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowbuildpreview) | This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. **Set to 0 (zero)** +| 8. Internet Explorer | The following Microsoft Internet Explorer MDM policies are available in the [Internet Explorer CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer) | +| | [InternetExplorer/AllowSuggestedSites](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-allowsuggestedsites) | Recommends websites based on the user’s browsing activity. **Set to Disabled** +| | [InternetExplorer/PreventManagingSmartScreenFilter]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-preventmanagingsmartscreenfilter) | Prevents the user from managing SmartScreen Filter, which warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing," or is known to host malware. **Set to Enabled** +| | [InternetExplorer/DisableFlipAheadFeature]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disableflipaheadfeature) | Determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. **Set to Enabled** +| | [InternetExplorer/DisableHomePageChange]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablehomepagechange) | Determines whether users can change the default Home Page or not. **Set to Enabled** +| | [InternetExplorer/DisableFirstRunWizard]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer#internetexplorer-disablefirstrunwizard) | Prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. **Set to Enabled** +| 9. Live Tiles | [Notifications/DisallowTileNotification](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-notifications)| This policy setting turns off tile notifications. If you enable this policy setting applications and system features will not be able to update their tiles and tile badges in the Start screen. **Set to Enabled** +| 10. Mail synchronization | [Accounts/AllowMicrosoftAccountConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountconnection) | Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. **Set to 0 (zero)** +| 11. Microsoft Account | [Accounts/AllowMicrosoftAccountSignInAssistant](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountsigninassistant) | Disable the Microsoft Account Sign-In Assistant. **Set to 0 (zero)** | 12. Microsoft Edge | | The following Microsoft Edge MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). For a complete list of the Microsoft Edge policies, see [Available policies for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/available-policies). -| | [Browser/AllowAutoFill](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowautofill) | Choose whether employees can use autofill on websites. **Set to 0 (zero)** -| | [Browser/AllowDoNotTrack](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowdonottrack) | Choose whether employees can send Do Not Track headers. **Set to 0 (zero)** -| | [Browser/AllowMicrosoftCompatbilityList](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowmicrosoftcompatibilitylist) | Specify the Microsoft compatibility list in Microsoft Edge. **Set to 0 (zero)** -| | [Browser/AllowPasswordManager](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowpasswordmanager) | Choose whether employees can save passwords locally on their devices. **Set to 0 (zero)** -| | [Browser/AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) | Choose whether the Address Bar shows search suggestions. **Set to 0 (zero)** -| | [Browser/AllowSmartScreen](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Choose whether SmartScreen is turned on or off. **Set to 0 (zero)** -| 13. Network Connection Status Indicator | [Connectivity/DisallowNetworkConnectivityActiveTests](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-connectivity#connectivity-disallownetworkconnectivityactivetests) | Note: After you apply this policy you must restart the device for the policy setting to take effect. **Set to 1 (one)** -| 14. Offline maps | [AllowOfflineMapsDownloadOverMeteredConnection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-maps)|Allows the download and update of map data over metered connections.
          **Set to 0 (zero)** -| | [EnableOfflineMapsAutoUpdate](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-maps#maps-enableofflinemapsautoupdate)|Disables the automatic download and update of map data. **Set to 0 (zero)** -| 15. OneDrive | [DisableOneDriveFileSync](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-system#system-disableonedrivefilesync)| Allows IT Admins to prevent apps and features from working with files on OneDrive. **Set to 1 (one)** +| | [Browser/AllowAutoFill](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowautofill) | Choose whether employees can use autofill on websites. **Set to 0 (zero)** +| | [Browser/AllowDoNotTrack](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowdonottrack) | Choose whether employees can send Do Not Track headers. **Set to 0 (zero)** +| | [Browser/AllowMicrosoftCompatbilityList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowmicrosoftcompatibilitylist) | Specify the Microsoft compatibility list in Microsoft Edge. **Set to 0 (zero)** +| | [Browser/AllowPasswordManager](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowpasswordmanager) | Choose whether employees can save passwords locally on their devices. **Set to 0 (zero)** +| | [Browser/AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) | Choose whether the Address Bar shows search suggestions. **Set to 0 (zero)** +| | [Browser/AllowSmartScreen](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Choose whether SmartScreen is turned on or off. **Set to 0 (zero)** +| 13. Network Connection Status Indicator | [Connectivity/DisallowNetworkConnectivityActiveTests](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-connectivity#connectivity-disallownetworkconnectivityactivetests) | Note: After you apply this policy you must restart the device for the policy setting to take effect. **Set to 1 (one)** +| 14. Offline maps | [AllowOfflineMapsDownloadOverMeteredConnection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps)|Allows the download and update of map data over metered connections.
          **Set to 0 (zero)** +| | [EnableOfflineMapsAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps#maps-enableofflinemapsautoupdate)|Disables the automatic download and update of map data. **Set to 0 (zero)** +| 15. OneDrive | [DisableOneDriveFileSync](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-disableonedrivefilesync)| Allows IT Admins to prevent apps and features from working with files on OneDrive. **Set to 1 (one)** | 16. Preinstalled apps | N/A | N/A | 17. Privacy settings | | Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC. -| 17.1 General | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection) | This policy setting controls the ability to send inking and typing data to Microsoft. **Set to 0 (zero)** -| 17.2 Location | [System/AllowLocation](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-system#system-allowlocation) | Specifies whether to allow app access to the Location service. **Set to 0 (zero)** -| 17.3 Camera | [Camera/AllowCamera](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-camera#camera-allowcamera) | Disables or enables the camera. **Set to 0 (zero)** -| 17.4 Microphone | [Privacy/LetAppsAccessMicrophone](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmicrophone) | Specifies whether Windows apps can access the microphone. **Set to 2 (two)** -| 17.5 Notifications | [Notifications/DisallowCloudNotification](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-notifications#notifications-disallowcloudnotification) | Turn off notifications network usage. **DO NOT TURN OFF WNS Notifications if you want manage your device(s) using Microsoft InTune** -| | [Privacy/LetAppsAccessNotifications](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessnotifications) | Specifies whether Windows apps can access notifications. **Set to 2 (two)** -| | [Settings/AllowOnlineTips]( https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-settings#settings-allowonlinetips) | Enables or disables the retrieval of online tips and help for the Settings app. **Set to Disabled** -| 17.6 Speech, Inking, & Typing | [Privacy/AllowInputPersonalization](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-allowinputpersonalization) | This policy specifies whether users on the device have the option to enable online speech recognition. **Set to 0 (zero)** -| | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection)| This policy setting controls the ability to send inking and typing data to Microsoft **Set to 0 (zero)** -| 17.7 Account info | [Privacy/LetAppsAccessAccountInfo](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessaccountinfo) | Specifies whether Windows apps can access account information. **Set to 2 (two)** -| 17.8 Contacts | [Privacy/LetAppsAccessContacts](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscontacts) | Specifies whether Windows apps can access contacts. **Set to 2 (two)** -| 17.9 Calendar | [Privacy/LetAppsAccessCalendar](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscalendar) | Specifies whether Windows apps can access the calendar. **Set to 2 (two)** -| 17.10 Call history | [Privacy/LetAppsAccessCallHistory](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscallhistory) | Specifies whether Windows apps can access account information. **Set to 2 (two)** -| 17.11 Email | [Privacy/LetAppsAccessEmail](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessemail) | Specifies whether Windows apps can access email. **Set to 2 (two)** -| 17.12 Messaging | [Privacy/LetAppsAccessMessaging](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmessaging) | Specifies whether Windows apps can read or send messages (text or MMS). **Set to 2 (two)** -| 17.13 Phone calls | [Privacy/LetAppsAccessPhone](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessphone) | Specifies whether Windows apps can make phone calls. **Set to 2 (two)** -| 17.14 Radios | [Privacy/LetAppsAccessRadios](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessradios) | Specifies whether Windows apps have access to control radios. **Set to 2 (two)** -| 17.15 Other devices | [Privacy/LetAppsSyncWithDevices](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappssyncwithdevices) | Specifies whether Windows apps can sync with devices. **Set to 2 (two)** -| | [Privacy/LetAppsAccessTrustedDevices](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstrusteddevices) | Specifies whether Windows apps can access trusted devices. **Set to 2 (two)** -| 17.16 Feedback & diagnostics | [System/AllowTelemetry](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | Allow the device to send diagnostic and usage telemetry data, such as Watson. **Set to 0 (zero)** -| | [Experience/DoNotShowFeedbackNotifications](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-donotshowfeedbacknotifications)| Prevents devices from showing feedback questions from Microsoft. **Set to 1 (one)** -| 17.17 Background apps | [Privacy/LetAppsRunInBackground](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsruninbackground) | Specifies whether Windows apps can run in the background. **Set to 2 (two)** -| 17.18 Motion | [Privacy/LetAppsAccessMotion](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmotion) | Specifies whether Windows apps can access motion data. **Set to 2 (two)** -| 17.19 Tasks | [Privacy/LetAppsAccessTasks](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstasks) | Turn off the ability to choose which apps have access to tasks. **Set to 2 (two)** -| 17.20 App Diagnostics | [Privacy/LetAppsGetDiagnosticInfo](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-privacy#privacy-letappsgetdiagnosticinfo) | Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. **Set to 2 (two)** -| 18. Software Protection Platform | [Licensing/DisallowKMSClientOnlineAVSValidation](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-licensing#licensing-disallowkmsclientonlineavsvalidation) | Opt out of sending KMS client activation data to Microsoft automatically. **Set to 1 (one)** -| 19. Storage Health | [Storage/AllowDiskHealthModelUpdates](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-storage#storage-allowdiskhealthmodelupdates) | Allows disk health model updates. **Set to 0 (zero)** -| 20. Sync your settings | [Experience/AllowSyncMySettings](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-allowsyncmysettings) | Control whether your settings are synchronized. **Set to 0 (zero)** +| 17.1 General | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection) | This policy setting controls the ability to send inking and typing data to Microsoft. **Set to 0 (zero)** +| 17.2 Location | [System/AllowLocation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowlocation) | Specifies whether to allow app access to the Location service. **Set to 0 (zero)** +| 17.3 Camera | [Camera/AllowCamera](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-camera#camera-allowcamera) | Disables or enables the camera. **Set to 0 (zero)** +| 17.4 Microphone | [Privacy/LetAppsAccessMicrophone](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmicrophone) | Specifies whether Windows apps can access the microphone. **Set to 2 (two)** +| 17.5 Notifications | [Notifications/DisallowCloudNotification](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-notifications#notifications-disallowcloudnotification) | Turn off notifications network usage. **DO NOT TURN OFF WNS Notifications if you want manage your device(s) using Microsoft InTune** +| | [Privacy/LetAppsAccessNotifications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessnotifications) | Specifies whether Windows apps can access notifications. **Set to 2 (two)** +| | [Settings/AllowOnlineTips]( https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-allowonlinetips) | Enables or disables the retrieval of online tips and help for the Settings app. **Set to Disabled** +| 17.6 Speech, Inking, & Typing | [Privacy/AllowInputPersonalization](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-allowinputpersonalization) | This policy specifies whether users on the device have the option to enable online speech recognition. **Set to 0 (zero)** +| | [TextInput/AllowLinguisticDataCollection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-textinput#textinput-allowlinguisticdatacollection)| This policy setting controls the ability to send inking and typing data to Microsoft **Set to 0 (zero)** +| 17.7 Account info | [Privacy/LetAppsAccessAccountInfo](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessaccountinfo) | Specifies whether Windows apps can access account information. **Set to 2 (two)** +| 17.8 Contacts | [Privacy/LetAppsAccessContacts](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscontacts) | Specifies whether Windows apps can access contacts. **Set to 2 (two)** +| 17.9 Calendar | [Privacy/LetAppsAccessCalendar](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscalendar) | Specifies whether Windows apps can access the calendar. **Set to 2 (two)** +| 17.10 Call history | [Privacy/LetAppsAccessCallHistory](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesscallhistory) | Specifies whether Windows apps can access account information. **Set to 2 (two)** +| 17.11 Email | [Privacy/LetAppsAccessEmail](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessemail) | Specifies whether Windows apps can access email. **Set to 2 (two)** +| 17.12 Messaging | [Privacy/LetAppsAccessMessaging](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmessaging) | Specifies whether Windows apps can read or send messages (text or MMS). **Set to 2 (two)** +| 17.13 Phone calls | [Privacy/LetAppsAccessPhone](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessphone) | Specifies whether Windows apps can make phone calls. **Set to 2 (two)** +| 17.14 Radios | [Privacy/LetAppsAccessRadios](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessradios) | Specifies whether Windows apps have access to control radios. **Set to 2 (two)** +| 17.15 Other devices | [Privacy/LetAppsSyncWithDevices](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappssyncwithdevices) | Specifies whether Windows apps can sync with devices. **Set to 2 (two)** +| | [Privacy/LetAppsAccessTrustedDevices](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstrusteddevices) | Specifies whether Windows apps can access trusted devices. **Set to 2 (two)** +| 17.16 Feedback & diagnostics | [System/AllowTelemetry](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | Allow the device to send diagnostic and usage telemetry data, such as Watson. **Set to 0 (zero)** +| | [Experience/DoNotShowFeedbackNotifications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-donotshowfeedbacknotifications)| Prevents devices from showing feedback questions from Microsoft. **Set to 1 (one)** +| 17.17 Background apps | [Privacy/LetAppsRunInBackground](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsruninbackground) | Specifies whether Windows apps can run in the background. **Set to 2 (two)** +| 17.18 Motion | [Privacy/LetAppsAccessMotion](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccessmotion) | Specifies whether Windows apps can access motion data. **Set to 2 (two)** +| 17.19 Tasks | [Privacy/LetAppsAccessTasks](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsaccesstasks) | Turn off the ability to choose which apps have access to tasks. **Set to 2 (two)** +| 17.20 App Diagnostics | [Privacy/LetAppsGetDiagnosticInfo](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-privacy#privacy-letappsgetdiagnosticinfo) | Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. **Set to 2 (two)** +| 18. Software Protection Platform | [Licensing/DisallowKMSClientOnlineAVSValidation](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-licensing#licensing-disallowkmsclientonlineavsvalidation) | Opt out of sending KMS client activation data to Microsoft automatically. **Set to 1 (one)** +| 19. Storage Health | [Storage/AllowDiskHealthModelUpdates](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-storage#storage-allowdiskhealthmodelupdates) | Allows disk health model updates. **Set to 0 (zero)** +| 20. Sync your settings | [Experience/AllowSyncMySettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowsyncmysettings) | Control whether your settings are synchronized. **Set to 0 (zero)** | 21. Teredo | No MDM needed | Teredo is **Off by default**. Delivery Optimization (DO) can turn on Teredo, but DO itself is turned Off via MDM. | 22. Wi-Fi Sense | No MDM needed | Wi-Fi Sense is no longer available from Windows 10 version 1803 and newer. -| 23. Windows Defender | [Defender/AllowCloudProtection](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection) | Disconnect from the Microsoft Antimalware Protection Service. **Set to 0 (zero)** -| | [Defender/SubmitSamplesConsent](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent) | Stop sending file samples back to Microsoft. **Set to 2 (two)** -| 23.1 Windows Defender Smartscreen | [Browser/AllowSmartScreen](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Disable Windows Defender Smartscreen. **Set to 0 (zero)** -| 23.2 Windows Defender Smartscreen EnableAppInstallControl | [SmartScreen/EnableAppInstallControl](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-smartscreen#smartscreen-enableappinstallcontrol) | Controls whether users are allowed to install apps from places other than the Microsoft Store. **Set to 0 (zero)** -| 24. Windows Spotlight | [Experience/AllowWindowsSpotlight](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-allowwindowsspotlight) | Disable Windows Spotlight. **Set to 0 (zero)** -| 25. Microsoft Store | [ApplicationManagement/DisableStoreOriginatedApps](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-disablestoreoriginatedapps)| Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. **Set to 1 (one)** -| | [ApplicationManagement/AllowAppStoreAutoUpdate](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowappstoreautoupdate)| Specifies whether automatic update of apps from Microsoft Store are allowed. **Set to 0 (zero)** -| 25.1 Apps for websites | [ApplicationDefaults/EnableAppUriHandlers](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-applicationdefaults#applicationdefaults-enableappurihandlers) | This policy setting determines whether Windows supports web-to-app linking with app URI handlers. **Set to 0 (zero)** +| 23. Windows Defender | [Defender/AllowCloudProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection) | Disconnect from the Microsoft Antimalware Protection Service. **Set to 0 (zero)** +| | [Defender/SubmitSamplesConsent](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent) | Stop sending file samples back to Microsoft. **Set to 2 (two)** +| 23.1 Windows Defender Smartscreen | [Browser/AllowSmartScreen](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-allowsmartscreen) | Disable Windows Defender Smartscreen. **Set to 0 (zero)** +| 23.2 Windows Defender Smartscreen EnableAppInstallControl | [SmartScreen/EnableAppInstallControl](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-smartscreen#smartscreen-enableappinstallcontrol) | Controls whether users are allowed to install apps from places other than the Microsoft Store. **Set to 0 (zero)** +| 24. Windows Spotlight | [Experience/AllowWindowsSpotlight](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowwindowsspotlight) | Disable Windows Spotlight. **Set to 0 (zero)** +| 25. Microsoft Store | [ApplicationManagement/DisableStoreOriginatedApps](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-disablestoreoriginatedapps)| Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. **Set to 1 (one)** +| | [ApplicationManagement/AllowAppStoreAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowappstoreautoupdate)| Specifies whether automatic update of apps from Microsoft Store are allowed. **Set to 0 (zero)** +| 25.1 Apps for websites | [ApplicationDefaults/EnableAppUriHandlers](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-applicationdefaults#applicationdefaults-enableappurihandlers) | This policy setting determines whether Windows supports web-to-app linking with app URI handlers. **Set to 0 (zero)** | 26. Windows Update Delivery Optimization | | The following Delivery Optimization MDM policies are available in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). -| | [DeliveryOptimization/DODownloadMode](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-deliveryoptimization#deliveryoptimization-dodownloadmode)| Lets you choose where Delivery Optimization gets or sends updates and apps. **Set to 100 (one hundred)** -| 27. Windows Update | [Update/AllowAutoUpdate](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-allowautoupdate) | Control automatic updates. **Set to 5 (five)** +| | [DeliveryOptimization/DODownloadMode](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deliveryoptimization#deliveryoptimization-dodownloadmode)| Lets you choose where Delivery Optimization gets or sends updates and apps. **Set to 100 (one hundred)** +| 27. Windows Update | [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate) | Control automatic updates. **Set to 5 (five)** ###
          Allowed traffic ("Whitelisted traffic") for Microsoft InTune / MDM configurations diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b8f7179b74..7f605818ad 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -41,7 +41,7 @@ Applying the Windows Restricted Traffic Limited Functionality Baseline is the sa It is recommended that you restart a device after making configuration changes to it. Note that **Get Help** and **Give us Feedback** links no longer work after the Windows Restricted Traffic Limited Functionality Baseline is applied. -To use Microsoft InTune cloud based device managment for restricting traffic please refer to the [Manage connections from Windows operating system components to Microsoft services using MDM](https://docs.microsoft.com/en-us/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-mdm). +To use Microsoft InTune cloud based device managment for restricting traffic please refer to the [Manage connections from Windows operating system components to Microsoft services using MDM](https://docs.microsoft.com/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services-using-mdm). We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com. diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md index 1573d9e947..561401fa44 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md @@ -100,7 +100,7 @@ Organizations using older directory synchronization technology, such as DirSync ## Federation with Azure -You can deploy Windows Hello for Business key trust in non-federated and federated environments. For non-federated environments, key trust deployments work in environments that have deployed [Password Synchronization with Azure AD Connect](https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-phs) and [Azure Active Directory Pass-through-Authentication](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-pass-through-authentication). For federated environments, you can deploy Windows Hello for Business key trust using Active Directory Federation Services (AD FS) beginning with Windows Server 2012 R2. +You can deploy Windows Hello for Business key trust in non-federated and federated environments. For non-federated environments, key trust deployments work in environments that have deployed [Password Synchronization with Azure AD Connect](https://docs.microsoft.com/azure/active-directory/hybrid/whatis-phs) and [Azure Active Directory Pass-through-Authentication](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect-pass-through-authentication). For federated environments, you can deploy Windows Hello for Business key trust using Active Directory Federation Services (AD FS) beginning with Windows Server 2012 R2. ### Section Review diff --git a/windows/security/identity-protection/hello-for-business/reset-security-key.md b/windows/security/identity-protection/hello-for-business/reset-security-key.md index b9cdc2e5ae..0cfc09e68c 100644 --- a/windows/security/identity-protection/hello-for-business/reset-security-key.md +++ b/windows/security/identity-protection/hello-for-business/reset-security-key.md @@ -24,7 +24,7 @@ ms.reviewer: >This operation will wipe everything from your security key and reset it to factory defaults.
          **All data and credentials will be cleared.** -A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ). +A [Microsoft-compatible security key](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ).
          Follow the instructions in the Settings app and look for specific instructions based on your security key manufacturer below: diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 1478ec896f..c3f0286d24 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -89,11 +89,11 @@ Some things that you can check on the device are: - [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics) - [Details on the TPM standard](https://www.microsoft.com/en-us/research/project/the-trusted-platform-module-tpm/) (has links to features using TPM) -- [TPM Base Services Portal](https://docs.microsoft.com/en-us/windows/desktop/TBS/tpm-base-services-portal) -- [TPM Base Services API](https://docs.microsoft.com/en-us/windows/desktop/api/_tbs/) +- [TPM Base Services Portal](https://docs.microsoft.com/windows/desktop/TBS/tpm-base-services-portal) +- [TPM Base Services API](https://docs.microsoft.com/windows/desktop/api/_tbs/) - [TPM Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/trustedplatformmodule) - [Prepare your organization for BitLocker: Planning and Policies - TPM configurations](https://docs.microsoft.com/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies#bkmk-tpmconfigurations) -- [Azure device provisioning: Identity attestation with TPM](https://azure.microsoft.com/en-us/blog/device-provisioning-identity-attestation-with-tpm/) -- [Azure device provisioning: A manufacturing timeline for TPM devices](https://azure.microsoft.com/en-us/blog/device-provisioning-a-manufacturing-timeline-for-tpm-devices/) +- [Azure device provisioning: Identity attestation with TPM](https://azure.microsoft.com/blog/device-provisioning-identity-attestation-with-tpm/) +- [Azure device provisioning: A manufacturing timeline for TPM devices](https://azure.microsoft.com/blog/device-provisioning-a-manufacturing-timeline-for-tpm-devices/) - [Windows 10: Enabling vTPM (Virtual TPM)](https://social.technet.microsoft.com/wiki/contents/articles/34431.windows-10-enabling-vtpm-virtual-tpm.aspx) - [How to Multiboot with Bitlocker, TPM, and a Non-Windows OS](https://social.technet.microsoft.com/wiki/contents/articles/9528.how-to-multiboot-with-bitlocker-tpm-and-a-non-windows-os.aspx) diff --git a/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md b/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md index d251a04493..dff04d8807 100644 --- a/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md +++ b/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md @@ -165,7 +165,7 @@ Use Windows Event Forwarding to collect and aggregate your WIP audit events. You 2. In the console tree under **Application and Services Logs\Microsoft\Windows**, click **EDP-Audit-Regular** and **EDP-Audit-TCB**. ## Collect WIP audit logs using Azure Monitor -You can collect audit logs using Azure Monitor. See [Windows event log data sources in Azure Monitor.](https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs) +You can collect audit logs using Azure Monitor. See [Windows event log data sources in Azure Monitor.](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs) **To view the WIP events in Azure Monitor** 1. Use an existing or create a new Log Analytics workspace. @@ -179,7 +179,7 @@ You can collect audit logs using Azure Monitor. See [Windows event log data sour >[!NOTE] >If using Windows Events Logs, the event log names can be found under Properties of the event in the Events folder (Application and Services Logs\Microsoft\Windows, click EDP-Audit-Regular and EDP-Audit-TCB). -3. Download Microsoft [Monitoring Agent](https://docs.microsoft.com/en-us/azure/azure-monitor/platform/agent-windows#install-the-agent-using-dsc-in-azure-automation). +3. Download Microsoft [Monitoring Agent](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#install-the-agent-using-dsc-in-azure-automation). 4. To get MSI for Intune installation as stated in the Azure Monitor article, extract: MMASetup-.exe /c /t: Install Microsoft Monitoring Agent to WIP devices using Workspace ID and Primary key. More information on Workspace ID and Primary key can be found in **Log Analytics** > **Advanced Settings**. diff --git a/windows/security/threat-protection/auditing/event-4697.md b/windows/security/threat-protection/auditing/event-4697.md index 72efcaeaae..d454c05905 100644 --- a/windows/security/threat-protection/auditing/event-4697.md +++ b/windows/security/threat-protection/auditing/event-4697.md @@ -114,11 +114,11 @@ This event generates when new service was installed in the system. | 0x2 | ​File System Driver | ​A file system driver, which is also a Kernel device driver. | | 0x8 | ​Recognizer Driver | ​A file system driver used during startup to determine the file systems present on the system. | | 0x10 | ​Win32 Own Process | ​A Win32 program that can be started by the Service Controller and that obeys the service control protocol. This type of Win32 service runs in a process by itself (this is the most common). | -| 0x20 | ​Win32 Share Process | ​A Win32 service that can share a process with other Win32 services.
          (see: | -| 0x110 | ​Interactive Own Process | ​A service that should be run as a standalone process and can communicate with the desktop.
          (see: ) | +| 0x20 | ​Win32 Share Process | ​A Win32 service that can share a process with other Win32 services.
          (see: | +| 0x110 | ​Interactive Own Process | ​A service that should be run as a standalone process and can communicate with the desktop.
          (see: ) | | 0x120 | Interactive Share Process | A service that can share address space with other services of the same type and can communicate with the desktop. | -- **Service Start Type** \[Type = HexInt32\]: The service start type can have one of the following values (see: : +- **Service Start Type** \[Type = HexInt32\]: The service start type can have one of the following values (see: : | Value | Service Type | Description | |-------|---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------| diff --git a/windows/security/threat-protection/auditing/event-5065.md b/windows/security/threat-protection/auditing/event-5065.md index 55bc44dda3..9722578bab 100644 --- a/windows/security/threat-protection/auditing/event-5065.md +++ b/windows/security/threat-protection/auditing/event-5065.md @@ -20,7 +20,7 @@ ms.author: dansimp - Windows Server 2016 -This event generates in [BCryptConfigureContext](https://msdn.microsoft.com/es-es/vstudio/aa375379)() function. This is a Cryptographic Next Generation (CNG) function. +This event generates in [BCryptConfigureContext](https://msdn.microsoft.com/vstudio/aa375379)() function. This is a Cryptographic Next Generation (CNG) function. This event generates when configuration information was changed for existing CNG context. diff --git a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md index 1ea71b62ad..910939ae7e 100644 --- a/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md +++ b/windows/security/threat-protection/device-control/control-usb-devices-using-intune.md @@ -161,7 +161,7 @@ For example, this custom profile allows installation and usage of USB devices wi ![Custom profile](images/custom-profile-allow-device-ids.png) -Peripherals that are allowed to be installed can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it blocks and allows the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. +Peripherals that are allowed to be installed can be specified by their [hardware identity](https://docs.microsoft.com/windows-hardware/drivers/install/device-identification-strings). For a list of common identifier structures, see [Device Identifier Formats](https://docs.microsoft.com/windows-hardware/drivers/install/device-identifier-formats). Test the configuration prior to rolling it out to ensure it blocks and allows the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one. For a SyncML example that allows installation of specific device IDs, see [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-allowinstallationofmatchingdeviceids). To allow specific device classes, see [DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-allowinstallationofmatchingdevicesetupclasses). Allowing installation of specific devices requires also enabling [DeviceInstallation/PreventInstallationOfDevicesNotDescribedByOtherPolicySettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofdevicesnotdescribedbyotherpolicysettings). diff --git a/windows/security/threat-protection/fips-140-validation.md b/windows/security/threat-protection/fips-140-validation.md index 39593c240a..78708f3bd8 100644 --- a/windows/security/threat-protection/fips-140-validation.md +++ b/windows/security/threat-protection/fips-140-validation.md @@ -227,7 +227,7 @@ The following are answers to commonly asked questions for the FIPS 140-2 validat 8. Are applications FIPS 140-2 validated? **Answer:** Microsoft only has low-level cryptographic modules in Windows FIPS 140-2 validated, not high-level applications. A better question is whether a certain application calls a FIPS 140-2 validated cryptographic module in the underlying Windows OS. That question needs to be directed to the company/product group that created the application of interest. 9. How can Systems Center Operations Manager 2012 be configured to use FIPS 140-2 validated cryptographic modules? - **Answer:** See [http://technet.microsoft.com/library/hh914094.aspx](https://technet.microsoft.com/library/hh914094.aspx) + **Answer:** See [https://technet.microsoft.com/library/hh914094.aspx](https://technet.microsoft.com/library/hh914094.aspx) ## Microsoft FIPS 140 Validated Cryptographic Modules @@ -7086,5 +7086,5 @@ Version 6.3.9600

          - + diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md index 10722baf97..d9d1de552d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-custom-detections.md @@ -1,7 +1,7 @@ --- title: Custom detections overview ms.reviewer: -description: Understand how how you can leverage the power of advanced hunting to create custom detections +description: Understand how you can leverage the power of advanced hunting to create custom detections keywords: custom detections, detections, advanced hunting, hunt, detect, query search.product: eADQiWindows 10XVcnh search.appverid: met150 From d2ac2e00a7c79e125e63af350e61c5ef54c35b9d Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:54:33 -0400 Subject: [PATCH 213/303] typo: Double word "type" --- .../identity-protection/access-control/local-accounts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/access-control/local-accounts.md b/windows/security/identity-protection/access-control/local-accounts.md index 1bd0ee3c7b..364908841f 100644 --- a/windows/security/identity-protection/access-control/local-accounts.md +++ b/windows/security/identity-protection/access-control/local-accounts.md @@ -515,7 +515,7 @@ The following table shows the Group Policy settings that are used to deny networ 2. Double-click **Deny log on through Remote Desktop Services**. - 3. Click **Add User or Group**, type type **Local account and member of Administrators group**, and > **OK**. + 3. Click **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**. 8. Link the GPO to the first **Workstations** OU as follows: From 92f1c8453c88056c0473972718d5bd21c8c0fd10 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:55:24 -0400 Subject: [PATCH 214/303] typo: Double word "data" --- .../microsoft-defender-atp/threat-protection-integration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md index 5402aa8cf9..e620a05684 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration.md @@ -39,7 +39,7 @@ Each layer in the threat protection stack plays a critical role in protecting cu Microsoft Defender ATP provides a comprehensive server protection solution, including endpoint detection and response (EDR) capabilities on Windows Servers. ## Azure Information Protection -Keep sensitive data secure while enabling productivity in the workplace through data data discovery and data protection. +Keep sensitive data secure while enabling productivity in the workplace through data discovery and data protection. ## Conditional Access Microsoft Defender ATP's dynamic machine risk score is integrated into the Conditional Access evaluation, ensuring that only secure devices have access to resources. From 11e48756a31bb48cb5bb9059876c7c578121f38a Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:56:02 -0400 Subject: [PATCH 215/303] typo: Double word "be" --- .../threat-and-vuln-mgt-scenarios.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 20faa27ae0..5bdc3b53a7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -88,17 +88,17 @@ Remediating issues in the security recommendations list will improve your config 3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up. - > >![request remediation](images/tvm_request_remediation.png). - > - > You will see a confirmation message that the remediation task has been created. - > ![remediation task creation confirmation](images/tvm_remediation_task_created.png) + > >![request remediation](images/tvm_request_remediation.png). + > + > You will see a confirmation message that the remediation task has been created. + > ![remediation task creation confirmation](images/tvm_remediation_task_created.png) 4. Save your CSV file. ![save csv file](images/tvm_save_csv_file.png) 5. Send a follow up email to your IT Administrator and allow the time that you have alloted for the remediation to propagate in the system. -6. Review the machine **Configuration score** widget again. The number of the security controls issues will decrease. When you click **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be be listed there anymore, and your configuration score should increase. +6. Review the machine **Configuration score** widget again. The number of the security controls issues will decrease. When you click **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be listed there anymore, and your configuration score should increase. ## Related topics From 03e7bb405c2b0798051ba0c5905b5eff83cd01f2 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:56:40 -0400 Subject: [PATCH 216/303] typo: Double word "when" --- .../customize-attack-surface-reduction.md | 2 +- .../enable-attack-surface-reduction.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md index 4559d896b6..2b7dec1738 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md @@ -40,7 +40,7 @@ You can exclude files and folders from being evaluated by attack surface reducti An exclusion applies to all rules that allow exclusions. You can specify an individual file, folder path, or the fully qualified domain name for a resource, but you cannot limit an exclusion to certain rules. -An exclusion is applied only when when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. +An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. Attack surface reduction supports environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). If you are encountering problems with rules detecting files that you believe should not be detected, you should [use audit mode first to test the rule](evaluate-attack-surface-reduction.md). diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 6240e524cc..bfd994a672 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -53,7 +53,7 @@ You can exclude files and folders from being evaluated by most attack surface re >- Block process creations originating from PSExec and WMI commands >- Block JavaScript or VBScript from launching downloaded executable content -You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. An exclusion is applied only when when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. +You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules the exclusions apply to. An exclusion is applied only when the excluded application or service starts. For example, if you add an exclusion for an update service that is already running, the update service will continue to trigger events until the service is stopped and restarted. ASR rules support environment variables and wildcards. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists). From 3d58c9e327b68ef71cac97f9f6bb88f9bc33afbc Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:57:31 -0400 Subject: [PATCH 217/303] typo: Double word "an" --- .../level-1-enterprise-basic-security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md index 5ff581cba2..46371fd58f 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md @@ -341,7 +341,7 @@ The controls enabled in level 1 enforce a reasonable security level while minimi | Feature | Config | Description | |-----------------------------------|-------------------------------------|--------------------| | [Local Admin Password Solution (LAPS)](https://www.microsoft.com/download/details.aspx?id=46899) | Deployed to all devices | Generates a unique local admin password to devices, mitigating many lateral traversal attacks. | -| [Windows Defender ATP EDR](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response) | Deployed to all devices | The Windows Defender ATP endpoint detection and response (EDR) provides actionable and near real-time detection of advanced attacks. EDR helps security analysts , and aggregates alerts with the same attack techniques or attributed to the same attacker into an an entity called an *incident*. An incident helps analysts prioritize alerts, collectively investigate the full scope of a breach, and respond to threats. Windows Defender ATP EDR is not expected to impact users or applications, and it can be deployed to all devices in a single step. | +| [Windows Defender ATP EDR](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response) | Deployed to all devices | The Windows Defender ATP endpoint detection and response (EDR) provides actionable and near real-time detection of advanced attacks. EDR helps security analysts , and aggregates alerts with the same attack techniques or attributed to the same attacker into an entity called an *incident*. An incident helps analysts prioritize alerts, collectively investigate the full scope of a breach, and respond to threats. Windows Defender ATP EDR is not expected to impact users or applications, and it can be deployed to all devices in a single step. | | [Windows Defender Credential Guard](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard) | Enabled for all compatible hardware | Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Windows Defender Credential Guard prevents these attacks by protecting NTLM password hashes, Kerberos Ticket Granting Tickets (TGTs), and credentials stored by applications as domain credentials. There is a small risk to application compatibility, as [applications will break](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard-requirements#application-requirements) if they require NTLMv1, Kerberos DES encryption, Kerberos unconstrained delegation, or extracting the Keberos TGT. As such, Microsoft recommends deploying Credential Guard using [the rings methodology](https://docs.microsoft.com/windows/deployment/update/waas-deployment-rings-windows-10-updates). | | [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/) | Default browser | Microsoft Edge in Windows 10 provides better security than Internet Explorer 11 (IE11). While you may still need to leverage IE11 for compatibility with some sites, Microsoft recommends configuring Microsoft Edge as the default browser, and building an Enterprise Mode Site List to redirect to IE11 only for those sites that require it. Microsoft recommends leveraging either Windows Analytics or Enterprise Site Discovery to build the initial Enterprise Mode Site List, and then gradually deploying this configuration using [the rings methodology](https://docs.microsoft.com/windows/deployment/update/waas-deployment-rings-windows-10-updates). | | [Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview) | Enabled on compatible hardware | Windows Defender Application Guard uses a hardware isolation approach. If an employee goes to an untrusted site through either Microsoft Edge or Internet Explorer, Microsoft Edge opens the site in an isolated container, which is separate from the host operating system and enabled by Hyper-V. If the untrusted site turns out to be malicious, the isolated container protects the host PC, and the attacker can't get to your enterprise data. There is a small risk to application compatibility, as some applications may require interaction with the host PC but may not yet be on the list of trusted web sites for Application Guard. Microsoft recommends leveraging either Windows Analytics or Enterprise Site Discovery to build the initial Network Isolation Settings, and then gradually deploying this configuration using [the rings methodology](https://docs.microsoft.com/windows/deployment/update/waas-deployment-rings-windows-10-updates). | From d308e1050f85d38f6859769ce6823c5059fa6859 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 01:19:18 -0400 Subject: [PATCH 218/303] Update windows/client-management/mdm/index.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index c000f76a85..bfaca2f117 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -44,7 +44,7 @@ The MDM security baseline includes policies that cover the following areas: For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see: - [MDM Security baseline for Windows 10, version 1903](http://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1903-MDM-SecurityBaseLine-Document.zip) -- [MDM Security baseline for Windows 10, version 1809](http://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].zip) + - [MDM Security baseline for Windows 10, version 1809](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].zip) For information about the MDM policies defined in the Intune security baseline public preview, see [Windows security baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-windows) From 60e5aa55bfc79d0b7583f4eb4a0f7ac7e567e0c4 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 01:27:22 -0400 Subject: [PATCH 219/303] Update windows/client-management/mdm/index.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- windows/client-management/mdm/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/index.md b/windows/client-management/mdm/index.md index bfaca2f117..b9bc55a06a 100644 --- a/windows/client-management/mdm/index.md +++ b/windows/client-management/mdm/index.md @@ -42,7 +42,7 @@ The MDM security baseline includes policies that cover the following areas: - And much more For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see: -- [MDM Security baseline for Windows 10, version 1903](http://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1903-MDM-SecurityBaseLine-Document.zip) +- [MDM Security baseline for Windows 10, version 1903](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1903-MDM-SecurityBaseLine-Document.zip) - [MDM Security baseline for Windows 10, version 1809](https://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].zip) From e209eb078af8a8b3b10534f9be2ff90a992133c9 Mon Sep 17 00:00:00 2001 From: Manuel Hauch Date: Mon, 17 Jun 2019 15:54:21 +0200 Subject: [PATCH 220/303] Updates considered to be out-of-date The description in the Group Policy Editor says: "By default, this value is set to 14 days." for both: "Define the number of days before spyware security intelligence is considered out of date" and "Define the number of days before virus security intelligence is considered out of date". The Link refers to those two settings. --- .../manage-protection-updates-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md index ca65e8d570..cb39ebc506 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md @@ -60,7 +60,7 @@ Microsoft Update allows for rapid releases, which means it will download small d The WSUS, Configuration Manager, and MMPC sources will deliver less frequent updates. The size of the updates may be slightly larger than the frequent release from Microsoft Update (as the delta, or differences between the latest version and what is on the endpoint will be larger). This ensures consistent protection without increasing ad hoc network usage (although the amount of data may be the same or increased as the updates will be fewer, but may be slightly larger). > [!IMPORTANT] -> If you have set MMPC as a fallback source after WSUS or Microsoft Update, updates will only be downloaded from MMPC when the current update is considered to be out-of-date (by default, this is 2 consecutive days of not being able to apply updates from the WSUS or Microsoft Update services). +> If you have set MMPC as a fallback source after WSUS or Microsoft Update, updates will only be downloaded from MMPC when the current update is considered to be out-of-date (by default, this is 14 consecutive days of not being able to apply updates from the WSUS or Microsoft Update services). > You can, however, [set the number of days before protection is reported as out-of-date](https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus#set-the-number-of-days-before-protection-is-reported-as-out-of-date). Each source has typical scenarios that depend on how your network is configured, in addition to how often they publish updates, as described in the following table: From aa62fbec5b47dfa98ad09cfee73946c862bb4fa6 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Mon, 17 Jun 2019 07:36:11 -0700 Subject: [PATCH 221/303] Formatting and style guide updates for new topics, updates to grammar --- .../surface-hub-2s-deploy-apps-intune.md | 17 ++++++----- .../surface-hub-2s-manage-intune.md | 2 +- .../surface-hub-2s-phone-authenticate.md | 6 ++-- .../surface-hub-2s-recover-reset.md | 28 +++++++++---------- .../surface-hub-2s-secure-with-uefi-semm.md | 8 ++++-- 5 files changed, 31 insertions(+), 30 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md index 98c1db15c4..e0cd0f59db 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md +++ b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md @@ -13,12 +13,10 @@ ms.localizationpriority: Normal # Deploy apps to Surface Hub 2S using Intune - -# Install You can install additional apps to fit your team or organization's needs. - ## Developer guidelines + - Surface Hub only runs [Universal Windows Platform (UWP) apps](https://msdn.microsoft.com/windows/uwp/get-started/whats-a-uwp). Apps created using the [Desktop App Converter](https://docs.microsoft.com/windows/uwp/porting/desktop-to-uwp-run-desktop-app-converter) will not run on Surface Hub. See a [list of apps that work with Surface Hub](https://support.microsoft.com/help/4040382/surface-Apps-that-work-with-Microsoft-Surface-Hub). - Apps must be targeted for the [Universal device family](https://msdn.microsoft.com/library/windows/apps/dn894631) or Windows Team device family. - Surface Hub only supports [offline-licensed apps](https://docs.microsoft.com/microsoft-store/distribute-offline-apps) from Microsoft Store for Business. @@ -27,22 +25,23 @@ You can install additional apps to fit your team or organization's needs. - You need admin credentials to install apps on Surface Hub. Designed to be used in meeting rooms and other shared spaces, Surface Hub prevents regular users from accessing the Microsoft Store to download and install apps. ## Deployment guidelines + You can deploy Universal Windows Platform (UWP) apps to Surface Hub 2S using Intune, easing app deployment to devices. 1. To deploy apps, enable MDM for your organization. In the Intune portal, select **Intune** as your MDM Authority (recommended). ![Choose MDM authority](images/sh2-set-intune5.png) -2. Enable the Microsoft Store for Business in Intune. Open Intune, click **Client apps** > **Microsoft Store for Business.** +2. Enable the Microsoft Store for Business in Intune. Open Intune, select **Client apps** > **Microsoft Store for Business.** ![Enable Store for Business](images/sh2-deploy-apps-sync.png) -3. In Intune open **Microsoft Store for Business** and click **Settings** > **Distribute** > **Management tools**. Choose **Microsoft Intune** as your management tool. +3. In Intune open **Microsoft Store for Business** and select **Settings** > **Distribute** > **Management tools**. Choose **Microsoft Intune** as your management tool. ![Add Intune as your management tool](images/sh2-set-intune8.png) -4. In Microsoft Store for Business, click **Settings** > **Shop** > **Shopping Experience**, and then click **Show offline apps**. Offline apps refer to apps that can be synced to Intune and centrally deployed to a device. +4. In Microsoft Store for Business, select **Settings** > **Shop** > **Shopping Experience**, and then select **Show offline apps**. Offline apps refer to apps that can be synced to Intune and centrally deployed to a device. 5. After enabling Offline shopping, you can acquire offline licenses for apps that you can sync to Intune and deploy as Device licensing. -6. In Intune > Client apps > Microsoft Store for Business, click Sync. -7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Click **Assignments** > **Add group**. ![*Assigning apps to groups *](images/sh2-assign-group.png)
          -8. Under assignment type, choose **Required**. For the selected group(s), choose **Device licensing** and then Click **OK** and save the assignment. \ No newline at end of file +6. In **Intune** > **Client apps** > **Microsoft Store for Business**, select **Sync**. +7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Select **Assignments** > **Add group**. ![*Assigning apps to groups *](images/sh2-assign-group.png)
          +8. Under assignment type, choose **Required**. For the selected group(s), choose **Device licensing** and then select **OK** and save the assignment. diff --git a/devices/surface-hub/surface-hub-2s-manage-intune.md b/devices/surface-hub/surface-hub-2s-manage-intune.md index f478652228..71c4c86a6c 100644 --- a/devices/surface-hub/surface-hub-2s-manage-intune.md +++ b/devices/surface-hub/surface-hub-2s-manage-intune.md @@ -19,7 +19,7 @@ Surface Hub 2S allows IT administrators to manage settings and policies using a ### Manual registration -1. Sign in as a local administrator on Surface Hub 2S and open the **Settings** app. Click **Surface Hub** > **Device management** and then click **+** to add. +1. Sign in as a local administrator on Surface Hub 2S and open the **Settings** app. Select **Surface Hub** > **Device management** and then select **+** to add. 2. After authenticating, the device will automatically register with Intune. ![Register Surface Hub 2S with Intune](images/sh2-set-intune1.png)
          diff --git a/devices/surface-hub/surface-hub-2s-phone-authenticate.md b/devices/surface-hub/surface-hub-2s-phone-authenticate.md index 9cb78f9693..e97ea7f96e 100644 --- a/devices/surface-hub/surface-hub-2s-phone-authenticate.md +++ b/devices/surface-hub/surface-hub-2s-phone-authenticate.md @@ -18,8 +18,8 @@ Phone authentication for Surface Hub simplifies signing-in to your meetings and ## To set up phone authentication 1. Download the [Microsoft Authenticator](https://www.microsoft.com/en-us/account/authenticator) app for iPhone or Android to your phone. -2. From your PC, go to [https://aka.ms/MFASetup](https://aka.ms/MFASetup) , sign in with your account, and click **Next.** -3. In the Additional security verification screen, select Mobile App and Use verification code, and then click Setup. +2. From your PC, go to [https://aka.ms/MFASetup](https://aka.ms/MFASetup) , sign in with your account, and select **Next.** +3. In the Additional security verification screen, select Mobile App and Use verification code, and then select **Setup**. ## To configure mobile app @@ -30,6 +30,6 @@ Phone authentication for Surface Hub simplifies signing-in to your meetings and ## To sign into Surface Hub -1. On Surface Hub, sign into **My meetings and files** and click **Send notification** when prompted. +1. On Surface Hub, sign into **My meetings and files** and select **Send notification** when prompted. 2. Match the number displayed on your phone with the number displayed on Surface Hub to approve your sign-in request. 3. If prompted, enter the PIN or biometric ID on your phone, to complete sign-in. diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index 31c48d4110..e3691f441e 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -19,36 +19,36 @@ To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** ## Reset device -1. To reset, click **Get Started**. -2. When the **Ready to reset this device** window appears, click **Reset**. Surface Hub 2S will reinstall the operating system from the recovery partition and may take up to one hour to complete. +1. To reset, select **Get Started**. +2. When the **Ready to reset this device** window appears, select **Reset**. Surface Hub 2S will reinstall the operating system from the recovery partition and may take up to one hour to complete. 3. Run **Setup** to reconfigure the device. 4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). - ![*Reset and recovery for Surface Hub 2S*](images/sh2-reset.png)
          *Figure 1. Reset and recovery for Surface Hub 2S.* ## Recover from the cloud -1. To recover, click **Restart now**. -1. In advanced startup mode, select the option to recover the device from the cloud. Surface Hub 2S will download the latest available customer image from the cloud and reinstall the operating system. -2. Remain connected to the network during the recovery process. -3. Run **Setup** to reconfigure the device. -4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). -**Recover Surface Hub 2S using USB recovery drive** +1. To recover, select **Restart now**. +2. In advanced startup mode, select the option to recover the device from the cloud. Surface Hub 2S will download the latest available customer image from the cloud and reinstall the operating system. +3. Remain connected to the network during the recovery process. +4. Run **Setup** to reconfigure the device. +5. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). + +## Recover Surface Hub 2S using USB recovery drive + New in Surface Hub 2S, you can now reinstall the device using a recovery image. -## Recover from USB drive +### Recover from USB drive Surface Hub 2S lets you reinstall the device using a recovery image, which allows you to reinstall the device to factory settings if you lost the Bitlocker key or no longer have admin credentials to the Settings app. - 1. Begin with a USB 3.0 drive with 8GB or 16GB of storage, formatted as FAT32. 2. Download recovery image from the Surface Recovery website onto the USB drive and connect it to any USB-C or USB A port on Surface Hub 2S. 3. Turn the device off, hold the Volume down button and then press the Power. Keep holding the Volume down button until you see circling dots below the Windows logo. -![*Use Volume down and power buttons to initiate recovery*](images/sh2-keypad.png)
          +![*Use Volume down and power buttons to initiate recovery*](images/sh2-keypad.png)
          4. In the language selection screen, select the display language for your Surface Hub 2S. -5. Choose **Recover from a drive** and **Fully clean the drive** and then click **Recover**. If prompted for a BitLocker key, click **Skip this drive**. Surface Hub 2S will reboot several times and take approximately 30 minutes to complete the recovery process. -6. When the first OOBE startup screen appears, remove the USB drive. \ No newline at end of file +5. Choose **Recover from a drive** and **Fully clean the drive** and then select **Recover**. If prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S will reboot several times and take approximately 30 minutes to complete the recovery process. +6. When the first OOBE startup screen appears, remove the USB drive. diff --git a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md index 152af9ce0b..138e79d2fd 100644 --- a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md +++ b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md @@ -25,24 +25,25 @@ Use the Microsoft Surface UEFI Configurator to control the following components: Use the Microsoft Surface UEFI Configurator to turn on or off the following UEFI settings: - Boot + - IPv6 for PXE Boot - Alternate Boot - Boot Order Lock - USB Boot - UEFI Front Page + - Devices - Boot - Date/Time - ## Create UEFI configuration image Unlike other Surface devices, you cannot use an MSI file or a Win PE image to apply these settings on Surface Hub 2S. Instead, you’ll need to create a USB image that can be loaded to the device. To create a Surface Hub 2S UEFI configuration image, download and install the latest version of the Microsoft Surface UEFI Configurator from the [Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) page in the Microsoft Download Center. For more information about using UEFI and SEMM, see [Microsoft Surface Enterprise Management Mode](https://docs.microsoft.com/en-us/surface/surface-enterprise-management-mode). - ## To configure UEFI on Surface Hub 2S + 1. Start the UEFI Configurator and on the first screen, choose **Configuration Package**. -2. To add the certificate to your package, you must have a valid certificate with the private key in a .pfx file format to sign and protect the package. Click **+ Certificate Protection.** +2. To add the certificate to your package, you must have a valid certificate with the private key in a .pfx file format to sign and protect the package. Select **+ Certificate Protection.** 3. Enter the certificate’s private key’s password. 4. After importing the private key,continue creating the package. 5. Choose **Hub** and **Surface Hub 2S** as the target for the UEFI configuration package. @@ -53,4 +54,5 @@ Unlike other Surface devices, you cannot use an MSI file or a Win PE image to ap Upon successful creation of the package, the Configurator will display the last two characters of your certificate’s thumbprint. You’ll need them when you import to the configuration to Surface Hub 2S. ## To boot into UEFI + Turn off Surface Hub 2S. Press and hold the **Volume Up** button and press the **Power** Button. Keep holding the Volume Up button until the UEFI menu appears. From 4732c0d2206f51c9ae1f091e135f195cef806dc4 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 17 Jun 2019 10:09:28 -0500 Subject: [PATCH 222/303] Update windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-hybrid-cert-trust-devreg.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md index de59d7c3e5..2f9a34b9d6 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md @@ -129,7 +129,6 @@ If your AD FS farm is not already configured for Device Authentication (you can `PS C:\> Initialize-ADDeviceRegistration -ServiceAccountName "" ` 3. On the pop-up window click **Yes**. - > [!NOTE] > If your AD FS service is configured to use a GMSA account, enter the account name in the format "domain\accountname$" From 456e3f6eb97851f62131d29d692151dac2ca7151 Mon Sep 17 00:00:00 2001 From: Marty Hernandez Avedon Date: Mon, 17 Jun 2019 11:20:04 -0400 Subject: [PATCH 223/303] Minor typo; Fixes #4066 >"Set-ProcesMitigation" is missing an "s" in the below example: >For example, to enable Arbitrary Code Guard (ACG) in audit mode for the testing.exe used in the example above, you'd use the following command: >PowerShell >Copy >Set-ProcesMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode >You can disable audit mode by using the same command but replacing -Enable with -Disable. --- .../customize-exploit-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index c238e5c8c2..0e744a0011 100644 --- a/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -208,7 +208,7 @@ Where: For example, to enable Arbitrary Code Guard (ACG) in audit mode for the *testing.exe* used in the example above, you'd use the following command: ```PowerShell -Set-ProcesMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode +Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode ``` You can disable audit mode by using the same command but replacing `-Enable` with `-Disable`. From d61c6a9c68a29aafcb3b838ab699411c66445570 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Mon, 17 Jun 2019 09:22:47 -0700 Subject: [PATCH 224/303] Acrolinx pass on all Surface Hub 2S topics --- devices/surface-hub/surface-hub-2s-account.md | 10 +++++----- devices/surface-hub/surface-hub-2s-change-history.md | 2 +- devices/surface-hub/surface-hub-2s-connect.md | 10 +++++----- devices/surface-hub/surface-hub-2s-custom-install.md | 10 +++++----- .../surface-hub/surface-hub-2s-deploy-apps-intune.md | 6 +++--- .../surface-hub/surface-hub-2s-deploy-checklist.md | 6 +++--- devices/surface-hub/surface-hub-2s-deploy.md | 7 +++---- devices/surface-hub/surface-hub-2s-manage-intune.md | 12 ++++++------ .../surface-hub/surface-hub-2s-onprem-powershell.md | 2 +- .../surface-hub/surface-hub-2s-phone-authenticate.md | 2 +- .../surface-hub-2s-port-keypad-overview.md | 8 ++++---- .../surface-hub-2s-prepare-environment.md | 12 ++++++------ devices/surface-hub/surface-hub-2s-quick-start.md | 6 +++--- devices/surface-hub/surface-hub-2s-recover-reset.md | 10 +++++----- .../surface-hub-2s-secure-with-uefi-semm.md | 8 ++++---- devices/surface-hub/surface-hub-2s-site-planning.md | 6 +++--- .../surface-hub-2s-site-readiness-guide.md | 6 +++--- devices/surface-hub/surface-hub-2s-techspecs.md | 12 ++++++------ devices/surface-hub/surface-hub-2s-unpack.md | 8 ++++---- devices/surface-hub/surface-hub-2s-whats-new.md | 12 ++++++------ 20 files changed, 77 insertions(+), 78 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index e1a66ba622..ad1e5c56b3 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -13,15 +13,15 @@ ms.localizationpriority: Normal # Create Surface Hub 2S device account -Creating a Surface Hub device account (also known as a Room mailbox) allows Surface Hub 2S to receive, approve, or decline meeting requests as well as join meetings using Microsoft Teams or Skype for Business. Configure the device account during OOBE setup. If needed you can changed it later (without going through OOBE setup). +Creating a Surface Hub device account (also known as a Room mailbox) allows Surface Hub 2S to receive, approve, or decline meeting requests and join meetings using Microsoft Teams or Skype for Business. Configure the device account during OOBE setup. If needed you can change it later (without going through OOBE setup). -Unlike standard Room mailboxes that remain disabled by default, you’ll need to enable the Surface Hub 2S device account to sign on to Microsoft Teams and Skype for Business. Surface Hub 2S relies on Exchange ActiveSync, which requires an ActiveSync mailbox policy on the device account. Apply the default ActiveSync mailbox policy that comes with Exchange Online. +Unlike standard Room mailboxes that remain disabled by default, you need to enable the Surface Hub 2S device account to sign on to Microsoft Teams and Skype for Business. Surface Hub 2S relies on Exchange ActiveSync, which requires an ActiveSync mailbox policy on the device account. Apply the default ActiveSync mailbox policy that comes with Exchange Online. Complete advanced configuration tasks using Windows PowerShell. For example: - If the default ActiveSync mailbox policy has already been modified by someone else or another process, you will likely have to create and assign a new ActiveSync mailbox policy using Exchange Online PowerShell. -- You will need to configure calendar processing for every Surface Hub device account using PowerShell. -- If you want Surface Hub 2S to send a custom auto reply in response to scheduling requests, you’ll need to configure that using Exchange Online PowerShell. +- You need to configure calendar processing for every Surface Hub device account using PowerShell. +- If you want Surface Hub 2S to send a custom auto reply in response to scheduling requests, you need to configure that using Exchange Online PowerShell. For more information, see [Configure Surface Hub 2S accounts via PowerShell]. @@ -35,7 +35,7 @@ For more information, see [Configure Surface Hub 2S accounts via PowerShell]. ![Leave remaining settings unchanged in the default state](images/sh2-account3.png) -3. Set the password for the device account. Ensure you **do not** select the option **Make this user change their password when they first sign in.** +3. Set the password for the device account. Ensure that you **do not** select the option **Make this user change their password when they first sign in.** ![Set the password for the device account](images/sh2-account4.png) diff --git a/devices/surface-hub/surface-hub-2s-change-history.md b/devices/surface-hub/surface-hub-2s-change-history.md index b7c59d5fd2..a2327b4a83 100644 --- a/devices/surface-hub/surface-hub-2s-change-history.md +++ b/devices/surface-hub/surface-hub-2s-change-history.md @@ -13,7 +13,7 @@ ms.localizationpriority: Normal # Change history for Surface Hub 2S -This topic will summarize new and updated content in the Surface Hub 2S documentation library. +This topic summarizes new and updated content in the Surface Hub 2S documentation library. ## June 2019 diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index 4f0d7c7bd6..eec4f12605 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -73,12 +73,14 @@ DisplayPort cables are certified for to 3 meters in length. If a long cable is n > Most DisplayPort sources will automatically switch to HDMI signaling if HDMI is detected. ## Wirelessly connect to Surface Hub 2S + Windows 10 natively supports Miracast, which lets you wireless connect to Surface Hub 2S. - **** -**To connect using Miracast:** + +### To connect using Miracast + 1. On your Windows 10 device, enter **Win** + **K**. 2. In the Connect window, look for the name of your Surface Hub 2S in the list of nearby devices. You can find the name of your Surface Hub 2S in the bottom left corner of the display. -3. If required, your system administrator may have enabled the PIN setting for Miracast connections on your Surface Hub which means that the first time you connect to that Surface Hub, a PIN number will be displayed on the screen. +3. If required, your system administrator may have enabled the PIN setting for Miracast connections on your Surface Hub which means that the first time you connect to that Surface Hub, a PIN number is displayed on the screen. > [!NOTE] > If you’re a local administrator on Surface Hub 2S, you can configure PIN requirements via **Surface app > Settings.** @@ -96,5 +98,3 @@ You can connect the following accessories to Surface Hub-2S using Bluetooth: > [!NOTE] > After you connect a Bluetooth headset or speaker, you might need to change the default microphone and speaker settings. For more information, see [Local management for Surface Hub settings](local-management-surface-hub-settings.md). - -## Learn more diff --git a/devices/surface-hub/surface-hub-2s-custom-install.md b/devices/surface-hub/surface-hub-2s-custom-install.md index b7ee37606e..50ffc4fa18 100644 --- a/devices/surface-hub/surface-hub-2s-custom-install.md +++ b/devices/surface-hub/surface-hub-2s-custom-install.md @@ -53,23 +53,23 @@ In addition to the visible ports on the sides of the device, certain integrated The removable compute cartridge containing the I/O ports must remain free of any obstructions or impediments of any kind. -![*Figure 3.View of compute cartridge located at the underside of Surface Hub 2s.*](images/sh2-ports.png)
          -***Figure 3.View of compute cartridge located at the underside of Surface Hub 2s.*** +![*Figure 3.View of compute cartridge on the underside of Surface Hub 2s.*](images/sh2-ports.png)
          +***Figure 3.View of compute cartridge on the underside of Surface Hub 2s.*** ![*Figure 4. Unimpeded removal of compute cartridge *](images/sh2-cartridge.png)
          ***Figure 4. Unimpeded removal of compute cartridge*** ## Selecting a mounting system -Surface Hub 2S uses a 350 mm x 350 mm mounting framework that meets most — but not all — of the criteria listed in the VESA Flat Display Mounting Interface Standard. Still, you can install Surface Hub 2S using any of various off-the-shelf display brackets, specifically designed to accommodate displays that diverge from exact VESA specifications, as shown below. +Surface Hub 2S uses a 350 mm x 350 mm mounting framework that meets most — but not all — of the criteria listed in the VESA Flat Display Mounting Interface Standard. You can install Surface Hub 2S using any of various off-the-shelf display brackets designed to accommodate displays that diverge from exact VESA specifications, as shown below. -On the back of Surface Hub 2S, you’ll find a square pattern of four M6 x 1.0 threaded holes centered on the circular bump (565 mm in diameter). Attach your mount using four M6 x 1.0 – 12 mm-long metric bolts. Or, depending on preference, you can use longer bolts up to a maximum of 20 mm. +On the back of Surface Hub 2S, you’ll find a square pattern of four M6 x 1.0 threaded holes centered on the circular bump (565 mm in diameter). Attach your mount using four M6 x 1.0–12 mm-long metric bolts. Or, depending on preference, you can use longer bolts up to a maximum of 20 mm. Important considerations for mounting systems |**Item**|**Description**|**Notes**| |:------ |:------------- |:------- | |**Strength**| Only choose mounts that can safely support devices of at least 28 kg (62 lbs.). | Required | -|**Stiffness**| Avoid flexible display mounts that can diminish the interactive pen and touch use experience. Note that most TV mounts are not designed to support touch displays. | Recommended | +|**Stiffness**| Avoid flexible display mounts that can diminish the interactive pen and touch use experience. Most TV mounts are not designed to support touch displays. | Recommended | |**Depth**| Keep the device mounted tightly to the wall especially in corridors and along circulation paths within rooms.| Recommended | |**Versatility**| Ensure your mounting solution remains hidden from view in both the existing landscape mode and any potential portrait mode (subject to future availability). | Recommended | diff --git a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md index e0cd0f59db..69620a076a 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md +++ b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md @@ -21,8 +21,8 @@ You can install additional apps to fit your team or organization's needs. - Apps must be targeted for the [Universal device family](https://msdn.microsoft.com/library/windows/apps/dn894631) or Windows Team device family. - Surface Hub only supports [offline-licensed apps](https://docs.microsoft.com/microsoft-store/distribute-offline-apps) from Microsoft Store for Business. - By default, apps must be Store-signed to be installed. During testing and development, you can also choose to run developer-signed UWP apps by placing the device in developer mode. -- When developing and submitting apps to the Microsoft Store, set Device family availability and Organizational licensing options to ensure apps will be available to run on Surface Hub. -- You need admin credentials to install apps on Surface Hub. Designed to be used in meeting rooms and other shared spaces, Surface Hub prevents regular users from accessing the Microsoft Store to download and install apps. +- When developing and submitting apps to the Microsoft Store, set Device family availability and Organizational licensing options to ensure that apps are available to run on Surface Hub. +- You need admin credentials to install apps on Surface Hub. Designed for use in meeting rooms and other shared spaces, Surface Hub prevents regular users from accessing the Microsoft Store to download and install apps. ## Deployment guidelines @@ -44,4 +44,4 @@ You can deploy Universal Windows Platform (UWP) apps to Surface Hub 2S using Int 5. After enabling Offline shopping, you can acquire offline licenses for apps that you can sync to Intune and deploy as Device licensing. 6. In **Intune** > **Client apps** > **Microsoft Store for Business**, select **Sync**. 7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Select **Assignments** > **Add group**. ![*Assigning apps to groups *](images/sh2-assign-group.png)
          -8. Under assignment type, choose **Required**. For the selected group(s), choose **Device licensing** and then select **OK** and save the assignment. +8. Under assignment type, choose **Required**. For the selected groups, choose **Device licensing** and then select **OK** and save the assignment. diff --git a/devices/surface-hub/surface-hub-2s-deploy-checklist.md b/devices/surface-hub/surface-hub-2s-deploy-checklist.md index 5122533501..31b9f44872 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-checklist.md +++ b/devices/surface-hub/surface-hub-2s-deploy-checklist.md @@ -21,7 +21,7 @@ ms.localizationpriority: Normal | ☐ |**Device account UPN**| | | | ☐ |**ActiveSync Policy**| | | | ☐ |**Calendar processing configuration completed**| - Yes
          - No | | -| ☐ |**Device friendly name**| | | +| ☐ |**Device-friendly name**| | | | ☐ |**Device host name**| | | | ☐ |**Affiliation**| - None
          - Active Directory affiliation
          - Azure Active Directory | | | ☐ |**Microsoft Teams Mode**| - Mode 0
          - Mode 1
          - Mode 2 | | @@ -40,14 +40,14 @@ ms.localizationpriority: Normal | ☐ |**Install additional certificates (on-premises only)**| | [Using certificates for AADJ on-premises single-sign on](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert) | |☐ |**Windows update**| - Windows Update for Business
          - Windows Server Update Services [WSUS] | [Deploy updates using Windows Update for Business](https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb)
          [Get Started with Windows Server Update Services (WSUS)](https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) | |☐ |**Surface app speaker setting**| - Rolling stand
          - Wall-mounted | | -|☐ |**IP Address**| - Wired - DHCP
          - Wired - DHCP reservation
          - Wireless – DHCP
          - Wireless – DHCP reservation | | +|☐ |**IP Address**| - Wired — DHCP
          - Wired — DHCP reservation
          - Wireless — DHCP
          - Wireless — DHCP reservation | | ## Surface Hub 2S post-deployment checklist |**Check**|**Item**|**Response**|**Learn more**| |:------|:-------|:---------|:----------| | ☐ |**Device account syncing**| - Yes
          - No | | -| ☐ |**Bitlocker key**| - Saved to file (no affiliation)
          - Saved in Active Directory (AD affiliation)
          - Saved in Azure AD ( Azure AD affiliation) | | +| ☐ |**Bitlocker key**| - Saved to file (no affiliation)
          - Saved in Active Directory (AD affiliation)
          - Saved in Azure AD (Azure AD affiliation) | | | ☐ |**Device OS updates**| - Completed | | | ☐ |**Windows Store updates**| - Automatic
          - Manual | | | ☐ |**Microsoft Teams scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions
          - Able to join audio
          - Able to join video
          - Able to share screen || diff --git a/devices/surface-hub/surface-hub-2s-deploy.md b/devices/surface-hub/surface-hub-2s-deploy.md index ed48ed2546..d535538bb6 100644 --- a/devices/surface-hub/surface-hub-2s-deploy.md +++ b/devices/surface-hub/surface-hub-2s-deploy.md @@ -15,7 +15,7 @@ ms.localizationpriority: Normal ## Deploy Surface Hub 2S with a provisioning package -You can use Windows Configuration Designer (WCD) to create provisioning packages to automate the deployment process of Surface Hub 2S. Use provisioning packages to add certificates, configure proxies, set up device administrators and device accounts. You can also use provisioning packages in conjunction with a configuration file to deploy multiple Surface Hubs with a single USB thumb drive. +You can use Windows Configuration Designer (WCD) to create provisioning packages to automate the deployment process of Surface Hub 2S. Use provisioning packages to add certificates, configure proxies, set up device administrators and device accounts. You can also use provisioning packages along with a configuration file to deploy multiple Surface Hubs with a single USB thumb drive. ### Install Windows Configuration Designer @@ -24,8 +24,7 @@ Install Windows Configuration Designer from the Windows Assessment and Deploymen ### Add certificates You can import Certificate Authority certificates to Surface Hub 2S. -To add certificates to Surface Hub 2S, you’ll need a copy of each certificate as X.509 in .cer format. You cannot import .crt, .pfx or other container formats. -Certificates must be imported into Windows Configuration Designer and arranged by hierarchy: +To add certificates to Surface Hub 2S, you need a copy of each certificate as X.509 in .cer format. You cannot import .crt, .pfx or other container formats. Certificates must be imported into Windows Configuration Designer and arranged by hierarchy: ![Add certificates](images/sh2-wcd.png) @@ -51,7 +50,7 @@ To create a bulk token, give it a friendly name, configure the expiration date ( ### Provisioning multiple devices (.csv file) -In addition to the provisioning package, you can use a Surface Hub configuration file to make it even easier to set up your devices. A Surface Hub configuration file contains a list of device accounts and friendly names for wireless projection. During first run, you’ll get an option to choose a device account and friendly name from a configuration file. +In addition to the provisioning package, you can use a Surface Hub configuration file to make it even easier to set up your devices. A Surface Hub configuration file contains a list of device accounts and friendly names for wireless projection. During first run, you get an option to choose a device account and friendly name from a configuration file. ### To create a Surface Hub configuration file diff --git a/devices/surface-hub/surface-hub-2s-manage-intune.md b/devices/surface-hub/surface-hub-2s-manage-intune.md index 71c4c86a6c..d8868e147a 100644 --- a/devices/surface-hub/surface-hub-2s-manage-intune.md +++ b/devices/surface-hub/surface-hub-2s-manage-intune.md @@ -34,7 +34,7 @@ Select Windows 10 Team for preset device restriction settings for Surface Hub an ![Set device restrictions for Surface Hub 2S.](images/sh2-set-intune3.png)
          -These settings include user experience and app behavior, Azure Log Analytics registration, Maintenance windows configuration, Session settings and Miracast settings. +These settings include user experience and app behavior, Azure Log Analytics registration, Maintenance windows configuration, Session settings, and Miracast settings. ## Additional supported configuration service providers @@ -46,9 +46,9 @@ To ensure optimal video and audio quality on Surface Hub 2S, add the following Q |**Name**|**Description**|**OMA-URI**|**Type**|**Value**| |:------ |:------------- |:--------- |:------ |:------- | -|**Audio Ports**| Audio Port range | ./Device/Vendor/MSFT/NetworkQoSPolicy/HubAudio/SourcePortMatchCondition | String | 50000-50019 | +|**Audio Ports**| Audio Port range | ./Device/Vendor/MSFT/NetworkQoSPolicy/HubAudio/SourcePortMatchCondition | String | 50000–50019 | |**Audio DSCP**| Audio ports marking | ./Device/Vendor/MSFT/NetworkQoSPolicy/HubAudio/DSCPAction | Integer | 46 | -|**Video Ports**| Video Port range | ./Device/Vendor/MSFT/NetworkQoSPolicy/HubVideo/SourcePortMatchCondition | String | 50020-50039 | +|**Video Ports**| Video Port range | ./Device/Vendor/MSFT/NetworkQoSPolicy/HubVideo/SourcePortMatchCondition | String | 50020–50039 | |**Video DSCP**| Video ports marking | ./Device/Vendor/MSFT/NetworkQoSPolicy/HubVideo/DSCPAction | Integer | 34 | > [!NOTE] @@ -60,9 +60,9 @@ You can set the Microsoft Teams app mode using Intune. Surface Hub 2S comes inst ### Modes: -- Mode 0 – Skype for Business with Microsoft Teams functionality for scheduled meetings. -- Mode 1 – Microsoft Teams with Skype for Business functionality for scheduled meetings. -- Mode 2 – Microsoft Teams only. +- Mode 0 — Skype for Business with Microsoft Teams functionality for scheduled meetings. +- Mode 1 — Microsoft Teams with Skype for Business functionality for scheduled meetings. +- Mode 2 — Microsoft Teams only. To set modes, add the following settings to a custom Device Configuration Profile. diff --git a/devices/surface-hub/surface-hub-2s-onprem-powershell.md b/devices/surface-hub/surface-hub-2s-onprem-powershell.md index 6e71a89f6f..a08eaf3b1d 100644 --- a/devices/surface-hub/surface-hub-2s-onprem-powershell.md +++ b/devices/surface-hub/surface-hub-2s-onprem-powershell.md @@ -53,7 +53,7 @@ Enable-CsMeetingRoom -Identity Contoso\HUB01 -SipAddressType emailaddress -Regis ## Mobile Device Mailbox Policy -You may need to create a new Mobile Device Mailbox Policy (also known as ActiveSync Policy) to allow your Surface Hub to connect to your online or on-premises environment. +You may need to create a Mobile Device Mailbox Policy (also known as ActiveSync Policy) to allow your Surface Hub to connect to your online or on-premises environment. ## Create a Surface Hub mobile device mailbox policy diff --git a/devices/surface-hub/surface-hub-2s-phone-authenticate.md b/devices/surface-hub/surface-hub-2s-phone-authenticate.md index e97ea7f96e..29f5730a18 100644 --- a/devices/surface-hub/surface-hub-2s-phone-authenticate.md +++ b/devices/surface-hub/surface-hub-2s-phone-authenticate.md @@ -32,4 +32,4 @@ Phone authentication for Surface Hub simplifies signing-in to your meetings and 1. On Surface Hub, sign into **My meetings and files** and select **Send notification** when prompted. 2. Match the number displayed on your phone with the number displayed on Surface Hub to approve your sign-in request. -3. If prompted, enter the PIN or biometric ID on your phone, to complete sign-in. +3. If prompted, enter the PIN or biometric ID on your phone to complete sign-in. diff --git a/devices/surface-hub/surface-hub-2s-port-keypad-overview.md b/devices/surface-hub/surface-hub-2s-port-keypad-overview.md index 4e4b0a8d6b..cdc068e4c3 100644 --- a/devices/surface-hub/surface-hub-2s-port-keypad-overview.md +++ b/devices/surface-hub/surface-hub-2s-port-keypad-overview.md @@ -15,7 +15,7 @@ ms.localizationpriority: Normal This page describes the ports, physical buttons, and configuration information essential for connecting to Surface Hub 2S whether via wired, Wi-Fi, or Bluetooth methods. It also includes best practice recommendations for key connectivity scenarios. -The figure below shows the location of ports and physical buttons located on a keypad attached to the underside of the device. The table includes detailed descriptions of each element. +The figure below shows the location of ports and physical buttons on a keypad attached to the underside of the device. The table includes detailed descriptions of each element. ![Front facing and underside view of I/O connections and physical buttons](images/hub2s-schematic.png) @@ -23,8 +23,8 @@ The figure below shows the location of ports and physical buttons located on a k |**Key**|**Component**|**Description**|**Key parameters**| |:--- |:--------- |:----------- |:-------------- | -| 1 | **USB C** | **USB 3.1 Gen 1**
          Use as a walk-up port for plugging in peripherals such as thumb-drives. Guest ports are located on each side of the device (4).

          *NOTE: This is the recommended port for connecting an external camera. Additional camera mount features are incorporated into the design to help support retention of attached cameras.*

          NOTE: TouchBack and video ingest are not supported on these ports. | Type C

          15 W Port (5V/3A) | -| 2 | **AC power** | **100-240V input**
          Connect to standard AC power and Surface Hub 2S will auto switch to the local power standard such as110 volts in the US and Canada or 220 volts in the UK.

          *NOTE: When the AC cord is plugged in, the system remains in an off state in which only the system management controller (SMC), real time clock (RTC), and keypad are running.* | IEC 60320 C14 | +| 1 | **USB C** | **USB 3.1 Gen 1**
          Use as a walk-up port for plugging in peripherals such as thumb-drives. Guest ports are on each side of the device (4).

          *NOTE: This is the recommended port for connecting an external camera. Additional camera mount features are incorporated into the design to help support retention of attached cameras.*

          NOTE: TouchBack and video ingest are not supported on these ports. | Type C

          15 W Port (5V/3A) | +| 2 | **AC power** | **100-240 V input**
          Connect to standard AC power and Surface Hub 2S will auto switch to the local power standard such as110 volts in the US and Canada or 220 volts in the UK.

          *NOTE: When the AC cord is plugged in, the system remains in an off state in which only the system management controller (SMC), real-time clock (RTC), and keypad are running.* | IEC 60320 C14 | | 3 | **DC power** | **24V DC input port**
          Use for connecting to mobile battery. | Xbox1 Dual barrel to Anderson connector | | 4 | **Ethernet** | **1000/100/10 Base-T**
          Use for providing a continuous connection in a corporate environment and related scenarios requiring maximum stability or capacity. | RJ45 | | 5 | **USB-A** | **USB 3.1 Gen 1**
          Use as a walk-up port for plugging in peripherals such as thumb-drives. | Type A
          7.5 W Port (5V/1.5A) | @@ -43,5 +43,5 @@ Surface Hub 2S consists of two primary system components: |**Component**|**Functionality**| |:--------- |:----------------- | -|**Video board**| - Produces the image on the LCD display.
          - Provides an audio/video connection path to/from the compute module.
          - Provides video scaling to support external video sources.
          - Performs color correction and calibration.
          - Responsible for power management, including occupancy sensors and device power states.
          - Monitors and manages all thermal sensors throughout the device.
          - Performs internal diagnostics.
          - Captures diagnostics, error logs and telemetry for all components not connected to the compute module.
          - Controls the behavior of keypad buttons.
          - Provides an on-screen display for control of video source, brightness, and volume. | +|**Video board**| - Produces the image on the LCD display.
          - Provides an audio/video connection path to/from the compute module.
          - Provides video scaling to support external video sources.
          - Performs color correction and calibration.
          - Responsible for power management, including occupancy sensors and device power states.
          - Monitors and manages all thermal sensors throughout the device.
          - Performs internal diagnostics.
          - Captures diagnostics, error logs, and telemetry for all components not connected to the compute module.
          - Controls the behavior of keypad buttons.
          - Provides an on-screen display for control of video source, brightness, and volume. | |**Compute module**| Connects to and controls all USB devices.
          - Provides video board interconnections for USB, Mini DP, HDMI, PCIe.
          - Provides Ethernet access via wired and wireless interfaces.
          Provides the on-screen audio/video content.
          - Ingests audio/video provided by external sources.
          - Allows video to be passed directly to the video board (bypassing the ingest process) for scenarios in which an external source is HDCP encrypted or is beyond the capability of the ingest subsystem.
          - Provides digital audio output for accessibility and room audio systems respectively (USB dongle support only). | diff --git a/devices/surface-hub/surface-hub-2s-prepare-environment.md b/devices/surface-hub/surface-hub-2s-prepare-environment.md index 49f010ba94..62e362147b 100644 --- a/devices/surface-hub/surface-hub-2s-prepare-environment.md +++ b/devices/surface-hub/surface-hub-2s-prepare-environment.md @@ -17,25 +17,25 @@ ms.localizationpriority: Normal You may use Exchange and Skype for Business on-premises with Surface Hub 2S. However, if you use Exchange Online, Skype for Business Online, Microsoft Teams or Microsoft Whiteboard, and intend to manage Surface Hub 2S with Intune, first review the [Office 365 requirements for endpoints](https://docs.microsoft.com/en-us/office365/enterprise/office-365-endpoints). -Office 365 endpoints help optimize your network by sending all trusted Office 365 network requests directly through your firewall, bypassing all additional packet level inspection or processing. This reduces latency and your perimeter capacity requirements. +Office 365 endpoints help optimize your network by sending all trusted Office 365 network requests directly through your firewall, bypassing all additional packet level inspection or processing. This feature reduces latency and your perimeter capacity requirements. -Microsoft regularly updates the Office 365 service with new features and functionality, which may alter required ports, URLs, and IP addresses. To evaluate, configure, and stay up to date with changes, subscribe to the [Office 365 IP Address and URL Web service](https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service. +Microsoft regularly updates the Office 365 service with new features and functionality, which may alter required ports, URLs, and IP addresses. To evaluate, configure, and stay up-to-date with changes, subscribe to the [Office 365 IP Address and URL Web service](https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service. ## Device affiliation Use Device affiliation to manage user access to the Settings app on Surface Hub 2S. -With the Windows 10 Team Edition operating system — that runs on SH2 — only authorized users can adjust settings via the settings app. Since choosing the affiliation can impact feature availability, plan appropriately to ensure users can access features as intended. +With the Windows 10 Team Edition operating system — that runs on SH2 — only authorized users can adjust settings via the settings app. Since choosing the affiliation can impact feature availability, plan appropriately to ensure that users can access features as intended. > [!NOTE] > You can only set Device affiliation during the initial out-of-box experience (OOBE) setup. If you need to reset Device affiliation, you’ll have to repeat OOBE setup. ## No affiliation -No affiliation is like having Surface Hub 2S in a workgroup with a different local Administrator account on each Surface Hub 2S. If you choose No affiliation, you must locally save the [Bitlocker Key to a USB thumb drive](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-key-management-faq). You can still enroll the device with Intune, however only the local admin will be able to access the Settings app using the account credentials configured during OOBE. You can change the Administrator account password from the Settings app. +No affiliation is like having Surface Hub 2S in a workgroup with a different local Administrator account on each Surface Hub 2S. If you choose No affiliation, you must locally save the [Bitlocker Key to a USB thumb drive](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-key-management-faq). You can still enroll the device with Intune, however only the local admin can access the Settings app using the account credentials configured during OOBE. You can change the Administrator account password from the Settings app. ## Active Directory Domain Services -If you affiliate Surface Hub 2S with on-premises Active Directory Domain Services, you will need to manage access to the Settings app via a security group on your domain, ensuring that all SG members have permissions to change settings on Surface Hub 2S. Note also the following: +If you affiliate Surface Hub 2S with on-premises Active Directory Domain Services, you need to manage access to the Settings app via a security group on your domain, ensuring that all SG members have permissions to change settings on Surface Hub 2S. Note also the following: - When Surface Hub 2S affiliates with your on-premises Active Directory Domain Services, the Bitlocker key is saved in the AD Schema and can be exported to a file. - Your organization’s Trusted Root CAs are pushed to the same container in Surface Hub 2S, which means you don’t need to import them using a provisioning package. @@ -45,4 +45,4 @@ If you affiliate Surface Hub 2S with on-premises Active Directory Domain Service When choosing to affiliate your Surface Hub 2S with Azure AD, any user in the Global Admins Security Group can sign in to the Settings app on Surface Hub 2S. Currently, no other group can be delegated to sign in to the Settings app on Surface Hub 2S. -If you enabled Intune Automatic Enrollment for your organization, Surface Hub 2S will automatically enroll itself with Intune. The device’s Bitlocker key will be automatically saved in Azure AD. When affiliating Surface Hub 2S with Azure AD, single sign-on and streamlined sign-on may not work. +If you enabled Intune Automatic Enrollment for your organization, Surface Hub 2S will automatically enroll itself with Intune. The device’s Bitlocker key is automatically saved in Azure AD. When affiliating Surface Hub 2S with Azure AD, single sign-on and streamlined sign-on may not work. diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index 3710435c3e..1dcda839ca 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -16,9 +16,9 @@ ms.localizationpriority: Normal ## Unpack Surface Hub 2S 1. Use the handles on each side of the box to move it to the space where you'll set it up. -2. Before opening, remove the clips (4) located on the front and back, and then lift the top off the box using the handles. -3. In the base of the Surface Hub 2S, open the accessories box containing the setup guide, Surface Hub 2 pen, Surface Hub 2 camera and the power cable. -4. On the back of the Surface Hub there's an instructional label showing you where to attach the mounting hardware. Install them in place and remove the label. +2. Before opening, remove the clips (4) on the front and back, and then lift the top off the box using the handles. +3. In the base of the Surface Hub 2S, open the accessories box containing the setup guide, Surface Hub 2 pen, Surface Hub 2 camera, and the power cable. +4. On the back of the Surface Hub, there's an instructional label showing you where to attach the mounting hardware. Install them in place and remove the label. | 1. **Set up your mount first** | | |------ | -------- | diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index e3691f441e..596b858e38 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -20,7 +20,7 @@ To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** ## Reset device 1. To reset, select **Get Started**. -2. When the **Ready to reset this device** window appears, select **Reset**. Surface Hub 2S will reinstall the operating system from the recovery partition and may take up to one hour to complete. +2. When the **Ready to reset this device** window appears, select **Reset**. Surface Hub 2S reinstalls the operating system from the recovery partition and may take up to one hour to complete. 3. Run **Setup** to reconfigure the device. 4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). @@ -30,7 +30,7 @@ To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** ## Recover from the cloud 1. To recover, select **Restart now**. -2. In advanced startup mode, select the option to recover the device from the cloud. Surface Hub 2S will download the latest available customer image from the cloud and reinstall the operating system. +2. In advanced startup mode, select the option to recover the device from the cloud. Surface Hub 2S downloads the latest available customer image from the cloud and reinstalls the operating system. 3. Remain connected to the network during the recovery process. 4. Run **Setup** to reconfigure the device. 5. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). @@ -43,12 +43,12 @@ New in Surface Hub 2S, you can now reinstall the device using a recovery image. Surface Hub 2S lets you reinstall the device using a recovery image, which allows you to reinstall the device to factory settings if you lost the Bitlocker key or no longer have admin credentials to the Settings app. -1. Begin with a USB 3.0 drive with 8GB or 16GB of storage, formatted as FAT32. +1. Begin with a USB 3.0 drive with 8 GB or 16 GB of storage, formatted as FAT32. 2. Download recovery image from the Surface Recovery website onto the USB drive and connect it to any USB-C or USB A port on Surface Hub 2S. -3. Turn the device off, hold the Volume down button and then press the Power. Keep holding the Volume down button until you see circling dots below the Windows logo. +3. Turn off the device, hold the Volume down button, and then press the Power. Keep holding the Volume down button until you see circling dots below the Windows logo. ![*Use Volume down and power buttons to initiate recovery*](images/sh2-keypad.png)
          4. In the language selection screen, select the display language for your Surface Hub 2S. -5. Choose **Recover from a drive** and **Fully clean the drive** and then select **Recover**. If prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S will reboot several times and take approximately 30 minutes to complete the recovery process. +5. Choose **Recover from a drive** and **Fully clean the drive** and then select **Recover**. If prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S reboots several times and takes approximately 30 minutes to complete the recovery process. 6. When the first OOBE startup screen appears, remove the USB drive. diff --git a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md index 138e79d2fd..6c4860e38e 100644 --- a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md +++ b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md @@ -38,20 +38,20 @@ Use the Microsoft Surface UEFI Configurator to turn on or off the following UEFI ## Create UEFI configuration image -Unlike other Surface devices, you cannot use an MSI file or a Win PE image to apply these settings on Surface Hub 2S. Instead, you’ll need to create a USB image that can be loaded to the device. To create a Surface Hub 2S UEFI configuration image, download and install the latest version of the Microsoft Surface UEFI Configurator from the [Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) page in the Microsoft Download Center. For more information about using UEFI and SEMM, see [Microsoft Surface Enterprise Management Mode](https://docs.microsoft.com/en-us/surface/surface-enterprise-management-mode). +Unlike other Surface devices, you cannot use an MSI file or a Win PE image to apply these settings on Surface Hub 2S. Instead, you need to create a USB image to load into the device. To create a Surface Hub 2S UEFI configuration image, download and install the latest version of the Microsoft Surface UEFI Configurator from the [Surface Tools for IT](https://www.microsoft.com/download/details.aspx?id=46703) page in the Microsoft Download Center. For more information about using UEFI and SEMM, see [Microsoft Surface Enterprise Management Mode](https://docs.microsoft.com/en-us/surface/surface-enterprise-management-mode). ## To configure UEFI on Surface Hub 2S 1. Start the UEFI Configurator and on the first screen, choose **Configuration Package**. 2. To add the certificate to your package, you must have a valid certificate with the private key in a .pfx file format to sign and protect the package. Select **+ Certificate Protection.** 3. Enter the certificate’s private key’s password. -4. After importing the private key,continue creating the package. +4. After importing the private key, continue creating the package. 5. Choose **Hub** and **Surface Hub 2S** as the target for the UEFI configuration package. 6. Choose the components and settings you want to activate or deactivate on Surface Hub 2S. 7. Use the USB option to export the file. -8. Insert and choose the USB drive you’d like to use for this package. Note that the USB drive will be formatted, and you’ll lose any information you have on it. +8. Insert and choose the USB drive you’d like to use for this package. The USB drive will be formatted and you lose any information you have on it. -Upon successful creation of the package, the Configurator will display the last two characters of your certificate’s thumbprint. You’ll need them when you import to the configuration to Surface Hub 2S. +Upon successful creation of the package, the Configurator will display the last two characters of your certificate’s thumbprint. You need these characters when you import to the configuration to Surface Hub 2S. ## To boot into UEFI diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index 04567185cd..d8722c04f2 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -19,11 +19,11 @@ Designed for team collaboration, Surface Hub 2S can transform the way you work ## Room considerations -Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an additional camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity table to determine if you need to plan for additional peripherals. +Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity table to determine if you need to plan for additional peripherals. |**Proximity**|**Additional requirements**| |:--------|:------| -| 1-2 meters | None | +| 1–2 meters | None | | Up to 2.3 meters | None | | Up to 4 meters | Peripherals optional| | More than 4 meters | Peripherals recommended | @@ -45,4 +45,4 @@ For detailed room planning guidance and more information about Microsoft Teams R ## Managing Surface Hub 2S location -If you plan to use Surface Hub 2S on a mobile stand, you may wish to explore third party solutions that enable location services. For example, active RFID systems can provide real-time tracking throughout complex office or industrial spaces. For more information, consult your A/V provider or other third-party expertise for guidance. +If you plan to use Surface Hub 2S on a mobile stand, you may wish to explore third-party solutions that enable location services. For example, active RFID systems can provide real-time tracking throughout complex office or industrial spaces. For more information, see your A/V provider or other third-party expertise for guidance. diff --git a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md index 359559a375..710bc356ac 100644 --- a/devices/surface-hub/surface-hub-2s-site-readiness-guide.md +++ b/devices/surface-hub/surface-hub-2s-site-readiness-guide.md @@ -16,8 +16,8 @@ ms.localizationpriority: Normal |**Topic**|**Description**| |:-------|:-------| | [Site planning for Surface Hub 2S](surface-hub-2s-site-planning.md) | Review room considerations and planning for peripherals. | -| [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) | Get an overview of required steps from unpacking to starting Surface Hub 2S. | -| [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) | Learn about licensed accessories for mounting Surface Hub 2S. | +| [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) | Get an overview of required steps to unpack and start Surface Hub 2S. | +| [Install and mount Surface Hub 2S](surface-hub-2s-install-mount.md) | Learn about licensed accessories to install and mount Surface Hub 2S. | | [Customizing installation of Surface Hub 2S](surface-hub-2s-custom-install.md) | Learn how to custom install without licensed mounting accessories.| | [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) | Get details for I/O ports and keypad power and selection controls. | -| [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) | Learn about wired and wireless methods of connecting to Surface Hub.| +| [Connect to Surface Hub 2S](surface-hub-2s-connect.md) | Learn about wired and wireless methods to connect to Surface Hub.| diff --git a/devices/surface-hub/surface-hub-2s-techspecs.md b/devices/surface-hub/surface-hub-2s-techspecs.md index 0c09db3433..5af343c5f0 100644 --- a/devices/surface-hub/surface-hub-2s-techspecs.md +++ b/devices/surface-hub/surface-hub-2s-techspecs.md @@ -20,7 +20,7 @@ ms.localizationpriority: Normal |**Size**| 29.2" x 43.2" x 3.0” (741 mm x 1097 mm x 76 mm) | |**Weight**| 61.6 lbs. (28 kg) | |**Resolution**| 3840 x 2560 | -|**Display**| PixelSense Display, 3:2 aspect ratio, 10-bit color, 15.5mm border, anti-glare, IPS LCD | +|**Display**| PixelSense Display, 3:2 aspect ratio, 10-bit color, 15.5 mm border, anti-glare, IPS LCD | |**Compute**| Quad-core 8th Generation Intel Core i5 processor, 8 GB RAM, 128 GB SSD 1 | |**Graphics**| Intel UHD Graphics 620 | |**Wireless**| Wi-Fi 5 (IEEE 802.11 a/b/g/n/ac compatible) Bluetooth Wireless 4.1 technology
          Miracast display | @@ -31,7 +31,7 @@ ms.localizationpriority: Normal |**Software**| Windows 10
          Microsoft Teams for Surface Hub 2
          Skype for Business
          Microsoft Whiteboard
          Microsoft Office (Mobile)
          Microsoft Power BI 2 | |**Connections**| USB-A
          Mini-DisplayPort video output
          RJ45 Gigabit Ethernet
          HDMI video input
          USB-C with DisplayPort input
          Four USB-C (on display) | |**Exterior**| Casing: Precision machined aluminum with mineral-composite resin
          Color: Platinum
          Physical Buttons: Power, Volume, Source | -|**What’s in the box**| One Surface Hub 2S
          One Surface Hub 2 Pen
          One Surface Hub 2 Camera
          2.5m AC Power Cable
          Quick Start Guide | +|**What’s in the box**| One Surface Hub 2S
          One Surface Hub 2 Pen
          One Surface Hub 2 Camera
          2.5 m AC Power Cable
          Quick Start Guide | |**Warranty**| 1-year limited hardware warranty | ## Pen tech specs @@ -39,7 +39,7 @@ ms.localizationpriority: Normal |**Item**|**Details**| |:------ |:- ------ | |**Dimensions**| 5.94" x 0.64" x 0.56” (151 mm x 16.3 mm x 14.3 mm) | -|**Weight**| 0.09 lbs. (41g) | +|**Weight**| 0.09 lbs. (41 g) | |**Buttons**| Barrel button and tail eraser | |**Color**| Grey | |**Connector type**| Bluetooth 4.0 | @@ -69,13 +69,13 @@ ms.localizationpriority: Normal |**Connection**| AC input/DC output & USB-A | |**Voltage**| 48 V DC | |**Capacity**| 8.2 Ah | -|**Energy**| 403Wh (~10x Pro6) | +|**Energy**| 403 Wh (~10x Pro6) | |**Power Delivery**| 387 W | |**Battery Technology**| Li-Ion NMC523 | |**Charger**| 600 W | -|**Charging Time**| 0 to 100 percent in ~1.5 hours | +|**Charging Time**| 0–100 percent in ~1.5 hours | |**Run Time**| 2 hours nominal | -|**AC output**| 88-265 V AC, 50-60Hz, Max 8 A/400 W | +|**AC output**| 88–265 V AC, 50–60 Hz, Max 8 A/400 W | |**DC output**| 24 V DC, Max 16.2 A /387 W | > [!NOTE] diff --git a/devices/surface-hub/surface-hub-2s-unpack.md b/devices/surface-hub/surface-hub-2s-unpack.md index 07919379cd..d5883a8367 100644 --- a/devices/surface-hub/surface-hub-2s-unpack.md +++ b/devices/surface-hub/surface-hub-2s-unpack.md @@ -15,12 +15,12 @@ ms.localizationpriority: Normal ## Unpacking the Surface Hub 2S -Before you remove Surface Hub 2S from the box, make sure you have your mounting solution assembled and someone available to help you. +Before you remove Surface Hub 2S from the box, make sure that you have your mounting solution assembled and someone available to help you. 1. Use the handles on each side of the box to move it to the space where you'll set it up. -2. Before opening, remove the clips (4) located on the front and back, and then lift the top off the box using the handles. -3. In the base of the Surface Hub 2S, open the accessories box containing the setup guide, Surface Hub 2 pen, Surface Hub 2 camera and the power cable. -4. On the back of the surface hub there's an instructional label showing you where to attach the mounting hardware. Install them in place and remove the label. +2. Before opening, remove the clips (4) on the front and back, and then lift the top off the box using the handles. +3. In the base of the Surface Hub 2S, open the accessories box containing the setup guide, Surface Hub 2 pen, Surface Hub 2 camera, and the power cable. +4. On the back of the surface hub, there's an instructional label that shows you where to attach the mounting hardware. Install them in place and remove the label. 5. If you're using a mobile stand remember to lock the wheels to keep the stand in place 6. Be sure to lift the Surface Hub 2S with both hands and support the bottom of the device. 7. Align the installed hardware with the slots on the mount so it rests firmly in place. diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 8f6bedc869..68977acc49 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -17,12 +17,12 @@ Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork |**Capability**|**Summary**|**Learn more**| |:-------|:------|:----| -|**MDM and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | +|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | |**Cloud and on-premises coexistence**| Calling and meeting capabilities support coexistence of cloud and on premises solutions with side-by-side compatibility with Skype for Business. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | |**Reset and recovery**| Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | |**Microsoft Whiteboard**| Active Directory integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers on Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | |**Microsoft Teams Meeting Room License**| Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | -|**On-screen display**| Adjust volume, brightness and input control directly on the display. | | +|**On-screen display**| Adjust volume, brightness, and input control directly on the display. | | |**Sensor-activated Connected Standby**| Doppler sensor triggers energy conservation power state changes based on nearby presence, entering Connected Standby sleep state after 1 minute of inactivity.

          Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | |**Surface Hub pen**| Ergonomically redesigned and easily attachable on the sides of the device. Pen firmware is updatable for future features. | | |**Surface app for Surface Hub 2S**| | | @@ -40,21 +40,21 @@ The following table details the differences between Surface Hub and Surface Hub |**Component**| **Surface Hub 55”**|**Surface Hub 84”**| **Surface Hub 2S**| |:----- |:---- |:---- |:----- | |**Form Factor**| 55” | 84” | 50” | -|**Size**| 31.75” x 59.62” x 3.38”
          (806.4mm x 1514.3mm x 85.8mm) | 46.12” x 86.7” x 4.15”
          (1171.5mm x 2202.9mm x 105.4mm) | 29.2" x 43.2" x 3.0"
          (741 mm x 1097 mm x 76 mm) | +|**Size**| 31.75” x 59.62” x 3.38”
          (806.4 mm x 1514.3 mm x 85.8 mm) | 46.12” x 86.7” x 4.15”
          (1171.5 mm x 2202.9 mm x 105.4 mm) | 29.2" x 43.2" x 3.0"
          (741 mm x 1097 mm x 76 mm) | |**Weight**| 105 lbs. (48 kg) | 280 lbs. (127 kg) | 61.6 lbs. (28 kg) | -|**Display**| Resolution:
          1920 x 1080 @ 120Hz
          Contrast ratio:
          1300:1
          Touch:
          100-point multi-touch
          Projective Capacitance optically bonded sensor | Resolution:
          3840 x 2160 @ 120Hz
          Contrast Ratio:
          1400:1
          Touch:
          100-point multi-touch
          Projective Capacitance optically bonded sensor | Resolution:
          3840 x 2560 @ 60Hz | +|**Display**| Resolution:
          1920 x 1080 @ 120 Hz
          Contrast ratio:
          1300:1
          Touch:
          100-point multi-touch
          Projective Capacitance optically bonded sensor | Resolution:
          3840 x 2160 @ 120 Hz
          Contrast Ratio:
          1400:1
          Touch:
          100-point multi-touch
          Projective Capacitance optically bonded sensor | Resolution:
          3840 x 2560 @ 60 Hz | |**Aspect Ratio**| 16:9 | 16:9 | 3:2 | |**Storage**| SSD 128 GB | SSD 128 GB | SSD 128 GB | |**RAM**| 8 GB RAM | 8 GB RAM | 8 GB RAM | |**Processor**| 4th Generation Intel® Core i5 | 4th Generation Intel Core i7 | Quad-core 8th Generation Intel Core i5 processor | |**Graphics**| Intel HD 4600 | NVIDIA Quadro K2200 | Intel UHD Graphics 620 | |**Network**| Wi-Fi (802.11 a/b/g/n/ac)
          Ethernet 1 Gbps
          Bluetooth 4.0 low energy
          Miracast enabled | Wi-Fi (802.11 a/b/g/n/ac)
          Ethernet 1 Gbps
          Bluetooth 4.0 low energy
          Miracast enabled | Wi-Fi 5 (IEEE 802.11 a/b/g/n/ac)
          Ethernet 1 Gbps
          Bluetooth Wireless 4.1 technology
          Miracast Display | -|**Ports**| (1) USB 3.0 (bottom) + (1) USB 3.0 (side access)
          (2) USB 2.0
          DisplayPort Video Output
          3.5mm Stereo Out
          RJ11 Connector for system-level control

          DisplayPort Video Input
          HDMI Video Input
          VGA Video Input
          3.5mm Stereo Input
          (1) USB 2.0 type B Touchback Output | (1) USB 3.0 (bottom) + (1) USB 3.0 (side access)
          (4) USB 2.0
          DisplayPort Video Output
          3.5mm Stereo Out
          RJ11 Connector for system-level control

          DisplayPort Video Input
          HDMI Video Input
          VGA Video Input
          3.5mm Stereo Input
          (1) USB 2.0 type B Touchback Output | (1) USB-A
          Mini-DisplayPort Video Output
          HDMI Video Input
          USB-C with DisplayPort Input
          (4) USB-C (on display)
          RJ45 Gigabit Ethernet | +|**Ports**| (1) USB 3.0 (bottom) + (1) USB 3.0 (side access)
          (2) USB 2.0
          DisplayPort Video Output
          3.5 mm Stereo Out
          RJ11 Connector for system-level control

          DisplayPort Video Input
          HDMI Video Input
          VGA Video Input
          3.5 mm Stereo Input
          (1) USB 2.0 type B Touchback Output | (1) USB 3.0 (bottom) + (1) USB 3.0 (side access)
          (4) USB 2.0
          DisplayPort Video Output
          3.5 mm Stereo Out
          RJ11 Connector for system-level control

          DisplayPort Video Input
          HDMI Video Input
          VGA Video Input
          3.5 mm Stereo Input
          (1) USB 2.0 type B Touchback Output | (1) USB-A
          Mini-DisplayPort Video Output
          HDMI Video Input
          USB-C with DisplayPort Input
          (4) USB-C (on display)
          RJ45 Gigabit Ethernet | |**Sensors**| (2) Passive Infrared Presence Sensors, Ambient Light Sensors | (2) Passive Infrared Presence Sensors, Ambient Light Sensors | Doppler occupancy sensor,
          Accelerometer,
          Gyroscope | |**NFC**| NFC reader | NFC reader | N/A | |**Speakers**| (2) Front-facing stereo speakers | (2) Front-facing stereo speakers | Full range front facing 3-way stereo speakers | |**Microphone**| High-Performance, 4-Element Array | High-Performance, 4-Element Array | Full band 8-element MEMS microphone array | -|**Camera**| (2) Wide angle HD cameras 1080p @ 30fps | (2) Wide angle HD cameras 1080p @ 30fps | (1) Microsoft Surface Hub 2 Camera, 4K, USB-C connection, 90-degree horizontal field of view | +|**Camera**| (2) Wide angle HD cameras 1080p @ 30 fps | (2) Wide angle HD cameras 1080p @ 30 fps | (1) Microsoft Surface Hub 2 Camera, 4K, USB-C connection, 90-degree horizontal field of view | |**Pen**| (2) Powered, active, subpixel accuracy | (2) Powered, active, subpixel accuracy | (1) Microsoft Surface Hub 2 Pen (active) | |**Physical buttons**| Power, Input Select, Volume, Brightness | Power, Input Select, Volume, Brightness | Power, Volume, Source | |**Software**| Windows 10 + Office (Word, PowerPoint, Excel) | Windows 10 + Office (Word, PowerPoint, Excel) | Windows 10 + Office (Word, PowerPoint, Excel) | From 61df6745323730860034ff56c0616feae8be62f1 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 17 Jun 2019 09:28:48 -0700 Subject: [PATCH 225/303] Monday changes --- devices/surface-hub/TOC.md | 3 ++- ...ween-surface-hub-and-windows-10-enterprise.md | 4 ++-- devices/surface-hub/surface-hub-2s-account.md | 16 ++++++++++++---- .../surface-hub-2s-deploy-checklist.md | 6 +++--- devices/surface-hub/surface-hub-2s-deploy.md | 5 ++--- .../surface-hub-2s-phone-authenticate.md | 16 ++++++++-------- .../surface-hub-2s-prepare-environment.md | 8 ++++---- .../surface-hub/surface-hub-2s-site-planning.md | 4 ++-- 8 files changed, 35 insertions(+), 27 deletions(-) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 98e7555bba..c38d17ef4f 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -5,7 +5,7 @@ ## Overview ### [What's new in Surface Hub 2S for IT admins](surface-hub-2s-whats-new.md) ### [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) -### [Managing Windows 10 Team operating system on Surface Hub ](differences-between-surface-hub-and-windows-10-enterprise.md) +### [Operating system essentials (Surface Hub) ](differences-between-surface-hub-and-windows-10-enterprise.md) ## Plan ### Surface Hub 2S Site Readiness Guide @@ -22,6 +22,7 @@ ### [Surface Hub 2S deployment checklist](surface-hub-2s-deploy-checklist.md) ### [Create Surface Hub 2S device account](surface-hub-2s-account.md) ### [Deploy Surface Hub 2S](surface-hub-2s-deploy.md) +### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md) ### [Configure Surface Hub 2S with PowerShell](surface-hub-2s-configure-with-powershell.md) ### [Configure Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) ### [Out of box startup for Surface Hub 2S](surface-hub-2s-startup.md) diff --git a/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md b/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md index a700575ff9..d611489003 100644 --- a/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md +++ b/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md @@ -1,6 +1,6 @@ --- -title: Differences between Surface Hub and Windows 10 Enterprise -description: This topic explains the differences between Windows 10 Team and Windows 10 Enterprise. +title: Operating system essentials (Surface Hub) +description: This topic explains unique aspects of the Windows 10 Team operating system and how it differs from Windows 10 Enterprise. keywords: change history ms.prod: surface-hub ms.sitesec: library diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index e1a66ba622..056e8f8b21 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -13,9 +13,9 @@ ms.localizationpriority: Normal # Create Surface Hub 2S device account -Creating a Surface Hub device account (also known as a Room mailbox) allows Surface Hub 2S to receive, approve, or decline meeting requests as well as join meetings using Microsoft Teams or Skype for Business. Configure the device account during OOBE setup. If needed you can changed it later (without going through OOBE setup). +Creating a Surface Hub device account (also known as a Room mailbox) allows Surface Hub 2S to receive, approve, or decline meeting requests as well as join meetings using Microsoft Teams or Skype for Business. You create the device account when you first start Surface Hub 2S during OOBE setup. -Unlike standard Room mailboxes that remain disabled by default, you’ll need to enable the Surface Hub 2S device account to sign on to Microsoft Teams and Skype for Business. Surface Hub 2S relies on Exchange ActiveSync, which requires an ActiveSync mailbox policy on the device account. Apply the default ActiveSync mailbox policy that comes with Exchange Online. +Unlike standard Room mailboxes that remain disabled by default, you will need to enable the Surface Hub 2S device account to sign in to Microsoft Teams and Skype for Business. Surface Hub 2S relies on Exchange ActiveSync, which requires an ActiveSync mailbox policy on the device account. Apply the default ActiveSync mailbox policy that comes with Exchange Online. Complete advanced configuration tasks using Windows PowerShell. For example: @@ -23,11 +23,11 @@ Complete advanced configuration tasks using Windows PowerShell. For example: - You will need to configure calendar processing for every Surface Hub device account using PowerShell. - If you want Surface Hub 2S to send a custom auto reply in response to scheduling requests, you’ll need to configure that using Exchange Online PowerShell. -For more information, see [Configure Surface Hub 2S accounts via PowerShell]. +For more information, see [Configure Surface Hub 2S accounts with PowerShell](surface-hub-2s-configure-with-powershell). ## Create account using Office 365 portal -1. In the Office 365 Admin portal, go to Resources and choose Rooms & Equipment. +1. In the Microsoft 365 Admin Center, go to Resources and choose Rooms & Equipment and then click +Room. 2. Provide a name and email address for the device account. Leave remaining settings unchanged in the default state. @@ -49,3 +49,11 @@ For more information, see [Configure Surface Hub 2S accounts via PowerShell]. - **Calendar:** Set **Calendar Auto processing** for this account. For more information, see [Configure Surface Hub 2S accounts via PowerShell.](devices\surface-hub\surface-hub-2s-configure-using-o365.md) + +## Room account password rotation + +You can configure Surface Hub 2S to automatically change a device account password without requiring you to manually update the device account information. + +If you turn on Password Rotation, Surface Hub 2S changes the password every 7 days. The automatically generated passwords contain 15-32 characters including a combination of uppercase and lowercase letters, numbers, and special characters. + +Passwords do not change during a meeting. If Surface Hub 2S is turned off, it attempts to change the password immediately when turned on or every 10 minutes until successful. diff --git a/devices/surface-hub/surface-hub-2s-deploy-checklist.md b/devices/surface-hub/surface-hub-2s-deploy-checklist.md index 5122533501..198329e611 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-checklist.md +++ b/devices/surface-hub/surface-hub-2s-deploy-checklist.md @@ -53,11 +53,11 @@ ms.localizationpriority: Normal | ☐ |**Microsoft Teams scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions
          - Able to join audio
          - Able to join video
          - Able to share screen || | ☐ |**Skype for Business scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions correctly
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | | ☐ |**Scheduled meeting when already invited**| - Meeting declined | | -| ☐ |**Microsoft Teams ad-hoc meeting**| - Invite other users work
          - Able to join audio
          - Able to join Video
          - Able to share screen | | +| ☐ |**Microsoft Teams ad-hoc meeting**| - Invite other users work
          - Able to join audio
          - Able to join video
          - Able to share screen | | | ☐ |**Skype for Business scheduled meeting**| - Invite other users work
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | -| ☐ |**Microsoft Whiteboard**| - Launch from start / welcome screen
          - Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | +| ☐ |**Microsoft Whiteboard**| - Launch from Welcome / Start screen
          - Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | | ☐ |**Incoming Skype/Teams call**| - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM (Skype for Business only) | | | ☐ |**Incoming live video streams**| - Maximum 2 (Skype for Business)
          - Maximum 4 (Microsoft Teams) | | | ☐ |**Microsoft Teams Mode 0 behavior**| - Skype for Business tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | | ☐ |**Microsoft Teams Mode 1 behavior**| - Teams tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | -| ☐ |**Microsoft Teams Mode 2 behavior**| - Teams tile on welcome / start screen
          - Can join scheduled Teams meetings
          - Fail to join Skype for Business meetings | | +| ☐ |**Microsoft Teams Mode 2 behavior**| - Teams tile on Welcome / Start screen
          - Can join scheduled Teams meetings
          - Fail to join Skype for Business meetings | | diff --git a/devices/surface-hub/surface-hub-2s-deploy.md b/devices/surface-hub/surface-hub-2s-deploy.md index ed48ed2546..1440a52357 100644 --- a/devices/surface-hub/surface-hub-2s-deploy.md +++ b/devices/surface-hub/surface-hub-2s-deploy.md @@ -19,13 +19,12 @@ You can use Windows Configuration Designer (WCD) to create provisioning packages ### Install Windows Configuration Designer -Install Windows Configuration Designer from the Windows Assessment and Deployment Kit (ADK) for Windows 10. Download and install the ADK for Windows 10, version 1703. +Install Windows Configuration Designer from the Windows Assessment and Deployment Kit (ADK) for Windows 10. Download and install the [ADK for Windows 10, version 1703](https://go.microsoft.com/fwlink/p/?LinkId=845542) . For more information, see [Download and install the Windows ADK](https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install) ### Add certificates You can import Certificate Authority certificates to Surface Hub 2S. -To add certificates to Surface Hub 2S, you’ll need a copy of each certificate as X.509 in .cer format. You cannot import .crt, .pfx or other container formats. -Certificates must be imported into Windows Configuration Designer and arranged by hierarchy: +To add certificates to Surface Hub 2S, you’ll need a copy of each certificate as X.509 in CER format. You cannot import CRT, PFX, or other container formats. Certificates must be imported into Windows Configuration Designer and arranged by hierarchy: ![Add certificates](images/sh2-wcd.png) diff --git a/devices/surface-hub/surface-hub-2s-phone-authenticate.md b/devices/surface-hub/surface-hub-2s-phone-authenticate.md index 9cb78f9693..05766cf0bc 100644 --- a/devices/surface-hub/surface-hub-2s-phone-authenticate.md +++ b/devices/surface-hub/surface-hub-2s-phone-authenticate.md @@ -1,6 +1,6 @@ --- title: "Configure phone authentication for Surface Hub 2S" -description: "Learn how to simplify signing into Surface Hub 2S using phone authentication." +description: "Learn how to simplify signing in to Surface Hub 2S using phone authentication." keywords: separate values with commas ms.prod: surface-hub ms.sitesec: library @@ -11,15 +11,15 @@ ms.topic: article ms.localizationpriority: Normal --- -# Configure phone authentication for Surface Hub +# Configure phone authentication for Surface Hub 2S -Phone authentication for Surface Hub simplifies signing-in to your meetings and files on Surface Hub. +Phone authentication simplifies signing-in to your meetings and files on Surface Hub 2S. ## To set up phone authentication 1. Download the [Microsoft Authenticator](https://www.microsoft.com/en-us/account/authenticator) app for iPhone or Android to your phone. -2. From your PC, go to [https://aka.ms/MFASetup](https://aka.ms/MFASetup) , sign in with your account, and click **Next.** -3. In the Additional security verification screen, select Mobile App and Use verification code, and then click Setup. +2. From your PC, go to [https://aka.ms/MFASetup](https://aka.ms/MFASetup), sign in with your account, and click **Next.** +3. In the Additional security verification screen, select **Mobile App and Use verification code**, and then click **Setup**. ## To configure mobile app @@ -28,8 +28,8 @@ Phone authentication for Surface Hub simplifies signing-in to your meetings and 3. In the Authenticator app on your phone, use the drop-down menu next to your account and select **Enable phone sign-in**. 4. If required, register your device with your organization and follow the on-screen instructions. -## To sign into Surface Hub +## To sign in to Surface Hub -1. On Surface Hub, sign into **My meetings and files** and click **Send notification** when prompted. +1. On Surface Hub, sign in to **My meetings and files** and click **Send notification** when prompted. 2. Match the number displayed on your phone with the number displayed on Surface Hub to approve your sign-in request. -3. If prompted, enter the PIN or biometric ID on your phone, to complete sign-in. +3. If prompted, enter the PIN or biometric ID on your phone. diff --git a/devices/surface-hub/surface-hub-2s-prepare-environment.md b/devices/surface-hub/surface-hub-2s-prepare-environment.md index 49f010ba94..437cceba31 100644 --- a/devices/surface-hub/surface-hub-2s-prepare-environment.md +++ b/devices/surface-hub/surface-hub-2s-prepare-environment.md @@ -19,23 +19,23 @@ You may use Exchange and Skype for Business on-premises with Surface Hub 2S. How Office 365 endpoints help optimize your network by sending all trusted Office 365 network requests directly through your firewall, bypassing all additional packet level inspection or processing. This reduces latency and your perimeter capacity requirements. -Microsoft regularly updates the Office 365 service with new features and functionality, which may alter required ports, URLs, and IP addresses. To evaluate, configure, and stay up to date with changes, subscribe to the [Office 365 IP Address and URL Web service](https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service. +Microsoft regularly updates the Office 365 service with new features and functionality, which may alter required ports, URLs, and IP addresses. To evaluate, configure, and stay up to date with changes, subscribe to the [Office 365 IP Address and URL Web service](https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service). ## Device affiliation Use Device affiliation to manage user access to the Settings app on Surface Hub 2S. -With the Windows 10 Team Edition operating system — that runs on SH2 — only authorized users can adjust settings via the settings app. Since choosing the affiliation can impact feature availability, plan appropriately to ensure users can access features as intended. +With the Windows 10 Team Edition operating system — that runs on Surface Hub 2S — only authorized users can adjust settings via the Settings app. > [!NOTE] > You can only set Device affiliation during the initial out-of-box experience (OOBE) setup. If you need to reset Device affiliation, you’ll have to repeat OOBE setup. ## No affiliation -No affiliation is like having Surface Hub 2S in a workgroup with a different local Administrator account on each Surface Hub 2S. If you choose No affiliation, you must locally save the [Bitlocker Key to a USB thumb drive](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-key-management-faq). You can still enroll the device with Intune, however only the local admin will be able to access the Settings app using the account credentials configured during OOBE. You can change the Administrator account password from the Settings app. +No affiliation is like having Surface Hub 2S in a workgroup with a different local Administrator account on each Surface Hub 2S. If you choose No affiliation, you must locally save the [Bitlocker Key to a USB thumb drive](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-key-management-faq). You can still enroll the device with Intune, however only the local admin will be able to access the Settings app using the account credentials configured during OOBE setup. You can change the Administrator account password from the Settings app. ## Active Directory Domain Services -If you affiliate Surface Hub 2S with on-premises Active Directory Domain Services, you will need to manage access to the Settings app via a security group on your domain, ensuring that all SG members have permissions to change settings on Surface Hub 2S. Note also the following: +If you affiliate Surface Hub 2S with on-premises Active Directory Domain Services, you will need to manage access to the Settings app via a security group on your domain, ensuring that all security group members have permissions to change settings on Surface Hub 2S. Note also the following: - When Surface Hub 2S affiliates with your on-premises Active Directory Domain Services, the Bitlocker key is saved in the AD Schema and can be exported to a file. - Your organization’s Trusted Root CAs are pushed to the same container in Surface Hub 2S, which means you don’t need to import them using a provisioning package. diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index 04567185cd..b6a54c87c2 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -19,9 +19,9 @@ Designed for team collaboration, Surface Hub 2S can transform the way you work ## Room considerations -Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an additional camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity table to determine if you need to plan for additional peripherals. +Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces may require peripherals such as an additional camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity table to determine if you need to plan for additional peripherals. -|**Proximity**|**Additional requirements**| +|**Proximity**|**Additional peripherals**| |:--------|:------| | 1-2 meters | None | | Up to 2.3 meters | None | From 0185f9b143ebbe9eabfc7e8f05c5908dc14a9ad0 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 12:42:08 -0400 Subject: [PATCH 226/303] chore: Renormalize line endings Ran `git add --renormalize .` --- .openpublishing.publish.config.json | 966 +- .../change-history-ms-edu-get-started.md | 88 +- .../create-tests-using-microsoft-forms.md | 66 +- .../windows/set-up-school-pcs-technical.md | 166 +- .../windows-autopilot/enrollment-status.md | 152 +- .../windows-autopilot/self-deploying.md | 142 +- .../windows-autopilot/user-driven.md | 198 +- .../windows-autopilot-requirements.md | 242 +- .../windows-autopilot-scenarios.md | 136 +- windows/eulas/index.md | 24 +- windows/privacy/TOC.md | 64 +- ...ws-diagnostic-data-in-your-organization.md | 908 +- windows/privacy/gdpr-it-guidance.md | 618 +- ...-endpoints-1709-non-enterprise-editions.md | 590 +- ...-endpoints-1803-non-enterprise-editions.md | 330 +- ...ws-personal-data-services-configuration.md | 816 +- .../wip-learning.md | 176 +- .../threat-protection/fips-140-validation.md | 14142 ++++++++-------- .../configuration-score.md | 114 +- .../configure-and-manage-tvm.md | 90 +- .../live-response-command-examples.md | 424 +- .../microsoft-defender-atp/live-response.md | 510 +- .../next-gen-threat-and-vuln-mgt.md | 136 +- .../threat-and-vuln-mgt-scenarios.md | 216 +- .../tvm-dashboard-insights.md | 154 +- ...ecurity-settings-with-tamper-protection.md | 116 +- .../windows-platform-common-criteria.md | 354 +- 27 files changed, 10969 insertions(+), 10969 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 4a01c45a31..195bd1e6bf 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -1,484 +1,484 @@ -{ - "build_entry_point": "", - "docsets_to_publish": [ - { - "docset_name": "education", - "build_source_folder": "education", - "build_output_subfolder": "education", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "hololens", - "build_source_folder": "devices/hololens", - "build_output_subfolder": "hololens", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "internet-explorer", - "build_source_folder": "browsers/internet-explorer", - "build_output_subfolder": "internet-explorer", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "keep-secure", - "build_source_folder": "windows/keep-secure", - "build_output_subfolder": "keep-secure", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "mdop", - "build_source_folder": "mdop", - "build_output_subfolder": "mdop", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "microsoft-edge", - "build_source_folder": "browsers/edge", - "build_output_subfolder": "microsoft-edge", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "release-information", - "build_source_folder": "windows/release-information", - "build_output_subfolder": "release-information", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "smb", - "build_source_folder": "smb", - "build_output_subfolder": "smb", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "store-for-business", - "build_source_folder": "store-for-business", - "build_output_subfolder": "store-for-business", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "surface", - "build_source_folder": "devices/surface", - "build_output_subfolder": "surface", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "surface-hub", - "build_source_folder": "devices/surface-hub", - "build_output_subfolder": "surface-hub", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-access-protection", - "build_source_folder": "windows/access-protection", - "build_output_subfolder": "win-access-protection", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-app-management", - "build_source_folder": "windows/application-management", - "build_output_subfolder": "win-app-management", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-client-management", - "build_source_folder": "windows/client-management", - "build_output_subfolder": "win-client-management", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-configuration", - "build_source_folder": "windows/configuration", - "build_output_subfolder": "win-configuration", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-deployment", - "build_source_folder": "windows/deployment", - "build_output_subfolder": "win-deployment", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-device-security", - "build_source_folder": "windows/device-security", - "build_output_subfolder": "win-device-security", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-configure", - "build_source_folder": "windows/configure", - "build_output_subfolder": "windows-configure", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-deploy", - "build_source_folder": "windows/deploy", - "build_output_subfolder": "windows-deploy", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-hub", - "build_source_folder": "windows/hub", - "build_output_subfolder": "windows-hub", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-manage", - "build_source_folder": "windows/manage", - "build_output_subfolder": "windows-manage", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-plan", - "build_source_folder": "windows/plan", - "build_output_subfolder": "windows-plan", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-privacy", - "build_source_folder": "windows/privacy", - "build_output_subfolder": "windows-privacy", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-security", - "build_source_folder": "windows/security", - "build_output_subfolder": "windows-security", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "windows-update", - "build_source_folder": "windows/update", - "build_output_subfolder": "windows-update", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-threat-protection", - "build_source_folder": "windows/threat-protection", - "build_output_subfolder": "win-threat-protection", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - }, - { - "docset_name": "win-whats-new", - "build_source_folder": "windows/whats-new", - "build_output_subfolder": "win-whats-new", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": true, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes" - } - ], - "notification_subscribers": [ - "elizapo@microsoft.com" - ], - "sync_notification_subscribers": [ - "daniha@microsoft.com" - ], - "branches_to_filter": [ - "" - ], - "git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs", - "git_repository_branch_open_to_public_contributors": "master", - "skip_source_output_uploading": false, - "need_preview_pull_request": true, - "resolve_user_profile_using_github": true, - "contribution_branch_mappings": {}, - "dependent_repositories": [ - { - "path_to_root": "_themes.pdf", - "url": "https://github.com/Microsoft/templates.docs.msft.pdf", - "branch": "master", - "branch_mapping": {} - }, - { - "path_to_root": "_themes", - "url": "https://github.com/Microsoft/templates.docs.msft", - "branch": "master", - "branch_mapping": {} - } - ], - "branch_target_mapping": { - "live": [ - "Publish", - "Pdf" - ], - "master": [ - "Publish", - "Pdf" - ] - }, - "need_generate_pdf_url_template": true, - "targets": { - "Pdf": { - "template_folder": "_themes.pdf" - } - }, - "need_generate_pdf": false, - "need_generate_intellisense": false +{ + "build_entry_point": "", + "docsets_to_publish": [ + { + "docset_name": "education", + "build_source_folder": "education", + "build_output_subfolder": "education", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "hololens", + "build_source_folder": "devices/hololens", + "build_output_subfolder": "hololens", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "internet-explorer", + "build_source_folder": "browsers/internet-explorer", + "build_output_subfolder": "internet-explorer", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "keep-secure", + "build_source_folder": "windows/keep-secure", + "build_output_subfolder": "keep-secure", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "mdop", + "build_source_folder": "mdop", + "build_output_subfolder": "mdop", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "microsoft-edge", + "build_source_folder": "browsers/edge", + "build_output_subfolder": "microsoft-edge", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "release-information", + "build_source_folder": "windows/release-information", + "build_output_subfolder": "release-information", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": false, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "smb", + "build_source_folder": "smb", + "build_output_subfolder": "smb", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "store-for-business", + "build_source_folder": "store-for-business", + "build_output_subfolder": "store-for-business", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "surface", + "build_source_folder": "devices/surface", + "build_output_subfolder": "surface", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "surface-hub", + "build_source_folder": "devices/surface-hub", + "build_output_subfolder": "surface-hub", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-access-protection", + "build_source_folder": "windows/access-protection", + "build_output_subfolder": "win-access-protection", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-app-management", + "build_source_folder": "windows/application-management", + "build_output_subfolder": "win-app-management", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-client-management", + "build_source_folder": "windows/client-management", + "build_output_subfolder": "win-client-management", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-configuration", + "build_source_folder": "windows/configuration", + "build_output_subfolder": "win-configuration", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-deployment", + "build_source_folder": "windows/deployment", + "build_output_subfolder": "win-deployment", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-device-security", + "build_source_folder": "windows/device-security", + "build_output_subfolder": "win-device-security", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-configure", + "build_source_folder": "windows/configure", + "build_output_subfolder": "windows-configure", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-deploy", + "build_source_folder": "windows/deploy", + "build_output_subfolder": "windows-deploy", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-hub", + "build_source_folder": "windows/hub", + "build_output_subfolder": "windows-hub", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-manage", + "build_source_folder": "windows/manage", + "build_output_subfolder": "windows-manage", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-plan", + "build_source_folder": "windows/plan", + "build_output_subfolder": "windows-plan", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-privacy", + "build_source_folder": "windows/privacy", + "build_output_subfolder": "windows-privacy", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-security", + "build_source_folder": "windows/security", + "build_output_subfolder": "windows-security", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "windows-update", + "build_source_folder": "windows/update", + "build_output_subfolder": "windows-update", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-threat-protection", + "build_source_folder": "windows/threat-protection", + "build_output_subfolder": "win-threat-protection", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + }, + { + "docset_name": "win-whats-new", + "build_source_folder": "windows/whats-new", + "build_output_subfolder": "win-whats-new", + "locale": "en-us", + "monikers": [], + "moniker_ranges": [], + "open_to_public_contributors": true, + "type_mapping": { + "Conceptual": "Content", + "ManagedReference": "Content", + "RestApi": "Content" + }, + "build_entry_point": "docs", + "template_folder": "_themes" + } + ], + "notification_subscribers": [ + "elizapo@microsoft.com" + ], + "sync_notification_subscribers": [ + "daniha@microsoft.com" + ], + "branches_to_filter": [ + "" + ], + "git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs", + "git_repository_branch_open_to_public_contributors": "master", + "skip_source_output_uploading": false, + "need_preview_pull_request": true, + "resolve_user_profile_using_github": true, + "contribution_branch_mappings": {}, + "dependent_repositories": [ + { + "path_to_root": "_themes.pdf", + "url": "https://github.com/Microsoft/templates.docs.msft.pdf", + "branch": "master", + "branch_mapping": {} + }, + { + "path_to_root": "_themes", + "url": "https://github.com/Microsoft/templates.docs.msft", + "branch": "master", + "branch_mapping": {} + } + ], + "branch_target_mapping": { + "live": [ + "Publish", + "Pdf" + ], + "master": [ + "Publish", + "Pdf" + ] + }, + "need_generate_pdf_url_template": true, + "targets": { + "Pdf": { + "template_folder": "_themes.pdf" + } + }, + "need_generate_pdf": false, + "need_generate_intellisense": false } \ No newline at end of file diff --git a/education/get-started/change-history-ms-edu-get-started.md b/education/get-started/change-history-ms-edu-get-started.md index c53e6d17a6..5273dbe9ce 100644 --- a/education/get-started/change-history-ms-edu-get-started.md +++ b/education/get-started/change-history-ms-edu-get-started.md @@ -1,44 +1,44 @@ ---- -title: Change history for Microsoft Education Get Started -description: New and changed topics in the Microsoft Education get started guide. -keywords: Microsoft Education get started guide, IT admin, IT pro, school, education, change history -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: edu -author: levinec -ms.author: ellevin -ms.date: 07/07/2017 -ms.reviewer: -manager: dansimp ---- - -# Change history for Microsoft Education Get Started - -This topic lists the changes in the Microsoft Education IT admin get started. - -## July 2017 - -| New or changed topic | Description | -| --- | ---- | -| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | Broke up the get started guide to highlight each phase in the Microsoft Education deployment and management process. | -| [Set up an Office 365 Education tenant](set-up-office365-edu-tenant.md) | New. Shows the video and step-by-step guide on how to set up an Office 365 for Education tenant. | -| [Use School Data Sync to import student data](use-school-data-sync.md) | New. Shows the video and step-by-step guide on School Data Sync and sample CSV files to import student data in a trial environment. | -| [Enable Microsoft Teams for your school](enable-microsoft-teams.md) | New. Shows how IT admins can enable and deploy Microsoft Teams in schools. | -| [Configure Microsoft Store for Education](configure-microsoft-store-for-education.md) | New. Shows the video and step-by-step guide on how to accept the services agreement and ensure your Microsoft Store account is associated with Intune for Education. | -| [Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md) | New. Shows the video and step-by-step guide on how to set up Intune for Education, buy apps from the Microsoft Store for Education, and install the apps for all users in your tenant. | -| [Set up Windows 10 education devices](set-up-windows-10-education-devices.md) | New. Shows options available to you when you need to set up new Windows 10 devices and enroll them to your education tenant. Each option contains a video and step-by-step guide. | -| [Finish Windows 10 device setup and other tasks](finish-setup-and-other-tasks.md) | New. Shows the video and step-by-step guide on how to finish preparing your Windows 10 devices for use in the classroom. | - - -## June 2017 - -| New or changed topic | Description | -| --- | ---- | -| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | Includes the following updates:

          - New configuration guidance for IT administrators to deploy Microsoft Teams.
          - Updated steps for School Data Sync to show the latest workflow and user experience.
          - Updated steps for Option 2: Try out Microsoft Education in a trial environment. You no longer need the SDS promo code to try SDS in a trial environment. | - -## May 2017 - -| New or changed topic | Description | -| --- | ---- | -| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | New. Learn how to use the new Microsoft Education system to set up a cloud infrastructure for your school, acquire devices and apps, and configure and deploy policies to your Windows 10 devices. | +--- +title: Change history for Microsoft Education Get Started +description: New and changed topics in the Microsoft Education get started guide. +keywords: Microsoft Education get started guide, IT admin, IT pro, school, education, change history +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: edu +author: levinec +ms.author: ellevin +ms.date: 07/07/2017 +ms.reviewer: +manager: dansimp +--- + +# Change history for Microsoft Education Get Started + +This topic lists the changes in the Microsoft Education IT admin get started. + +## July 2017 + +| New or changed topic | Description | +| --- | ---- | +| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | Broke up the get started guide to highlight each phase in the Microsoft Education deployment and management process. | +| [Set up an Office 365 Education tenant](set-up-office365-edu-tenant.md) | New. Shows the video and step-by-step guide on how to set up an Office 365 for Education tenant. | +| [Use School Data Sync to import student data](use-school-data-sync.md) | New. Shows the video and step-by-step guide on School Data Sync and sample CSV files to import student data in a trial environment. | +| [Enable Microsoft Teams for your school](enable-microsoft-teams.md) | New. Shows how IT admins can enable and deploy Microsoft Teams in schools. | +| [Configure Microsoft Store for Education](configure-microsoft-store-for-education.md) | New. Shows the video and step-by-step guide on how to accept the services agreement and ensure your Microsoft Store account is associated with Intune for Education. | +| [Use Intune for Education to manage groups, apps, and settings](use-intune-for-education.md) | New. Shows the video and step-by-step guide on how to set up Intune for Education, buy apps from the Microsoft Store for Education, and install the apps for all users in your tenant. | +| [Set up Windows 10 education devices](set-up-windows-10-education-devices.md) | New. Shows options available to you when you need to set up new Windows 10 devices and enroll them to your education tenant. Each option contains a video and step-by-step guide. | +| [Finish Windows 10 device setup and other tasks](finish-setup-and-other-tasks.md) | New. Shows the video and step-by-step guide on how to finish preparing your Windows 10 devices for use in the classroom. | + + +## June 2017 + +| New or changed topic | Description | +| --- | ---- | +| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | Includes the following updates:

          - New configuration guidance for IT administrators to deploy Microsoft Teams.
          - Updated steps for School Data Sync to show the latest workflow and user experience.
          - Updated steps for Option 2: Try out Microsoft Education in a trial environment. You no longer need the SDS promo code to try SDS in a trial environment. | + +## May 2017 + +| New or changed topic | Description | +| --- | ---- | +| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | New. Learn how to use the new Microsoft Education system to set up a cloud infrastructure for your school, acquire devices and apps, and configure and deploy policies to your Windows 10 devices. | diff --git a/education/windows/create-tests-using-microsoft-forms.md b/education/windows/create-tests-using-microsoft-forms.md index 356dbca7b5..3551b9aa41 100644 --- a/education/windows/create-tests-using-microsoft-forms.md +++ b/education/windows/create-tests-using-microsoft-forms.md @@ -1,33 +1,33 @@ ---- -title: Create tests using Microsoft Forms -ms.reviewer: -manager: dansimp -description: Learn how to use Microsoft Forms with the Take a Test app to prevent access to other computers or online resources while completing a test. -keywords: school, Take a Test, Microsoft Forms -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -author: levinec -ms.author: ellevin -redirect_url: https://support.microsoft.com/help/4000711/windows-10-create-tests-using-microsoft-forms ---- - -# Create tests using Microsoft Forms -**Applies to:** - -- Windows 10 - - -For schools that have an Office 365 Education subscription, teachers can use [Microsoft Forms](https://support.office.com/article/What-is-Microsoft-Forms-6b391205-523c-45d2-b53a-fc10b22017c8) to create a test and then require that students use the Take a Test app to block access to other computers or online resources while completing the test created through Microsoft Forms. - -To do this, teachers can select a check box to make it a secure test. Microsoft Forms will generate a link that you can use to embed into your OneNote or class website. When students are ready to take a test, they can click on the link to start the test. - -Microsoft Forms will perform checks to ensure students are taking the test in a locked down Take a Test session. If not, students are not permitted access to the assessment. - -[Learn how to block Internet access while students complete your form](https://support.office.com/article/6bd7e31d-5be0-47c9-a0dc-c0a74fc48959) - - -## Related topics - -[Take tests in Windows 10](take-tests-in-windows-10.md) +--- +title: Create tests using Microsoft Forms +ms.reviewer: +manager: dansimp +description: Learn how to use Microsoft Forms with the Take a Test app to prevent access to other computers or online resources while completing a test. +keywords: school, Take a Test, Microsoft Forms +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +ms.pagetype: edu +author: levinec +ms.author: ellevin +redirect_url: https://support.microsoft.com/help/4000711/windows-10-create-tests-using-microsoft-forms +--- + +# Create tests using Microsoft Forms +**Applies to:** + +- Windows 10 + + +For schools that have an Office 365 Education subscription, teachers can use [Microsoft Forms](https://support.office.com/article/What-is-Microsoft-Forms-6b391205-523c-45d2-b53a-fc10b22017c8) to create a test and then require that students use the Take a Test app to block access to other computers or online resources while completing the test created through Microsoft Forms. + +To do this, teachers can select a check box to make it a secure test. Microsoft Forms will generate a link that you can use to embed into your OneNote or class website. When students are ready to take a test, they can click on the link to start the test. + +Microsoft Forms will perform checks to ensure students are taking the test in a locked down Take a Test session. If not, students are not permitted access to the assessment. + +[Learn how to block Internet access while students complete your form](https://support.office.com/article/6bd7e31d-5be0-47c9-a0dc-c0a74fc48959) + + +## Related topics + +[Take tests in Windows 10](take-tests-in-windows-10.md) diff --git a/education/windows/set-up-school-pcs-technical.md b/education/windows/set-up-school-pcs-technical.md index 5808bdcd4d..ab45a9f0a7 100644 --- a/education/windows/set-up-school-pcs-technical.md +++ b/education/windows/set-up-school-pcs-technical.md @@ -1,84 +1,84 @@ ---- -title: Set up School PCs app technical reference overview -description: Describes the purpose of the Set up School PCs app for Windows 10 devices. -keywords: shared cart, shared PC, school, set up school pcs -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -ms.localizationpriority: medium -author: mjcaparas -ms.author: macapara -ms.date: 07/11/2018 -ms.reviewer: -manager: dansimp ---- - -What is Set up School PCs? -================================================= - -**Applies to:** - -- Windows 10 - -The **Set up School PCs** app helps you configure new Windows 10 PCs for school use. The -app, which is available for Windows 10 version 1703 and later, configures and saves -school-optimized settings, apps, and policies into a single provisioning package. You can then save the package to a USB drive and distribute it to your school PCs. - -If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up -School PCs app will create a setup file. This file joins the PC to your Azure Active Directory tenant. The app also helps set up PCs for use with or without Internet connectivity. - - -## Join PC to Azure Active Directory -If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up -School PCs app creates a setup file that joins your PC to your Azure Active -Directory tenant. - -The app also helps set up PCs for use with or without Internet connectivity. - -## List of Set up School PCs features -The following table describes the Set up School PCs app features and lists each type of Intune subscription. An X indicates that the feature is available with the specific subscription. - -| Feature | No Internet | Azure AD | Office 365 | Azure AD Premium | -|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------|----------|------------|------------------| -| **Fast sign-in** | X | X | X | X | -| Students sign in and start using the computer in under a minute, even on initial sign-in. | | | | | -| **Custom Start experience** | X | X | X | X | -| Necessary classroom apps are pinned to Start and unnecessary apps are removed. | | | | | -| **Guest account, no sign-in required** | X | X | X | X | -| Set up computers for use by anyone with or without an account. | | | | | -| **School policies** | X | X | X | X | -| Settings create a relevant, useful learning environment and optimal computer performance. | | | | | -| **Azure AD Join** | | X | X | X | -| Computers join with your existing Azure AD or Office 365 subscription for centralized management. | | | | | -| **Single sign-on to Office 365** | | | X | X | -| Students sign in with their IDs to access all Office 365 web apps or installed Office apps. | | | | | -| **Take a Test app** | | | | X | -| Administer quizzes and assessments through test providers such as Smarter Balanced. | | | | | -| [Settings roaming](https://azure.microsoft.com/documentation/articles/active-directory-windows-enterprise-state-roaming-overview/) **via Azure AD** | | | | X | -| Synchronize student and application data across devices for a personalized experience. | | | | | - +--- +title: Set up School PCs app technical reference overview +description: Describes the purpose of the Set up School PCs app for Windows 10 devices. +keywords: shared cart, shared PC, school, set up school pcs +ms.prod: w10 +ms.mktglfcycl: plan +ms.sitesec: library +ms.pagetype: edu +ms.localizationpriority: medium +author: mjcaparas +ms.author: macapara +ms.date: 07/11/2018 +ms.reviewer: +manager: dansimp +--- + +What is Set up School PCs? +================================================= + +**Applies to:** + +- Windows 10 + +The **Set up School PCs** app helps you configure new Windows 10 PCs for school use. The +app, which is available for Windows 10 version 1703 and later, configures and saves +school-optimized settings, apps, and policies into a single provisioning package. You can then save the package to a USB drive and distribute it to your school PCs. + +If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up +School PCs app will create a setup file. This file joins the PC to your Azure Active Directory tenant. The app also helps set up PCs for use with or without Internet connectivity. + + +## Join PC to Azure Active Directory +If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up +School PCs app creates a setup file that joins your PC to your Azure Active +Directory tenant. + +The app also helps set up PCs for use with or without Internet connectivity. + +## List of Set up School PCs features +The following table describes the Set up School PCs app features and lists each type of Intune subscription. An X indicates that the feature is available with the specific subscription. + +| Feature | No Internet | Azure AD | Office 365 | Azure AD Premium | +|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------|----------|------------|------------------| +| **Fast sign-in** | X | X | X | X | +| Students sign in and start using the computer in under a minute, even on initial sign-in. | | | | | +| **Custom Start experience** | X | X | X | X | +| Necessary classroom apps are pinned to Start and unnecessary apps are removed. | | | | | +| **Guest account, no sign-in required** | X | X | X | X | +| Set up computers for use by anyone with or without an account. | | | | | +| **School policies** | X | X | X | X | +| Settings create a relevant, useful learning environment and optimal computer performance. | | | | | +| **Azure AD Join** | | X | X | X | +| Computers join with your existing Azure AD or Office 365 subscription for centralized management. | | | | | +| **Single sign-on to Office 365** | | | X | X | +| Students sign in with their IDs to access all Office 365 web apps or installed Office apps. | | | | | +| **Take a Test app** | | | | X | +| Administer quizzes and assessments through test providers such as Smarter Balanced. | | | | | +| [Settings roaming](https://azure.microsoft.com/documentation/articles/active-directory-windows-enterprise-state-roaming-overview/) **via Azure AD** | | | | X | +| Synchronize student and application data across devices for a personalized experience. | | | | | + > [!NOTE] -> If your school uses Active Directory, use [Windows Configuration -> Designer](set-up-students-pcs-to-join-domain.md) -> to configure your PCs to join the domain. You can only use the Set up School -> PCs app to set up PCs that are connected to Azure AD. - - - -## Next steps -Learn more about setting up devices with the Set up School PCs app. -* [Azure AD Join with Set up School PCs](set-up-school-pcs-azure-ad-join.md) -* [Shared PC mode for schools](set-up-school-pcs-shared-pc-mode.md) -* [What's in my provisioning package](set-up-school-pcs-provisioning-package.md) -* [Set up Windows 10 devices for education](set-up-windows-10.md) - -When you're ready to create and apply your provisioning package, see [Use Set up School PCs app](use-set-up-school-pcs-app.md). - - - - - - - - +> If your school uses Active Directory, use [Windows Configuration +> Designer](set-up-students-pcs-to-join-domain.md) +> to configure your PCs to join the domain. You can only use the Set up School +> PCs app to set up PCs that are connected to Azure AD. + + + +## Next steps +Learn more about setting up devices with the Set up School PCs app. +* [Azure AD Join with Set up School PCs](set-up-school-pcs-azure-ad-join.md) +* [Shared PC mode for schools](set-up-school-pcs-shared-pc-mode.md) +* [What's in my provisioning package](set-up-school-pcs-provisioning-package.md) +* [Set up Windows 10 devices for education](set-up-windows-10.md) + +When you're ready to create and apply your provisioning package, see [Use Set up School PCs app](use-set-up-school-pcs-app.md). + + + + + + + + diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 401c84e8fe..6f995f3299 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -1,76 +1,76 @@ ---- -title: Windows Autopilot Enrollment Status page -ms.reviewer: -manager: laurawi -description: Gives an overview of the enrollment status page capabilities, configuration -keywords: Autopilot Plug and Forget, Windows 10 -ms.prod: w10 -ms.technology: Windows -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: deploy -ms.localizationpriority: medium -author: greg-lindsay -ms.author: greglin -ms.collection: M365-modern-desktop -ms.topic: article ---- - - -# Windows Autopilot Enrollment Status page - -**Applies to** - -- Windows 10 - -The Windows Autopilot Enrollment Status Page displays the status of the complete device configuration process. Incorporating feedback from customers, this provides information to the user to show that the device is being configured. The Enrollment Status Page can be also configured to prevent access to the desktop until the configuration process is complete. - - ![Enrollment status page](images/enrollment-status-page.png) - -From Windows 10 version 1803 onwards, you can opt out of the account setup phase. If it is skipped, settings will be applied for users when they access their desktop for the first time. - -## Available settings - - The following settings can be configured to customize behavior of the enrollment status page: - -
          User-driven modeRequirements and validation steps for deploying a new Azure Active Directory (AAD) joined or hybrid AAD-joined Windows 10 device are provided. -
          Self-deploying modeRequirements and validation steps for deploying a new Windows 10 device device with little to no user interaction are provided. +
          Self-deploying modeRequirements and validation steps for deploying a new Windows 10 device with little to no user interaction are provided.
          Windows Autopilot ResetUsing Windows Autopilot Reset, a device can be restored to its original settings, taking it back to a business-ready state. Both local and remote reset scenarios are discussed.
          Windows Autopilot for white glove deploymentRequirements and procedures are described that enable additional policies and apps to be delivered to a Windows Autopilot device.
          Support for existing devicesThis topic describes how Windows Autopilot can be used to convert Windows 7 or Windows 8.1 domain-joined computers to AAD-joined computers running Windows 10. From 6936486b8ec608ed7be0ef2647b25706ea41f428 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:49:39 -0400 Subject: [PATCH 210/303] typo: Double word "indicates" --- .../basic-level-windows-diagnostic-events-and-fields-1703.md | 4 ++-- .../basic-level-windows-diagnostic-events-and-fields-1709.md | 4 ++-- .../basic-level-windows-diagnostic-events-and-fields-1803.md | 4 ++-- .../basic-level-windows-diagnostic-events-and-fields-1809.md | 4 ++-- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 4 ++-- 5 files changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 4b6a124ff2..a33c69f537 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -342,7 +342,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove -This event indicates Indicates that the DecisionApplicationFile object is no longer present. +This event indicates that the DecisionApplicationFile object is no longer present. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -678,7 +678,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. +This event indicates that a new set of InventoryApplicationFileAdd events will be sent. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index a88ae5d6a4..7d2dd9147e 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -362,7 +362,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove -This event indicates Indicates that the DecisionApplicationFile object is no longer present. +This event indicates that the DecisionApplicationFile object is no longer present. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -710,7 +710,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. +This event indicates that a new set of InventoryApplicationFileAdd events will be sent. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index ac8f4d3e3c..31f8fd3917 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -396,7 +396,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove -This event indicates Indicates that the DecisionApplicationFile object is no longer present. +This event indicates that the DecisionApplicationFile object is no longer present. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -747,7 +747,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. +This event indicates that a new set of InventoryApplicationFileAdd events will be sent. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 765419c245..bb6351d8e9 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -821,7 +821,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove -This event indicates Indicates that the DecisionApplicationFile object is no longer present. +This event indicates that the DecisionApplicationFile object is no longer present. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -1173,7 +1173,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. +This event indicates that a new set of InventoryApplicationFileAdd events will be sent. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 9f8a2900c9..fe781cbc1f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -681,7 +681,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.DecisionApplicationFileRemove -This event indicates Indicates that the DecisionApplicationFile object is no longer present. +This event indicates that the DecisionApplicationFile object is no longer present. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). @@ -1000,7 +1000,7 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.InventoryApplicationFileStartSync -This event indicates indicates that a new set of InventoryApplicationFileAdd events will be sent. +This event indicates that a new set of InventoryApplicationFileAdd events will be sent. This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). From 18eb007eaf7d9082d0cf0ecae1bb7614cfa94b65 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:51:50 -0400 Subject: [PATCH 211/303] typo: Double word "used" --- .../basic-level-windows-diagnostic-events-and-fields-1703.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1709.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1803.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1809.md | 2 +- .../basic-level-windows-diagnostic-events-and-fields-1903.md | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md index 4b6a124ff2..f674054efc 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -5029,7 +5029,7 @@ The following fields are available: - **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. - **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. - **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. - **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). - **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md index a88ae5d6a4..0fea226551 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709.md @@ -5274,7 +5274,7 @@ The following fields are available: - **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. - **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. - **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. - **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). - **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md index ac8f4d3e3c..6600d7e153 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1803.md @@ -6041,7 +6041,7 @@ The following fields are available: - **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. - **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. - **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. - **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). - **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 765419c245..7b8bf37fe1 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -6512,7 +6512,7 @@ The following fields are available: - **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. - **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. - **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. - **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). - **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md index 9f8a2900c9..52d9977e7f 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903.md @@ -6285,7 +6285,7 @@ The following fields are available: - **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim. - **Setup360Extended** Detailed information about the phase/action when the potential failure occurred. - **Setup360Mode** The phase of Setup360. Example: Predownload, Install, Finalize, Rollback. -- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors. +- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors. - **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT. - **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS). - **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled. From 8a80b594136718d7c3317a1530697ffe60711ccf Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Mon, 17 Jun 2019 00:53:27 -0400 Subject: [PATCH 212/303] typo: Double word "how" --- windows/release-information/windows-message-center.yml | 2 +- .../microsoft-defender-atp/overview-custom-detections.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 9619ecc9de..92d6817a3d 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -107,7 +107,7 @@ If you are still unable to connect to Windows Update services due to this proble
          Driver quality in the Windows ecosystem
          Ensuring Windows 10 works great with all the devices and accessories our customers use is a top priority. We work closely with this broad mix of partners to test new drivers, monitor health characteristics over time, and make Windows and our ecosystem more resilient architecturally. Our goal is to ensure that all the updates and drivers we deliver to non-Insider populations are validated and at production quality (including monthly optional releases) before pushing drivers broadly to all. Explore the driver distribution chain and learn how we measure driver quality and prevent conflicts.
          December 19, 2018
          10:04 AM PT
          Introducing the Modern Desktop podcast series
          In this new podcast series, we'll explore the good, the bad, and, yes, the ugly of servicing and delivery for Windows 10 and Office 365 ProPlus. We'll talk about modern desktop management through Enterprise Mobility, security, and cloud-attached and co-managed environments. Listen to the first episode, in which we discuss monthly quality updates fpr Windows 10, the Microsoft 365 Stay Current pilot program, and interview a real customer to see how they ingest monthly updates in their organization.
          December 18, 2018
          01:00 PM PT
          Measuring Delivery Optimization and its impact to your network
          If you've familiarized yourself with the configuration options for Delivery Optimization in Windows 10, and have started to configure the settings you feel will be the best fit for your organization’s network topology, now is the time to see how well those settings are working. This article provides tips on how evaluate performance at the device level or organization level.
          December 13, 2018
          03:48 PM PT
          Windows monthly security and quality updates overview
          Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort.
          December 10, 2018
          10:00 AM PT
          Windows monthly security and quality updates overview
          Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort.
          December 10, 2018
          10:00 AM PT
          LTSC: What is it, and when should it be used?
          With the Semi-Annual Channel, devices receive two feature updates per year, and benefit from the best performance, user experience, security, and stability. This servicing option continues to be our recommendation for managing Windows 10 updates; however, we acknowledge that certain devices and use cases (e.g. medical systems and industrial process controllers) dictate that functionality and features don’t change over time. Find out how we designed the Long-Term Servicing Channel (LTSC) with these types of use cases in mind, and what is offered through the LTSC.
          November 29, 2018
          07:02 PM PT
          Plan for change: Local Experience Packs: What are they and when should you use them?
          When we released Windows 10, version 1803, we introduced Local Experience Packs (LXPs), which are modern language packs delivered through the Microsoft Store or Microsoft Store for Business. Learn about the biggest advantage to LXPs, and the retirement of legacy language packs (lp.cab) for all Language Interface Packs (LIP).
          November 14, 2018
          11:10 AM PT
          Windows 10 Quality approach for a complex ecosystem
          While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases.
          November 13, 2018
          10:00 AM PT
          -
          SettingYesNo -
          Show app and profile installation progressThe enrollment status page is displayed.The enrollment status page is not displayed. -
          Block device use until all apps and profiles are installedThe settings in this table are made available to customize behavior of the enrollment status page, so that the user can address potential installation issues. -The enrollment status page is displayed with no additional options to address installation failures. -
          Allow users to reset device if installation error occursA Reset device button is displayed if there is an installation failure.The Reset device button is not displayed if there is an installation failure. -
          Allow users to use device if installation error occursA Continue anyway button is displayed if there is an installation failure.The Continue anyway button is not displayed if there is an installation failure. -
          Show error when installation takes longer than specified number of minutesSpecify the number of minutes to wait for installation to complete. A default value of 60 minutes is entered. -
          Show custom message when an error occursA text box is provided where you can specify a custom message to display in case of an installation error.The default message is displayed:
          Oh no! Something didn't do what it was supposed to. Please contact your IT department. -
          Allow users to collect logs about installation errorsIf there is an installation error, a Collect logs button is displayed.
          If the user clicks this button they are asked to choose a location to save the log file MDMDiagReport.cab
          The Collect logs button is not displayed if there is an installation error. -
          Block device use until these required apps are installed if they are assigned to the user/deviceChoose All or Selected.

          If Selected is chosen, a Select apps button is displayed that enables you to choose which apps must be installed prior to enabling device use. -
          - -See the following example: - - ![Enrollment status page settings](images/esp-settings.png) - -## Installation progress tracking - -The Enrollment Status page tracks a subset of the available MDM CSP policies that are delivered to the device as part of the complete device configuration process. The specific types of policies that are tracked include: - -- Certain types of app installations. - - Enterprise modern apps (Appx/MSIX) installed by the [Enterprise Modern App Managment CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisemodernappmanagement-csp). - - Enterprise desktop apps (single-file MSIs) installed by the [Enterprise Desktop App Management CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisedesktopappmanagement-csp). -- Certain device configuration policies. - -The following types of policies and installations are not tracked: - -- Intune Management Extensions PowerShell scripts -- Office 365 ProPlus installations** -- System Center Configuration Manager apps, packages, and task sequences - -**The ability to track Office 365 ProPlus installations was added with Windows 10, version 1809.
          - -## More information - -For more information on configuring the Enrollment Status page, see the [Microsoft Intune documentation](https://docs.microsoft.com/intune/windows-enrollment-status).
          -For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP documentation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).
          -For more information about blocking for app installation: -- [Blocking for app installation using Enrollment Status Page](https://blogs.technet.microsoft.com/mniehaus/2018/12/06/blocking-for-app-installation-using-enrollment-status-page/). -- [Support Tip: Office C2R installation is now tracked during ESP](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-Tip-Office-C2R-installation-is-now-tracked-during-ESP/ba-p/295514). +--- +title: Windows Autopilot Enrollment Status page +ms.reviewer: +manager: laurawi +description: Gives an overview of the enrollment status page capabilities, configuration +keywords: Autopilot Plug and Forget, Windows 10 +ms.prod: w10 +ms.technology: Windows +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +ms.localizationpriority: medium +author: greg-lindsay +ms.author: greglin +ms.collection: M365-modern-desktop +ms.topic: article +--- + + +# Windows Autopilot Enrollment Status page + +**Applies to** + +- Windows 10 + +The Windows Autopilot Enrollment Status Page displays the status of the complete device configuration process. Incorporating feedback from customers, this provides information to the user to show that the device is being configured. The Enrollment Status Page can be also configured to prevent access to the desktop until the configuration process is complete. + + ![Enrollment status page](images/enrollment-status-page.png) + +From Windows 10 version 1803 onwards, you can opt out of the account setup phase. If it is skipped, settings will be applied for users when they access their desktop for the first time. + +## Available settings + + The following settings can be configured to customize behavior of the enrollment status page: + + +
          SettingYesNo +
          Show app and profile installation progressThe enrollment status page is displayed.The enrollment status page is not displayed. +
          Block device use until all apps and profiles are installedThe settings in this table are made available to customize behavior of the enrollment status page, so that the user can address potential installation issues. +The enrollment status page is displayed with no additional options to address installation failures. +
          Allow users to reset device if installation error occursA Reset device button is displayed if there is an installation failure.The Reset device button is not displayed if there is an installation failure. +
          Allow users to use device if installation error occursA Continue anyway button is displayed if there is an installation failure.The Continue anyway button is not displayed if there is an installation failure. +
          Show error when installation takes longer than specified number of minutesSpecify the number of minutes to wait for installation to complete. A default value of 60 minutes is entered. +
          Show custom message when an error occursA text box is provided where you can specify a custom message to display in case of an installation error.The default message is displayed:
          Oh no! Something didn't do what it was supposed to. Please contact your IT department. +
          Allow users to collect logs about installation errorsIf there is an installation error, a Collect logs button is displayed.
          If the user clicks this button they are asked to choose a location to save the log file MDMDiagReport.cab
          The Collect logs button is not displayed if there is an installation error. +
          Block device use until these required apps are installed if they are assigned to the user/deviceChoose All or Selected.

          If Selected is chosen, a Select apps button is displayed that enables you to choose which apps must be installed prior to enabling device use. +
          + +See the following example: + + ![Enrollment status page settings](images/esp-settings.png) + +## Installation progress tracking + +The Enrollment Status page tracks a subset of the available MDM CSP policies that are delivered to the device as part of the complete device configuration process. The specific types of policies that are tracked include: + +- Certain types of app installations. + - Enterprise modern apps (Appx/MSIX) installed by the [Enterprise Modern App Managment CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisemodernappmanagement-csp). + - Enterprise desktop apps (single-file MSIs) installed by the [Enterprise Desktop App Management CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisedesktopappmanagement-csp). +- Certain device configuration policies. + +The following types of policies and installations are not tracked: + +- Intune Management Extensions PowerShell scripts +- Office 365 ProPlus installations** +- System Center Configuration Manager apps, packages, and task sequences + +**The ability to track Office 365 ProPlus installations was added with Windows 10, version 1809.
          + +## More information + +For more information on configuring the Enrollment Status page, see the [Microsoft Intune documentation](https://docs.microsoft.com/intune/windows-enrollment-status).
          +For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP documentation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).
          +For more information about blocking for app installation: +- [Blocking for app installation using Enrollment Status Page](https://blogs.technet.microsoft.com/mniehaus/2018/12/06/blocking-for-app-installation-using-enrollment-status-page/). +- [Support Tip: Office C2R installation is now tracked during ESP](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-Tip-Office-C2R-installation-is-now-tracked-during-ESP/ba-p/295514). diff --git a/windows/deployment/windows-autopilot/self-deploying.md b/windows/deployment/windows-autopilot/self-deploying.md index e2fb1ecaa1..bcddf84201 100644 --- a/windows/deployment/windows-autopilot/self-deploying.md +++ b/windows/deployment/windows-autopilot/self-deploying.md @@ -1,71 +1,71 @@ ---- -title: Windows Autopilot Self-Deploying mode (Preview) -description: Windows Autopilot deployment -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune -ms.reviewer: mniehaus -manager: laurawi -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.sitesec: library -ms.pagetype: deploy -author: greg-lindsay -ms.author: greglin -ms.collection: M365-modern-desktop -ms.topic: article ---- - - -# Windows Autopilot Self-Deploying mode - -**Applies to: Windows 10, version 1809 or later** - -Windows Autopilot self-deploying mode enables a device to be deployed with little to no user interaction. For devices with an Ethernet connection, no user interaction is required; for devices connected via Wi-fi, no interaction is required after making the Wi-fi connection (choosing the language, locale, and keyboard, then making a network connection). - -Self-deploying mode joins the device into Azure Active Directory, enrolls the device in Intune (or another MDM service) leveraging Azure AD for automatic MDM enrollment, and ensures that all policies, applications, certificates, and networking profiles are provisioned on the device, leveraging the enrollment status page to prevent access to the desktop until the device is fully provisioned. - ->[!NOTE] ->Self-deploying mode does not support Active Directory Join or Hybrid Azure AD Join. All devices will be joined to Azure Active Directory. - -Self-deploying mode is designed to deploy Windows 10 as a kiosk, digital signage device, or a shared device. When setting up a kiosk, you can leverage the new Kiosk Browser, an app built on Microsoft Edge that can be used to create a tailored, MDM-managed browsing experience. When combined with MDM policies to create a local account and configure it to automatically log on, the complete configuration of the device can be automated. Find out more about these options by reading simplifying kiosk management for IT with Windows 10. See [Set up a kiosk or digital sign in Intune or other MDM service](https://docs.microsoft.com/windows/configuration/setup-kiosk-digital-signage#set-up-a-kiosk-or-digital-sign-in-intune-or-other-mdm-service) for additional details. - ->[!NOTE] ->Self-deploying mode does not presently associate a user with the device (since no user ID or password is specified as part of the process). As a result, some Azure AD and Intune capabilities (such as BitLocker recovery, installation of apps from the Company Portal, or Conditional Access) may not be available to a user that signs into the device. - -![The user experience with Windows Autopilot self-deploying mode](images/self-deploy-welcome.png) - -## Requirements - -Because self-deploying mode uses a device’s TPM 2.0 hardware to authenticate the device into an organization’s Azure AD tenant, devices without TPM 2.0 cannot be used with this mode. The devices must also support TPM device attestation. (All newly-manufactured Windows devices should meet these requirements.) - ->[!NOTE] ->If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error. (Hyper-V virtual TPMs are not supported.) - -In order to display an organization-specific logo and organization name during the Autopilot process, Azure Active Directory Company Branding needs to be configured with the images and text that should be displayed. See [Quickstart: Add company branding to your sign-in page in Azure AD](https://docs.microsoft.com/azure/active-directory/fundamentals/customize-branding) for more details. - -## Step by step - -In order to perform a self-deploying mode deployment using Windows Autopilot, the following preparation steps need to be completed: - -- Create an Autopilot profile for self-deploying mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. (Note that it is not possible to create a profile in the Microsoft Store for Business or Partner Center for self-deploying mode.) -- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group. Ensure that the profile has been assigned to the device before attempting to deploy that device. -- Boot the device, connecting it to Wi-fi if required, then wait for the provisioning process to complete. - -## Validation - -When performing a self-deploying mode deployment using Windows Autopilot, the following end-user experience should be observed: - -- Once connected to a network, the Autopilot profile will be downloaded. -- If the Autopilot profile has been configured to automatically configure the language, locale, and keyboard layout, these OOBE screens should be skipped as long as Ethernet connectivity is available. Otherwise, manual steps are required: - - If multiple languages are preinstalled in Windows 10, the user must pick a language. - - The user must pick a locale and a keyboard layout, and optionally a second keyboard layout. -- If connected via Ethernet, no network prompt is expected. If no Ethernet connection is available and Wi-fi is built in, the user needs to connect to a wireless network. -- Windows 10 will check for critical OOBE updates, and if any are available they will be automatically installed (rebooting if required). -- The device will join Azure Active Directory. -- After joining Azure Active Directory, the device will enroll in Intune (or other configured MDM services). -- The [enrollment status page](enrollment-status.md) will be displayed. -- Depending on the device settings deployed, the device will either: - - Remain at the logon screen, where any member of the organization can log on by specifying their Azure AD credentials. - - Automatically sign in as a local account, for devices configured as a kiosk or digital signage. - -In case the observed results do not match these expectations, consult the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation. +--- +title: Windows Autopilot Self-Deploying mode (Preview) +description: Windows Autopilot deployment +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.reviewer: mniehaus +manager: laurawi +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.sitesec: library +ms.pagetype: deploy +author: greg-lindsay +ms.author: greglin +ms.collection: M365-modern-desktop +ms.topic: article +--- + + +# Windows Autopilot Self-Deploying mode + +**Applies to: Windows 10, version 1809 or later** + +Windows Autopilot self-deploying mode enables a device to be deployed with little to no user interaction. For devices with an Ethernet connection, no user interaction is required; for devices connected via Wi-fi, no interaction is required after making the Wi-fi connection (choosing the language, locale, and keyboard, then making a network connection). + +Self-deploying mode joins the device into Azure Active Directory, enrolls the device in Intune (or another MDM service) leveraging Azure AD for automatic MDM enrollment, and ensures that all policies, applications, certificates, and networking profiles are provisioned on the device, leveraging the enrollment status page to prevent access to the desktop until the device is fully provisioned. + +>[!NOTE] +>Self-deploying mode does not support Active Directory Join or Hybrid Azure AD Join. All devices will be joined to Azure Active Directory. + +Self-deploying mode is designed to deploy Windows 10 as a kiosk, digital signage device, or a shared device. When setting up a kiosk, you can leverage the new Kiosk Browser, an app built on Microsoft Edge that can be used to create a tailored, MDM-managed browsing experience. When combined with MDM policies to create a local account and configure it to automatically log on, the complete configuration of the device can be automated. Find out more about these options by reading simplifying kiosk management for IT with Windows 10. See [Set up a kiosk or digital sign in Intune or other MDM service](https://docs.microsoft.com/windows/configuration/setup-kiosk-digital-signage#set-up-a-kiosk-or-digital-sign-in-intune-or-other-mdm-service) for additional details. + +>[!NOTE] +>Self-deploying mode does not presently associate a user with the device (since no user ID or password is specified as part of the process). As a result, some Azure AD and Intune capabilities (such as BitLocker recovery, installation of apps from the Company Portal, or Conditional Access) may not be available to a user that signs into the device. + +![The user experience with Windows Autopilot self-deploying mode](images/self-deploy-welcome.png) + +## Requirements + +Because self-deploying mode uses a device’s TPM 2.0 hardware to authenticate the device into an organization’s Azure AD tenant, devices without TPM 2.0 cannot be used with this mode. The devices must also support TPM device attestation. (All newly-manufactured Windows devices should meet these requirements.) + +>[!NOTE] +>If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error. (Hyper-V virtual TPMs are not supported.) + +In order to display an organization-specific logo and organization name during the Autopilot process, Azure Active Directory Company Branding needs to be configured with the images and text that should be displayed. See [Quickstart: Add company branding to your sign-in page in Azure AD](https://docs.microsoft.com/azure/active-directory/fundamentals/customize-branding) for more details. + +## Step by step + +In order to perform a self-deploying mode deployment using Windows Autopilot, the following preparation steps need to be completed: + +- Create an Autopilot profile for self-deploying mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. (Note that it is not possible to create a profile in the Microsoft Store for Business or Partner Center for self-deploying mode.) +- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group. Ensure that the profile has been assigned to the device before attempting to deploy that device. +- Boot the device, connecting it to Wi-fi if required, then wait for the provisioning process to complete. + +## Validation + +When performing a self-deploying mode deployment using Windows Autopilot, the following end-user experience should be observed: + +- Once connected to a network, the Autopilot profile will be downloaded. +- If the Autopilot profile has been configured to automatically configure the language, locale, and keyboard layout, these OOBE screens should be skipped as long as Ethernet connectivity is available. Otherwise, manual steps are required: + - If multiple languages are preinstalled in Windows 10, the user must pick a language. + - The user must pick a locale and a keyboard layout, and optionally a second keyboard layout. +- If connected via Ethernet, no network prompt is expected. If no Ethernet connection is available and Wi-fi is built in, the user needs to connect to a wireless network. +- Windows 10 will check for critical OOBE updates, and if any are available they will be automatically installed (rebooting if required). +- The device will join Azure Active Directory. +- After joining Azure Active Directory, the device will enroll in Intune (or other configured MDM services). +- The [enrollment status page](enrollment-status.md) will be displayed. +- Depending on the device settings deployed, the device will either: + - Remain at the logon screen, where any member of the organization can log on by specifying their Azure AD credentials. + - Automatically sign in as a local account, for devices configured as a kiosk or digital signage. + +In case the observed results do not match these expectations, consult the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation. diff --git a/windows/deployment/windows-autopilot/user-driven.md b/windows/deployment/windows-autopilot/user-driven.md index 0b60714d75..cce649aaf6 100644 --- a/windows/deployment/windows-autopilot/user-driven.md +++ b/windows/deployment/windows-autopilot/user-driven.md @@ -1,99 +1,99 @@ ---- -title: Windows Autopilot User-Driven Mode -description: Windows Autopilot deployment -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune -ms.reviewer: mniehaus -manager: laurawi -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.sitesec: library -ms.pagetype: deploy -author: greg-lindsay -ms.author: greglin -ms.collection: M365-modern-desktop -ms.topic: article ---- - - -# Windows Autopilot user-driven mode - -Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions: - -- Unbox the device, plug it in, and turn it on. -- Choose a language, locale and keyboard. -- Connect it to a wireless or wired network with internet access. -- Specify your e-mail address and password for your organization account. - -After completing those simple steps, the remainder of the process is completely automated, with the device being joined to the organization, enrolled in Intune (or another MDM service), and fully configured as defined by the organization. Any additional prompts during the Out-of-Box Experience (OOBE) can be supressed; see [Configuring Autopilot Profiles](profiles.md) for options that are available. - -Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options. - -## Available user-driven modes - -The following options are available for user-driven deployment: - -- [Azure Active Directory join](#user-driven-mode-for-azure-active-directory-join) is available if devices do not need to be joined to an on-prem Active Directory domain. -- [Hybrid Azure Active Directory join](#user-driven-mode-for-hybrid-azure-active-directory-join) is available for devices that must be joined to both Azure Active Directory and your on-prem Active Directory domain. - -### User-driven mode for Azure Active Directory join - -In order to perform a user-driven deployment using Windows Autopilot, the following preparation steps need to be completed: - -- Ensure that the users who will be performing user-driven mode deployments are able to join devices to Azure Active Directory. See [Configure device settings](https://docs.microsoft.com/azure/active-directory/device-management-azure-portal#configure-device-settings) in the Azure Active Directory documentation for more information. -- Create an Autopilot profile for user-driven mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. With Microsoft Store for Business and Partner Center, user-driven mode is the default and does not need to be selected. -- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group. - -For each device that will be deployed using user-driven deployment, these additional steps are needed: - -- Ensure that the device has been added to Windows Autopilot. This can be done automatically by an OEM or partner at the time the device is purchased, or it can be done through a manual harvesting process later. See [Adding devices to Windows Autopilot](add-devices.md) for more information. -- Ensure an Autopilot profile has been assigned to the device: - - If using Intune and Azure Active Directory dynamic device groups, this can be done automatically. - - If using Intune and Azure Active Directory static device groups, manually add the device to the device group. - - If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device. - -Also see the [Validation](#validation) section below. - -### User-driven mode for hybrid Azure Active Directory join - -Windows Autopilot requires that devices be Azure Active Directory joined. If you have an on-premises Active Directory environment and want to also join devices to your on-premises domain, you can accomplish this by configuring Autopilot devices to be [hybrid Azure Active Directory (AAD) joined](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan). - -#### Requirements - -To perform a user-driven hybrid AAD joined deployment using Windows Autopilot: - -- A Windows Autopilot profile for user-driven mode must be created and - - **Hybrid Azure AD joined** must be specified as the selected option under **Join to Azure AD as** in the Autopilot profile. -- If using Intune, a device group in Azure Active Directory must exist with the Windows Autopilot profile assigned to that group. -- The device must be running Windows 10, version 1809 or later. -- The device must be able to access an Active Directory domain controller, so it must be connected to the organization's network (where it can resolve the DNS records for the AD domain and the AD domain controller, and communicate with the domain controller to authenticate the user). -- The device must be able to access the Internet, following the [documented Windows Autopilot network requirements](windows-autopilot-requirements.md). -- The Intune Connector for Active Directory must be installed. - - Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf. -- If using Proxy, WPAD Proxy settings option must be enabled and configured. - -**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default. - -#### Step by step instructions - -See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid). - -Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic. - -## Validation - -When performing a user-driven deployment using Windows Autopilot, the following end-user experience should be observed: - -- If multiple languages are preinstalled in Windows 10, the user must pick a language. -- The user must pick a locale and a keyboard layout, and optionally a second keyboard layout. -- If connected via Ethernet, no network prompt is expected. If no Ethernet connection is available and Wi-fi is built in, the user needs to connect to a wireless network. -- Once connected to a network, the Autopilot profile will be downloaded. -- Windows 10 will check for critical OOBE updates, and if any are available they will be automatically installed (rebooting if required). -- The user will be prompted for Azure Active Directory credentials, with a customized user experience showing the Azure AD tenant name, logo, and sign-in text. -- Once correct credentials have been entered, the device will join Azure Active Directory. -- After joining Azure Active Directory, the device will enroll in Intune (or other configured MDM services). -- If configured, the [enrollment status page](enrollment-status.md) will be displayed. -- Once the device configuration tasks have completed, the user will be signed into Windows 10 using the credentials they previously provided. -- Once signed in, the enrollment status page will again be displayed for user-targeted configuration tasks. - -In case the observed results do not match these expectations, consult the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation. +--- +title: Windows Autopilot User-Driven Mode +description: Windows Autopilot deployment +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.reviewer: mniehaus +manager: laurawi +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.sitesec: library +ms.pagetype: deploy +author: greg-lindsay +ms.author: greglin +ms.collection: M365-modern-desktop +ms.topic: article +--- + + +# Windows Autopilot user-driven mode + +Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions: + +- Unbox the device, plug it in, and turn it on. +- Choose a language, locale and keyboard. +- Connect it to a wireless or wired network with internet access. +- Specify your e-mail address and password for your organization account. + +After completing those simple steps, the remainder of the process is completely automated, with the device being joined to the organization, enrolled in Intune (or another MDM service), and fully configured as defined by the organization. Any additional prompts during the Out-of-Box Experience (OOBE) can be supressed; see [Configuring Autopilot Profiles](profiles.md) for options that are available. + +Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options. + +## Available user-driven modes + +The following options are available for user-driven deployment: + +- [Azure Active Directory join](#user-driven-mode-for-azure-active-directory-join) is available if devices do not need to be joined to an on-prem Active Directory domain. +- [Hybrid Azure Active Directory join](#user-driven-mode-for-hybrid-azure-active-directory-join) is available for devices that must be joined to both Azure Active Directory and your on-prem Active Directory domain. + +### User-driven mode for Azure Active Directory join + +In order to perform a user-driven deployment using Windows Autopilot, the following preparation steps need to be completed: + +- Ensure that the users who will be performing user-driven mode deployments are able to join devices to Azure Active Directory. See [Configure device settings](https://docs.microsoft.com/azure/active-directory/device-management-azure-portal#configure-device-settings) in the Azure Active Directory documentation for more information. +- Create an Autopilot profile for user-driven mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. With Microsoft Store for Business and Partner Center, user-driven mode is the default and does not need to be selected. +- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group. + +For each device that will be deployed using user-driven deployment, these additional steps are needed: + +- Ensure that the device has been added to Windows Autopilot. This can be done automatically by an OEM or partner at the time the device is purchased, or it can be done through a manual harvesting process later. See [Adding devices to Windows Autopilot](add-devices.md) for more information. +- Ensure an Autopilot profile has been assigned to the device: + - If using Intune and Azure Active Directory dynamic device groups, this can be done automatically. + - If using Intune and Azure Active Directory static device groups, manually add the device to the device group. + - If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device. + +Also see the [Validation](#validation) section below. + +### User-driven mode for hybrid Azure Active Directory join + +Windows Autopilot requires that devices be Azure Active Directory joined. If you have an on-premises Active Directory environment and want to also join devices to your on-premises domain, you can accomplish this by configuring Autopilot devices to be [hybrid Azure Active Directory (AAD) joined](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan). + +#### Requirements + +To perform a user-driven hybrid AAD joined deployment using Windows Autopilot: + +- A Windows Autopilot profile for user-driven mode must be created and + - **Hybrid Azure AD joined** must be specified as the selected option under **Join to Azure AD as** in the Autopilot profile. +- If using Intune, a device group in Azure Active Directory must exist with the Windows Autopilot profile assigned to that group. +- The device must be running Windows 10, version 1809 or later. +- The device must be able to access an Active Directory domain controller, so it must be connected to the organization's network (where it can resolve the DNS records for the AD domain and the AD domain controller, and communicate with the domain controller to authenticate the user). +- The device must be able to access the Internet, following the [documented Windows Autopilot network requirements](windows-autopilot-requirements.md). +- The Intune Connector for Active Directory must be installed. + - Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf. +- If using Proxy, WPAD Proxy settings option must be enabled and configured. + +**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default. + +#### Step by step instructions + +See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid). + +Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic. + +## Validation + +When performing a user-driven deployment using Windows Autopilot, the following end-user experience should be observed: + +- If multiple languages are preinstalled in Windows 10, the user must pick a language. +- The user must pick a locale and a keyboard layout, and optionally a second keyboard layout. +- If connected via Ethernet, no network prompt is expected. If no Ethernet connection is available and Wi-fi is built in, the user needs to connect to a wireless network. +- Once connected to a network, the Autopilot profile will be downloaded. +- Windows 10 will check for critical OOBE updates, and if any are available they will be automatically installed (rebooting if required). +- The user will be prompted for Azure Active Directory credentials, with a customized user experience showing the Azure AD tenant name, logo, and sign-in text. +- Once correct credentials have been entered, the device will join Azure Active Directory. +- After joining Azure Active Directory, the device will enroll in Intune (or other configured MDM services). +- If configured, the [enrollment status page](enrollment-status.md) will be displayed. +- Once the device configuration tasks have completed, the user will be signed into Windows 10 using the credentials they previously provided. +- Once signed in, the enrollment status page will again be displayed for user-targeted configuration tasks. + +In case the observed results do not match these expectations, consult the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation. diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index ac1c72cda0..5ef4bd2feb 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -1,121 +1,121 @@ ---- -title: Windows Autopilot requirements -ms.reviewer: -manager: laurawi -description: Windows Autopilot deployment -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.sitesec: library -ms.pagetype: deploy -author: greg-lindsay -ms.author: greglin -ms.collection: M365-modern-desktop -ms.topic: article ---- - - -# Windows Autopilot requirements - -**Applies to: Windows 10** - -Windows Autopilot depends on specific capabilities available in Windows 10, Azure Active Directory, and MDM services such as Microsoft Intune. In order to use Windows Autopilot and leverage these capabilities, some requirements must be met. - -**Note**: For a list of OEMs that currently support Windows Autopilot, see the Participant device manufacturers section at [Windows Autopilot](https://aka.ms/windowsautopilot). - -## Software requirements - -- Windows 10 version 1703 (semi-annual channel) or higher is required. -- The following editions are supported: - - Windows 10 Pro - - Windows 10 Pro Education - - Windows 10 Pro for Workstations - - Windows 10 Enterprise - - Windows 10 Education - - Windows 10 Enterprise 2019 LTSC - -## Networking requirements - -Windows Autopilot depends on a variety of internet-based services. Access to these services must be provided for Autopilot to function properly. In the simplest case, enabling proper functionality can be achieved by ensuring the following: - -- Ensure DNS name resolution for internet DNS names -- Allow access to all hosts via port 80 (HTTP), 443 (HTTPS), and 123 (UDP/NTP) - -In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the required services. For additional details about each of these services and their specific requirements, review the following details: - -
          ServiceInformation -
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
          - -For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about problems that might occur when you connect to the Internet through a proxy server. -
          Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information. -
          IntuneOnce authenticated, Azure Active Directory will trigger enrollment of the device into the Intune MDM service. See the following link for details about network communication requirements: Intune network configuration requirements and bandwidth. -
          Windows UpdateDuring the OOBE process, as well as after the Windows 10 OS is fully configured, the Windows Update service is leveraged to retrieve needed updates. If there are problems connecting to Windows Update, see How to solve connection problems concerning Windows Update or Microsoft Update.
          - -If Windows Update is inaccessible, the AutoPilot process will still continue but critical updates will not be available. - -
          Delivery OptimizationWhen downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps, the Delivery Optimization service is contacted to enable peer-to-peer sharing of content so that only a few devices need to download it from the internet.
          - -If the Delivery Optimization Service is inaccessible, the AutoPilot process will still continue with Delivery Optimization downloads from the cloud (without peer-to-peer). - -
          Network Time Protocol (NTP) SyncWhen a Windows device starts up, it will talk to a network time server to ensure that the time on the device is accurate. Ensure that UDP port 123 to time.windows.com is accessible. -
          Domain Name Services (DNS)To resolve DNS names for all services, the device communicates with a DNS server, typically provided via DHCP.  This DNS server must be able to resolve internet names. -
          Diagnostics dataTo enable Windows Analytics and related diagnostics capabilities, see Configure Windows diagnostic data in your organization.
          - -If diagnostic data cannot be sent, the Autopilot process will still continue, but services that depend on diagnostic data, such as Windows Analytics, will not work. -
          Network Connection Status Indicator (NCSI)Windows must be able to tell that the device is able to access the internet. For more information, see Network Connection Status Indicator (NCSI). - -www.msftconnecttest.com must be resolvable via DNS and accessible via HTTP. -
          Windows Notification Services (WNS)This service is used to enable Windows to receive notifications from apps and services. See Microsoft Store for more information.
          - -If the WNS services are not available, the Autopilot process will still continue without notifications. -
          Microsoft Store, Microsoft Store for BusinessApps in the Microsoft Store can be pushed to the device, triggered via Intune (MDM).  App updates and additional apps may also be needed when the user first logs in. For more information, see Prerequisites for Microsoft Store for Business and Education (also includes Azure AD and Windows Notification Services).
          - -If the Microsoft Store is not accessible, the AutoPilot process will still continue without Microsoft Store apps. - -
          Office 365As part of the Intune device configuration, installation of Office 365 ProPlus may be required. For more information, see Office 365 URLs and IP address ranges (includes all Office services, DNS names, IP addresses; includes Azure AD and other services that may overlap with those listed above). -
          Certificate revocation lists (CRLs)Some of these services will also need to check certificate revocation lists (CRLs) for certificates used in the services.  A full list of these is documented at Office 365 URLs and IP address ranges and Office 365 Certificate Chains. -
          Hybrid AAD joinHybrid AAD can be join, the machine should be on corporate network for hybrid AAD join to work. See details at Windows Autopilot user-driven mode -
          - -## Licensing requirements - -Windows Autopilot depends on specific capabilities available in Windows 10 and Azure Active Directory. It also requires an MDM service such as Microsoft Intune. These capabilities can be obtained through various editions and subscription programs: - -To provide needed Azure Active Directory (automatic MDM enrollment and company branding features) and MDM functionality, one of the following is required: - - [Microsoft 365 Business subscriptions](https://www.microsoft.com/en-us/microsoft-365/business) - - [Microsoft 365 F1 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise/firstline) - - [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/en-us/education/buy-license/microsoft365/default.aspx) - - [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune). - - [Enterprise Mobility + Security E3 or E5 subscriptions](https://www.microsoft.com/en-us/cloud-platform/enterprise-mobility-security), which include all needed Azure AD and Intune features. - - [Intune for Education subscriptions](https://docs.microsoft.com/intune-education/what-is-intune-for-education), which include all needed Azure AD and Intune features. - - [Azure Active Directory Premium P1 or P2](https://azure.microsoft.com/services/active-directory/) and [Microsoft Intune subscriptions](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune) (or an alternative MDM service). - -Additionally, the following are also recommended (but not required): -- [Office 365 ProPlus](https://www.microsoft.com/en-us/p/office-365-proplus/CFQ7TTC0K8R0), which can be deployed easily via Intune (or other MDM services). -- [Windows Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation), to automatically step up devices from Windows 10 Pro to Windows 10 Enterprise. - -## Configuration requirements - -Before Windows Autopilot can be used, some configuration tasks are required to support the common Autopilot scenarios. - -- Configure Azure Active Directory automatic enrollment. For Microsoft Intune, see [Enable Windows 10 automatic enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment) for details. If using a different MDM service, contact the vendor for the specific URLs or configuration needed for those services. -- Configure Azure Active Directory custom branding. In order to display an organization-specific logon page during the Autopilot process, Azure Active Directory needs to be configured with the images and text that should be displayed. See [Quickstart: Add company branding to your sign-in page in Azure AD](https://docs.microsoft.com/azure/active-directory/fundamentals/customize-branding) for more details. Note that the "square logo" and "sign-in page text" are the key elements for Autopilot, as well as the Azure Active Directory tenant name (configured separately in the Azure AD tenant properties). -- Enable [Windows Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation) if desired, in order to automatically step up from Windows 10 Pro to Windows 10 Enterprise. - -Specific scenarios will then have additional requirements. Generally, there are two specific tasks: - -- Device registration. Devices need to be added to Windows Autopilot to support most Windows Autopilot scenarios. See [Adding devices to Windows Autopilot](add-devices.md) for more details. -- Profile configuration. Once devices have been added to Windows Autopilot, a profile of settings needs to be applied to each device. See [Configure Autopilot profiles](profiles.md) for details. Note that Microsoft Intune can automate this profile assignment; see [Create an AutoPilot device group](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group) and [Assign an AutoPilot deployment profile to a device group](https://docs.microsoft.com/intune/enrollment-autopilot#assign-an-autopilot-deployment-profile-to-a-device-group) for more information. - -See [Windows Autopilot Scenarios](windows-autopilot-scenarios.md) for additional details. - -For a walkthrough for some of these and related steps, see this video: -
           
          - - -There are no additional hardware requirements to use Windows 10 Autopilot, beyond the [requirements to run Windows 10](https://www.microsoft.com/windows/windows-10-specifications). - -## Related topics - -[Configure Autopilot deployment](configure-autopilot.md) +--- +title: Windows Autopilot requirements +ms.reviewer: +manager: laurawi +description: Windows Autopilot deployment +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.sitesec: library +ms.pagetype: deploy +author: greg-lindsay +ms.author: greglin +ms.collection: M365-modern-desktop +ms.topic: article +--- + + +# Windows Autopilot requirements + +**Applies to: Windows 10** + +Windows Autopilot depends on specific capabilities available in Windows 10, Azure Active Directory, and MDM services such as Microsoft Intune. In order to use Windows Autopilot and leverage these capabilities, some requirements must be met. + +**Note**: For a list of OEMs that currently support Windows Autopilot, see the Participant device manufacturers section at [Windows Autopilot](https://aka.ms/windowsautopilot). + +## Software requirements + +- Windows 10 version 1703 (semi-annual channel) or higher is required. +- The following editions are supported: + - Windows 10 Pro + - Windows 10 Pro Education + - Windows 10 Pro for Workstations + - Windows 10 Enterprise + - Windows 10 Education + - Windows 10 Enterprise 2019 LTSC + +## Networking requirements + +Windows Autopilot depends on a variety of internet-based services. Access to these services must be provided for Autopilot to function properly. In the simplest case, enabling proper functionality can be achieved by ensuring the following: + +- Ensure DNS name resolution for internet DNS names +- Allow access to all hosts via port 80 (HTTP), 443 (HTTPS), and 123 (UDP/NTP) + +In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the required services. For additional details about each of these services and their specific requirements, review the following details: + +
          ServiceInformation +
          Windows Autopilot Deployment Service and Windows ActivationAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 builds 18204 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
          + +For all supported Windows 10 releases, Windows Autopilot also uses Windows Activation services. See Windows activation or validation fails with error code 0x8004FE33 for details about problems that might occur when you connect to the Internet through a proxy server. +
          Azure Active DirectoryUser credentials are validated by Azure Active Directory, and the device can also be joined to Azure Active Directory. See Office 365 IP Address and URL Web service for more information. +
          IntuneOnce authenticated, Azure Active Directory will trigger enrollment of the device into the Intune MDM service. See the following link for details about network communication requirements: Intune network configuration requirements and bandwidth. +
          Windows UpdateDuring the OOBE process, as well as after the Windows 10 OS is fully configured, the Windows Update service is leveraged to retrieve needed updates. If there are problems connecting to Windows Update, see How to solve connection problems concerning Windows Update or Microsoft Update.
          + +If Windows Update is inaccessible, the AutoPilot process will still continue but critical updates will not be available. + +
          Delivery OptimizationWhen downloading Windows Updates, Microsoft Store apps and app updates, Office Updates and Intune Win32 Apps, the Delivery Optimization service is contacted to enable peer-to-peer sharing of content so that only a few devices need to download it from the internet.
          + +If the Delivery Optimization Service is inaccessible, the AutoPilot process will still continue with Delivery Optimization downloads from the cloud (without peer-to-peer). + +
          Network Time Protocol (NTP) SyncWhen a Windows device starts up, it will talk to a network time server to ensure that the time on the device is accurate. Ensure that UDP port 123 to time.windows.com is accessible. +
          Domain Name Services (DNS)To resolve DNS names for all services, the device communicates with a DNS server, typically provided via DHCP.  This DNS server must be able to resolve internet names. +
          Diagnostics dataTo enable Windows Analytics and related diagnostics capabilities, see Configure Windows diagnostic data in your organization.
          + +If diagnostic data cannot be sent, the Autopilot process will still continue, but services that depend on diagnostic data, such as Windows Analytics, will not work. +
          Network Connection Status Indicator (NCSI)Windows must be able to tell that the device is able to access the internet. For more information, see Network Connection Status Indicator (NCSI). + +www.msftconnecttest.com must be resolvable via DNS and accessible via HTTP. +
          Windows Notification Services (WNS)This service is used to enable Windows to receive notifications from apps and services. See Microsoft Store for more information.
          + +If the WNS services are not available, the Autopilot process will still continue without notifications. +
          Microsoft Store, Microsoft Store for BusinessApps in the Microsoft Store can be pushed to the device, triggered via Intune (MDM).  App updates and additional apps may also be needed when the user first logs in. For more information, see Prerequisites for Microsoft Store for Business and Education (also includes Azure AD and Windows Notification Services).
          + +If the Microsoft Store is not accessible, the AutoPilot process will still continue without Microsoft Store apps. + +
          Office 365As part of the Intune device configuration, installation of Office 365 ProPlus may be required. For more information, see Office 365 URLs and IP address ranges (includes all Office services, DNS names, IP addresses; includes Azure AD and other services that may overlap with those listed above). +
          Certificate revocation lists (CRLs)Some of these services will also need to check certificate revocation lists (CRLs) for certificates used in the services.  A full list of these is documented at Office 365 URLs and IP address ranges and Office 365 Certificate Chains. +
          Hybrid AAD joinHybrid AAD can be join, the machine should be on corporate network for hybrid AAD join to work. See details at Windows Autopilot user-driven mode +
          + +## Licensing requirements + +Windows Autopilot depends on specific capabilities available in Windows 10 and Azure Active Directory. It also requires an MDM service such as Microsoft Intune. These capabilities can be obtained through various editions and subscription programs: + +To provide needed Azure Active Directory (automatic MDM enrollment and company branding features) and MDM functionality, one of the following is required: + - [Microsoft 365 Business subscriptions](https://www.microsoft.com/en-us/microsoft-365/business) + - [Microsoft 365 F1 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise/firstline) + - [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/en-us/education/buy-license/microsoft365/default.aspx) + - [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune). + - [Enterprise Mobility + Security E3 or E5 subscriptions](https://www.microsoft.com/en-us/cloud-platform/enterprise-mobility-security), which include all needed Azure AD and Intune features. + - [Intune for Education subscriptions](https://docs.microsoft.com/intune-education/what-is-intune-for-education), which include all needed Azure AD and Intune features. + - [Azure Active Directory Premium P1 or P2](https://azure.microsoft.com/services/active-directory/) and [Microsoft Intune subscriptions](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune) (or an alternative MDM service). + +Additionally, the following are also recommended (but not required): +- [Office 365 ProPlus](https://www.microsoft.com/en-us/p/office-365-proplus/CFQ7TTC0K8R0), which can be deployed easily via Intune (or other MDM services). +- [Windows Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation), to automatically step up devices from Windows 10 Pro to Windows 10 Enterprise. + +## Configuration requirements + +Before Windows Autopilot can be used, some configuration tasks are required to support the common Autopilot scenarios. + +- Configure Azure Active Directory automatic enrollment. For Microsoft Intune, see [Enable Windows 10 automatic enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment) for details. If using a different MDM service, contact the vendor for the specific URLs or configuration needed for those services. +- Configure Azure Active Directory custom branding. In order to display an organization-specific logon page during the Autopilot process, Azure Active Directory needs to be configured with the images and text that should be displayed. See [Quickstart: Add company branding to your sign-in page in Azure AD](https://docs.microsoft.com/azure/active-directory/fundamentals/customize-branding) for more details. Note that the "square logo" and "sign-in page text" are the key elements for Autopilot, as well as the Azure Active Directory tenant name (configured separately in the Azure AD tenant properties). +- Enable [Windows Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation) if desired, in order to automatically step up from Windows 10 Pro to Windows 10 Enterprise. + +Specific scenarios will then have additional requirements. Generally, there are two specific tasks: + +- Device registration. Devices need to be added to Windows Autopilot to support most Windows Autopilot scenarios. See [Adding devices to Windows Autopilot](add-devices.md) for more details. +- Profile configuration. Once devices have been added to Windows Autopilot, a profile of settings needs to be applied to each device. See [Configure Autopilot profiles](profiles.md) for details. Note that Microsoft Intune can automate this profile assignment; see [Create an AutoPilot device group](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group) and [Assign an AutoPilot deployment profile to a device group](https://docs.microsoft.com/intune/enrollment-autopilot#assign-an-autopilot-deployment-profile-to-a-device-group) for more information. + +See [Windows Autopilot Scenarios](windows-autopilot-scenarios.md) for additional details. + +For a walkthrough for some of these and related steps, see this video: +
           
          + + +There are no additional hardware requirements to use Windows 10 Autopilot, beyond the [requirements to run Windows 10](https://www.microsoft.com/windows/windows-10-specifications). + +## Related topics + +[Configure Autopilot deployment](configure-autopilot.md) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md b/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md index ec85b05086..3422c91127 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-scenarios.md @@ -1,68 +1,68 @@ ---- -title: Windows Autopilot scenarios and capabilities -description: Windows Autopilot deployment -keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune -ms.reviewer: mniehaus -manager: laurawi -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.sitesec: library -ms.pagetype: deploy -author: greg-lindsay -ms.author: greglin -ms.collection: M365-modern-desktop -ms.topic: article ---- - - -# Windows Autopilot scenarios and capabilities - -**Applies to: Windows 10** - -## Scenarios - -Windows Autopilot includes support for a growing list of scenarios, designed to support common organization needs which can vary based on the type of organization and their progress moving to Windows 10 and [transitioning to modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management). - -The following Windows Autopilot scenarios are described in this guide: - - -
          ScenarioMore information -
          Deploy devices that will be set up by a member of the organization and configured for that person[Windows Autopilot user-driven mode](user-driven.md) -
          Deploy devices that will be automatically configured for shared use, as a kiosk, or as a digital signage device.[Windows Autopilot self-deploying mode](self-deploying.md) -
          Re-deploy a device in a business-ready state.[Windows Autopilot Reset](windows-autopilot-reset.md) -
          Pre-provision a device with up-to-date applications, policies and settings.[White glove](white-glove.md) -
          Deploy Windows 10 on an existing Windows 7 or 8.1 device[Windows Autopilot for existing devices](existing-devices.md) -
          - -## Windows Autopilot capabilities - -### Windows Autopilot is self-updating during OOBE - -Starting with the Windows 10, version 1903, Autopilot functional and critical updates will begin downloading automatically during OOBE after a device gets connected to a network and the [critical driver and Windows zero-day patch (ZDP) updates](https://docs.microsoft.com/windows-hardware/customize/desktop/windows-updates-during-oobe) have completed. The user or IT admin cannot opt-out of these Autopilot updates; they are required for Windows Autopilot deployment to operate properly. Windows will alert the user that the device is checking for, downloading and installing the updates. - -### Cortana voiceover and speech recognition during OOBE - -In Windows 10, version 1903 and later Cortana voiceover and speech recognition during OOBE is DISABLED by default for all Windows 10 Pro, Education and Enterprise SKUs. - -If desired, you can enable Cortana voiceover and speech recognition during OOBE by creating the following registry key. This key does not exist by default. - -HKLM\Software\Microsoft\Windows\CurrentVersion\OOBE\EnableVoiceForAllEditions - -The key value is a DWORD with **0** = disabled and **1** = enabled. - -| Value | Description | -| --- | --- | -| 0 | Cortana voiceover is disabled | -| 1 | Cortana voiceover is enabled | -| No value | Device will fall back to default behavior of the edition | - -To change this key value, use WCD tool to create as PPKG as documented [here](https://docs.microsoft.com/windows/configuration/wcd/wcd-oobe#nforce). - -### Bitlocker encryption - -With Windows Autopilot, you can configure the BitLocker encryption settings to be applied before automatic encryption is started. For more information, see [Setting the BitLocker encryption algorithm for Autopilot devices](bitlocker.md) - -## Related topics - -[Windows Autopilot: What's new](windows-autopilot-whats-new.md) +--- +title: Windows Autopilot scenarios and capabilities +description: Windows Autopilot deployment +keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune +ms.reviewer: mniehaus +manager: laurawi +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.sitesec: library +ms.pagetype: deploy +author: greg-lindsay +ms.author: greglin +ms.collection: M365-modern-desktop +ms.topic: article +--- + + +# Windows Autopilot scenarios and capabilities + +**Applies to: Windows 10** + +## Scenarios + +Windows Autopilot includes support for a growing list of scenarios, designed to support common organization needs which can vary based on the type of organization and their progress moving to Windows 10 and [transitioning to modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management). + +The following Windows Autopilot scenarios are described in this guide: + + +
          ScenarioMore information +
          Deploy devices that will be set up by a member of the organization and configured for that person[Windows Autopilot user-driven mode](user-driven.md) +
          Deploy devices that will be automatically configured for shared use, as a kiosk, or as a digital signage device.[Windows Autopilot self-deploying mode](self-deploying.md) +
          Re-deploy a device in a business-ready state.[Windows Autopilot Reset](windows-autopilot-reset.md) +
          Pre-provision a device with up-to-date applications, policies and settings.[White glove](white-glove.md) +
          Deploy Windows 10 on an existing Windows 7 or 8.1 device[Windows Autopilot for existing devices](existing-devices.md) +
          + +## Windows Autopilot capabilities + +### Windows Autopilot is self-updating during OOBE + +Starting with the Windows 10, version 1903, Autopilot functional and critical updates will begin downloading automatically during OOBE after a device gets connected to a network and the [critical driver and Windows zero-day patch (ZDP) updates](https://docs.microsoft.com/windows-hardware/customize/desktop/windows-updates-during-oobe) have completed. The user or IT admin cannot opt-out of these Autopilot updates; they are required for Windows Autopilot deployment to operate properly. Windows will alert the user that the device is checking for, downloading and installing the updates. + +### Cortana voiceover and speech recognition during OOBE + +In Windows 10, version 1903 and later Cortana voiceover and speech recognition during OOBE is DISABLED by default for all Windows 10 Pro, Education and Enterprise SKUs. + +If desired, you can enable Cortana voiceover and speech recognition during OOBE by creating the following registry key. This key does not exist by default. + +HKLM\Software\Microsoft\Windows\CurrentVersion\OOBE\EnableVoiceForAllEditions + +The key value is a DWORD with **0** = disabled and **1** = enabled. + +| Value | Description | +| --- | --- | +| 0 | Cortana voiceover is disabled | +| 1 | Cortana voiceover is enabled | +| No value | Device will fall back to default behavior of the edition | + +To change this key value, use WCD tool to create as PPKG as documented [here](https://docs.microsoft.com/windows/configuration/wcd/wcd-oobe#nforce). + +### Bitlocker encryption + +With Windows Autopilot, you can configure the BitLocker encryption settings to be applied before automatic encryption is started. For more information, see [Setting the BitLocker encryption algorithm for Autopilot devices](bitlocker.md) + +## Related topics + +[Windows Autopilot: What's new](windows-autopilot-whats-new.md) diff --git a/windows/eulas/index.md b/windows/eulas/index.md index 2eb00343d3..daa4838aac 100644 --- a/windows/eulas/index.md +++ b/windows/eulas/index.md @@ -1,12 +1,12 @@ ---- -title: Windows 10 - Testing in live -description: What are Windows, UWP, and Win32 apps -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: mobile -ms.author: elizapo -author: lizap -ms.localizationpriority: medium ---- -# Testing non-editability +--- +title: Windows 10 - Testing in live +description: What are Windows, UWP, and Win32 apps +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: mobile +ms.author: elizapo +author: lizap +ms.localizationpriority: medium +--- +# Testing non-editability diff --git a/windows/privacy/TOC.md b/windows/privacy/TOC.md index 1dd34ad810..e4021e6946 100644 --- a/windows/privacy/TOC.md +++ b/windows/privacy/TOC.md @@ -1,32 +1,32 @@ -# [Privacy](index.yml) -## [Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md) -## [Windows and the GDPR: Information for IT Administrators and Decision Makers](gdpr-it-guidance.md) -## [Windows 10 & Privacy Compliance: A Guide for IT and Compliance Professionals](Windows-10-and-privacy-compliance.md) -## [Windows 10 personal data services configuration](windows-personal-data-services-configuration.md) -## [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) -## Diagnostic Data Viewer -### [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) -### [Diagnostic Data Viewer for PowerShell Overview](Microsoft-DiagnosticDataViewer.md) -## Basic level Windows diagnostic data events and fields -### [Windows 10, version 1903 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1903.md) -### [Windows 10, version 1809 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1809.md) -### [Windows 10, version 1803 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) -### [Windows 10, version 1709 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) -### [Windows 10, version 1703 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -## Enhanced level Windows diagnostic data events and fields -### [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) -## Full level categories -### [Windows 10, version 1709 and newer diagnostic data for the Full level](windows-diagnostic-data.md) -### [Windows 10, version 1703 diagnostic data for the Full level](windows-diagnostic-data-1703.md) -## Manage Windows 10 connection endpoints -### [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -### [Manage connections from Windows operating system components to Microsoft services using MDM](manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md) -### [Connection endpoints for Windows 10, version 1903](manage-windows-1903-endpoints.md) -### [Connection endpoints for Windows 10, version 1809](manage-windows-1809-endpoints.md) -### [Connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md) -### [Connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md) -### [Connection endpoints for non-Enterprise editions of Windows 10, version 1903](windows-endpoints-1903-non-enterprise-editions.md) -### [Connection endpoints for non-Enterprise editions of Windows 10, version 1809](windows-endpoints-1809-non-enterprise-editions.md) -### [Connection endpoints for non-Enterprise editions of Windows 10, version 1803](windows-endpoints-1803-non-enterprise-editions.md) -### [Connection endpoints for non-Enterprise editions of Windows 10, version 1709](windows-endpoints-1709-non-enterprise-editions.md) - +# [Privacy](index.yml) +## [Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md) +## [Windows and the GDPR: Information for IT Administrators and Decision Makers](gdpr-it-guidance.md) +## [Windows 10 & Privacy Compliance: A Guide for IT and Compliance Professionals](Windows-10-and-privacy-compliance.md) +## [Windows 10 personal data services configuration](windows-personal-data-services-configuration.md) +## [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) +## Diagnostic Data Viewer +### [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) +### [Diagnostic Data Viewer for PowerShell Overview](Microsoft-DiagnosticDataViewer.md) +## Basic level Windows diagnostic data events and fields +### [Windows 10, version 1903 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1903.md) +### [Windows 10, version 1809 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1809.md) +### [Windows 10, version 1803 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1803.md) +### [Windows 10, version 1709 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1709.md) +### [Windows 10, version 1703 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) +## Enhanced level Windows diagnostic data events and fields +### [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) +## Full level categories +### [Windows 10, version 1709 and newer diagnostic data for the Full level](windows-diagnostic-data.md) +### [Windows 10, version 1703 diagnostic data for the Full level](windows-diagnostic-data-1703.md) +## Manage Windows 10 connection endpoints +### [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +### [Manage connections from Windows operating system components to Microsoft services using MDM](manage-connections-from-windows-operating-system-components-to-microsoft-services-using-MDM.md) +### [Connection endpoints for Windows 10, version 1903](manage-windows-1903-endpoints.md) +### [Connection endpoints for Windows 10, version 1809](manage-windows-1809-endpoints.md) +### [Connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md) +### [Connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md) +### [Connection endpoints for non-Enterprise editions of Windows 10, version 1903](windows-endpoints-1903-non-enterprise-editions.md) +### [Connection endpoints for non-Enterprise editions of Windows 10, version 1809](windows-endpoints-1809-non-enterprise-editions.md) +### [Connection endpoints for non-Enterprise editions of Windows 10, version 1803](windows-endpoints-1803-non-enterprise-editions.md) +### [Connection endpoints for non-Enterprise editions of Windows 10, version 1709](windows-endpoints-1709-non-enterprise-editions.md) + diff --git a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md index 12a92da773..12db0fe2fe 100644 --- a/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md +++ b/windows/privacy/configure-windows-diagnostic-data-in-your-organization.md @@ -1,454 +1,454 @@ ---- -description: Use this article to make informed decisions about how you can configure diagnostic data in your organization. -title: Configure Windows diagnostic data in your organization (Windows 10) -keywords: privacy -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: high -audience: ITPro -author: dansimp -ms.author: dansimp -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 04/29/2019 ---- - -# Configure Windows diagnostic data in your organization - -**Applies to** - -- Windows 10 Enterprise -- Windows 10 Mobile -- Windows Server - -This article applies to Windows and Windows Server diagnostic data only. It describes the types of diagnostic data we may gather, the ways you might manage it in your organization, and some examples of how diagnostic data can provide you with valuable insights into your enterprise deployments. Microsoft uses the data to quickly identify and address issues affecting its customers. - -Use this article to make informed decisions about how you might configure diagnostic data in your organization. Diagnostic data is a term that means different things to different people and organizations. For this article, we discuss diagnostic data as system data that is uploaded by the Connected User Experiences and Telemetry component. Microsoft uses diagnostic data to keep Windows secure and up to date, troubleshoot problems, and make product improvements. - -We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com. - -## Overview of Windows diagnostic data - -At Microsoft, we use Windows diagnostic data to inform our decisions and focus our efforts in providing the most robust, most valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Diagnostic data gives users a voice in the operating system’s development. This guide describes the importance of Windows diagnostic data and how we protect that data. Additionally, it differentiates between diagnostic data and functional data. It also describes the diagnostic data levels that Windows supports. Of course, you can choose how much diagnostic data is shared with Microsoft, and this guide demonstrates how. - -To frame a discussion about diagnostic data, it is important to understand Microsoft’s privacy principles. We earn customer trust every day by focusing on six key privacy principles as described at [privacy.microsoft.com](https://privacy.microsoft.com/). These principles guided the implementation of the Windows diagnostic data system in the following ways: - -- **Control.** We offer customers control of the diagnostic data they share with us by providing easy-to-use management tools. -- **Transparency.** We provide information about the diagnostic data that Windows and Windows Server collects so our customers can make informed decisions. -- **Security.** We encrypt diagnostic data in transit from your device via TLS 1.2, and additionally use certificate pinning to secure the connection. -- **Strong legal protections.** We respect customers’ local privacy laws and fight for legal protection of their privacy as a fundamental human right. -- **No content-based targeting.** We take steps to avoid and minimize the collection of customer content, such as the content of files, chats, or emails, through the Windows diagnostic data system. Customer content inadvertently collected is kept confidential and not used for user targeting. -- **Benefits to you.** We collect Windows diagnostic data to help provide you with an up-to-date, more secure, reliable and performant product, and to improve Windows for all our customers. - -In previous versions of Windows and Windows Server, Microsoft used diagnostic data to check for updated or new Windows Defender signatures, check whether Windows Update installations were successful, gather reliability information through the Reliability Analysis Component (RAC), and gather reliability information through the Windows Customer Experience Improvement Program (CEIP) on Windows. In Windows 10 and Windows Server, you can control diagnostic data streams by using the Privacy option in Settings, Group Policy, or MDM. - -For Windows 10, we invite IT pros to join the [Windows Insider Program](http://insider.windows.com) to give us feedback on what we can do to make Windows work better for your organization. - -## Understanding Windows diagnostic data - -Windows as a Service is a fundamental change in how Microsoft plans, builds, and delivers the operating system. Historically, we released a major Windows version every few years. The effort required to deploy large and infrequent Windows versions was substantial. That effort included updating the infrastructure to support the upgrade. Windows as a Service accelerates the cadence to provide rich updates more frequently, and these updates require substantially less effort to roll out than earlier versions of Windows. Since it provides more value to organizations in a shorter timeframe, delivering Windows as a Service is a top priority for us. - -The release cadence of Windows may be fast, so feedback is critical to its success. We rely on diagnostic data at each stage of the process to inform our decisions and prioritize our efforts. - -### What is Windows diagnostic data? -Windows diagnostic data is vital technical data from Windows devices about the device and how Windows and related software are performing. It's used in the following ways: - -- Keep Windows up to date -- Keep Windows secure, reliable, and performant -- Improve Windows – through the aggregate analysis of the use of Windows -- Personalize Windows engagement surfaces - -Here are some specific examples of Windows diagnostic data: - -- Type of hardware being used -- Applications installed and usage details -- Reliability information on device drivers - -### What is NOT diagnostic data? - -Diagnostic data can sometimes be confused with functional data. Some Windows components and apps connect to Microsoft services directly, but the data they exchange is not diagnostic data. For example, exchanging a user’s location for local weather or news is not an example of diagnostic data—it is functional data that the app or service requires to satisfy the user’s request. - -There are subtle differences between diagnostic data and functional data. Windows collects and sends diagnostic data in the background automatically. You can control how much information is gathered by setting the diagnostic data level. Microsoft tries to avoid collecting personal information wherever possible (for example, if a crash dump is collected and a document was in memory at the time of the crash). On the other hand, functional data can contain personal information. However, a user action, such as requesting news or asking Cortana a question, usually triggers collection and transmission of functional data. - -If you’re an IT pro that wants to manage Windows functional data sent from your organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](https://technet.microsoft.com/itpro/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services). - -The following are specific examples of functional data: - -- Current location for weather -- Bing searches -- Wallpaper and desktop settings synced across multiple devices - -### Diagnostic data gives users a voice - -Windows and Windows Server diagnostic data gives every user a voice in the operating system’s development and ongoing improvement. It helps us understand how Windows 10 and Windows Server behaves in the real world, focus on user priorities, and make informed decisions that benefit them. For our enterprise customers, representation in the dataset on which we will make future design decisions is a real benefit. The following sections offer real examples of these benefits. - -### Improve app and driver quality - -Our ability to collect diagnostic data that drives improvements to Windows and Windows Server helps raise the bar for app and device driver quality. Diagnostic data helps us to quickly identify and fix critical reliability and security issues with apps and device drivers on given configurations. For example, we can identify an app that hangs on devices using a specific version of a video driver, allowing us to work with the app and device driver vendor to quickly fix the issue. The result is less downtime and reduced costs and increased productivity associated with troubleshooting these issues. - -#### Real-world example of how Windows diagnostic data helps -There was a version of a video driver that was crashing on some devices running Windows 10, causing the device to reboot. We detected the problem in our diagnostic data, and immediately contacted the third-party developer who builds the video driver. Working with the developer, we provided an updated driver to Windows Insiders within 24 hours. Based on diagnostic data from the Windows Insiders’ devices, we were able to validate the new version of the video driver, and rolled it out to the broad public as an update the next day. Diagnostic data helped us find, fix, and resolve this problem in just 48 hours, providing a better user experience and reducing costly support calls. - -### Improve end-user productivity - -Windows diagnostic data also helps Microsoft better understand how customers use (or do not use) the operating system’s features and related services. The insights we gain from this data helps us prioritize our engineering effort to directly impact our customers’ experiences. Examples are: - -- **Start menu.** How do people change the Start menu layout? Do they pin other apps to it? Are there any apps that they frequently unpin? We use this dataset to adjust the default Start menu layout to better reflect people’s expectations when they turn on their device for the first time. -- **Cortana.** We use diagnostic data to monitor the scalability of our cloud service, improving search performance. -- **Application switching.** Research and observations from earlier Windows versions showed that people rarely used Alt+Tab to switch between applications. After discussing this with some users, we learned they loved the feature, saying that it would be highly productive, but they did not know about it previously. Based on this, we created the Task View button in Windows 10 to make this feature more discoverable. Later diagnostic data showed significantly higher usage of this feature. - -**These examples show how the use of diagnostic data enables Microsoft to build or enhance features which can help organizations increase employee productivity while lowering help desk calls.** - -### Insights into your own organization - -Sharing information with Microsoft helps make Windows and other products better, but it can also help make your internal processes and user experiences better, as well. Microsoft is in the process of developing a set of analytics customized for your internal use. The first of these, called [Upgrade Readiness](/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness). - -#### Upgrade Readiness - -Upgrading to new operating system versions has traditionally been a challenging, complex, and slow process for many enterprises. Discovering applications and drivers and then testing them for potential compatibility issues have been among the biggest pain points. - -To better help customers through this difficult process, Microsoft developed Upgrade Readiness to give enterprises the tools to plan and manage the upgrade process end to end and allowing them to adopt new Windows releases more quickly and on an ongoing basis. - -With Windows diagnostic data enabled, Microsoft collects computer, application, and driver compatibility-related information for analysis. We then identify compatibility issues that can block your upgrade and suggest fixes when they are known to Microsoft. - -Use Upgrade Readiness to get: - -- A visual workflow that guides you from pilot to production -- Detailed computer, driver, and application inventory -- Powerful computer level search and drill-downs -- Guidance and insights into application and driver compatibility issues with suggested fixes -- Data driven application rationalization tools -- Application usage information, allowing targeted validation; workflow to track validation progress and decisions -- Data export to commonly used software deployment tools - -The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. - -## How Microsoft handles diagnostic data - -The diagnostic data is categorized into four levels: - -- [**Security**](#security-level). Information that’s required to help keep Windows and Windows Server secure, including data about the Connected User Experiences and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender. - -- [**Basic**](#basic-level). Basic device info, including: quality-related data, app compatibility, and data from the **Security** level. - -- [**Enhanced**](#enhanced-level). Additional insights, including: how Windows, Windows Server, and apps are used, how they perform, advanced reliability data, and data from both the **Basic** and the **Security** levels. - -- [**Full**](#full-level). Includes information about the websites you browse, how you use apps and features, plus additional information about device health, device activity (sometimes referred to as usage), and enhanced error reporting. At Full, Microsoft also collects the memory state of your device when a system or app crash occurs. It includes data from the **Security**, **Basic**, and **Enhanced** levels. - -Diagnostic data levels are cumulative, meaning each subsequent level includes data collected through lower levels. For more information see the [Diagnostic data levels](#diagnostic-data-levels) section. - -### Data collection - -Windows 10 and Windows Server includes the Connected User Experiences and Telemetry component, which uses Event Tracing for Windows (ETW) tracelogging technology that gathers and stores diagnostic data events and data. The operating system and some Microsoft management solutions, such as System Center, use the same logging technology. - -1. Operating system features and some management applications are instrumented to publish events and data. Examples of management applications include Virtual Machine Manager (VMM), Server Manager, and Storage Spaces. -2. Events are gathered using public operating system event logging and tracing APIs. -3. You can configure the diagnostic data level by using MDM policy, Group Policy, or registry settings. -4. The Connected User Experiences and Telemetry component transmits the diagnostic data. - -Info collected at the Enhanced and Full levels of diagnostic data is typically gathered at a fractional sampling rate, which can be as low as 1% of devices reporting data at those levels. - -### Data transmission - -All diagnostic data is encrypted using SSL and uses certificate pinning during transfer from the device to the Microsoft Data Management Service. With Windows 10, data is uploaded on a schedule that is sensitive to event priority, battery use, and network cost. Real-time events, such as Windows Defender Advanced Threat Protection, are always sent immediately. Normal events are not uploaded on metered networks, unless you are on a metered server connection. On a free network, normal events can be uploaded every 4 hours if on battery, or every 15 minutes if on A/C power. Diagnostic and crash data are only uploaded on A/C power and free networks. - -The data transmitted at the Basic and Enhanced data diagnostic levels is quite small; typically less than 1 MB per device per day, but occasionally up to 2 MB per device per day). - -### Endpoints - -The Microsoft Data Management Service routes data back to our secure cloud storage. Only Microsoft personnel with a valid business justification are permitted access. - -The following table defines the endpoints for Connected User Experiences and Telemetry component: - -Windows release | Endpoint ---- | --- -Windows 10, versions 1703 or later, with the 2018-09 cumulative update installed| **Diagnostics data** - v10c.vortex-win.data.microsoft.com

          **Functional** - v20.vortex-win.data.microsoft.com
          **Microsoft Defender Advanced Threat Protection** is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com
          **Settings** - win.data.microsoft.com -Windows 10, versions 1803 or later, without the 2018-09 cumulative update installed | **Diagnostics data** - v10.events.data.microsoft.com

          **Functional** - v20.vortex-win.data.microsoft.com
          **Microsoft Defender Advanced Threat Protection** is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com
          **Settings** - win.data.microsoft.com -Windows 10, version 1709 or earlier | **Diagnostics data** - v10.vortex-win.data.microsoft.com

          **Functional** - v20.vortex-win.data.microsoft.com
          **Microsoft Defender Advanced Threat Protection** is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com
          **Settings** - win.data.microsoft.com - -The following table defines the endpoints for other diagnostic data services: - -| Service | Endpoint | -| - | - | -| [Windows Error Reporting](https://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com | -| | ceuswatcab01.blob.core.windows.net | -| | ceuswatcab02.blob.core.windows.net | -| | eaus2watcab01.blob.core.windows.net | -| | eaus2watcab02.blob.core.windows.net | -| | weus2watcab01.blob.core.windows.net | -| | weus2watcab02.blob.core.windows.net | -| [Online Crash Analysis](https://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com | -| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 | -| Microsoft Defender Advanced Threat Protection | https://wdcp.microsoft.com
          https://wdcpalt.microsoft.com | - -### Data use and access - -The principle of least privileged access guides access to diagnostic data. Microsoft does not share personal data of our customers with third parties, except at the customer’s discretion or for the limited purposes described in the [Privacy Statement](https://privacy.microsoft.com/privacystatement). Microsoft may share business reports with OEMs and third-party partners that include aggregated and anonymized diagnostic data information. Data-sharing decisions are made by an internal team including privacy, legal, and data management. - -### Retention - -Microsoft believes in and practices information minimization. We strive to gather only the info we need and to store it only for as long as it’s needed to provide a service or for analysis. Much of the info about how Windows and apps are functioning is deleted within 30 days. Other info may be retained longer, such as error reporting data or Microsoft Store purchase history. - -## Manage enterprise diagnostic data level - -### Enterprise management - -Sharing diagnostic data with Microsoft provides many benefits to enterprises, so we do not recommend turning it off. For most enterprise customers, simply adjusting the diagnostic data level and managing specific components is the best option. - -Customers can set the diagnostic data level in both the user interface and with existing management tools. Users can change the diagnostic data level in the **Diagnostic data** setting. In the **Settings** app, in **Privacy** > **Diagnostics & feedback**. They can choose between Basic and Full. The Enhanced level will only be displayed as an option when Group Policy or Mobile Device Management (MDM) are invoked with this level. The Security level is not available. - -IT pros can use various methods, including Group Policy and Mobile Device Management (MDM), to choose a diagnostic data level. If you’re using Windows 10 Enterprise, Windows 10 Education, or Windows Server, the Security diagnostic data level is available when managing the policy. Setting the diagnostic data level through policy sets the upper boundary for the users’ choices. To disable user choice after setting the level with the policy, you will need to use the "Configure telemetry opt-in setting user interface" group policy. The remainder of this article describes how to use group policy to configure levels and settings interface. - - -#### Manage your diagnostic data settings - -Use the steps in this article to set and/or adjust the diagnostic data settings for Windows and Windows Server in your organization. - -> [!IMPORTANT] -> These diagnostic data levels only apply to Windows and Windows Server components and apps that use the Connected User Experiences and Telemetry component. Non-Windows components, such as Microsoft Office or other 3rd-party apps, may communicate with their cloud services outside of these diagnostic data levels. You should work with your app vendors to understand their diagnostic data policy, and how you can to opt in or opt out. For more information on how Microsoft Office uses diagnostic data, see [Overview of privacy controls for Office 365 ProPlus](/deployoffice/privacy/overview-privacy-controls). - -The lowest diagnostic data setting level supported through management policies is **Security**. The lowest diagnostic data setting supported through the Settings UI is **Basic**. The default diagnostic data setting for Windows Server is **Enhanced**. - -### Configure the diagnostic data level - -You can configure your device's diagnostic data settings using the management tools you’re already using, such as Group Policy, MDM, or Windows Provisioning. You can also manually change your settings using Registry Editor. Setting your diagnostic data levels through a management policy sets the upper level for diagnostic data on the device. - -Use the appropriate value in the table below when you configure the management policy. - -| Level | Value | -| - | - | -| Security | **0** | -| Basic | **1** | -| Enhanced | **2** | -| Full | **3** | - - > [!NOTE] - > When both the Computer Configuration policy and User Configuration policy are set, the more restrictive policy is used. - -### Use Group Policy to set the diagnostic data level - -Use a Group Policy object to set your organization’s diagnostic data level. - -1. From the Group Policy Management Console, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds**. - -2. Double-click **Allow Telemetry**. - -3. In the **Options** box, select the level that you want to configure, and then click **OK**. - -### Use MDM to set the diagnostic data level - -Use the [Policy Configuration Service Provider (CSP)](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) to apply the System/AllowTelemetry MDM policy. - -### Use Registry Editor to set the diagnostic data level - -Use Registry Editor to manually set the registry level on each device in your organization or you can write a script to edit the registry. If a management policy already exists, such as Group Policy or MDM, it will override this registry setting. - -1. Open Registry Editor, and go to **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DataCollection**. - -2. Right-click **DataCollection**, click New, and then click **DWORD (32-bit) Value**. - -3. Type **AllowTelemetry**, and then press ENTER. - -4. Double-click **AllowTelemetry**, set the desired value from the table above, and then click **OK.** - -5. Click **File** > **Export**, and then save the file as a .reg file, such as **C:\\AllowTelemetry.reg**. You can run this file from a script on each device in your organization. - -### Additional diagnostic data controls - -There are a few more settings that you can turn off that may send diagnostic data information: - -- To turn off Windows Update diagnostic data, you have two choices. Either turn off Windows Update, or set your devices to be managed by an on premises update server, such as [Windows Server Update Services (WSUS)](https://technet.microsoft.com/library/hh852345.aspx) or [System Center Configuration Manager](https://www.microsoft.com/server-cloud/products/system-center-2012-r2-configuration-manager/). - -- Turn off **Windows Defender Cloud-based Protection** and **Automatic sample submission** in **Settings** > **Update & security** > **Windows Defender**. - -- Manage the Malicious Software Removal Tool in your organization. For more info, see Microsoft KB article [891716](https://support.microsoft.com/kb/891716). - -- Turn off **Improve inking and typing** in **Settings** > **Privacy**. At diagnostic data levels **Enhanced** and **Full**, Microsoft uses Linguistic Data Collection info to improve language model features such as autocomplete, spellcheck, suggestions, input pattern recognition, and dictionary. - - > [!NOTE] - > Microsoft does not intend to gather sensitive information, such as credit card numbers, usernames and passwords, email addresses, or other similarly sensitive information for Linguistic Data Collection. We guard against such events by using technologies to identify and remove sensitive information before linguistic data is sent from the user's device. If we determine that sensitive information has been inadvertently received, we delete the information. - -## Diagnostic data levels - -These levels are available on all desktop and mobile editions of Windows 10, except for the **Security** level, which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server. - -### Security level - -The Security level gathers only the diagnostic data info that is required to keep Windows devices, Windows Server, and guests protected with the latest security updates. This level is only available on Windows Server, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and Windows IoT Core editions. - -> [!NOTE] -> If your organization relies on Windows Update for updates, you shouldn’t use the **Security** level. Because no Windows Update information is gathered at this level, important information about update failures is not sent. Microsoft uses this information to fix the causes of those failures and improve the quality of our updates. - -Windows Server Update Services (WSUS) and System Center Configuration Manager functionality is not affected at this level, nor is diagnostic data about Windows Server features or System Center gathered. - -The data gathered at this level includes: - -- **Connected User Experiences and Telemetry component settings**. If general diagnostic data has been gathered and is queued, it is sent to Microsoft. Along with this diagnostic data, the Connected User Experiences and Telemetry component may download a configuration settings file from Microsoft’s servers. This file is used to configure the Connected User Experiences and Telemetry component itself. The data gathered by the client for this request includes OS information, device id (used to identify what specific device is requesting settings) and device class (for example, whether the device is server or desktop). - -- **Malicious Software Removal Tool (MSRT)** The MSRT infection report contains information, including device info and IP address. - - > [!NOTE] - > You can turn off the MSRT infection report. No MSRT information is included if MSRT is not used. If Windows Update is turned off, MSRT will not be offered to users. For more info, see Microsoft KB article [891716](https://support.microsoft.com/kb/891716). - -- **Windows Defender/Endpoint Protection**. Windows Defender and System Center Endpoint Protection requires some information to function, including: anti-malware signatures, diagnostic information, User Account Control settings, Unified Extensible Firmware Interface (UEFI) settings, and IP address. - - > [!NOTE] - > This reporting can be turned off and no information is included if a customer is using third-party antimalware software, or if Windows Defender is turned off. For more info, see [Windows Defender](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-defender). - - Microsoft recommends that Windows Update, Windows Defender, and MSRT remain enabled unless the enterprise uses alternative solutions such as Windows Server Update Services, System Center Configuration Manager, or a third-party antimalware solution. Windows Update, Windows Defender, and MSRT provide core Windows functionality such as driver and OS updates, including security updates. - -For servers with default diagnostic data settings and no Internet connectivity, you should set the diagnostic data level to **Security**. This stops data gathering for events that would not be uploaded due to the lack of Internet connectivity. - -No user content, such as user files or communications, is gathered at the **Security** diagnostic data level, and we take steps to avoid gathering any information that directly identifies a company or user, such as name, email address, or account ID. However, in rare circumstances, MSRT information may unintentionally contain personal information. For instance, some malware may create entries in a computer’s registry that include information such as a username, causing it to be gathered. MSRT reporting is optional and can be turned off at any time. - -### Basic level - -The Basic level gathers a limited set of data that’s critical for understanding the device and its configuration. This level also includes the **Security** level data. This level helps to identify problems that can occur on a specific hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a specific driver version. The Connected User Experiences and Telemetry component does not gather diagnostic data about System Center, but it can transmit diagnostic data for other non-Windows applications if they have user consent. - -This is the default level for Windows 10 Education editions, as well as all desktop editions starting with Windows 10, version 1903. - -The normal upload range for the Basic diagnostic data level is between 109 KB - 159 KB per day, per device. - -The data gathered at this level includes: - -- **Basic device data**. Helps provide an understanding about the types of Windows devices and the configurations and types of native and virtualized Windows Servers in the ecosystem. Examples include: - - - Device attributes, such as camera resolution and display type - - - Internet Explorer version - - - Battery attributes, such as capacity and type - - - Networking attributes, such as number of network adapters, speed of network adapters, mobile operator network, and IMEI number - - - Processor and memory attributes, such as number of cores, architecture, speed, memory size, and firmware - - - Virtualization attribute, such as Second Level Address Translation (SLAT) support and guest operating system - - - Operating system attributes, such as Windows edition and virtualization state - - - Storage attributes, such as number of drives, type, and size - -- **Connected User Experiences and Telemetry component quality metrics**. Helps provide an understanding about how the Connected User Experiences and Telemetry component is functioning, including % of uploaded events, dropped events, and the last upload time. - -- **Quality-related information**. Helps Microsoft develop a basic understanding of how a device and its operating system are performing. Some examples are the device characteristics of a Connected Standby device, the number of crashes or hangs, and application state change details, such as how much processor time and memory were used, and the total uptime for an app. - -- **Compatibility data**. Helps provide an understanding about which apps are installed on a device or virtual machine and identifies potential compatibility problems. - - - **General app data and app data for Internet Explorer add-ons**. Includes a list of apps that are installed on a native or virtualized instance of the OS and whether these apps function correctly after an upgrade. This app data includes the app name, publisher, version, and basic details about which files have been blocked from usage. - - - **Internet Explorer add-ons**. Includes a list of Internet Explorer add-ons that are installed on a device and whether these apps will work after an upgrade. - - - **System data**. Helps provide an understanding about whether a device meets the minimum requirements to upgrade to the next version of the operating system. System information includes the amount of memory, as well as information about the processor and BIOS. - - - **Accessory device data**. Includes a list of accessory devices, such as printers or external storage devices, that are connected to Windows PCs and whether these devices will function after upgrading to a new version of the operating system. - - - **Driver data**. Includes specific driver usage that’s meant to help figure out whether apps and devices will function after upgrading to a new version of the operating system. This can help to determine blocking issues and then help Microsoft and our partners apply fixes and improvements. - -- **Microsoft Store**. Provides information about how the Microsoft Store performs, including app downloads, installations, and updates. It also includes Microsoft Store launches, page views, suspend and resumes, and obtaining licenses. - - -### Enhanced level - -The Enhanced level gathers data about how Windows and apps are used and how they perform. This level also includes data from both the **Basic** and **Security** levels. This level helps to improve the user experience with the operating system and apps. Data from this level can be abstracted into patterns and trends that can help Microsoft determine future improvements. - -This level is needed to quickly identify and address Windows and Windows Server quality issues. - -The normal upload range for the Enhanced diagnostic data level is between 239 KB - 348 KB per day, per device. - -The data gathered at this level includes: - -- **Operating system events**. Helps to gain insights into different areas of the operating system, including networking, Hyper-V, Cortana, storage, file system, and other components. - -- **Operating system app events**. A set of events resulting from Microsoft applications and management tools that were downloaded from the Store or pre-installed with Windows or Windows Server, including Server Manager, Photos, Mail, and Microsoft Edge. - -- **Device-specific events**. Contains data about events that are specific to certain devices, such as Surface Hub and Microsoft HoloLens. For example, Microsoft HoloLens sends Holographic Processing Unit (HPU)-related events. - -- **Some crash dump types**. All crash dump types, except for heap dumps and full dumps. - -If the Connected User Experiences and Telemetry component detects a problem on Windows 10 that requires gathering more detailed instrumentation, the Connected User Experiences and Telemetry component at the **Enhanced** diagnostic data level will only gather data about the events associated with the specific issue. - -### Full level - -The Full level gathers data necessary to identify and to help fix problems, following the approval process described below. This level also includes data from the Basic, Enhanced, and Security levels. - -Additionally, at this level, devices opted in to the [Windows Insider Program](http://insider.windows.com) will send events, such as reliability and app responsiveness. that can show Microsoft how pre-release binaries and features are performing. These events help us make decisions on which builds are flighted. All devices in the [Windows Insider Program](http://insider.windows.com) are automatically set to this level. - -If a device experiences problems that are difficult to identify or repeat using Microsoft’s internal testing, additional data becomes necessary. This data can include any user content that might have triggered the problem and is gathered from a small sample of devices that have both opted into the **Full** diagnostic data level and have exhibited the problem. - -However, before more data is gathered, Microsoft’s privacy governance team, including privacy and other subject matter experts, must approve the diagnostics request made by a Microsoft engineer. If the request is approved, Microsoft engineers can use the following capabilities to get the information: - -- Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe. - -- Ability to get registry keys. - -- All crash dump types, including heap dumps and full dumps. - -> [!NOTE] -> Crash dumps collected at this diagnostic data level may unintentionally contain personal data, such as portions of memory from a documents, a web page, etc. - -## Limit Enhanced diagnostic data to the minimum required by Windows Analytics - -Windows Analytics Device Health reports are powered by diagnostic data not included in the **Basic** level, such as crash reports and certain operating system events. In the past, organizations sending **Enhanced** or **Full** level diagnostic data were able to participate in Device Health. However, organizations that required detailed event and field level documentation were unable to move from **Basic** to **Enhanced**. - -In Windows 10, version 1709, we introduced the **Limit Enhanced diagnostic data to the minimum required by Windows Analytics** feature. When enabled, this feature lets you send only the following subset of **Enhanced** level diagnostic data. For more info about Device Health, see the [Monitor the health of devices with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor) topic. - -- **Operating system events.** Limited to a small set required for analytics reports and documented in the [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) topic. - -- **Some crash dump types.** Triage dumps for user mode and mini dumps for kernel mode. - ->[!NOTE] -> Triage dumps are a type of [minidumps](https://docs.microsoft.com/windows/desktop/debug/minidump-files) that go through a process of user-sensitive information scrubbing. Some user-sensitive information may be missed in the process, and will therefore be sent with the dump. - -### Enable limiting enhanced diagnostic data to the minimum required by Windows Analytics - -1. Set the diagnostic data level to **Enhanced**, using either Group Policy or MDM. - - a. Using Group Policy, set the **Computer Configuration/Administrative Templates/Windows Components/Data Collection and Preview Builds/Allow telemetry** setting to **2**. - - -OR- - - b. Using MDM, use the Policy CSP to set the **System/AllowTelemetry** value to **2**. - - -AND- - -2. Enable the **LimitEnhancedDiagnosticDataWindowsAnalytics** setting, using either Group Policy or MDM. - - a. Using Group Policy, set the **Computer Configuration/Administrative Templates/Windows Components/Data collection and Preview builds/Limit Enhanced diagnostic data to the minimum required by Windows Analytics** setting to **Enabled**. - - -OR- - - b. Using MDM, use the Policy CSP to set the **System/LimitEnhancedDiagnosticDataWindowsAnalytics** value to **1**. - -## Additional resources - -FAQs - -- [Cortana, Search, and privacy](https://privacy.microsoft.com/windows-10-cortana-and-privacy) -- [Windows 10 feedback, diagnostics, and privacy](https://privacy.microsoft.com/windows-10-feedback-diagnostics-and-privacy) -- [Windows 10 camera and privacy](https://privacy.microsoft.com/windows-10-camera-and-privacy) -- [Windows 10 location service and privacy](https://privacy.microsoft.com/windows-10-location-and-privacy) -- [Microsoft Edge and privacy](https://privacy.microsoft.com/windows-10-microsoft-edge-and-privacy) -- [Windows 10 speech, inking, typing, and privacy](https://privacy.microsoft.com/windows-10-speech-inking-typing-and-privacy-faq) -- [Windows Hello and privacy](https://privacy.microsoft.com/windows-10-windows-hello-and-privacy) -- [Wi-Fi Sense](https://privacy.microsoft.com/windows-10-about-wifi-sense) -- [Windows Update Delivery Optimization](https://privacy.microsoft.com/windows-10-windows-update-delivery-optimization) - -Blogs - -- [Privacy and Windows 10](https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10) - -Privacy Statement - -- [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) - -TechNet - -- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) - -Web Pages - -- [Privacy at Microsoft](https://privacy.microsoft.com) +--- +description: Use this article to make informed decisions about how you can configure diagnostic data in your organization. +title: Configure Windows diagnostic data in your organization (Windows 10) +keywords: privacy +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: high +audience: ITPro +author: dansimp +ms.author: dansimp +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 04/29/2019 +--- + +# Configure Windows diagnostic data in your organization + +**Applies to** + +- Windows 10 Enterprise +- Windows 10 Mobile +- Windows Server + +This article applies to Windows and Windows Server diagnostic data only. It describes the types of diagnostic data we may gather, the ways you might manage it in your organization, and some examples of how diagnostic data can provide you with valuable insights into your enterprise deployments. Microsoft uses the data to quickly identify and address issues affecting its customers. + +Use this article to make informed decisions about how you might configure diagnostic data in your organization. Diagnostic data is a term that means different things to different people and organizations. For this article, we discuss diagnostic data as system data that is uploaded by the Connected User Experiences and Telemetry component. Microsoft uses diagnostic data to keep Windows secure and up to date, troubleshoot problems, and make product improvements. + +We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com. + +## Overview of Windows diagnostic data + +At Microsoft, we use Windows diagnostic data to inform our decisions and focus our efforts in providing the most robust, most valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Diagnostic data gives users a voice in the operating system’s development. This guide describes the importance of Windows diagnostic data and how we protect that data. Additionally, it differentiates between diagnostic data and functional data. It also describes the diagnostic data levels that Windows supports. Of course, you can choose how much diagnostic data is shared with Microsoft, and this guide demonstrates how. + +To frame a discussion about diagnostic data, it is important to understand Microsoft’s privacy principles. We earn customer trust every day by focusing on six key privacy principles as described at [privacy.microsoft.com](https://privacy.microsoft.com/). These principles guided the implementation of the Windows diagnostic data system in the following ways: + +- **Control.** We offer customers control of the diagnostic data they share with us by providing easy-to-use management tools. +- **Transparency.** We provide information about the diagnostic data that Windows and Windows Server collects so our customers can make informed decisions. +- **Security.** We encrypt diagnostic data in transit from your device via TLS 1.2, and additionally use certificate pinning to secure the connection. +- **Strong legal protections.** We respect customers’ local privacy laws and fight for legal protection of their privacy as a fundamental human right. +- **No content-based targeting.** We take steps to avoid and minimize the collection of customer content, such as the content of files, chats, or emails, through the Windows diagnostic data system. Customer content inadvertently collected is kept confidential and not used for user targeting. +- **Benefits to you.** We collect Windows diagnostic data to help provide you with an up-to-date, more secure, reliable and performant product, and to improve Windows for all our customers. + +In previous versions of Windows and Windows Server, Microsoft used diagnostic data to check for updated or new Windows Defender signatures, check whether Windows Update installations were successful, gather reliability information through the Reliability Analysis Component (RAC), and gather reliability information through the Windows Customer Experience Improvement Program (CEIP) on Windows. In Windows 10 and Windows Server, you can control diagnostic data streams by using the Privacy option in Settings, Group Policy, or MDM. + +For Windows 10, we invite IT pros to join the [Windows Insider Program](http://insider.windows.com) to give us feedback on what we can do to make Windows work better for your organization. + +## Understanding Windows diagnostic data + +Windows as a Service is a fundamental change in how Microsoft plans, builds, and delivers the operating system. Historically, we released a major Windows version every few years. The effort required to deploy large and infrequent Windows versions was substantial. That effort included updating the infrastructure to support the upgrade. Windows as a Service accelerates the cadence to provide rich updates more frequently, and these updates require substantially less effort to roll out than earlier versions of Windows. Since it provides more value to organizations in a shorter timeframe, delivering Windows as a Service is a top priority for us. + +The release cadence of Windows may be fast, so feedback is critical to its success. We rely on diagnostic data at each stage of the process to inform our decisions and prioritize our efforts. + +### What is Windows diagnostic data? +Windows diagnostic data is vital technical data from Windows devices about the device and how Windows and related software are performing. It's used in the following ways: + +- Keep Windows up to date +- Keep Windows secure, reliable, and performant +- Improve Windows – through the aggregate analysis of the use of Windows +- Personalize Windows engagement surfaces + +Here are some specific examples of Windows diagnostic data: + +- Type of hardware being used +- Applications installed and usage details +- Reliability information on device drivers + +### What is NOT diagnostic data? + +Diagnostic data can sometimes be confused with functional data. Some Windows components and apps connect to Microsoft services directly, but the data they exchange is not diagnostic data. For example, exchanging a user’s location for local weather or news is not an example of diagnostic data—it is functional data that the app or service requires to satisfy the user’s request. + +There are subtle differences between diagnostic data and functional data. Windows collects and sends diagnostic data in the background automatically. You can control how much information is gathered by setting the diagnostic data level. Microsoft tries to avoid collecting personal information wherever possible (for example, if a crash dump is collected and a document was in memory at the time of the crash). On the other hand, functional data can contain personal information. However, a user action, such as requesting news or asking Cortana a question, usually triggers collection and transmission of functional data. + +If you’re an IT pro that wants to manage Windows functional data sent from your organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](https://technet.microsoft.com/itpro/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services). + +The following are specific examples of functional data: + +- Current location for weather +- Bing searches +- Wallpaper and desktop settings synced across multiple devices + +### Diagnostic data gives users a voice + +Windows and Windows Server diagnostic data gives every user a voice in the operating system’s development and ongoing improvement. It helps us understand how Windows 10 and Windows Server behaves in the real world, focus on user priorities, and make informed decisions that benefit them. For our enterprise customers, representation in the dataset on which we will make future design decisions is a real benefit. The following sections offer real examples of these benefits. + +### Improve app and driver quality + +Our ability to collect diagnostic data that drives improvements to Windows and Windows Server helps raise the bar for app and device driver quality. Diagnostic data helps us to quickly identify and fix critical reliability and security issues with apps and device drivers on given configurations. For example, we can identify an app that hangs on devices using a specific version of a video driver, allowing us to work with the app and device driver vendor to quickly fix the issue. The result is less downtime and reduced costs and increased productivity associated with troubleshooting these issues. + +#### Real-world example of how Windows diagnostic data helps +There was a version of a video driver that was crashing on some devices running Windows 10, causing the device to reboot. We detected the problem in our diagnostic data, and immediately contacted the third-party developer who builds the video driver. Working with the developer, we provided an updated driver to Windows Insiders within 24 hours. Based on diagnostic data from the Windows Insiders’ devices, we were able to validate the new version of the video driver, and rolled it out to the broad public as an update the next day. Diagnostic data helped us find, fix, and resolve this problem in just 48 hours, providing a better user experience and reducing costly support calls. + +### Improve end-user productivity + +Windows diagnostic data also helps Microsoft better understand how customers use (or do not use) the operating system’s features and related services. The insights we gain from this data helps us prioritize our engineering effort to directly impact our customers’ experiences. Examples are: + +- **Start menu.** How do people change the Start menu layout? Do they pin other apps to it? Are there any apps that they frequently unpin? We use this dataset to adjust the default Start menu layout to better reflect people’s expectations when they turn on their device for the first time. +- **Cortana.** We use diagnostic data to monitor the scalability of our cloud service, improving search performance. +- **Application switching.** Research and observations from earlier Windows versions showed that people rarely used Alt+Tab to switch between applications. After discussing this with some users, we learned they loved the feature, saying that it would be highly productive, but they did not know about it previously. Based on this, we created the Task View button in Windows 10 to make this feature more discoverable. Later diagnostic data showed significantly higher usage of this feature. + +**These examples show how the use of diagnostic data enables Microsoft to build or enhance features which can help organizations increase employee productivity while lowering help desk calls.** + +### Insights into your own organization + +Sharing information with Microsoft helps make Windows and other products better, but it can also help make your internal processes and user experiences better, as well. Microsoft is in the process of developing a set of analytics customized for your internal use. The first of these, called [Upgrade Readiness](/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness). + +#### Upgrade Readiness + +Upgrading to new operating system versions has traditionally been a challenging, complex, and slow process for many enterprises. Discovering applications and drivers and then testing them for potential compatibility issues have been among the biggest pain points. + +To better help customers through this difficult process, Microsoft developed Upgrade Readiness to give enterprises the tools to plan and manage the upgrade process end to end and allowing them to adopt new Windows releases more quickly and on an ongoing basis. + +With Windows diagnostic data enabled, Microsoft collects computer, application, and driver compatibility-related information for analysis. We then identify compatibility issues that can block your upgrade and suggest fixes when they are known to Microsoft. + +Use Upgrade Readiness to get: + +- A visual workflow that guides you from pilot to production +- Detailed computer, driver, and application inventory +- Powerful computer level search and drill-downs +- Guidance and insights into application and driver compatibility issues with suggested fixes +- Data driven application rationalization tools +- Application usage information, allowing targeted validation; workflow to track validation progress and decisions +- Data export to commonly used software deployment tools + +The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. + +## How Microsoft handles diagnostic data + +The diagnostic data is categorized into four levels: + +- [**Security**](#security-level). Information that’s required to help keep Windows and Windows Server secure, including data about the Connected User Experiences and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender. + +- [**Basic**](#basic-level). Basic device info, including: quality-related data, app compatibility, and data from the **Security** level. + +- [**Enhanced**](#enhanced-level). Additional insights, including: how Windows, Windows Server, and apps are used, how they perform, advanced reliability data, and data from both the **Basic** and the **Security** levels. + +- [**Full**](#full-level). Includes information about the websites you browse, how you use apps and features, plus additional information about device health, device activity (sometimes referred to as usage), and enhanced error reporting. At Full, Microsoft also collects the memory state of your device when a system or app crash occurs. It includes data from the **Security**, **Basic**, and **Enhanced** levels. + +Diagnostic data levels are cumulative, meaning each subsequent level includes data collected through lower levels. For more information see the [Diagnostic data levels](#diagnostic-data-levels) section. + +### Data collection + +Windows 10 and Windows Server includes the Connected User Experiences and Telemetry component, which uses Event Tracing for Windows (ETW) tracelogging technology that gathers and stores diagnostic data events and data. The operating system and some Microsoft management solutions, such as System Center, use the same logging technology. + +1. Operating system features and some management applications are instrumented to publish events and data. Examples of management applications include Virtual Machine Manager (VMM), Server Manager, and Storage Spaces. +2. Events are gathered using public operating system event logging and tracing APIs. +3. You can configure the diagnostic data level by using MDM policy, Group Policy, or registry settings. +4. The Connected User Experiences and Telemetry component transmits the diagnostic data. + +Info collected at the Enhanced and Full levels of diagnostic data is typically gathered at a fractional sampling rate, which can be as low as 1% of devices reporting data at those levels. + +### Data transmission + +All diagnostic data is encrypted using SSL and uses certificate pinning during transfer from the device to the Microsoft Data Management Service. With Windows 10, data is uploaded on a schedule that is sensitive to event priority, battery use, and network cost. Real-time events, such as Windows Defender Advanced Threat Protection, are always sent immediately. Normal events are not uploaded on metered networks, unless you are on a metered server connection. On a free network, normal events can be uploaded every 4 hours if on battery, or every 15 minutes if on A/C power. Diagnostic and crash data are only uploaded on A/C power and free networks. + +The data transmitted at the Basic and Enhanced data diagnostic levels is quite small; typically less than 1 MB per device per day, but occasionally up to 2 MB per device per day). + +### Endpoints + +The Microsoft Data Management Service routes data back to our secure cloud storage. Only Microsoft personnel with a valid business justification are permitted access. + +The following table defines the endpoints for Connected User Experiences and Telemetry component: + +Windows release | Endpoint +--- | --- +Windows 10, versions 1703 or later, with the 2018-09 cumulative update installed| **Diagnostics data** - v10c.vortex-win.data.microsoft.com

          **Functional** - v20.vortex-win.data.microsoft.com
          **Microsoft Defender Advanced Threat Protection** is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com
          **Settings** - win.data.microsoft.com +Windows 10, versions 1803 or later, without the 2018-09 cumulative update installed | **Diagnostics data** - v10.events.data.microsoft.com

          **Functional** - v20.vortex-win.data.microsoft.com
          **Microsoft Defender Advanced Threat Protection** is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com
          **Settings** - win.data.microsoft.com +Windows 10, version 1709 or earlier | **Diagnostics data** - v10.vortex-win.data.microsoft.com

          **Functional** - v20.vortex-win.data.microsoft.com
          **Microsoft Defender Advanced Threat Protection** is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com
          **Settings** - win.data.microsoft.com + +The following table defines the endpoints for other diagnostic data services: + +| Service | Endpoint | +| - | - | +| [Windows Error Reporting](https://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com | +| | ceuswatcab01.blob.core.windows.net | +| | ceuswatcab02.blob.core.windows.net | +| | eaus2watcab01.blob.core.windows.net | +| | eaus2watcab02.blob.core.windows.net | +| | weus2watcab01.blob.core.windows.net | +| | weus2watcab02.blob.core.windows.net | +| [Online Crash Analysis](https://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com | +| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 | +| Microsoft Defender Advanced Threat Protection | https://wdcp.microsoft.com
          https://wdcpalt.microsoft.com | + +### Data use and access + +The principle of least privileged access guides access to diagnostic data. Microsoft does not share personal data of our customers with third parties, except at the customer’s discretion or for the limited purposes described in the [Privacy Statement](https://privacy.microsoft.com/privacystatement). Microsoft may share business reports with OEMs and third-party partners that include aggregated and anonymized diagnostic data information. Data-sharing decisions are made by an internal team including privacy, legal, and data management. + +### Retention + +Microsoft believes in and practices information minimization. We strive to gather only the info we need and to store it only for as long as it’s needed to provide a service or for analysis. Much of the info about how Windows and apps are functioning is deleted within 30 days. Other info may be retained longer, such as error reporting data or Microsoft Store purchase history. + +## Manage enterprise diagnostic data level + +### Enterprise management + +Sharing diagnostic data with Microsoft provides many benefits to enterprises, so we do not recommend turning it off. For most enterprise customers, simply adjusting the diagnostic data level and managing specific components is the best option. + +Customers can set the diagnostic data level in both the user interface and with existing management tools. Users can change the diagnostic data level in the **Diagnostic data** setting. In the **Settings** app, in **Privacy** > **Diagnostics & feedback**. They can choose between Basic and Full. The Enhanced level will only be displayed as an option when Group Policy or Mobile Device Management (MDM) are invoked with this level. The Security level is not available. + +IT pros can use various methods, including Group Policy and Mobile Device Management (MDM), to choose a diagnostic data level. If you’re using Windows 10 Enterprise, Windows 10 Education, or Windows Server, the Security diagnostic data level is available when managing the policy. Setting the diagnostic data level through policy sets the upper boundary for the users’ choices. To disable user choice after setting the level with the policy, you will need to use the "Configure telemetry opt-in setting user interface" group policy. The remainder of this article describes how to use group policy to configure levels and settings interface. + + +#### Manage your diagnostic data settings + +Use the steps in this article to set and/or adjust the diagnostic data settings for Windows and Windows Server in your organization. + +> [!IMPORTANT] +> These diagnostic data levels only apply to Windows and Windows Server components and apps that use the Connected User Experiences and Telemetry component. Non-Windows components, such as Microsoft Office or other 3rd-party apps, may communicate with their cloud services outside of these diagnostic data levels. You should work with your app vendors to understand their diagnostic data policy, and how you can to opt in or opt out. For more information on how Microsoft Office uses diagnostic data, see [Overview of privacy controls for Office 365 ProPlus](/deployoffice/privacy/overview-privacy-controls). + +The lowest diagnostic data setting level supported through management policies is **Security**. The lowest diagnostic data setting supported through the Settings UI is **Basic**. The default diagnostic data setting for Windows Server is **Enhanced**. + +### Configure the diagnostic data level + +You can configure your device's diagnostic data settings using the management tools you’re already using, such as Group Policy, MDM, or Windows Provisioning. You can also manually change your settings using Registry Editor. Setting your diagnostic data levels through a management policy sets the upper level for diagnostic data on the device. + +Use the appropriate value in the table below when you configure the management policy. + +| Level | Value | +| - | - | +| Security | **0** | +| Basic | **1** | +| Enhanced | **2** | +| Full | **3** | + + > [!NOTE] + > When both the Computer Configuration policy and User Configuration policy are set, the more restrictive policy is used. + +### Use Group Policy to set the diagnostic data level + +Use a Group Policy object to set your organization’s diagnostic data level. + +1. From the Group Policy Management Console, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds**. + +2. Double-click **Allow Telemetry**. + +3. In the **Options** box, select the level that you want to configure, and then click **OK**. + +### Use MDM to set the diagnostic data level + +Use the [Policy Configuration Service Provider (CSP)](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) to apply the System/AllowTelemetry MDM policy. + +### Use Registry Editor to set the diagnostic data level + +Use Registry Editor to manually set the registry level on each device in your organization or you can write a script to edit the registry. If a management policy already exists, such as Group Policy or MDM, it will override this registry setting. + +1. Open Registry Editor, and go to **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DataCollection**. + +2. Right-click **DataCollection**, click New, and then click **DWORD (32-bit) Value**. + +3. Type **AllowTelemetry**, and then press ENTER. + +4. Double-click **AllowTelemetry**, set the desired value from the table above, and then click **OK.** + +5. Click **File** > **Export**, and then save the file as a .reg file, such as **C:\\AllowTelemetry.reg**. You can run this file from a script on each device in your organization. + +### Additional diagnostic data controls + +There are a few more settings that you can turn off that may send diagnostic data information: + +- To turn off Windows Update diagnostic data, you have two choices. Either turn off Windows Update, or set your devices to be managed by an on premises update server, such as [Windows Server Update Services (WSUS)](https://technet.microsoft.com/library/hh852345.aspx) or [System Center Configuration Manager](https://www.microsoft.com/server-cloud/products/system-center-2012-r2-configuration-manager/). + +- Turn off **Windows Defender Cloud-based Protection** and **Automatic sample submission** in **Settings** > **Update & security** > **Windows Defender**. + +- Manage the Malicious Software Removal Tool in your organization. For more info, see Microsoft KB article [891716](https://support.microsoft.com/kb/891716). + +- Turn off **Improve inking and typing** in **Settings** > **Privacy**. At diagnostic data levels **Enhanced** and **Full**, Microsoft uses Linguistic Data Collection info to improve language model features such as autocomplete, spellcheck, suggestions, input pattern recognition, and dictionary. + + > [!NOTE] + > Microsoft does not intend to gather sensitive information, such as credit card numbers, usernames and passwords, email addresses, or other similarly sensitive information for Linguistic Data Collection. We guard against such events by using technologies to identify and remove sensitive information before linguistic data is sent from the user's device. If we determine that sensitive information has been inadvertently received, we delete the information. + +## Diagnostic data levels + +These levels are available on all desktop and mobile editions of Windows 10, except for the **Security** level, which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server. + +### Security level + +The Security level gathers only the diagnostic data info that is required to keep Windows devices, Windows Server, and guests protected with the latest security updates. This level is only available on Windows Server, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and Windows IoT Core editions. + +> [!NOTE] +> If your organization relies on Windows Update for updates, you shouldn’t use the **Security** level. Because no Windows Update information is gathered at this level, important information about update failures is not sent. Microsoft uses this information to fix the causes of those failures and improve the quality of our updates. + +Windows Server Update Services (WSUS) and System Center Configuration Manager functionality is not affected at this level, nor is diagnostic data about Windows Server features or System Center gathered. + +The data gathered at this level includes: + +- **Connected User Experiences and Telemetry component settings**. If general diagnostic data has been gathered and is queued, it is sent to Microsoft. Along with this diagnostic data, the Connected User Experiences and Telemetry component may download a configuration settings file from Microsoft’s servers. This file is used to configure the Connected User Experiences and Telemetry component itself. The data gathered by the client for this request includes OS information, device id (used to identify what specific device is requesting settings) and device class (for example, whether the device is server or desktop). + +- **Malicious Software Removal Tool (MSRT)** The MSRT infection report contains information, including device info and IP address. + + > [!NOTE] + > You can turn off the MSRT infection report. No MSRT information is included if MSRT is not used. If Windows Update is turned off, MSRT will not be offered to users. For more info, see Microsoft KB article [891716](https://support.microsoft.com/kb/891716). + +- **Windows Defender/Endpoint Protection**. Windows Defender and System Center Endpoint Protection requires some information to function, including: anti-malware signatures, diagnostic information, User Account Control settings, Unified Extensible Firmware Interface (UEFI) settings, and IP address. + + > [!NOTE] + > This reporting can be turned off and no information is included if a customer is using third-party antimalware software, or if Windows Defender is turned off. For more info, see [Windows Defender](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-defender). + + Microsoft recommends that Windows Update, Windows Defender, and MSRT remain enabled unless the enterprise uses alternative solutions such as Windows Server Update Services, System Center Configuration Manager, or a third-party antimalware solution. Windows Update, Windows Defender, and MSRT provide core Windows functionality such as driver and OS updates, including security updates. + +For servers with default diagnostic data settings and no Internet connectivity, you should set the diagnostic data level to **Security**. This stops data gathering for events that would not be uploaded due to the lack of Internet connectivity. + +No user content, such as user files or communications, is gathered at the **Security** diagnostic data level, and we take steps to avoid gathering any information that directly identifies a company or user, such as name, email address, or account ID. However, in rare circumstances, MSRT information may unintentionally contain personal information. For instance, some malware may create entries in a computer’s registry that include information such as a username, causing it to be gathered. MSRT reporting is optional and can be turned off at any time. + +### Basic level + +The Basic level gathers a limited set of data that’s critical for understanding the device and its configuration. This level also includes the **Security** level data. This level helps to identify problems that can occur on a specific hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a specific driver version. The Connected User Experiences and Telemetry component does not gather diagnostic data about System Center, but it can transmit diagnostic data for other non-Windows applications if they have user consent. + +This is the default level for Windows 10 Education editions, as well as all desktop editions starting with Windows 10, version 1903. + +The normal upload range for the Basic diagnostic data level is between 109 KB - 159 KB per day, per device. + +The data gathered at this level includes: + +- **Basic device data**. Helps provide an understanding about the types of Windows devices and the configurations and types of native and virtualized Windows Servers in the ecosystem. Examples include: + + - Device attributes, such as camera resolution and display type + + - Internet Explorer version + + - Battery attributes, such as capacity and type + + - Networking attributes, such as number of network adapters, speed of network adapters, mobile operator network, and IMEI number + + - Processor and memory attributes, such as number of cores, architecture, speed, memory size, and firmware + + - Virtualization attribute, such as Second Level Address Translation (SLAT) support and guest operating system + + - Operating system attributes, such as Windows edition and virtualization state + + - Storage attributes, such as number of drives, type, and size + +- **Connected User Experiences and Telemetry component quality metrics**. Helps provide an understanding about how the Connected User Experiences and Telemetry component is functioning, including % of uploaded events, dropped events, and the last upload time. + +- **Quality-related information**. Helps Microsoft develop a basic understanding of how a device and its operating system are performing. Some examples are the device characteristics of a Connected Standby device, the number of crashes or hangs, and application state change details, such as how much processor time and memory were used, and the total uptime for an app. + +- **Compatibility data**. Helps provide an understanding about which apps are installed on a device or virtual machine and identifies potential compatibility problems. + + - **General app data and app data for Internet Explorer add-ons**. Includes a list of apps that are installed on a native or virtualized instance of the OS and whether these apps function correctly after an upgrade. This app data includes the app name, publisher, version, and basic details about which files have been blocked from usage. + + - **Internet Explorer add-ons**. Includes a list of Internet Explorer add-ons that are installed on a device and whether these apps will work after an upgrade. + + - **System data**. Helps provide an understanding about whether a device meets the minimum requirements to upgrade to the next version of the operating system. System information includes the amount of memory, as well as information about the processor and BIOS. + + - **Accessory device data**. Includes a list of accessory devices, such as printers or external storage devices, that are connected to Windows PCs and whether these devices will function after upgrading to a new version of the operating system. + + - **Driver data**. Includes specific driver usage that’s meant to help figure out whether apps and devices will function after upgrading to a new version of the operating system. This can help to determine blocking issues and then help Microsoft and our partners apply fixes and improvements. + +- **Microsoft Store**. Provides information about how the Microsoft Store performs, including app downloads, installations, and updates. It also includes Microsoft Store launches, page views, suspend and resumes, and obtaining licenses. + + +### Enhanced level + +The Enhanced level gathers data about how Windows and apps are used and how they perform. This level also includes data from both the **Basic** and **Security** levels. This level helps to improve the user experience with the operating system and apps. Data from this level can be abstracted into patterns and trends that can help Microsoft determine future improvements. + +This level is needed to quickly identify and address Windows and Windows Server quality issues. + +The normal upload range for the Enhanced diagnostic data level is between 239 KB - 348 KB per day, per device. + +The data gathered at this level includes: + +- **Operating system events**. Helps to gain insights into different areas of the operating system, including networking, Hyper-V, Cortana, storage, file system, and other components. + +- **Operating system app events**. A set of events resulting from Microsoft applications and management tools that were downloaded from the Store or pre-installed with Windows or Windows Server, including Server Manager, Photos, Mail, and Microsoft Edge. + +- **Device-specific events**. Contains data about events that are specific to certain devices, such as Surface Hub and Microsoft HoloLens. For example, Microsoft HoloLens sends Holographic Processing Unit (HPU)-related events. + +- **Some crash dump types**. All crash dump types, except for heap dumps and full dumps. + +If the Connected User Experiences and Telemetry component detects a problem on Windows 10 that requires gathering more detailed instrumentation, the Connected User Experiences and Telemetry component at the **Enhanced** diagnostic data level will only gather data about the events associated with the specific issue. + +### Full level + +The Full level gathers data necessary to identify and to help fix problems, following the approval process described below. This level also includes data from the Basic, Enhanced, and Security levels. + +Additionally, at this level, devices opted in to the [Windows Insider Program](http://insider.windows.com) will send events, such as reliability and app responsiveness. that can show Microsoft how pre-release binaries and features are performing. These events help us make decisions on which builds are flighted. All devices in the [Windows Insider Program](http://insider.windows.com) are automatically set to this level. + +If a device experiences problems that are difficult to identify or repeat using Microsoft’s internal testing, additional data becomes necessary. This data can include any user content that might have triggered the problem and is gathered from a small sample of devices that have both opted into the **Full** diagnostic data level and have exhibited the problem. + +However, before more data is gathered, Microsoft’s privacy governance team, including privacy and other subject matter experts, must approve the diagnostics request made by a Microsoft engineer. If the request is approved, Microsoft engineers can use the following capabilities to get the information: + +- Ability to run a limited, pre-approved list of Microsoft certified diagnostic tools, such as msinfo32.exe, powercfg.exe, and dxdiag.exe. + +- Ability to get registry keys. + +- All crash dump types, including heap dumps and full dumps. + +> [!NOTE] +> Crash dumps collected at this diagnostic data level may unintentionally contain personal data, such as portions of memory from a documents, a web page, etc. + +## Limit Enhanced diagnostic data to the minimum required by Windows Analytics + +Windows Analytics Device Health reports are powered by diagnostic data not included in the **Basic** level, such as crash reports and certain operating system events. In the past, organizations sending **Enhanced** or **Full** level diagnostic data were able to participate in Device Health. However, organizations that required detailed event and field level documentation were unable to move from **Basic** to **Enhanced**. + +In Windows 10, version 1709, we introduced the **Limit Enhanced diagnostic data to the minimum required by Windows Analytics** feature. When enabled, this feature lets you send only the following subset of **Enhanced** level diagnostic data. For more info about Device Health, see the [Monitor the health of devices with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor) topic. + +- **Operating system events.** Limited to a small set required for analytics reports and documented in the [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) topic. + +- **Some crash dump types.** Triage dumps for user mode and mini dumps for kernel mode. + +>[!NOTE] +> Triage dumps are a type of [minidumps](https://docs.microsoft.com/windows/desktop/debug/minidump-files) that go through a process of user-sensitive information scrubbing. Some user-sensitive information may be missed in the process, and will therefore be sent with the dump. + +### Enable limiting enhanced diagnostic data to the minimum required by Windows Analytics + +1. Set the diagnostic data level to **Enhanced**, using either Group Policy or MDM. + + a. Using Group Policy, set the **Computer Configuration/Administrative Templates/Windows Components/Data Collection and Preview Builds/Allow telemetry** setting to **2**. + + -OR- + + b. Using MDM, use the Policy CSP to set the **System/AllowTelemetry** value to **2**. + + -AND- + +2. Enable the **LimitEnhancedDiagnosticDataWindowsAnalytics** setting, using either Group Policy or MDM. + + a. Using Group Policy, set the **Computer Configuration/Administrative Templates/Windows Components/Data collection and Preview builds/Limit Enhanced diagnostic data to the minimum required by Windows Analytics** setting to **Enabled**. + + -OR- + + b. Using MDM, use the Policy CSP to set the **System/LimitEnhancedDiagnosticDataWindowsAnalytics** value to **1**. + +## Additional resources + +FAQs + +- [Cortana, Search, and privacy](https://privacy.microsoft.com/windows-10-cortana-and-privacy) +- [Windows 10 feedback, diagnostics, and privacy](https://privacy.microsoft.com/windows-10-feedback-diagnostics-and-privacy) +- [Windows 10 camera and privacy](https://privacy.microsoft.com/windows-10-camera-and-privacy) +- [Windows 10 location service and privacy](https://privacy.microsoft.com/windows-10-location-and-privacy) +- [Microsoft Edge and privacy](https://privacy.microsoft.com/windows-10-microsoft-edge-and-privacy) +- [Windows 10 speech, inking, typing, and privacy](https://privacy.microsoft.com/windows-10-speech-inking-typing-and-privacy-faq) +- [Windows Hello and privacy](https://privacy.microsoft.com/windows-10-windows-hello-and-privacy) +- [Wi-Fi Sense](https://privacy.microsoft.com/windows-10-about-wifi-sense) +- [Windows Update Delivery Optimization](https://privacy.microsoft.com/windows-10-windows-update-delivery-optimization) + +Blogs + +- [Privacy and Windows 10](https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10) + +Privacy Statement + +- [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) + +TechNet + +- [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) + +Web Pages + +- [Privacy at Microsoft](https://privacy.microsoft.com) diff --git a/windows/privacy/gdpr-it-guidance.md b/windows/privacy/gdpr-it-guidance.md index d032754214..088f0adccd 100644 --- a/windows/privacy/gdpr-it-guidance.md +++ b/windows/privacy/gdpr-it-guidance.md @@ -1,309 +1,309 @@ ---- -title: Windows and the GDPR-Information for IT Administrators and Decision Makers -description: Use this topic to understand the relationship between users in your organization and Microsoft in the context of the GDPR (General Data Protection Regulation). -keywords: privacy, GDPR, windows, IT -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: high -audience: ITPro -author: dansimp -ms.author: dansimp -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 05/11/2018 -ms.reviewer: ---- -# Windows and the GDPR: Information for IT Administrators and Decision Makers - -Applies to: -- Windows 10, version 1809 -- Windows 10, version 1803 -- Windows 10, version 1709 -- Windows 10, version 1703 -- Windows 10 Team Edition, version 1703 for Surface Hub -- Windows Server 2019 -- Windows Server 2016 -- Windows Analytics - -This topic provides IT Decision Makers with a basic understanding of the relationship between users in an organization and Microsoft in the context of the GDPR (General Data Protection Regulation). You will also learn what role an IT organization plays for that relationship. - -For more information about the GDPR, see: -* [Microsoft GDPR Overview](https://aka.ms/GDPROverview) -* [Microsoft Trust Center FAQs about the GDPR](https://aka.ms/gdpr-faq) -* [Microsoft Service Trust Portal (STP)](https://aka.ms/stp) -* [Get Started: Support for GDPR Accountability](https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted) - -## GDPR fundamentals - -Here are some GDPR fundamentals: - -* On May 25, 2018, this EU data privacy law is implemented. It sets a new global bar for data privacy rights, security, and compliance. -* The GDPR is fundamentally about protecting and enabling the privacy rights of individuals – both customers and employees. -* The European law establishes strict global data privacy requirements governing how organizations manage and protect personal data while respecting individual choice – no matter where data is sent, processed, or stored. -* A request by an individual to an organization to take an action on their personal data is referred to here as a *data subject request*, or *DSR*. - -Microsoft believes data privacy is a fundamental right, and that the GDPR is an important step forward for clarifying and enabling individual privacy rights. We also recognize that the GDPR required significant changes by organizations all over the world with regard to the discovery, management, protection, and reporting of personal data that is collected, processed, and stored within an organization. - -### What is personal data under the GDPR? - -Article 4 (1) of [the GDPR](http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=en) defines personal data as any information relating to an identified or identifiable person. There is no distinction between a person’s private, public, or work roles. As defined by the GDPR, personal data includes, but is not limited to: -* Name -* Email address -* Credit card numbers -* IP addresses -* Social media posts -* Location information -* Handwriting patterns -* Voice input to cloud-based speech services - -### Controller and processor under the GDPR: Who does what - -#### Definition - -The GDPR describes specific requirements for allocating responsibility for controller and processor activities related to personal data. Thus, every organization that processes personal data must determine whether it is acting as a controller or processor for a specific scenario. - -* **Controller**: GDPR Article 4 (7) defines the ‘controller’ as the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data. -* **Processor**: According to the GDPR Article 4 (8) ‘processor’ means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller. - -#### Controller scenario - -For example, when an organization is using Microsoft Windows Defender Advanced Threat Protection (ATP) to detect, investigate, and respond to advanced threats on their networks as part of their IT operations, that organization is collecting data from the user’s device – data, that might include personal data. In this scenario, the organization is the *controller* of the respective personal data, since the organization controls the purpose and means of the processing for data being collected from the devices that have Windows Defender ATP enabled. - -#### Processor scenario - -In the controller scenario described above, Microsoft is a *processor* because Microsoft provides data processing services to that controller (in the given example, an organization that subscribed to Windows Defender ATP and enabled it for the user’s device). As processor, Microsoft only processes data on behalf of the enterprise customer and does not have the right to process data beyond their instructions as specified in a written contract, such as the [Microsoft Product Terms and the Microsoft Online Services Terms (OST)](https://www.microsoft.com/en-us/licensing/product-licensing/products.aspx). - -## GDPR relationship between a Windows 10 user and Microsoft - -For Windows 10 services, Microsoft usually is the controller (with exceptions, such as Windows Defender ATP). The following sections describe what that means for the related data. - -### Types of data exchanged with Microsoft - -Microsoft collects data from or generates data through interactions with users of Windows 10 devices. This information can contain personal data, as defined in [Article 4 (1) of the GDPR](http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL&from=EN), that may be used to provide, support, and improve Windows 10 services. - -Microsoft discloses data collection and privacy practices in detail, for example: -* As part of the Windows 10 installation; -* In the Windows 10 privacy settings; -* Via the web-based [Microsoft Privacy dashboard](https://account.microsoft.com/privacy); and -* In the [Microsoft Privacy Statement](https://privacy.microsoft.com/en-us/privacystatement). - -It is important to differentiate between two distinct types of data Windows services are dealing with. - -#### Windows functional data - -A user action, such as performing a Skype call, usually triggers the collection and transmission of Windows *functional data*. Some Windows components and applications connecting to Microsoft services also exchange Windows functional data to provide user functionality. - -Some other examples of Windows functional data: -* The Weather app which can use the device’s location to retrieve local weather or community news. -* Wallpaper and desktop settings that are synchronized across multiple devices. - -For more info on how IT Professionals can manage Windows functional data sent from an organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md). - -#### Windows diagnostic data - -Windows diagnostic data is used to keep the operating system secure and up-to-date, troubleshoot problems, and make product improvements. The data is encrypted before being sent back to Microsoft. - -Some examples of diagnostic data include: -* The type of hardware being used, information about installed apps and usage details, and reliability data on drivers running on the device. -* For users who have turned on “Tailored experiences”, it can be used to offer personalized tips, ads, and recommendations to enhance Microsoft products and services for the needs of the user. - -Diagnostic data is categorized into the levels "Security", "Basic", "Enhanced", and "Full". For a detailed discussion about these diagnostic data levels please see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). To find more about what information is collected and how it is handled, see [Understanding Windows diagnostic data](configure-windows-diagnostic-data-in-your-organization.md#understanding-windows-diagnostic-data). - ->[!IMPORTANT] ->Other Microsoft services as well as 3rd party applications and drivers running on Windows devices may implement their own functionality, independently from Windows, to transport their diagnostic data. Please contact the publisher for further guidance on how to control the diagnostic data collection level and transmission of these applications and services. - -### Windows services where Microsoft is the processor under the GDPR - -Most Windows 10 services are controller services in terms of the GDPR – for both Windows functional data and Windows diagnostic data. But there are a few Windows services where Microsoft is a processor for functional data under the GDPR, such as [Windows Analytics](https://www.microsoft.com/windowsforbusiness/windows-analytics) and [Windows Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/windowsforbusiness/windows-atp). - ->[!NOTE] ->Both Windows Analytics and Windows Defender ATP are subscription services for organizations. Some functionality requires a certain license (please see [Compare Windows 10 editions](https://www.microsoft.com/en-us/windowsforbusiness/compare)). - -#### Windows Analytics - -[Windows Analytics](https://www.microsoft.com/en-us/windowsforbusiness/windows-analytics) is a service that provides rich, actionable information for helping organizations to gain deep insights into the operational efficiency and health of the Windows devices in their environment. It uses Windows diagnostic data from devices enrolled by the IT organization of an enterprise into the Windows Analytics service. - -Windows [transmits Windows diagnostic data](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) to Microsoft datacenters, where that data is analyzed and stored. With Windows Analytics, the IT organization can then view the analyzed data to detect and fix issues or to improve their processes for upgrading to Windows 10. - -As a result, in terms of the GDPR, the organization that has subscribed to Windows Analytics is acting as the controller, while Microsoft is the processor for Windows Analytics. ->[!NOTE] ->The IT organization must explicitly enable Windows Analytics for a device after the organization subscribes. - ->[!IMPORTANT] ->Windows Analytics does not collect Windows Diagnostic data by itself. Instead, Windows Analytics only uses a subset of Windows Diagnostic data that is collected by Windows for an enrolled device. The Windows Diagnostic data collection is controlled by the IT department of an organization or the user of a device. - -#### Windows Defender ATP - -[Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) is cloud-based service that collects and analyzes usage data from an organization’s devices to detect security threats. Some of the data can contain personal data as defined by the GDPR. Enrolled devices transmit usage data to Microsoft datacenters, where that data is analyzed, processed, and stored. The security operations center (SOC) of the organization can view the analyzed data using the [Windows Defender ATP portal](https://securitycenter.windows.com/). - -As a result, in terms of the GDPR, the organization that has subscribed to Windows Defender ATP is acting as the controller, while Microsoft is the processor for Windows Defender ATP. - ->[!NOTE] ->The IT organization must explicitly enable Windows Defender ATP for a device after the organization subscribes. - -#### At a glance – Windows 10 services GDPR mode of operations - -The following table lists in what GDPR mode – controller or processor – Windows 10 services are operating. - -| Service | Microsoft GDPR mode of operation | -| --- | --- | -| Windows Functional data | Controller or Processor* | -| Windows Diagnostic data | Controller | -| Windows Analytics | Processor | -| Windows Defender Advanced Threat Detection (ATP) | Processor | - -*Table 1: Windows 10 GDPR modes of operations for different Windows 10 services* - -*/*Depending on which application/feature this is referring to.* - -## Windows diagnostic data and Windows 10 - - -### Recommended Windows 10 settings - -Windows diagnostic data collection level for Windows 10 can be set by a user in Windows (*Start > Settings > Privacy > Diagnostics & feedback*) or by the IT department of an organization, using Group Policy or Mobile Device Management (MDM) techniques. - -* For Windows 10, version 1803 and version 1809, Microsoft recommends setting the Windows diagnostic level to “Enhanced”. This enables organizations to get the full functionality of [Windows Analytics](#windows-analytics). - ->[!NOTE] ->For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). - -* For Windows 10, version 1709, and Windows 10, version 1703, the recommended Windows diagnostic level configuration for EEA and Switzerland commercial users is “Basic”. - ->[!NOTE] ->For Windows 7, Microsoft recommends [configuring enterprise devices for Windows Analytics](/windows/deployment/update/windows-analytics-get-started) to facilitate upgrade planning to Windows 10. - -### Additional information for Windows Analytics - -Some Windows Analytics solutions and functionality, such as Update Compliance, works with “Basic” as minimum Windows diagnostic level. Other solutions and functionality of Windows Analytics, such as Device Health, require “Enhanced”. - -Those organizations who wish to share the smallest set of events for Windows Analytics and have set the Windows diagnostic level to “Enhanced” can use the “Limit Enhanced diagnostic data to the minimum required by Windows Analytics” setting. This filtering mechanism was that Microsoft introduced in Windows 10, version 1709. When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to the smallest set of data required by Windows Analytics. - ->[!NOTE] ->Additional information can be found at [Windows Analytics and privacy](/windows/deployment/update/windows-analytics-privacy -). - -## Controlling Windows 10 data collection and notification about it - -Windows 10 sends diagnostic data to Microsoft services, and some of that data can contain personal data. Both the user and the IT organization have the ability to control the transmission of that data to Microsoft. - -### Adjusting privacy settings by the user - -A user has the ability to adjust additional privacy settings in Windows by navigating to *Start > Settings > Privacy*. For example, a user can control if location is enabled or disabled, whether or not to transmit feedback on inking and typing input to Microsoft for improving the personal accuracy of these services, or if Windows collects activities for syncing it with other devices. - -For a standard user in an organization, some privacy settings might be controlled by their IT department. This is done using Group Policies or Mobile Device Management (MDM) settings. If this is the case, the user will see an alert that says ‘Some settings are hidden or managed by your organization’ when they navigate to *Start > Settings > Privacy*. As such, the user can only change some settings, but not all. - -### Users can lower the diagnostic level - -Starting with Windows 10, version 1803, a user can change the Windows diagnostics data level for their device below to what was set by their IT department. Organizations can allow or disallow this feature by configuring the Group Policy **Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds\Configure telemetry opt-in setting user interface** or the MDM policy **ConfigureTelemetryOptInSettingsUx**. - -If an IT organization has not disabled this policy, users within the organization can change their own Windows diagnostic data collection level in *Start > Settings > Privacy > Diagnostics & feedback*. For example, if the IT organization enabled this policy and set the level to “Full”, a user can modify the Windows diagnostics data level setting to “Basic”. - -### Notification at logon - -Windows 10, version 1803, and later can provide users with a notification during their logon. If the IT organization has not disabled the Group Policy **Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds\Configure telemetry opt-in change notifications** or the MDM policy **ConfigureTelemetryOptInChangeNotification**, Windows diagnostic data notifications can appear at logon so that the users of a device are aware of the data collection. - -This notification can also be shown when the diagnostic level for the device was changed. For instance, if the diagnostic level on the device is set to “Basic” and the IT organization changes it to “Full”, users will be notified on their next logon. - -### Diagnostic Data Viewer (DDV) - -In Windows 10, version 1803 and later, users can invoke the [Diagnostic Data Viewer (DDV)](diagnostic-data-viewer-overview.md) to see what Windows diagnostic data is collected on their local device. This app lets a user review the diagnostic data collected on his device that is being sent to Microsoft. The DDV groups the information into simple categories based on how it is used by Microsoft. - -A user can turn on Windows diagnostic data viewing by going to go to *Start > Settings > Privacy > Diagnostics & feedback*. Under the ‘Diagnostic data viewer’ section, the user has to enable the ‘If data viewing is enabled, you can see your diagnostics data’ option. After DDV is installed on the device, the user can start it by clicking the ‘Diagnostic Data Viewer’ in the ‘Diagnostic data viewer’ section of *Start > Settings > Privacy > Diagnostics & feedback*. - -Also, the user can delete all Windows diagnostic data collected from the device. This is done by clicking the ‘Delete’ button in the ‘Delete diagnostic data’ section of *Start > Settings > Privacy > Diagnostics & feedback*. - -### Windows 10 personal data services configuration - -Microsoft assembled a list of Windows 10 services configuration settings that are useful for personal data privacy protection and related regulations, such as the General Data Protection Regulation (GDPR). There is one section with settings for service data that is managed at Microsoft and a section for local data that is managed by an IT organization. - -IT Professionals that are interested in this configuration, see [Windows 10 personal data services configuration](windows-personal-data-services-configuration.md). - -### Windows 10 connections to Microsoft - -To find out more about the network connections that Windows components make to Microsoft as well as the privacy settings that affect data shared with either Microsoft or apps, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) and [Manage Windows 10 connection endpoints](manage-windows-endpoints.md). These articles describe how these settings can be managed by an IT Professional. - -### At-a-glance: the relationship between an IT organization and the GDPR - -Because Microsoft is a controller for data collected by Windows 10, the user can work with Microsoft to satisfy GDPR requirements. While this relationship between Microsoft and a user is evident in a consumer scenario, an IT organization can influence that relationship in an enterprise scenario. For example, the IT organization has the ability to centrally configure the Windows diagnostic data level by using Group Policy or MDM settings. - -## Windows Server - -Windows Server follows the same mechanisms as Windows 10 for handling of personal data – for example, when collecting Windows diagnostic data. - -More detailed information about Windows Server and the GDPR is available at Beginning your General Data Protection Regulation (GDPR) journey for Windows Server. - -### Windows diagnostic data and Windows Server - -The lowest diagnostic data setting level supported on Windows Server 2016 and Windows Server 2019 through management policies is “Security”. The lowest diagnostic data setting supported through the Settings UI is “Basic”. The default diagnostic data level for all Windows Server 2016 and Windows Server 2019 editions is “Enhanced”. - -IT administrators can configure the Windows Server diagnostic data settings using familiar management tools, such as Group Policy, MDM, or Windows Provisioning. IT administrators can also manually change settings using Registry Editor. Setting the Windows Server diagnostic data levels through a management policy overrides any device-level settings. - -There are two options for deleting Windows diagnostic data from a Windows Server machine: - -- If the “Desktop Experience” option was chosen during the installation of Windows Server 2019, then there are the same options available for an IT administrator that end users have with Windows 10, version 1803 and version 1809, to submit a request for deleting that device’s diagnostic data. This is done by clicking the **Delete** button in the **Delete diagnostic data** section of **Start > Settings > Privacy > Diagnostics & feedback**. -- Microsoft has provided a [PowerShell cmdlet](https://docs.microsoft.com/powershell/module/windowsdiagnosticdata) that IT administrators can use to delete Windows diagnostic data via the command line on a machine running Windows Server 2016 or Windows Server 2019. This cmdlet provides the same functionality for deleting Windows diagnostic data as with Desktop Experience on Windows Server 2019. For more information, see [the PowerShell Gallery](https://www.powershellgallery.com/packages/WindowsDiagnosticData). - -### Backups and Windows Server - -Backups, including live backups and backups that are stored locally within an organization or in the cloud, can contain personal data. - -- Backups an organizations creates, for example by using Windows Server Backup (WSB), are under its control. For example, for exporting personal data contained in a backup, the organization needs to restore the appropriate backup sets to facilitate the respective data subject request (DSR). -- The GDPR also applies when storing backups in the cloud. For example, an organization can use Microsoft Azure Backup to backup files and folders from physical or virtual Windows Server machines (located on-premises or in Azure) to the cloud. The organization that is subscribed to this backup service also has the obligation to restore the data in order to exercise the respective DSR. - -## Windows 10 Team Edition, Version 1703 for Surface Hub - -Surface Hub is a shared device used within an organization. The device identifier collected as part of diagnostic data is not connected to a user. For removing Windows diagnostic data sent to Microsoft for a Surface Hub, Microsoft created the Surface Hub Delete Diagnostic Data tool available in the Microsoft Store. - ->[!NOTE] ->Additional apps running on the device, that are not delivered as part of the in-box experience of Surface Hub, may implement their own diagnostic data collection and transmission functionality independently to collect and process personal data. Please contact the app publisher for further guidance on how to control this. - -An IT administrator can configure privacy- related settings, such as setting the Windows diagnostic data level to Basic. Surface Hub does not support group policy for centralized management; however, IT administrators can use MDM to apply these settings to Surface Hub. For more information about Surface Hub and MDM, please see [Manage settings with an MDM provider](https://docs.microsoft.com/surface-hub/manage-settings-with-mdm-for-surface-hub). - -## Further reading - -### Optional settings / features that further improve the protection of personal data - -Personal data protection is one of the goals of the GDPR. One way of improving personal data protection is to use the modern and advanced security features of Windows 10. An IT organization can learn more at [Mitigate threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10) and [Standards for a highly secure Windows 10 device](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-highly-secure). - ->[!NOTE] ->Some of these features might require a particular Windows hardware, such as a computer with a Trusted Platform Module (TPM) chip, and can depend on a particular Windows product (such as Windows 10 E5). - -### Windows Security Baselines - -Microsoft has created Windows Security Baselines to efficiently configure Windows 10 and Windows Server. For more information, please visit [Windows Security Baselines](/windows/security/threat-protection/windows-security-baselines). - -### Windows Restricted Traffic Limited Functionality Baseline - -To make it easier to deploy settings that restrict connections from Windows 10 and Windows Server to Microsoft, IT Professionals can apply the Windows Restricted Traffic Limited Functionality Baseline, available [here](https://go.microsoft.com/fwlink/?linkid=828887). - ->[!IMPORTANT] ->Some of the settings of the Windows Restricted Traffic Limited Functionality Baseline will reduce the functionality and security configuration of a device in the organization and are therefore not recommended. - -### Microsoft Trust Center and Service Trust Portal - -Please visit our [GDPR section of the Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/privacy/gdpr) to obtain additional resources and to learn more about how Microsoft can help you fulfill specific GDPR requirements. There you can find lots of useful information about the GDPR, including how Microsoft is helping customers to successfully master the GDPR, a FAQ list, and a list of [resources for GDPR compliance](https://www.microsoft.com/en-us/TrustCenter/Privacy/gdpr/resources). Also, please check out the [Compliance Manager](https://aka.ms/compliancemanager) of the Microsoft [Service Trust Portal (STP)](https://aka.ms/stp) and [Get Started: Support for GDPR Accountability](https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted). - -### Additional resources - -#### FAQs - -* [Windows 10 feedback, diagnostics, and privacy](https://privacy.microsoft.com/windows-10-feedback-diagnostics-and-privacy) -* [Microsoft Edge and privacy](https://privacy.microsoft.com/windows-10-microsoft-edge-and-privacy) -* [Windows Hello and privacy](https://privacy.microsoft.com/windows-10-windows-hello-and-privacy) -* [Wi-Fi Sense](https://privacy.microsoft.com/windows-10-about-wifi-sense) - -#### Blogs - -* [Privacy and Windows 10](https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10) - -#### Privacy Statement - -* [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) - -#### Other resources - -* [Privacy at Microsoft](https://privacy.microsoft.com/) +--- +title: Windows and the GDPR-Information for IT Administrators and Decision Makers +description: Use this topic to understand the relationship between users in your organization and Microsoft in the context of the GDPR (General Data Protection Regulation). +keywords: privacy, GDPR, windows, IT +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: high +audience: ITPro +author: dansimp +ms.author: dansimp +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 05/11/2018 +ms.reviewer: +--- +# Windows and the GDPR: Information for IT Administrators and Decision Makers + +Applies to: +- Windows 10, version 1809 +- Windows 10, version 1803 +- Windows 10, version 1709 +- Windows 10, version 1703 +- Windows 10 Team Edition, version 1703 for Surface Hub +- Windows Server 2019 +- Windows Server 2016 +- Windows Analytics + +This topic provides IT Decision Makers with a basic understanding of the relationship between users in an organization and Microsoft in the context of the GDPR (General Data Protection Regulation). You will also learn what role an IT organization plays for that relationship. + +For more information about the GDPR, see: +* [Microsoft GDPR Overview](https://aka.ms/GDPROverview) +* [Microsoft Trust Center FAQs about the GDPR](https://aka.ms/gdpr-faq) +* [Microsoft Service Trust Portal (STP)](https://aka.ms/stp) +* [Get Started: Support for GDPR Accountability](https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted) + +## GDPR fundamentals + +Here are some GDPR fundamentals: + +* On May 25, 2018, this EU data privacy law is implemented. It sets a new global bar for data privacy rights, security, and compliance. +* The GDPR is fundamentally about protecting and enabling the privacy rights of individuals – both customers and employees. +* The European law establishes strict global data privacy requirements governing how organizations manage and protect personal data while respecting individual choice – no matter where data is sent, processed, or stored. +* A request by an individual to an organization to take an action on their personal data is referred to here as a *data subject request*, or *DSR*. + +Microsoft believes data privacy is a fundamental right, and that the GDPR is an important step forward for clarifying and enabling individual privacy rights. We also recognize that the GDPR required significant changes by organizations all over the world with regard to the discovery, management, protection, and reporting of personal data that is collected, processed, and stored within an organization. + +### What is personal data under the GDPR? + +Article 4 (1) of [the GDPR](http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=en) defines personal data as any information relating to an identified or identifiable person. There is no distinction between a person’s private, public, or work roles. As defined by the GDPR, personal data includes, but is not limited to: +* Name +* Email address +* Credit card numbers +* IP addresses +* Social media posts +* Location information +* Handwriting patterns +* Voice input to cloud-based speech services + +### Controller and processor under the GDPR: Who does what + +#### Definition + +The GDPR describes specific requirements for allocating responsibility for controller and processor activities related to personal data. Thus, every organization that processes personal data must determine whether it is acting as a controller or processor for a specific scenario. + +* **Controller**: GDPR Article 4 (7) defines the ‘controller’ as the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data. +* **Processor**: According to the GDPR Article 4 (8) ‘processor’ means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller. + +#### Controller scenario + +For example, when an organization is using Microsoft Windows Defender Advanced Threat Protection (ATP) to detect, investigate, and respond to advanced threats on their networks as part of their IT operations, that organization is collecting data from the user’s device – data, that might include personal data. In this scenario, the organization is the *controller* of the respective personal data, since the organization controls the purpose and means of the processing for data being collected from the devices that have Windows Defender ATP enabled. + +#### Processor scenario + +In the controller scenario described above, Microsoft is a *processor* because Microsoft provides data processing services to that controller (in the given example, an organization that subscribed to Windows Defender ATP and enabled it for the user’s device). As processor, Microsoft only processes data on behalf of the enterprise customer and does not have the right to process data beyond their instructions as specified in a written contract, such as the [Microsoft Product Terms and the Microsoft Online Services Terms (OST)](https://www.microsoft.com/en-us/licensing/product-licensing/products.aspx). + +## GDPR relationship between a Windows 10 user and Microsoft + +For Windows 10 services, Microsoft usually is the controller (with exceptions, such as Windows Defender ATP). The following sections describe what that means for the related data. + +### Types of data exchanged with Microsoft + +Microsoft collects data from or generates data through interactions with users of Windows 10 devices. This information can contain personal data, as defined in [Article 4 (1) of the GDPR](http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL&from=EN), that may be used to provide, support, and improve Windows 10 services. + +Microsoft discloses data collection and privacy practices in detail, for example: +* As part of the Windows 10 installation; +* In the Windows 10 privacy settings; +* Via the web-based [Microsoft Privacy dashboard](https://account.microsoft.com/privacy); and +* In the [Microsoft Privacy Statement](https://privacy.microsoft.com/en-us/privacystatement). + +It is important to differentiate between two distinct types of data Windows services are dealing with. + +#### Windows functional data + +A user action, such as performing a Skype call, usually triggers the collection and transmission of Windows *functional data*. Some Windows components and applications connecting to Microsoft services also exchange Windows functional data to provide user functionality. + +Some other examples of Windows functional data: +* The Weather app which can use the device’s location to retrieve local weather or community news. +* Wallpaper and desktop settings that are synchronized across multiple devices. + +For more info on how IT Professionals can manage Windows functional data sent from an organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md). + +#### Windows diagnostic data + +Windows diagnostic data is used to keep the operating system secure and up-to-date, troubleshoot problems, and make product improvements. The data is encrypted before being sent back to Microsoft. + +Some examples of diagnostic data include: +* The type of hardware being used, information about installed apps and usage details, and reliability data on drivers running on the device. +* For users who have turned on “Tailored experiences”, it can be used to offer personalized tips, ads, and recommendations to enhance Microsoft products and services for the needs of the user. + +Diagnostic data is categorized into the levels "Security", "Basic", "Enhanced", and "Full". For a detailed discussion about these diagnostic data levels please see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). To find more about what information is collected and how it is handled, see [Understanding Windows diagnostic data](configure-windows-diagnostic-data-in-your-organization.md#understanding-windows-diagnostic-data). + +>[!IMPORTANT] +>Other Microsoft services as well as 3rd party applications and drivers running on Windows devices may implement their own functionality, independently from Windows, to transport their diagnostic data. Please contact the publisher for further guidance on how to control the diagnostic data collection level and transmission of these applications and services. + +### Windows services where Microsoft is the processor under the GDPR + +Most Windows 10 services are controller services in terms of the GDPR – for both Windows functional data and Windows diagnostic data. But there are a few Windows services where Microsoft is a processor for functional data under the GDPR, such as [Windows Analytics](https://www.microsoft.com/windowsforbusiness/windows-analytics) and [Windows Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/windowsforbusiness/windows-atp). + +>[!NOTE] +>Both Windows Analytics and Windows Defender ATP are subscription services for organizations. Some functionality requires a certain license (please see [Compare Windows 10 editions](https://www.microsoft.com/en-us/windowsforbusiness/compare)). + +#### Windows Analytics + +[Windows Analytics](https://www.microsoft.com/en-us/windowsforbusiness/windows-analytics) is a service that provides rich, actionable information for helping organizations to gain deep insights into the operational efficiency and health of the Windows devices in their environment. It uses Windows diagnostic data from devices enrolled by the IT organization of an enterprise into the Windows Analytics service. + +Windows [transmits Windows diagnostic data](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) to Microsoft datacenters, where that data is analyzed and stored. With Windows Analytics, the IT organization can then view the analyzed data to detect and fix issues or to improve their processes for upgrading to Windows 10. + +As a result, in terms of the GDPR, the organization that has subscribed to Windows Analytics is acting as the controller, while Microsoft is the processor for Windows Analytics. +>[!NOTE] +>The IT organization must explicitly enable Windows Analytics for a device after the organization subscribes. + +>[!IMPORTANT] +>Windows Analytics does not collect Windows Diagnostic data by itself. Instead, Windows Analytics only uses a subset of Windows Diagnostic data that is collected by Windows for an enrolled device. The Windows Diagnostic data collection is controlled by the IT department of an organization or the user of a device. + +#### Windows Defender ATP + +[Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp) is cloud-based service that collects and analyzes usage data from an organization’s devices to detect security threats. Some of the data can contain personal data as defined by the GDPR. Enrolled devices transmit usage data to Microsoft datacenters, where that data is analyzed, processed, and stored. The security operations center (SOC) of the organization can view the analyzed data using the [Windows Defender ATP portal](https://securitycenter.windows.com/). + +As a result, in terms of the GDPR, the organization that has subscribed to Windows Defender ATP is acting as the controller, while Microsoft is the processor for Windows Defender ATP. + +>[!NOTE] +>The IT organization must explicitly enable Windows Defender ATP for a device after the organization subscribes. + +#### At a glance – Windows 10 services GDPR mode of operations + +The following table lists in what GDPR mode – controller or processor – Windows 10 services are operating. + +| Service | Microsoft GDPR mode of operation | +| --- | --- | +| Windows Functional data | Controller or Processor* | +| Windows Diagnostic data | Controller | +| Windows Analytics | Processor | +| Windows Defender Advanced Threat Detection (ATP) | Processor | + +*Table 1: Windows 10 GDPR modes of operations for different Windows 10 services* + +*/*Depending on which application/feature this is referring to.* + +## Windows diagnostic data and Windows 10 + + +### Recommended Windows 10 settings + +Windows diagnostic data collection level for Windows 10 can be set by a user in Windows (*Start > Settings > Privacy > Diagnostics & feedback*) or by the IT department of an organization, using Group Policy or Mobile Device Management (MDM) techniques. + +* For Windows 10, version 1803 and version 1809, Microsoft recommends setting the Windows diagnostic level to “Enhanced”. This enables organizations to get the full functionality of [Windows Analytics](#windows-analytics). + +>[!NOTE] +>For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). + +* For Windows 10, version 1709, and Windows 10, version 1703, the recommended Windows diagnostic level configuration for EEA and Switzerland commercial users is “Basic”. + +>[!NOTE] +>For Windows 7, Microsoft recommends [configuring enterprise devices for Windows Analytics](/windows/deployment/update/windows-analytics-get-started) to facilitate upgrade planning to Windows 10. + +### Additional information for Windows Analytics + +Some Windows Analytics solutions and functionality, such as Update Compliance, works with “Basic” as minimum Windows diagnostic level. Other solutions and functionality of Windows Analytics, such as Device Health, require “Enhanced”. + +Those organizations who wish to share the smallest set of events for Windows Analytics and have set the Windows diagnostic level to “Enhanced” can use the “Limit Enhanced diagnostic data to the minimum required by Windows Analytics” setting. This filtering mechanism was that Microsoft introduced in Windows 10, version 1709. When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to the smallest set of data required by Windows Analytics. + +>[!NOTE] +>Additional information can be found at [Windows Analytics and privacy](/windows/deployment/update/windows-analytics-privacy +). + +## Controlling Windows 10 data collection and notification about it + +Windows 10 sends diagnostic data to Microsoft services, and some of that data can contain personal data. Both the user and the IT organization have the ability to control the transmission of that data to Microsoft. + +### Adjusting privacy settings by the user + +A user has the ability to adjust additional privacy settings in Windows by navigating to *Start > Settings > Privacy*. For example, a user can control if location is enabled or disabled, whether or not to transmit feedback on inking and typing input to Microsoft for improving the personal accuracy of these services, or if Windows collects activities for syncing it with other devices. + +For a standard user in an organization, some privacy settings might be controlled by their IT department. This is done using Group Policies or Mobile Device Management (MDM) settings. If this is the case, the user will see an alert that says ‘Some settings are hidden or managed by your organization’ when they navigate to *Start > Settings > Privacy*. As such, the user can only change some settings, but not all. + +### Users can lower the diagnostic level + +Starting with Windows 10, version 1803, a user can change the Windows diagnostics data level for their device below to what was set by their IT department. Organizations can allow or disallow this feature by configuring the Group Policy **Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds\Configure telemetry opt-in setting user interface** or the MDM policy **ConfigureTelemetryOptInSettingsUx**. + +If an IT organization has not disabled this policy, users within the organization can change their own Windows diagnostic data collection level in *Start > Settings > Privacy > Diagnostics & feedback*. For example, if the IT organization enabled this policy and set the level to “Full”, a user can modify the Windows diagnostics data level setting to “Basic”. + +### Notification at logon + +Windows 10, version 1803, and later can provide users with a notification during their logon. If the IT organization has not disabled the Group Policy **Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds\Configure telemetry opt-in change notifications** or the MDM policy **ConfigureTelemetryOptInChangeNotification**, Windows diagnostic data notifications can appear at logon so that the users of a device are aware of the data collection. + +This notification can also be shown when the diagnostic level for the device was changed. For instance, if the diagnostic level on the device is set to “Basic” and the IT organization changes it to “Full”, users will be notified on their next logon. + +### Diagnostic Data Viewer (DDV) + +In Windows 10, version 1803 and later, users can invoke the [Diagnostic Data Viewer (DDV)](diagnostic-data-viewer-overview.md) to see what Windows diagnostic data is collected on their local device. This app lets a user review the diagnostic data collected on his device that is being sent to Microsoft. The DDV groups the information into simple categories based on how it is used by Microsoft. + +A user can turn on Windows diagnostic data viewing by going to go to *Start > Settings > Privacy > Diagnostics & feedback*. Under the ‘Diagnostic data viewer’ section, the user has to enable the ‘If data viewing is enabled, you can see your diagnostics data’ option. After DDV is installed on the device, the user can start it by clicking the ‘Diagnostic Data Viewer’ in the ‘Diagnostic data viewer’ section of *Start > Settings > Privacy > Diagnostics & feedback*. + +Also, the user can delete all Windows diagnostic data collected from the device. This is done by clicking the ‘Delete’ button in the ‘Delete diagnostic data’ section of *Start > Settings > Privacy > Diagnostics & feedback*. + +### Windows 10 personal data services configuration + +Microsoft assembled a list of Windows 10 services configuration settings that are useful for personal data privacy protection and related regulations, such as the General Data Protection Regulation (GDPR). There is one section with settings for service data that is managed at Microsoft and a section for local data that is managed by an IT organization. + +IT Professionals that are interested in this configuration, see [Windows 10 personal data services configuration](windows-personal-data-services-configuration.md). + +### Windows 10 connections to Microsoft + +To find out more about the network connections that Windows components make to Microsoft as well as the privacy settings that affect data shared with either Microsoft or apps, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) and [Manage Windows 10 connection endpoints](manage-windows-endpoints.md). These articles describe how these settings can be managed by an IT Professional. + +### At-a-glance: the relationship between an IT organization and the GDPR + +Because Microsoft is a controller for data collected by Windows 10, the user can work with Microsoft to satisfy GDPR requirements. While this relationship between Microsoft and a user is evident in a consumer scenario, an IT organization can influence that relationship in an enterprise scenario. For example, the IT organization has the ability to centrally configure the Windows diagnostic data level by using Group Policy or MDM settings. + +## Windows Server + +Windows Server follows the same mechanisms as Windows 10 for handling of personal data – for example, when collecting Windows diagnostic data. + +More detailed information about Windows Server and the GDPR is available at Beginning your General Data Protection Regulation (GDPR) journey for Windows Server. + +### Windows diagnostic data and Windows Server + +The lowest diagnostic data setting level supported on Windows Server 2016 and Windows Server 2019 through management policies is “Security”. The lowest diagnostic data setting supported through the Settings UI is “Basic”. The default diagnostic data level for all Windows Server 2016 and Windows Server 2019 editions is “Enhanced”. + +IT administrators can configure the Windows Server diagnostic data settings using familiar management tools, such as Group Policy, MDM, or Windows Provisioning. IT administrators can also manually change settings using Registry Editor. Setting the Windows Server diagnostic data levels through a management policy overrides any device-level settings. + +There are two options for deleting Windows diagnostic data from a Windows Server machine: + +- If the “Desktop Experience” option was chosen during the installation of Windows Server 2019, then there are the same options available for an IT administrator that end users have with Windows 10, version 1803 and version 1809, to submit a request for deleting that device’s diagnostic data. This is done by clicking the **Delete** button in the **Delete diagnostic data** section of **Start > Settings > Privacy > Diagnostics & feedback**. +- Microsoft has provided a [PowerShell cmdlet](https://docs.microsoft.com/powershell/module/windowsdiagnosticdata) that IT administrators can use to delete Windows diagnostic data via the command line on a machine running Windows Server 2016 or Windows Server 2019. This cmdlet provides the same functionality for deleting Windows diagnostic data as with Desktop Experience on Windows Server 2019. For more information, see [the PowerShell Gallery](https://www.powershellgallery.com/packages/WindowsDiagnosticData). + +### Backups and Windows Server + +Backups, including live backups and backups that are stored locally within an organization or in the cloud, can contain personal data. + +- Backups an organizations creates, for example by using Windows Server Backup (WSB), are under its control. For example, for exporting personal data contained in a backup, the organization needs to restore the appropriate backup sets to facilitate the respective data subject request (DSR). +- The GDPR also applies when storing backups in the cloud. For example, an organization can use Microsoft Azure Backup to backup files and folders from physical or virtual Windows Server machines (located on-premises or in Azure) to the cloud. The organization that is subscribed to this backup service also has the obligation to restore the data in order to exercise the respective DSR. + +## Windows 10 Team Edition, Version 1703 for Surface Hub + +Surface Hub is a shared device used within an organization. The device identifier collected as part of diagnostic data is not connected to a user. For removing Windows diagnostic data sent to Microsoft for a Surface Hub, Microsoft created the Surface Hub Delete Diagnostic Data tool available in the Microsoft Store. + +>[!NOTE] +>Additional apps running on the device, that are not delivered as part of the in-box experience of Surface Hub, may implement their own diagnostic data collection and transmission functionality independently to collect and process personal data. Please contact the app publisher for further guidance on how to control this. + +An IT administrator can configure privacy- related settings, such as setting the Windows diagnostic data level to Basic. Surface Hub does not support group policy for centralized management; however, IT administrators can use MDM to apply these settings to Surface Hub. For more information about Surface Hub and MDM, please see [Manage settings with an MDM provider](https://docs.microsoft.com/surface-hub/manage-settings-with-mdm-for-surface-hub). + +## Further reading + +### Optional settings / features that further improve the protection of personal data + +Personal data protection is one of the goals of the GDPR. One way of improving personal data protection is to use the modern and advanced security features of Windows 10. An IT organization can learn more at [Mitigate threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10) and [Standards for a highly secure Windows 10 device](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-highly-secure). + +>[!NOTE] +>Some of these features might require a particular Windows hardware, such as a computer with a Trusted Platform Module (TPM) chip, and can depend on a particular Windows product (such as Windows 10 E5). + +### Windows Security Baselines + +Microsoft has created Windows Security Baselines to efficiently configure Windows 10 and Windows Server. For more information, please visit [Windows Security Baselines](/windows/security/threat-protection/windows-security-baselines). + +### Windows Restricted Traffic Limited Functionality Baseline + +To make it easier to deploy settings that restrict connections from Windows 10 and Windows Server to Microsoft, IT Professionals can apply the Windows Restricted Traffic Limited Functionality Baseline, available [here](https://go.microsoft.com/fwlink/?linkid=828887). + +>[!IMPORTANT] +>Some of the settings of the Windows Restricted Traffic Limited Functionality Baseline will reduce the functionality and security configuration of a device in the organization and are therefore not recommended. + +### Microsoft Trust Center and Service Trust Portal + +Please visit our [GDPR section of the Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/privacy/gdpr) to obtain additional resources and to learn more about how Microsoft can help you fulfill specific GDPR requirements. There you can find lots of useful information about the GDPR, including how Microsoft is helping customers to successfully master the GDPR, a FAQ list, and a list of [resources for GDPR compliance](https://www.microsoft.com/en-us/TrustCenter/Privacy/gdpr/resources). Also, please check out the [Compliance Manager](https://aka.ms/compliancemanager) of the Microsoft [Service Trust Portal (STP)](https://aka.ms/stp) and [Get Started: Support for GDPR Accountability](https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted). + +### Additional resources + +#### FAQs + +* [Windows 10 feedback, diagnostics, and privacy](https://privacy.microsoft.com/windows-10-feedback-diagnostics-and-privacy) +* [Microsoft Edge and privacy](https://privacy.microsoft.com/windows-10-microsoft-edge-and-privacy) +* [Windows Hello and privacy](https://privacy.microsoft.com/windows-10-windows-hello-and-privacy) +* [Wi-Fi Sense](https://privacy.microsoft.com/windows-10-about-wifi-sense) + +#### Blogs + +* [Privacy and Windows 10](https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10) + +#### Privacy Statement + +* [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) + +#### Other resources + +* [Privacy at Microsoft](https://privacy.microsoft.com/) diff --git a/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md index f9dbed1a8c..d886aa19d1 100644 --- a/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1709-non-enterprise-editions.md @@ -1,295 +1,295 @@ ---- -title: Windows 10, version 1709, connection endpoints for non-Enterprise editions -description: Explains what Windows 10 endpoints are used in non-Enterprise editions. -keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.localizationpriority: high -audience: ITPro -author: dansimp -ms.author: dansimp -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 6/26/2018 -ms.reviewer: ---- -# Windows 10, version 1709, connection endpoints for non-Enterprise editions - - **Applies to** - -- Windows 10 Home, version 1709 -- Windows 10 Professional, version 1709 -- Windows 10 Education, version 1709 - -In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-endpoints.md), the following endpoints are available on other editions of Windows 10, version 1709. - -We used the following methodology to derive these network endpoints: - -1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. -2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). -3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. -4. Compile reports on traffic going to public IP addresses. -5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. -6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. - -> [!NOTE] -> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. - -## Windows 10 Home - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -| *.tlu.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | -| *.wac.phicdn.net | HTTP | Used by the Verizon Content Delivery Network to perform Windows updates. | -| *.1.msftsrvcs.vo.llnwi.net | HTTP | Used for Windows Update downloads of apps and OS updates. | -| *.c-msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | -| *.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | -| *.dscd.akamai.net | HTTP | Used to download content. | -| *.dspg.akamaiedge.net | HTTP | Used to check for updates to maps that have been downloaded for offline use. | -| *.hwcdn.net | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates. | -| *.m1-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | -| *.wac.edgecastcdn.net | TLSv1.2 | Used by the Verizon Content Delivery Network to perform Windows updates. | -| *.wns.windows.com | TLSv1.2 | Used for the Windows Push Notification Services (WNS). | -| *prod.do.dsp.mp.microsoft.com | TLSv1.2\/HTTPS | Used for Windows Update downloads of apps and OS updates. | -| .g.akamaiedge.net | HTTP | Used to check for updates to maps that have been downloaded for offline use. | -| 2.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | -| 2.tlu.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | -| arc.msn.com | HTTPS | Used to retrieve Windows Spotlight metadata. | -| arc.msn.com.nsatc.net | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | -| a-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| au.download.windowsupdate.com | HTTP | Used to download operating system patches and updates. | -| b-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| candycrushsoda.king.com | TLSv1.2 | Used for Candy Crush Saga updates. | -| cdn.content.prod.cms.msn.com | HTTP | Used to retrieve Windows Spotlight metadata. | -| cdn.onenote.net | HTTP | Used for OneNote Live Tile. | -| client-office365-tas.msedge.net | HTTP | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | -| config.edge.skype.com | HTTP | Used to retrieve Skype configuration values. | -| ctldl.windowsupdate.com | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| cy2.licensing.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| cy2.purchase.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | TLSv1.2 | Used as a way for apps to dynamically update their configuration. | -| cy2.vortex.data.microsoft.com.akadns.net | TLSv1.2 | Used to retrieve Windows Insider Preview builds. | -| definitionupdates.microsoft.com | HTTPS | Used for Windows Defender definition updates. | -| displaycatalog.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| dl.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| dual-a-0001.a-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| fe2.update.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe2.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2\/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fg.download.windowsupdate.com.c.footprint.net | HTTP | Used to download operating system patches and updates. | -| fp.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| g.live.com/1rewlive5skydrive/ | HTTPS | Used by a redirection service to automatically update URLs. | -| g.msn.com.nsatc.net | HTTP | Used to retrieve Windows Spotlight metadata. | -| geo-prod.do.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | -| go.microsoft.com | HTTPS | Used by a redirection service to automatically update URLs. | -| img-prod-cms-rt-microsoft-com.akamaized.net | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). | -| *.login.msa.akadns6.net | TLSv1.2 | Used for Microsoft accounts to sign in. | -| licensing.mp.microsoft.com | HTTPS | Used for online activation and some app licensing. | -| location-inference-westus.cloudapp.net | TLSv1.2 | Used for location data. | -| login.live.com | HTTPS | Used to authenticate a device. | -| mediaredirect.microsoft.com | HTTPS | Used by the Groove Music app to update HTTP handler status. | -| modern.watson.data.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | -| msftsrvcs.vo.llnwd.net | HTTP | Enables connections to Windows Update. | -| msnbot-*.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | -| oem.twimg.com | HTTPS | Used for the Twitter Live Tile. | -| oneclient.sfx.ms | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| peer4-wst.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| pti.store.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| pti.store.microsoft.com.unistore.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| purchase.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| ris.api.iris.microsoft.com.akadns.net | TLSv1.2\/HTTPS | Used to retrieve Windows Spotlight metadata. | -| settings-win.data.microsoft.com | HTTPS | Used for Windows apps to dynamically update their configuration. | -| sls.update.microsoft.com.nsatc.net | TLSv1.2\/HTTPS | Enables connections to Windows Update. | -| star-mini.c10r.facebook.com | TLSv1.2 | Used for the Facebook Live Tile. | -| storecatalogrevocation.storequality.microsoft.com | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | -| storeedgefd.dsx.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| store-images.s-microsoft.com | HTTP | Used to get images that are used for Microsoft Store suggestions. | -| tile-service.weather.microsoft.com | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | TLSv1.2 | Used for content regulation. | -| v10.vortex-win.data.microsoft.com | HTTPS | Used to retrieve Windows Insider Preview builds. | -| wallet.microsoft.com | HTTPS | Used by the Microsoft Wallet app. | -| wallet-frontend-prod-westus.cloudapp.net | TLSv1.2 | Used by the Microsoft Wallet app. | -| *.telemetry.microsoft.com | HTTPS | Used by Windows Error Reporting. | -| ceuswatcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| ceuswatcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| eaus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| eaus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| weus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| weus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| wdcp.microsoft.akadns.net | TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled. | -| wildcard.twimg.com | TLSv1.2 | Used for the Twitter Live Tile. | -| www.bing.com | HTTP | Used for updates for Cortana, apps, and Live Tiles. | -| www.facebook.com | HTTPS | Used for the Facebook Live Tile. | -| [www.microsoft.com](https://www.microsoft.com/) | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | - -## Windows 10 Pro - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -| *.*.akamai.net | HTTP | Used to download content. | -| *.*.akamaiedge.net | TLSv1.2\/HTTP | Used to check for updates to maps that have been downloaded for offline use. | -| *.a-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.blob.core.windows.net | HTTPS | Used by Windows Update to update words used for language input methods. | -| *.c-msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | -| *.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | -| *.dspb.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | -| *.dspg.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | -| *.e-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.login.msa.akadns6.net | TLSv1.2 | Used for Microsoft accounts to sign in. | -| *.s-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.telecommand.telemetry.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | -| *.wac.edgecastcdn.net | TLSv1.2 | Used by the Verizon Content Delivery Network to perform Windows updates. | -| *.wac.phicdn.net | HTTP | Used by the Verizon Content Delivery Network to perform Windows updates. | -| *.wns.windows.com | TLSv1.2 | Used for the Windows Push Notification Services (WNS). | -| *prod.do.dsp.mp.microsoft.com | TLSv1.2\/HTTPS | Used for Windows Update downloads of apps and OS updates. | -| 3.dl.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| 3.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | -| 3.tlu.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | -| 3.tlu.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | -| arc.msn.com | HTTPS | Used to retrieve Windows Spotlight metadata. | -| arc.msn.com.nsatc.net | TLSv1.3 | Used to retrieve Windows Spotlight metadata. | -| au.download.windowsupdate.com | HTTPS | Used to download operating system patches and updates. | -| b-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| candycrushsoda.king.com | HTTPS | Used for Candy Crush Saga updates. | -| cdn.content.prod.cms.msn.com | HTTP | Used to retrieve Windows Spotlight metadata. | -| cdn.onenote.net | HTTPS | Used for OneNote Live Tile. | -| client-office365-tas.msedge.net | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | -| config.edge.skype.com | HTTPS | Used to retrieve Skype configuration values. | -| ctldl.windowsupdate.com | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cs12.wpc.v0cdn.net | HTTP | Used by the Verizon Content Delivery Network to download content for Windows upgrades with Wireless Planning and Coordination (WPC). | -| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | TLSv1.2 | Used as a way for apps to dynamically update their configuration. | -| cy2.vortex.data.microsoft.com.akadns.net | TLSv1.2 | Used to retrieve Windows Insider Preview builds. | -| definitionupdates.microsoft.com | HTTPS | Used for Windows Defender definition updates. | -| displaycatalog.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| download.windowsupdate.com | HTTP | Enables connections to Windows Update. | -| evoke-windowsservices-tas.msedge.net | HTTPS | Used by the Photos app to download configuration files, and to connect to the Office 365 portal’s shared infrastructure, including Office. | -| fe2.update.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe2.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2\/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fg.download.windowsupdate.com.c.footprint.net | HTTP | Used to download operating system patches and updates. | -| fp.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| fs.microsoft.com | HTTPS | Used to download fonts on demand | -| g.live.com | HTTP | Used by a redirection service to automatically update URLs. | -| g.msn.com | HTTPS | Used to retrieve Windows Spotlight metadata. | -| g.msn.com.nsatc.net | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | -| geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| geover-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| go.microsoft.com | HTTPS | Used by a redirection service to automatically update URLs. | -| gpla1.wac.v2cdn.net | HTTP | Used for Baltimore CyberTrust Root traffic. . | -| img-prod-cms-rt-microsoft-com.akamaized.net | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). | -| licensing.mp.microsoft.com | HTTPS | Used for online activation and some app licensing. | -| location-inference-westus.cloudapp.net | TLSv1.2 | Used for location data. | -| login.live.com | HTTPS | Used to authenticate a device. | -| l-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| mediaredirect.microsoft.com | HTTPS | Used by the Groove Music app to update HTTP handler status. | -| modern.watson.data.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | -| msnbot-*.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | -| oem.twimg.com | HTTP | Used for the Twitter Live Tile. | -| oneclient.sfx.ms | HTTP | Used by OneDrive for Business to download and verify app updates. | -| peer1-wst.msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | -| pti.store.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| pti.store.microsoft.com.unistore.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| purchase.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| ris.api.iris.microsoft.com | HTTPS | Used to retrieve Windows Spotlight metadata. | -| settings-win.data.microsoft.com | HTTPS | Used for Windows apps to dynamically update their configuration. | -| sls.update.microsoft.com | HTTPS | Enables connections to Windows Update. | -| storecatalogrevocation.storequality.microsoft.com | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | -| storeedgefd.dsx.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | -| store-images.s-microsoft.com | HTTPS | Used to get images that are used for Microsoft Store suggestions. | -| store-images.s-microsoft.com | HTTPS | Used to get images that are used for Microsoft Store suggestions. | -| *.telemetry.microsoft.com | HTTPS | Used by Windows Error Reporting. | -| ceuswatcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| ceuswatcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| eaus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| eaus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| weus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| weus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| tile-service.weather.microsoft.com | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | -| v10.vortex-win.data.microsoft.com | HTTPS | Used to retrieve Windows Insider Preview builds. | -| wallet.microsoft.com | HTTPS | Used by the Microsoft Wallet app. | -| wdcp.microsoft.akadns.net | HTTPS | Used for Windows Defender when Cloud-based Protection is enabled. | -| wildcard.twimg.com | TLSv1.2 | Used for the Twitter Live Tile. | -| www.bing.com | TLSv1.2 | Used for updates for Cortana, apps, and Live Tiles. | -| www.facebook.com | HTTPS | Used for the Facebook Live Tile. | -| [www.microsoft.com](https://www.microsoft.com/) | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | - -## Windows 10 Education - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -| *.a-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.b.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | -| *.c-msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | -| *.dscb1.akamaiedge.net | HTTP | Used to check for updates to maps that have been downloaded for offline use. | -| *.dscd.akamai.net | HTTP | Used to download content. | -| *.dspb.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | -| *.dspw65.akamai.net | HTTP | Used to download content. | -| *.e-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.g.akamai.net | HTTP | Used to download content. | -| *.g.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | -| *.l.windowsupdate.com | HTTP | Enables connections to Windows Update. | -| *.s-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | -| *.wac.phicdn.net | HTTP | Used by the Verizon Content Delivery Network to perform Windows updates | -| *.wns.windows.com | TLSv1.2 | Used for the Windows Push Notification Services (WNS). | -| *prod.do.dsp.mp.microsoft.com | TLSv1.2 | Used for Windows Update downloads of apps and OS updates. | -| *prod.do.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Used for Windows Update downloads of apps and OS updates. | -| 3.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | -| 3.tlu.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | -| a-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| au.download.windowsupdate.com | HTTP | Used to download operating system patches and updates. | -| cdn.onenote.net | HTTPS | Used for OneNote Live Tile. | -| cds.*.hwcdn.net | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates. | -| co4.telecommand.telemetry.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | -| config.edge.skype.com | HTTPS | Used to retrieve Skype configuration values. | -| ctldl.windowsupdate.com | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cs12.wpc.v0cdn.net | HTTP | Used by the Verizon Content Delivery Network to download content for Windows upgrades with Wireless Planning and Coordination (WPC). | -| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | TLSv1.2 | Used as a way for apps to dynamically update their configuration. | -| cy2.vortex.data.microsoft.com.akadns.net | TLSv1.2 | Used to retrieve Windows Insider Preview builds. | -| dl.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| download.windowsupdate.com | HTTP | Enables connections to Windows Update. | -| evoke-windowsservices-tas.msedge.net/ab | HTTPS | Used by the Photos app to download configuration files, and to connect to the Office 365 portal’s shared infrastructure, including Office. | -| fe2.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | -| fg.download.windowsupdate.com.c.footprint.net | HTTP | Used to download operating system patches and updates. | -| fp.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| g.msn.com.nsatc.net | TLSv1.2\/HTTP | Used to retrieve Windows Spotlight metadata. | -| geo-prod.do.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | -| geover-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| go.microsoft.com | HTTPS | Used by a redirection service to automatically update URLs. | -| gpla1.wac.v2cdn.net | HTTP | Used for Baltimore CyberTrust Root traffic. . | -| ipv4.login.msa.akadns6.net | TLSv1.2 | Used for Microsoft accounts to sign in. | -| licensing.mp.microsoft.com | HTTPS | Used for online activation and some app licensing. | -| location-inference-westus.cloudapp.net | TLSv1.2 | Used for location data. | -| login.live.com/* | HTTPS | Used to authenticate a device. | -| l-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| mediaredirect.microsoft.com | HTTPS | Used by the Groove Music app to update HTTP handler status. | -| modern.watson.data.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | -| msftconnecttest.com/* | HTTP | Used by Network Connection Status Indicator (NCSI) to detect Internet connectivity and corporate network connectivity status. | -| msnbot-65-52-108-198.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | -| oneclient.sfx.ms | HTTP | Used by OneDrive for Business to download and verify app updates. | -| peer1-wst.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| pti.store.microsoft.com.unistore.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | -| settings-win.data.microsoft.com | HTTPS | Used for Windows apps to dynamically update their configuration. | -| sls.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | -| store-images.s-microsoft.com | HTTPS | Used to get images that are used for Microsoft Store suggestions. | -| tile-service.weather.microsoft.com | HTTP | Used to download updates to the Weather app Live Tile. | -| *.telemetry.microsoft.com | HTTPS | Used by Windows Error Reporting. | -| ceuswatcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| ceuswatcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| eaus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| eaus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| weus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| weus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | TLSv1.2 | Used for content regulation. | -| wallet.microsoft.com | HTTPS | Used by the Microsoft Wallet app. | - -| wdcp.microsoft.akadns.net | TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled. | -| www.bing.com | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | +--- +title: Windows 10, version 1709, connection endpoints for non-Enterprise editions +description: Explains what Windows 10 endpoints are used in non-Enterprise editions. +keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.localizationpriority: high +audience: ITPro +author: dansimp +ms.author: dansimp +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 6/26/2018 +ms.reviewer: +--- +# Windows 10, version 1709, connection endpoints for non-Enterprise editions + + **Applies to** + +- Windows 10 Home, version 1709 +- Windows 10 Professional, version 1709 +- Windows 10 Education, version 1709 + +In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-endpoints.md), the following endpoints are available on other editions of Windows 10, version 1709. + +We used the following methodology to derive these network endpoints: + +1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. +2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). +3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. +4. Compile reports on traffic going to public IP addresses. +5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. +6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. + +> [!NOTE] +> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. + +## Windows 10 Home + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.tlu.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | +| *.wac.phicdn.net | HTTP | Used by the Verizon Content Delivery Network to perform Windows updates. | +| *.1.msftsrvcs.vo.llnwi.net | HTTP | Used for Windows Update downloads of apps and OS updates. | +| *.c-msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | +| *.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | +| *.dscd.akamai.net | HTTP | Used to download content. | +| *.dspg.akamaiedge.net | HTTP | Used to check for updates to maps that have been downloaded for offline use. | +| *.hwcdn.net | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates. | +| *.m1-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | +| *.wac.edgecastcdn.net | TLSv1.2 | Used by the Verizon Content Delivery Network to perform Windows updates. | +| *.wns.windows.com | TLSv1.2 | Used for the Windows Push Notification Services (WNS). | +| *prod.do.dsp.mp.microsoft.com | TLSv1.2\/HTTPS | Used for Windows Update downloads of apps and OS updates. | +| .g.akamaiedge.net | HTTP | Used to check for updates to maps that have been downloaded for offline use. | +| 2.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | +| 2.tlu.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | +| arc.msn.com | HTTPS | Used to retrieve Windows Spotlight metadata. | +| arc.msn.com.nsatc.net | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | +| a-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| au.download.windowsupdate.com | HTTP | Used to download operating system patches and updates. | +| b-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| candycrushsoda.king.com | TLSv1.2 | Used for Candy Crush Saga updates. | +| cdn.content.prod.cms.msn.com | HTTP | Used to retrieve Windows Spotlight metadata. | +| cdn.onenote.net | HTTP | Used for OneNote Live Tile. | +| client-office365-tas.msedge.net | HTTP | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | +| config.edge.skype.com | HTTP | Used to retrieve Skype configuration values. | +| ctldl.windowsupdate.com | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| cy2.licensing.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| cy2.purchase.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | TLSv1.2 | Used as a way for apps to dynamically update their configuration. | +| cy2.vortex.data.microsoft.com.akadns.net | TLSv1.2 | Used to retrieve Windows Insider Preview builds. | +| definitionupdates.microsoft.com | HTTPS | Used for Windows Defender definition updates. | +| displaycatalog.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| dl.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| dual-a-0001.a-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| fe2.update.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe2.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2\/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fg.download.windowsupdate.com.c.footprint.net | HTTP | Used to download operating system patches and updates. | +| fp.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| g.live.com/1rewlive5skydrive/ | HTTPS | Used by a redirection service to automatically update URLs. | +| g.msn.com.nsatc.net | HTTP | Used to retrieve Windows Spotlight metadata. | +| geo-prod.do.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | +| go.microsoft.com | HTTPS | Used by a redirection service to automatically update URLs. | +| img-prod-cms-rt-microsoft-com.akamaized.net | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). | +| *.login.msa.akadns6.net | TLSv1.2 | Used for Microsoft accounts to sign in. | +| licensing.mp.microsoft.com | HTTPS | Used for online activation and some app licensing. | +| location-inference-westus.cloudapp.net | TLSv1.2 | Used for location data. | +| login.live.com | HTTPS | Used to authenticate a device. | +| mediaredirect.microsoft.com | HTTPS | Used by the Groove Music app to update HTTP handler status. | +| modern.watson.data.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | +| msftsrvcs.vo.llnwd.net | HTTP | Enables connections to Windows Update. | +| msnbot-*.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | +| oem.twimg.com | HTTPS | Used for the Twitter Live Tile. | +| oneclient.sfx.ms | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| peer4-wst.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| pti.store.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| pti.store.microsoft.com.unistore.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| purchase.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| ris.api.iris.microsoft.com.akadns.net | TLSv1.2\/HTTPS | Used to retrieve Windows Spotlight metadata. | +| settings-win.data.microsoft.com | HTTPS | Used for Windows apps to dynamically update their configuration. | +| sls.update.microsoft.com.nsatc.net | TLSv1.2\/HTTPS | Enables connections to Windows Update. | +| star-mini.c10r.facebook.com | TLSv1.2 | Used for the Facebook Live Tile. | +| storecatalogrevocation.storequality.microsoft.com | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | +| storeedgefd.dsx.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| store-images.s-microsoft.com | HTTP | Used to get images that are used for Microsoft Store suggestions. | +| tile-service.weather.microsoft.com | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | TLSv1.2 | Used for content regulation. | +| v10.vortex-win.data.microsoft.com | HTTPS | Used to retrieve Windows Insider Preview builds. | +| wallet.microsoft.com | HTTPS | Used by the Microsoft Wallet app. | +| wallet-frontend-prod-westus.cloudapp.net | TLSv1.2 | Used by the Microsoft Wallet app. | +| *.telemetry.microsoft.com | HTTPS | Used by Windows Error Reporting. | +| ceuswatcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| ceuswatcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| eaus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| eaus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| weus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| weus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| wdcp.microsoft.akadns.net | TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled. | +| wildcard.twimg.com | TLSv1.2 | Used for the Twitter Live Tile. | +| www.bing.com | HTTP | Used for updates for Cortana, apps, and Live Tiles. | +| www.facebook.com | HTTPS | Used for the Facebook Live Tile. | +| [www.microsoft.com](https://www.microsoft.com/) | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | + +## Windows 10 Pro + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.*.akamai.net | HTTP | Used to download content. | +| *.*.akamaiedge.net | TLSv1.2\/HTTP | Used to check for updates to maps that have been downloaded for offline use. | +| *.a-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.blob.core.windows.net | HTTPS | Used by Windows Update to update words used for language input methods. | +| *.c-msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | +| *.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | +| *.dspb.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | +| *.dspg.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | +| *.e-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.login.msa.akadns6.net | TLSv1.2 | Used for Microsoft accounts to sign in. | +| *.s-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.telecommand.telemetry.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | +| *.wac.edgecastcdn.net | TLSv1.2 | Used by the Verizon Content Delivery Network to perform Windows updates. | +| *.wac.phicdn.net | HTTP | Used by the Verizon Content Delivery Network to perform Windows updates. | +| *.wns.windows.com | TLSv1.2 | Used for the Windows Push Notification Services (WNS). | +| *prod.do.dsp.mp.microsoft.com | TLSv1.2\/HTTPS | Used for Windows Update downloads of apps and OS updates. | +| 3.dl.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| 3.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | +| 3.tlu.dl.delivery.mp.microsoft.com | HTTP | Enables connections to Windows Update. | +| 3.tlu.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | +| arc.msn.com | HTTPS | Used to retrieve Windows Spotlight metadata. | +| arc.msn.com.nsatc.net | TLSv1.3 | Used to retrieve Windows Spotlight metadata. | +| au.download.windowsupdate.com | HTTPS | Used to download operating system patches and updates. | +| b-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| candycrushsoda.king.com | HTTPS | Used for Candy Crush Saga updates. | +| cdn.content.prod.cms.msn.com | HTTP | Used to retrieve Windows Spotlight metadata. | +| cdn.onenote.net | HTTPS | Used for OneNote Live Tile. | +| client-office365-tas.msedge.net | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | +| config.edge.skype.com | HTTPS | Used to retrieve Skype configuration values. | +| ctldl.windowsupdate.com | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cs12.wpc.v0cdn.net | HTTP | Used by the Verizon Content Delivery Network to download content for Windows upgrades with Wireless Planning and Coordination (WPC). | +| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | TLSv1.2 | Used as a way for apps to dynamically update their configuration. | +| cy2.vortex.data.microsoft.com.akadns.net | TLSv1.2 | Used to retrieve Windows Insider Preview builds. | +| definitionupdates.microsoft.com | HTTPS | Used for Windows Defender definition updates. | +| displaycatalog.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| download.windowsupdate.com | HTTP | Enables connections to Windows Update. | +| evoke-windowsservices-tas.msedge.net | HTTPS | Used by the Photos app to download configuration files, and to connect to the Office 365 portal’s shared infrastructure, including Office. | +| fe2.update.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe2.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2\/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fg.download.windowsupdate.com.c.footprint.net | HTTP | Used to download operating system patches and updates. | +| fp.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| fs.microsoft.com | HTTPS | Used to download fonts on demand | +| g.live.com | HTTP | Used by a redirection service to automatically update URLs. | +| g.msn.com | HTTPS | Used to retrieve Windows Spotlight metadata. | +| g.msn.com.nsatc.net | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | +| geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| geover-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| go.microsoft.com | HTTPS | Used by a redirection service to automatically update URLs. | +| gpla1.wac.v2cdn.net | HTTP | Used for Baltimore CyberTrust Root traffic. . | +| img-prod-cms-rt-microsoft-com.akamaized.net | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps). | +| licensing.mp.microsoft.com | HTTPS | Used for online activation and some app licensing. | +| location-inference-westus.cloudapp.net | TLSv1.2 | Used for location data. | +| login.live.com | HTTPS | Used to authenticate a device. | +| l-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| mediaredirect.microsoft.com | HTTPS | Used by the Groove Music app to update HTTP handler status. | +| modern.watson.data.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | +| msnbot-*.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | +| oem.twimg.com | HTTP | Used for the Twitter Live Tile. | +| oneclient.sfx.ms | HTTP | Used by OneDrive for Business to download and verify app updates. | +| peer1-wst.msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | +| pti.store.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| pti.store.microsoft.com.unistore.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| purchase.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| ris.api.iris.microsoft.com | HTTPS | Used to retrieve Windows Spotlight metadata. | +| settings-win.data.microsoft.com | HTTPS | Used for Windows apps to dynamically update their configuration. | +| sls.update.microsoft.com | HTTPS | Enables connections to Windows Update. | +| storecatalogrevocation.storequality.microsoft.com | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | +| storeedgefd.dsx.mp.microsoft.com | HTTPS | Used to communicate with Microsoft Store. | +| store-images.s-microsoft.com | HTTPS | Used to get images that are used for Microsoft Store suggestions. | +| store-images.s-microsoft.com | HTTPS | Used to get images that are used for Microsoft Store suggestions. | +| *.telemetry.microsoft.com | HTTPS | Used by Windows Error Reporting. | +| ceuswatcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| ceuswatcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| eaus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| eaus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| weus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| weus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| tile-service.weather.microsoft.com | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | +| v10.vortex-win.data.microsoft.com | HTTPS | Used to retrieve Windows Insider Preview builds. | +| wallet.microsoft.com | HTTPS | Used by the Microsoft Wallet app. | +| wdcp.microsoft.akadns.net | HTTPS | Used for Windows Defender when Cloud-based Protection is enabled. | +| wildcard.twimg.com | TLSv1.2 | Used for the Twitter Live Tile. | +| www.bing.com | TLSv1.2 | Used for updates for Cortana, apps, and Live Tiles. | +| www.facebook.com | HTTPS | Used for the Facebook Live Tile. | +| [www.microsoft.com](https://www.microsoft.com/) | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | + +## Windows 10 Education + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.a-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.b.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | +| *.c-msedge.net | HTTP | Used by OfficeHub to get the metadata of Office apps. | +| *.dscb1.akamaiedge.net | HTTP | Used to check for updates to maps that have been downloaded for offline use. | +| *.dscd.akamai.net | HTTP | Used to download content. | +| *.dspb.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | +| *.dspw65.akamai.net | HTTP | Used to download content. | +| *.e-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.g.akamai.net | HTTP | Used to download content. | +| *.g.akamaiedge.net | TLSv1.2 | Used to check for updates to maps that have been downloaded for offline use. | +| *.l.windowsupdate.com | HTTP | Enables connections to Windows Update. | +| *.s-msedge.net | TLSv1.2 | Used by OfficeHub to get the metadata of Office apps. | +| *.wac.phicdn.net | HTTP | Used by the Verizon Content Delivery Network to perform Windows updates | +| *.wns.windows.com | TLSv1.2 | Used for the Windows Push Notification Services (WNS). | +| *prod.do.dsp.mp.microsoft.com | TLSv1.2 | Used for Windows Update downloads of apps and OS updates. | +| *prod.do.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Used for Windows Update downloads of apps and OS updates. | +| 3.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | +| 3.tlu.dl.delivery.mp.microsoft.com.c.footprint.net | HTTP | Enables connections to Windows Update. | +| a-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| au.download.windowsupdate.com | HTTP | Used to download operating system patches and updates. | +| cdn.onenote.net | HTTPS | Used for OneNote Live Tile. | +| cds.*.hwcdn.net | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates. | +| co4.telecommand.telemetry.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | +| config.edge.skype.com | HTTPS | Used to retrieve Skype configuration values. | +| ctldl.windowsupdate.com | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cs12.wpc.v0cdn.net | HTTP | Used by the Verizon Content Delivery Network to download content for Windows upgrades with Wireless Planning and Coordination (WPC). | +| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | TLSv1.2 | Used as a way for apps to dynamically update their configuration. | +| cy2.vortex.data.microsoft.com.akadns.net | TLSv1.2 | Used to retrieve Windows Insider Preview builds. | +| dl.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| download.windowsupdate.com | HTTP | Enables connections to Windows Update. | +| evoke-windowsservices-tas.msedge.net/ab | HTTPS | Used by the Photos app to download configuration files, and to connect to the Office 365 portal’s shared infrastructure, including Office. | +| fe2.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | +| fg.download.windowsupdate.com.c.footprint.net | HTTP | Used to download operating system patches and updates. | +| fp.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| g.msn.com.nsatc.net | TLSv1.2\/HTTP | Used to retrieve Windows Spotlight metadata. | +| geo-prod.do.dsp.mp.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | +| geover-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| go.microsoft.com | HTTPS | Used by a redirection service to automatically update URLs. | +| gpla1.wac.v2cdn.net | HTTP | Used for Baltimore CyberTrust Root traffic. . | +| ipv4.login.msa.akadns6.net | TLSv1.2 | Used for Microsoft accounts to sign in. | +| licensing.mp.microsoft.com | HTTPS | Used for online activation and some app licensing. | +| location-inference-westus.cloudapp.net | TLSv1.2 | Used for location data. | +| login.live.com/* | HTTPS | Used to authenticate a device. | +| l-ring.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| mediaredirect.microsoft.com | HTTPS | Used by the Groove Music app to update HTTP handler status. | +| modern.watson.data.microsoft.com.akadns.net | TLSv1.2 | Used by Windows Error Reporting. | +| msftconnecttest.com/* | HTTP | Used by Network Connection Status Indicator (NCSI) to detect Internet connectivity and corporate network connectivity status. | +| msnbot-65-52-108-198.search.msn.com | TLSv1.2 | Used to retrieve Windows Spotlight metadata. | +| oneclient.sfx.ms | HTTP | Used by OneDrive for Business to download and verify app updates. | +| peer1-wst.msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| pti.store.microsoft.com.unistore.akadns.net | TLSv1.2 | Used to communicate with Microsoft Store. | +| settings-win.data.microsoft.com | HTTPS | Used for Windows apps to dynamically update their configuration. | +| sls.update.microsoft.com.nsatc.net | TLSv1.2 | Enables connections to Windows Update. | +| store-images.s-microsoft.com | HTTPS | Used to get images that are used for Microsoft Store suggestions. | +| tile-service.weather.microsoft.com | HTTP | Used to download updates to the Weather app Live Tile. | +| *.telemetry.microsoft.com | HTTPS | Used by Windows Error Reporting. | +| ceuswatcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| ceuswatcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| eaus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| eaus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| weus2watcab01.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| weus2watcab02.blob.core.windows.net | HTTPS | Used by Windows Error Reporting. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | TLSv1.2 | Used for content regulation. | +| wallet.microsoft.com | HTTPS | Used by the Microsoft Wallet app. | + +| wdcp.microsoft.akadns.net | TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled. | +| www.bing.com | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | diff --git a/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md b/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md index 7b3c0d3958..574818973c 100644 --- a/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-1803-non-enterprise-editions.md @@ -1,165 +1,165 @@ ---- -title: Windows 10, version 1803, connection endpoints for non-Enterprise editions -description: Explains what Windows 10 endpoints are used in non-Enterprise editions. -keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.localizationpriority: high -audience: ITPro -author: dansimp -ms.author: dansimp -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 6/26/2018 -ms.reviewer: ---- -# Windows 10, version 1803, connection endpoints for non-Enterprise editions - - **Applies to** - -- Windows 10 Home, version 1803 -- Windows 10 Professional, version 1803 -- Windows 10 Education, version 1803 - -In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-endpoints.md), the following endpoints are available on other editions of Windows 10, version 1803. - -We used the following methodology to derive these network endpoints: - -1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. -2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). -3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. -4. Compile reports on traffic going to public IP addresses. -5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. -6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. - -> [!NOTE] -> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. - -## Windows 10 Family - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/ | HTTP | Enables connections to Windows Update. | -| arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| arc.msn.com/v3/Delivery/Placement | HTTPS | Used to retrieve Windows Spotlight metadata. | -| client-office365-tas.msedge.net* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | -| config.edge.skype.com/config/* | HTTPS | Used to retrieve Skype configuration values. | -| ctldl.windowsupdate.com/msdownload/update* | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| displaycatalog.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store. | -| dm3p.wns.notify.windows.com.akadns.net | HTTPS | Used for the Windows Push Notification Services (WNS). | -| fe2.update.microsoft.com* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| g.live.com/odclientsettings/Prod | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | -| ip5.afdorigin-prod-am02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic. | -| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | -| licensing.mp.microsoft.com/v7.0/licenses/content | HTTPS | Used for online activation and some app licensing. | -| location-inference-westus.cloudapp.net | HTTPS | Used for location data. | -| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application. | -| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| ocos-office365-s2s.msedge.net* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. | -| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | -| oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| onecollector.cloudapp.aria.akadns.net | HTTPS | Office Telemetry | -| prod.nexusrules.live.com.akadns.net | HTTPS | Office Telemetry | -| query.prod.cms.rt.microsoft.com* | HTTPS | Used to retrieve Windows Spotlight metadata. | -| ris.api.iris.microsoft.com* | HTTPS | Used to retrieve Windows Spotlight metadata. | -| settings.data.microsoft.com/settings/v2.0/* | HTTPS | Used for Windows apps to dynamically update their configuration. | -| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration.  | -| share.microsoft.com/windows-app-web-link | HTTPS | Traffic related to Books app | -| sls.update.microsoft.com* | HTTPS | Enables connections to Windows Update. | -| storecatalogrevocation.storequality.microsoft.com* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | -| storeedgefd.dsx.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store. | -| tile-service.weather.microsoft.com* | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | -| us.configsvc1.live.com.akadns.net | HTTPS | Microsoft Office configuration related traffic | -| watson.telemetry.microsoft.com/Telemetry.Request | HTTPS | Used by Windows Error Reporting. | -| wd-prod-cp-us-east-2-fe.eastus.cloudapp.azure.com | HTTPS | Azure front end traffic | - - -## Windows 10 Pro -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.tlu.dl.delivery.mp.microsoft.com/* | HTTP | Enables connections to Windows Update. | -| *geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | -| arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| au.download.windowsupdate.com/* | HTTP | Enables connections to Windows Update. | -| ctldl.windowsupdate.com/msdownload/update/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| dm3p.wns.notify.windows.com.akadns.net | HTTPS | Used for the Windows Push Notification Services (WNS) | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| flightingservicewus.cloudapp.net | HTTPS | Insider Program | -| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | -| location-inference-westus.cloudapp.net | HTTPS | Used for location data. | -| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | -| onecollector.cloudapp.aria.akadns.net | HTTPS | Office Telemetry | -| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | -| vip5.afdorigin-prod-am02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic | - - -## Windows 10 Education - -| **Destination** | **Protocol** | **Description** | -| --- | --- | --- | -| *.b.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | -| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | -| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| *.tlu.dl.delivery.mp.microsoft.com* | HTTP | Enables connections to Windows Update. | -| *.windowsupdate.com* | HTTP | Enables connections to Windows Update. | -| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | -| au.download.windowsupdate.com* | HTTP | Enables connections to Windows Update. | -| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. | -| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | -| cloudtile.photos.microsoft.com.akadns.net | HTTPS | Photos App in MS Store -| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values.  | -| ctldl.windowsupdate.com/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | -| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | -| displaycatalog.mp.microsoft.com/* | HTTPS | Used to communicate with Microsoft Store. | -| download.windowsupdate.com/* | HTTPS | Enables connections to Windows Update. | -| emdl.ws.microsoft.com/* | HTTP | Used to download apps from the Microsoft Store. | -| fe2.update.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| fe3.delivery.mp.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | -| flightingservicewus.cloudapp.net | HTTPS | Insider Program | -| g.live.com/odclientsettings/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | -| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | -| licensing.mp.microsoft.com/* | HTTPS | Used for online activation and some app licensing. | -| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application | -| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | -| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. | -| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | -| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | -| onecollector.cloudapp.aria.akadns.net | HTTPS | Office telemetry | -| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. | -| share.microsoft.com/windows-app-web-link | HTTPS | Traffic related to Books app | -| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. | -| storecatalogrevocation.storequality.microsoft.com/* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | -| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | -| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | -| vip5.afdorigin-prod-ch02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic. | -| watson.telemetry.microsoft.com/Telemetry.Request | HTTPS | Used by Windows Error Reporting. | -| wd-prod-cp-us-west-3-fe.westus.cloudapp.azure.com | HTTPS | Azure front end traffic | -| www.bing.com/* | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | +--- +title: Windows 10, version 1803, connection endpoints for non-Enterprise editions +description: Explains what Windows 10 endpoints are used in non-Enterprise editions. +keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016 +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.localizationpriority: high +audience: ITPro +author: dansimp +ms.author: dansimp +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 6/26/2018 +ms.reviewer: +--- +# Windows 10, version 1803, connection endpoints for non-Enterprise editions + + **Applies to** + +- Windows 10 Home, version 1803 +- Windows 10 Professional, version 1803 +- Windows 10 Education, version 1803 + +In addition to the endpoints listed for [Windows 10 Enterprise](manage-windows-endpoints.md), the following endpoints are available on other editions of Windows 10, version 1803. + +We used the following methodology to derive these network endpoints: + +1. Set up the latest version of Windows 10 on a test virtual machine using the default settings. +2. Leave the devices running idle for a week (that is, a user is not interacting with the system/device). +3. Use globally accepted network protocol analyzer/capturing tools and log all background egress traffic. +4. Compile reports on traffic going to public IP addresses. +5. The test virtual machine was logged in using a local account and was not joined to a domain or Azure Active Directory. +6. All traffic was captured in our lab using a IPV4 network. Therefore no IPV6 traffic is reported here. + +> [!NOTE] +> Microsoft uses global load balancers that can appear in network trace-routes. For example, an endpoint for *.akadns.net might be used to load balance requests to an Azure datacenter, which can change over time. + +## Windows 10 Family + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/ | HTTP | Enables connections to Windows Update. | +| arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| arc.msn.com/v3/Delivery/Placement | HTTPS | Used to retrieve Windows Spotlight metadata. | +| client-office365-tas.msedge.net* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | +| config.edge.skype.com/config/* | HTTPS | Used to retrieve Skype configuration values. | +| ctldl.windowsupdate.com/msdownload/update* | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| displaycatalog.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store. | +| dm3p.wns.notify.windows.com.akadns.net | HTTPS | Used for the Windows Push Notification Services (WNS). | +| fe2.update.microsoft.com* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.mp.microsoft.com | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| g.live.com/odclientsettings/Prod | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | +| ip5.afdorigin-prod-am02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic. | +| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | +| licensing.mp.microsoft.com/v7.0/licenses/content | HTTPS | Used for online activation and some app licensing. | +| location-inference-westus.cloudapp.net | HTTPS | Used for location data. | +| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application. | +| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| ocos-office365-s2s.msedge.net* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. | +| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | +| oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| onecollector.cloudapp.aria.akadns.net | HTTPS | Office Telemetry | +| prod.nexusrules.live.com.akadns.net | HTTPS | Office Telemetry | +| query.prod.cms.rt.microsoft.com* | HTTPS | Used to retrieve Windows Spotlight metadata. | +| ris.api.iris.microsoft.com* | HTTPS | Used to retrieve Windows Spotlight metadata. | +| settings.data.microsoft.com/settings/v2.0/* | HTTPS | Used for Windows apps to dynamically update their configuration. | +| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration.  | +| share.microsoft.com/windows-app-web-link | HTTPS | Traffic related to Books app | +| sls.update.microsoft.com* | HTTPS | Enables connections to Windows Update. | +| storecatalogrevocation.storequality.microsoft.com* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | +| storeedgefd.dsx.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store. | +| tile-service.weather.microsoft.com* | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | +| us.configsvc1.live.com.akadns.net | HTTPS | Microsoft Office configuration related traffic | +| watson.telemetry.microsoft.com/Telemetry.Request | HTTPS | Used by Windows Error Reporting. | +| wd-prod-cp-us-east-2-fe.eastus.cloudapp.azure.com | HTTPS | Azure front end traffic | + + +## Windows 10 Pro +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.tlu.dl.delivery.mp.microsoft.com/* | HTTP | Enables connections to Windows Update. | +| *geo-prod.dodsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update. | +| arc.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| au.download.windowsupdate.com/* | HTTP | Enables connections to Windows Update. | +| ctldl.windowsupdate.com/msdownload/update/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| dm3p.wns.notify.windows.com.akadns.net | HTTPS | Used for the Windows Push Notification Services (WNS) | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| flightingservicewus.cloudapp.net | HTTPS | Insider Program | +| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | +| location-inference-westus.cloudapp.net | HTTPS | Used for location data. | +| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | +| onecollector.cloudapp.aria.akadns.net | HTTPS | Office Telemetry | +| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | +| vip5.afdorigin-prod-am02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic | + + +## Windows 10 Education + +| **Destination** | **Protocol** | **Description** | +| --- | --- | --- | +| *.b.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.e-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. | +| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. | +| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| *.tlu.dl.delivery.mp.microsoft.com* | HTTP | Enables connections to Windows Update. | +| *.windowsupdate.com* | HTTP | Enables connections to Windows Update. | +| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. | +| au.download.windowsupdate.com* | HTTP | Enables connections to Windows Update. | +| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. | +| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office. | +| cloudtile.photos.microsoft.com.akadns.net | HTTPS | Photos App in MS Store +| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values.  | +| ctldl.windowsupdate.com/* | HTTP | Used to download certificates that are publicly known to be fraudulent. | +| cy2.displaycatalog.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.licensing.md.mp.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| cy2.settings.data.microsoft.com.akadns.net | HTTPS | Used to communicate with Microsoft Store. | +| displaycatalog.mp.microsoft.com/* | HTTPS | Used to communicate with Microsoft Store. | +| download.windowsupdate.com/* | HTTPS | Enables connections to Windows Update. | +| emdl.ws.microsoft.com/* | HTTP | Used to download apps from the Microsoft Store. | +| fe2.update.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.dsp.mp.microsoft.com.nsatc.net | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| fe3.delivery.mp.microsoft.com/* | HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store. | +| flightingservicewus.cloudapp.net | HTTPS | Insider Program | +| g.live.com/odclientsettings/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| g.msn.com.nsatc.net | HTTPS | Used to retrieve Windows Spotlight metadata. | +| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. | +| licensing.mp.microsoft.com/* | HTTPS | Used for online activation and some app licensing. | +| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application | +| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. | +| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. | +| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. | +| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. | +| onecollector.cloudapp.aria.akadns.net | HTTPS | Office telemetry | +| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. | +| share.microsoft.com/windows-app-web-link | HTTPS | Traffic related to Books app | +| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. | +| storecatalogrevocation.storequality.microsoft.com/* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store. | +| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. | +| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. | +| vip5.afdorigin-prod-ch02.afdogw.com | HTTPS | Used to serve office 365 experimentation traffic. | +| watson.telemetry.microsoft.com/Telemetry.Request | HTTPS | Used by Windows Error Reporting. | +| wd-prod-cp-us-west-3-fe.westus.cloudapp.azure.com | HTTPS | Azure front end traffic | +| www.bing.com/* | HTTPS | Used for updates for Cortana, apps, and Live Tiles. | diff --git a/windows/privacy/windows-personal-data-services-configuration.md b/windows/privacy/windows-personal-data-services-configuration.md index a5005057fc..0b5997a3eb 100644 --- a/windows/privacy/windows-personal-data-services-configuration.md +++ b/windows/privacy/windows-personal-data-services-configuration.md @@ -1,408 +1,408 @@ ---- -title: Windows 10 personal data services configuration -description: An overview of Windows 10 services configuration settings that are used for personal data privacy protection relevant for regulations, such as the General Data Protection Regulation (GDPR) -keywords: privacy, GDPR, windows, IT -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: high -audience: ITPro -author: dansimp -ms.author: dansimp -manager: dansimp -ms.collection: M365-security-compliance -ms.topic: article -ms.date: 05/11/2018 -ms.reviewer: ---- -# Windows 10 personal data services configuration - -Applies to: -- Windows 10, version 1803 - -Microsoft assembled a list of Windows 10 services configuration settings that are useful for personal data privacy protection and related regulations, such as the General Data Protection Regulation (GDPR). There is one section with settings for service data that is managed at Microsoft and a section for local data that is managed by an IT organization. - -IT Professionals that are interested in applying these settings via group policies can find the configuration for download [here](https://go.microsoft.com/fwlink/?linkid=874149). - -## Introduction - -Microsoft collects data from or generates it through interactions with users of Windows 10 devices. This information can contain personal data that may be used to provide, support, and improve Windows 10 services. - -Many Windows 10 services are controller services. A user can manage data collection settings, for example by opening *Start > Settings > Privacy* or by visiting the [Microsoft Privacy dashboard](https://account.microsoft.com/privacy). While this relationship between Microsoft and a user is evident in a consumer type scenario, an IT organization can influence that relationship. For example, the IT department has the ability to configure the Windows diagnostic data level across their organization by using Group Policy, registry, or Mobile Device Management (MDM) settings. - -Below is a collection of settings related to the Windows 10 personal data services configuration that IT Professionals can use as guidance for influencing Windows diagnostic data collection and personal data protection. - -## Windows diagnostic data - -Windows 10 collects Windows diagnostic data—such as usage data, performance data, inking, typing, and utterance data—and sends it back to Microsoft. That data is used for keeping the operating system secure and up-to-date, to troubleshoot problems, and to make product improvements. For users who have turned on "Tailored experiences", that data can also be used to offer personalized tips, ads, and recommendations to enhance Microsoft products and services for your needs. - -The following options for configuring Windows diagnostic data are relevant in this context. - -### Diagnostic level - -This setting determines the amount of Windows diagnostic data sent to Microsoft. - ->[!NOTE] ->In Windows 10, version 1709, Microsoft introduced a new feature: “Limit Enhanced diagnostic data to the minimum required by Windows Analytics”. When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to the smallest set of data required by [Windows Analytics](https://www.microsoft.com/windowsforbusiness/windows-analytics). For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | ->| **Policy Name** | Allow Telemetry | ->| **Default setting** | 2 - Enhanced | ->| **Recommended** | 2 - Enhanced | - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | User Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | ->| **Policy Name** | Allow Telemetry | ->| **Default setting** | 2 - Enhanced | ->| **Recommended** | 2 - Enhanced | - ->[!NOTE] ->When both the Computer Configuration policy and User Configuration policy are set, the more restrictive policy is used. - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\DataCollection | ->| **Value** | AllowTelemetry | ->| **Type** | REG_DWORD | ->| **Setting** | "00000002" | - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKCU\Software\Policies\Microsoft\Windows\DataCollection | ->| **Value** | AllowTelemetry | ->| **Type** | REG_DWORD | ->| **Setting** | "00000002" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | System | ->| **Policy** | AllowTelemetry (scope: device and user) | ->| **Default setting** | 2 – Enhanced | ->| **Recommended** | 2 – Allowed | - -### Diagnostic opt-in change notifications - -This setting determines whether a device shows notifications about Windows diagnostic data levels to people on first logon or when changes occur in the diagnostic configuration. - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | ->| **Policy Name** | Configure telemetry opt-in change notifications | ->| **Default setting** | Enabled | ->| **Recommended** | Enabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\DataCollection | ->| **Value** | DisableTelemetryOptInChangeNotification | ->| **Type** | REG_DWORD | ->| **Setting** | "00000000" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | System | ->| **Policy** | ConfigureTelemetryOptInChangeNotification | ->| **Default setting** | 0 – Enabled | ->| **Recommended** | 0 – Enabled | - -### Configure telemetry opt-in setting user interface - -This setting determines whether people can change their own Windows diagnostic data level in *Start > Settings > Privacy > Diagnostics & feedback*. - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | ->| **Policy Name** | Configure telemetry opt-in setting user interface | ->| **Default setting** | Enabled | ->| **Recommended** | Enabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\DataCollection | ->| **Value** | DisableTelemetryOptInSettingsUx | ->| **Type** | REG_DWORD | ->| **Setting** | "00000001" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | System | ->| **Policy** | ConfigureTelemetryOptInSettingsUx | ->| **Default setting** | 0 – Enabled | ->| **Recommended** | 0 – Enabled | - -## Policies affecting personal data protection managed by the Enterprise IT - -There are additional settings usually managed by the Enterprise IT that also affect the protection of personal data. - -The following options for configuring these policies are relevant in this context. - -### BitLocker - -The following settings determine whether fixed and removable drives are protected by the BitLocker Drive Encryption. - -#### Fixed Data Drives - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption\Fixed Data Drives | ->| **Policy Name** | Deny write access to fixed drives not protected by BitLocker | ->| **Default setting** | Not configured | ->| **Recommended** | Enabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\System\CurrentControlSet\Policies\Microsoft\FVE | ->| **Value** | FDVDenyWriteAccess | ->| **Type** | REG_DWORD | ->| **Setting** | "00000001" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | BitLocker | ->| **Policy** | FixedDrivesRequireEncryption | ->| **Default setting** | Disabled | ->| **Recommended** | Enabled (see [instructions](/windows/client-management/mdm/bitlocker-csp#fixeddrivesrequireencryption)) | - -#### Removable Data Drives - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption\Removable Data Drives | ->| **Policy Name** | Deny write access to removable drives not protected by BitLocker | ->| **Default setting** | Not configured | ->| **Recommended** | Enabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\System\CurrentControlSet\Policies\Microsoft\FVE | ->| **Value** | RDVDenyWriteAccess | ->| **Type** | REG_DWORD | ->| **Setting** | "00000001" | - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\FVE | ->| **Value** | RDVDenyCrossOrg | ->| **Type** | REG_DWORD | ->| **Setting** | "00000000" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | BitLocker | ->| **Policy** | RemovableDrivesRequireEncryption | ->| **Default setting** | Disabled | ->| **Recommended** | Enabled (see [instructions](/windows/client-management/mdm/bitlocker-csp#removabledrivesrequireencryption)) | - -### Privacy – AdvertisingID - -This setting determines if the advertising ID, which preventing apps from using the ID for experiences across apps, is turned off. - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\System\User Profiles | ->| **Policy Name** | Turn off the advertising ID | ->| **Default setting** | Not configured | ->| **Recommended** | Enabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\AdvertisingInfo | ->| **Value** | DisabledByGroupPolicy | ->| **Type** | REG_DWORD | ->| **Setting** | "00000001" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | Privacy | ->| **Policy** | DisableAdvertisingId | ->| **Default setting** | 65535 (default) - Not configured | ->| **Recommended** | 1 – Enabled | - -### Edge - -These settings whether employees send “Do Not Track” from the Microsoft Edge web browser to websites. - ->[!NOTE] ->Please see [this Microsoft blog post](https://blogs.microsoft.com/on-the-issues/2015/04/03/an-update-on-microsofts-approach-to-do-not-track/) for more details on why the “Do Not Track” is no longer the default setting. - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge | ->| **Policy Name** | Configure Do Not Track | ->| **Default setting** | Disabled | ->| **Recommended** | Disabled | - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | User Configuration\Administrative Templates\Windows Components\Microsoft Edge | ->| **Policy Name** | Configure Do Not Track | ->| **Default setting** | Disabled | ->| **Recommended** | Disabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main | ->| **Value** | DoNotTrack | ->| **Type** | REG_DWORD | ->| **Setting** | "00000000" | - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Registry key** | HKCU\Software\Policies\Microsoft\MicrosoftEdge\Main | ->| **Value** | DoNotTrack | ->| **Type** | REG_DWORD | ->| **Setting** | "00000000" | - -#### MDM - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **MDM CSP** | Browser | ->| **Policy** | AllowDoNotTrack (scope: device + user) | ->| **Default setting** | 0 (default) – Not allowed | ->| **Recommended** | 0 – Not allowed | - -### Internet Explorer - -These settings whether employees send “Do Not Track” header from the Microsoft Explorer web browser to websites. - -#### Group Policy - -> [!div class="mx-tableFixed"] ->| | | ->|:-|:-| ->| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | ->| **Policy Name** | Always send Do Not Track header | ->| **Default setting** | Disabled | ->| **Recommended** | Disabled | - -> [!div class="mx-tableFixed"] ->||| ->|:-|:-| ->| **Group Policy** | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | ->| **Policy Name** | Always send Do Not Track header | ->| **Default setting** | Disabled | ->| **Recommended** | Disabled | - -#### Registry - -> [!div class="mx-tableFixed"] ->||| ->|:-|:-| ->| **Registry key** | HKLM\Software\Policies\Microsoft\Internet Explorer\Main | ->| **Value** | DoNotTrack | ->| **Type** | REG_DWORD | ->| **Setting** | "00000000" | - -> [!div class="mx-tableFixed"] ->||| ->|:-|:-| ->| **Registry key** | HKCU\Software\Policies\Microsoft\Internet Explorer\Main | ->| **Value** | DoNotTrack | ->| **Type** | REG_DWORD | ->| **Setting** | "00000000" | - -#### MDM - -> [!div class="mx-tableFixed"] ->||| ->|:-|:-| ->| **MDM CSP** | N/A | - -## Additional resources - -### FAQs - -* [Windows 10 feedback, diagnostics, and privacy](https://privacy.microsoft.com/windows-10-feedback-diagnostics-and-privacy) -* [Microsoft Edge and privacy](https://privacy.microsoft.com/windows-10-microsoft-edge-and-privacy) -* [Windows Hello and privacy](https://privacy.microsoft.com/windows-10-windows-hello-and-privacy) -* [Wi-Fi Sense](https://privacy.microsoft.com/windows-10-about-wifi-sense) - -### Blogs - -* [Privacy and Windows 10](https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10) - -### Privacy Statement - -* [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) - -### Windows Privacy on docs.microsoft.com - -* [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -* [Manage Windows 10 connection endpoints](manage-windows-endpoints.md) -* [Understanding Windows diagnostic data](configure-windows-diagnostic-data-in-your-organization.md#understanding-windows-diagnostic-data) -* [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) - -### Other resources - -* [Privacy at Microsoft](https://privacy.microsoft.com/) +--- +title: Windows 10 personal data services configuration +description: An overview of Windows 10 services configuration settings that are used for personal data privacy protection relevant for regulations, such as the General Data Protection Regulation (GDPR) +keywords: privacy, GDPR, windows, IT +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: high +audience: ITPro +author: dansimp +ms.author: dansimp +manager: dansimp +ms.collection: M365-security-compliance +ms.topic: article +ms.date: 05/11/2018 +ms.reviewer: +--- +# Windows 10 personal data services configuration + +Applies to: +- Windows 10, version 1803 + +Microsoft assembled a list of Windows 10 services configuration settings that are useful for personal data privacy protection and related regulations, such as the General Data Protection Regulation (GDPR). There is one section with settings for service data that is managed at Microsoft and a section for local data that is managed by an IT organization. + +IT Professionals that are interested in applying these settings via group policies can find the configuration for download [here](https://go.microsoft.com/fwlink/?linkid=874149). + +## Introduction + +Microsoft collects data from or generates it through interactions with users of Windows 10 devices. This information can contain personal data that may be used to provide, support, and improve Windows 10 services. + +Many Windows 10 services are controller services. A user can manage data collection settings, for example by opening *Start > Settings > Privacy* or by visiting the [Microsoft Privacy dashboard](https://account.microsoft.com/privacy). While this relationship between Microsoft and a user is evident in a consumer type scenario, an IT organization can influence that relationship. For example, the IT department has the ability to configure the Windows diagnostic data level across their organization by using Group Policy, registry, or Mobile Device Management (MDM) settings. + +Below is a collection of settings related to the Windows 10 personal data services configuration that IT Professionals can use as guidance for influencing Windows diagnostic data collection and personal data protection. + +## Windows diagnostic data + +Windows 10 collects Windows diagnostic data—such as usage data, performance data, inking, typing, and utterance data—and sends it back to Microsoft. That data is used for keeping the operating system secure and up-to-date, to troubleshoot problems, and to make product improvements. For users who have turned on "Tailored experiences", that data can also be used to offer personalized tips, ads, and recommendations to enhance Microsoft products and services for your needs. + +The following options for configuring Windows diagnostic data are relevant in this context. + +### Diagnostic level + +This setting determines the amount of Windows diagnostic data sent to Microsoft. + +>[!NOTE] +>In Windows 10, version 1709, Microsoft introduced a new feature: “Limit Enhanced diagnostic data to the minimum required by Windows Analytics”. When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to the smallest set of data required by [Windows Analytics](https://www.microsoft.com/windowsforbusiness/windows-analytics). For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | +>| **Policy Name** | Allow Telemetry | +>| **Default setting** | 2 - Enhanced | +>| **Recommended** | 2 - Enhanced | + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | User Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | +>| **Policy Name** | Allow Telemetry | +>| **Default setting** | 2 - Enhanced | +>| **Recommended** | 2 - Enhanced | + +>[!NOTE] +>When both the Computer Configuration policy and User Configuration policy are set, the more restrictive policy is used. + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\DataCollection | +>| **Value** | AllowTelemetry | +>| **Type** | REG_DWORD | +>| **Setting** | "00000002" | + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKCU\Software\Policies\Microsoft\Windows\DataCollection | +>| **Value** | AllowTelemetry | +>| **Type** | REG_DWORD | +>| **Setting** | "00000002" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | System | +>| **Policy** | AllowTelemetry (scope: device and user) | +>| **Default setting** | 2 – Enhanced | +>| **Recommended** | 2 – Allowed | + +### Diagnostic opt-in change notifications + +This setting determines whether a device shows notifications about Windows diagnostic data levels to people on first logon or when changes occur in the diagnostic configuration. + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | +>| **Policy Name** | Configure telemetry opt-in change notifications | +>| **Default setting** | Enabled | +>| **Recommended** | Enabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\DataCollection | +>| **Value** | DisableTelemetryOptInChangeNotification | +>| **Type** | REG_DWORD | +>| **Setting** | "00000000" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | System | +>| **Policy** | ConfigureTelemetryOptInChangeNotification | +>| **Default setting** | 0 – Enabled | +>| **Recommended** | 0 – Enabled | + +### Configure telemetry opt-in setting user interface + +This setting determines whether people can change their own Windows diagnostic data level in *Start > Settings > Privacy > Diagnostics & feedback*. + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Data Collection and Preview Builds | +>| **Policy Name** | Configure telemetry opt-in setting user interface | +>| **Default setting** | Enabled | +>| **Recommended** | Enabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\DataCollection | +>| **Value** | DisableTelemetryOptInSettingsUx | +>| **Type** | REG_DWORD | +>| **Setting** | "00000001" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | System | +>| **Policy** | ConfigureTelemetryOptInSettingsUx | +>| **Default setting** | 0 – Enabled | +>| **Recommended** | 0 – Enabled | + +## Policies affecting personal data protection managed by the Enterprise IT + +There are additional settings usually managed by the Enterprise IT that also affect the protection of personal data. + +The following options for configuring these policies are relevant in this context. + +### BitLocker + +The following settings determine whether fixed and removable drives are protected by the BitLocker Drive Encryption. + +#### Fixed Data Drives + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption\Fixed Data Drives | +>| **Policy Name** | Deny write access to fixed drives not protected by BitLocker | +>| **Default setting** | Not configured | +>| **Recommended** | Enabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\System\CurrentControlSet\Policies\Microsoft\FVE | +>| **Value** | FDVDenyWriteAccess | +>| **Type** | REG_DWORD | +>| **Setting** | "00000001" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | BitLocker | +>| **Policy** | FixedDrivesRequireEncryption | +>| **Default setting** | Disabled | +>| **Recommended** | Enabled (see [instructions](/windows/client-management/mdm/bitlocker-csp#fixeddrivesrequireencryption)) | + +#### Removable Data Drives + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Bitlocker Drive Encryption\Removable Data Drives | +>| **Policy Name** | Deny write access to removable drives not protected by BitLocker | +>| **Default setting** | Not configured | +>| **Recommended** | Enabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\System\CurrentControlSet\Policies\Microsoft\FVE | +>| **Value** | RDVDenyWriteAccess | +>| **Type** | REG_DWORD | +>| **Setting** | "00000001" | + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\FVE | +>| **Value** | RDVDenyCrossOrg | +>| **Type** | REG_DWORD | +>| **Setting** | "00000000" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | BitLocker | +>| **Policy** | RemovableDrivesRequireEncryption | +>| **Default setting** | Disabled | +>| **Recommended** | Enabled (see [instructions](/windows/client-management/mdm/bitlocker-csp#removabledrivesrequireencryption)) | + +### Privacy – AdvertisingID + +This setting determines if the advertising ID, which preventing apps from using the ID for experiences across apps, is turned off. + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\System\User Profiles | +>| **Policy Name** | Turn off the advertising ID | +>| **Default setting** | Not configured | +>| **Recommended** | Enabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\Windows\AdvertisingInfo | +>| **Value** | DisabledByGroupPolicy | +>| **Type** | REG_DWORD | +>| **Setting** | "00000001" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | Privacy | +>| **Policy** | DisableAdvertisingId | +>| **Default setting** | 65535 (default) - Not configured | +>| **Recommended** | 1 – Enabled | + +### Edge + +These settings whether employees send “Do Not Track” from the Microsoft Edge web browser to websites. + +>[!NOTE] +>Please see [this Microsoft blog post](https://blogs.microsoft.com/on-the-issues/2015/04/03/an-update-on-microsofts-approach-to-do-not-track/) for more details on why the “Do Not Track” is no longer the default setting. + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge | +>| **Policy Name** | Configure Do Not Track | +>| **Default setting** | Disabled | +>| **Recommended** | Disabled | + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | User Configuration\Administrative Templates\Windows Components\Microsoft Edge | +>| **Policy Name** | Configure Do Not Track | +>| **Default setting** | Disabled | +>| **Recommended** | Disabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\MicrosoftEdge\Main | +>| **Value** | DoNotTrack | +>| **Type** | REG_DWORD | +>| **Setting** | "00000000" | + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Registry key** | HKCU\Software\Policies\Microsoft\MicrosoftEdge\Main | +>| **Value** | DoNotTrack | +>| **Type** | REG_DWORD | +>| **Setting** | "00000000" | + +#### MDM + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **MDM CSP** | Browser | +>| **Policy** | AllowDoNotTrack (scope: device + user) | +>| **Default setting** | 0 (default) – Not allowed | +>| **Recommended** | 0 – Not allowed | + +### Internet Explorer + +These settings whether employees send “Do Not Track” header from the Microsoft Explorer web browser to websites. + +#### Group Policy + +> [!div class="mx-tableFixed"] +>| | | +>|:-|:-| +>| **Group Policy** | Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | +>| **Policy Name** | Always send Do Not Track header | +>| **Default setting** | Disabled | +>| **Recommended** | Disabled | + +> [!div class="mx-tableFixed"] +>||| +>|:-|:-| +>| **Group Policy** | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | +>| **Policy Name** | Always send Do Not Track header | +>| **Default setting** | Disabled | +>| **Recommended** | Disabled | + +#### Registry + +> [!div class="mx-tableFixed"] +>||| +>|:-|:-| +>| **Registry key** | HKLM\Software\Policies\Microsoft\Internet Explorer\Main | +>| **Value** | DoNotTrack | +>| **Type** | REG_DWORD | +>| **Setting** | "00000000" | + +> [!div class="mx-tableFixed"] +>||| +>|:-|:-| +>| **Registry key** | HKCU\Software\Policies\Microsoft\Internet Explorer\Main | +>| **Value** | DoNotTrack | +>| **Type** | REG_DWORD | +>| **Setting** | "00000000" | + +#### MDM + +> [!div class="mx-tableFixed"] +>||| +>|:-|:-| +>| **MDM CSP** | N/A | + +## Additional resources + +### FAQs + +* [Windows 10 feedback, diagnostics, and privacy](https://privacy.microsoft.com/windows-10-feedback-diagnostics-and-privacy) +* [Microsoft Edge and privacy](https://privacy.microsoft.com/windows-10-microsoft-edge-and-privacy) +* [Windows Hello and privacy](https://privacy.microsoft.com/windows-10-windows-hello-and-privacy) +* [Wi-Fi Sense](https://privacy.microsoft.com/windows-10-about-wifi-sense) + +### Blogs + +* [Privacy and Windows 10](https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10) + +### Privacy Statement + +* [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement) + +### Windows Privacy on docs.microsoft.com + +* [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) +* [Manage Windows 10 connection endpoints](manage-windows-endpoints.md) +* [Understanding Windows diagnostic data](configure-windows-diagnostic-data-in-your-organization.md#understanding-windows-diagnostic-data) +* [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) + +### Other resources + +* [Privacy at Microsoft](https://privacy.microsoft.com/) diff --git a/windows/security/information-protection/windows-information-protection/wip-learning.md b/windows/security/information-protection/windows-information-protection/wip-learning.md index c65af63ce9..736efd6668 100644 --- a/windows/security/information-protection/windows-information-protection/wip-learning.md +++ b/windows/security/information-protection/windows-information-protection/wip-learning.md @@ -1,88 +1,88 @@ ---- -title: -# Fine-tune Windows Information Policy (WIP) with WIP Learning -description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company. -ms.assetid: 53db29d2-d99d-4db6-b494-90e2b4872ca2 -ms.reviewer: -keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP Learning -ms.prod: w10 -ms.mktglfcycl: -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: dulcemontemayor -ms.author: dolmont -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/26/2019 ---- - -# Fine-tune Windows Information Protection (WIP) with WIP Learning -**Applies to:** - -- Windows 10, version 1703 and later -- Windows 10 Mobile, version 1703 and later - -With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune. - -The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with [“Block”](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly. - -In the **Website learning report**, you can view a summary of the devices that have shared work data with websites. You can use this information to determine which websites should be added to group and user WIP policies. The summary shows which website URLs are accessed by WIP-enabled apps so you can decide which ones are cloud or personal, and add them to the resource list. - -## Access the WIP Learning reports - -1. Open the [Azure portal](http://portal.azure.com/). - -1. Click **All services**, type **Intune** in the text box filter, and click the star to add it to **Favorites**. - -1. Click **Intune** > **Client apps** > **App protection status** > **Reports**. - - ![Image showing the UI path to the WIP report](images/access-wip-learning-report.png) - -1. Select either **App learning report for Windows Information Protection** or **Website learning report for Windows Information Protection**. - - ![Image showing the UI with for app and website learning reports](images/wip-learning-select-report.png) - -Once you have the apps and websites showing up in the WIP Learning logging reports, you can decide whether to add them to your app protection policies. - -## Use the WIP section of Device Health - -You can use Device Health to adjust your WIP protection policy. See [Using Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-using#windows-information-protection) to learn more. - -If you want to configure your environment for Windows Analytics: Device Health, see [Get Started with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-get-started) for more information. - -Once you have WIP policies in place, by using the WIP section of Device Health, you can: - -- Reduce disruptive prompts by adding rules to allow data sharing from approved apps. -- Tune WIP rules by confirming that certain apps are allowed or denied by current policy. - -## Use Device Health and Intune to adjust WIP protection policy - -The information needed for the following steps can be found using Device Health, which you will first have to set up. Learn more about how you can [Monitor the health of devices with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor). - -1. In **Device Health** click the app you want to add to your policy and copy the publisher information. - -2. In Intune, click **App protection policies** and then choose the app policy you want to add an application to. - -3. Click **Protected apps**, and then click **Add Apps**. - -4. In the **Recommended apps** drop down menu, choose either **Store apps** or **Desktop apps**, depending on the app you've chosen (for example, an executable (EXE) is a desktop app). - - ![View of drop down menu for Store or desktop apps](images/wip-learning-choose-store-or-desktop-app.png) - -5. In **NAME** (optional), type the name of the app, and then in **PUBLISHER** (required), paste the publisher information that you copied in step 1 above. - - ![View of Add Apps app info entry boxes](images/wip-learning-app-info.png) - -6. Type the name of the product in **PRODUCT NAME** (required) (this will probably be the same as what you typed for **NAME**). - -7. Copy the name of the executable (for example, snippingtool.exe) and paste it in **FILE** (required). - -8. Type the version number of the app into **MIN VERSION** in Intune (alternately, you can specify the max version, but one or the other is required), and then select the **ACTION**: **Allow** or **Deny** - -When working with WIP-enabled apps and WIP-unknown apps, it is recommended that you start with **Silent** or **Allow overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. For more information about WIP modes, see: [Protect enterprise data using WIP: WIP-modes](protect-enterprise-data-using-wip.md#bkmk-modes) - ->[!NOTE] ->Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). +--- +title: +# Fine-tune Windows Information Policy (WIP) with WIP Learning +description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company. +ms.assetid: 53db29d2-d99d-4db6-b494-90e2b4872ca2 +ms.reviewer: +keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP Learning +ms.prod: w10 +ms.mktglfcycl: +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +author: dulcemontemayor +ms.author: dolmont +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +ms.date: 02/26/2019 +--- + +# Fine-tune Windows Information Protection (WIP) with WIP Learning +**Applies to:** + +- Windows 10, version 1703 and later +- Windows 10 Mobile, version 1703 and later + +With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune. + +The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with [“Block”](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly. + +In the **Website learning report**, you can view a summary of the devices that have shared work data with websites. You can use this information to determine which websites should be added to group and user WIP policies. The summary shows which website URLs are accessed by WIP-enabled apps so you can decide which ones are cloud or personal, and add them to the resource list. + +## Access the WIP Learning reports + +1. Open the [Azure portal](http://portal.azure.com/). + +1. Click **All services**, type **Intune** in the text box filter, and click the star to add it to **Favorites**. + +1. Click **Intune** > **Client apps** > **App protection status** > **Reports**. + + ![Image showing the UI path to the WIP report](images/access-wip-learning-report.png) + +1. Select either **App learning report for Windows Information Protection** or **Website learning report for Windows Information Protection**. + + ![Image showing the UI with for app and website learning reports](images/wip-learning-select-report.png) + +Once you have the apps and websites showing up in the WIP Learning logging reports, you can decide whether to add them to your app protection policies. + +## Use the WIP section of Device Health + +You can use Device Health to adjust your WIP protection policy. See [Using Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-using#windows-information-protection) to learn more. + +If you want to configure your environment for Windows Analytics: Device Health, see [Get Started with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-get-started) for more information. + +Once you have WIP policies in place, by using the WIP section of Device Health, you can: + +- Reduce disruptive prompts by adding rules to allow data sharing from approved apps. +- Tune WIP rules by confirming that certain apps are allowed or denied by current policy. + +## Use Device Health and Intune to adjust WIP protection policy + +The information needed for the following steps can be found using Device Health, which you will first have to set up. Learn more about how you can [Monitor the health of devices with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor). + +1. In **Device Health** click the app you want to add to your policy and copy the publisher information. + +2. In Intune, click **App protection policies** and then choose the app policy you want to add an application to. + +3. Click **Protected apps**, and then click **Add Apps**. + +4. In the **Recommended apps** drop down menu, choose either **Store apps** or **Desktop apps**, depending on the app you've chosen (for example, an executable (EXE) is a desktop app). + + ![View of drop down menu for Store or desktop apps](images/wip-learning-choose-store-or-desktop-app.png) + +5. In **NAME** (optional), type the name of the app, and then in **PUBLISHER** (required), paste the publisher information that you copied in step 1 above. + + ![View of Add Apps app info entry boxes](images/wip-learning-app-info.png) + +6. Type the name of the product in **PRODUCT NAME** (required) (this will probably be the same as what you typed for **NAME**). + +7. Copy the name of the executable (for example, snippingtool.exe) and paste it in **FILE** (required). + +8. Type the version number of the app into **MIN VERSION** in Intune (alternately, you can specify the max version, but one or the other is required), and then select the **ACTION**: **Allow** or **Deny** + +When working with WIP-enabled apps and WIP-unknown apps, it is recommended that you start with **Silent** or **Allow overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. For more information about WIP modes, see: [Protect enterprise data using WIP: WIP-modes](protect-enterprise-data-using-wip.md#bkmk-modes) + +>[!NOTE] +>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). diff --git a/windows/security/threat-protection/fips-140-validation.md b/windows/security/threat-protection/fips-140-validation.md index 78708f3bd8..ac3e78109d 100644 --- a/windows/security/threat-protection/fips-140-validation.md +++ b/windows/security/threat-protection/fips-140-validation.md @@ -1,172 +1,172 @@ ---- -title: FIPS 140 Validation -description: This topic provides information on how Microsoft products and cryptographic modules comply with the U.S. Federal government standard FIPS 140. -ms.prod: w10 -audience: ITPro -author: dulcemontemayor -ms.author: dolmont -manager: dansimp -ms.collection: M365-identity-device-management -ms.topic: article -ms.localizationpriority: medium -ms.date: 04/03/2018 -ms.reviewer: ---- - - -# FIPS 140 Validation - -On this page - - - [Introduction](https://technet.microsoft.com/library/cc750357.aspx#id0eo) - - [FIPS 140 Overview](https://technet.microsoft.com/library/cc750357.aspx#id0ebd) - - [Microsoft Product Validation (Information for Procurement Officers and Auditors)](https://technet.microsoft.com/library/cc750357.aspx#id0ezd) - - [Information for System Integrators](https://technet.microsoft.com/library/cc750357.aspx#id0eve) - - [Information for Software Developers](https://technet.microsoft.com/library/cc750357.aspx#id0eibac) - - [FIPS 140 FAQ](https://technet.microsoft.com/library/cc750357.aspx#id0eqcac) - - [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#id0ewfac) - - [Cryptographic Algorithms](https://technet.microsoft.com/library/cc750357.aspx#id0erobg) - -Updated: March 2018 - - - -## Introduction - -This document provides information on how Microsoft products and cryptographic modules comply with the U.S. Federal government standard, *Federal Information Processing Standard (FIPS) 140 – Security Requirements for Cryptographic Modules* \[FIPS 140\]. - -### Audience - -This document is primarily focused on providing information for three parties: - -[Procurement Officer](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_product_validation) – Responsible for verifying that Microsoft products (or even third-party applications) are either FIPS 140 validated or utilize a Microsoft FIPS 140 validated cryptographic module. - -[System Integrator](https://technet.microsoft.com/library/cc750357.aspx#_information_for_system) – Responsible for ensuring that Microsoft Products are configured properly to use only FIPS 140 validated cryptographic modules. - -[Software Developer](https://technet.microsoft.com/library/cc750357.aspx#_information_for_software) – Responsible for building software products that utilize Microsoft FIPS 140 validated cryptographic modules. - -### Document Map - -This document is broken into seven major sections: - -[FIPS 140 Overview](https://technet.microsoft.com/library/cc750357.aspx#_fips_140_overview) – Provides an overview of the FIPS 140 standard as well as provides some historical information about the standard. - -[Microsoft Product Validation (Information for Procurement Officers and Auditors)](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_product_validation) – Provides information on how Microsoft products are FIPS 140 validated. - -[Information for System Integrators](https://technet.microsoft.com/library/cc750357.aspx#_information_for_system) – Describes how to configure and verify that Microsoft Products are being used in a manner consistent with the product’s FIPS 140 Security Policy. - -[Information for Software Developers](https://technet.microsoft.com/library/cc750357.aspx#_information_for_software) – Identifies how developers can leverage the Microsoft FIPS 140 validated cryptographic modules. - -[FAQ](https://technet.microsoft.com/library/cc750357.aspx#_fips_140_faq) – Frequently Asked Questions. - -[Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140) – Explains Microsoft cryptographic architecture and identifies specific modules that are FIPS 140 validated. - -[Cryptographic Algorithms](https://technet.microsoft.com/library/cc750357.aspx#_cryptographic_algorithms) – Lists the cryptographic algorithm, modes, states, key sizes, Windows versions, and corresponding cryptographic algorithm validation certificates. - -## FIPS 140 Overview - -### FIPS 140 Standard - -FIPS 140 is a US government and Canadian government standard that defines a minimum set of the security requirements for products that implement cryptography. This standard is designed for cryptographic modules that are used to secure sensitive but unclassified information. Testing against the FIPS 140 standard is maintained by the Cryptographic Module Validation Program (CMVP), a joint effort between the US National Institute of Standards and Technology (NIST) and the Communications Security Establishment of Canada (CSEC). - -The current standard defines four-levels of increasing security, 1 through 4. Most software products (including all Microsoft products) are tested against the Level 1 security requirements. - -### Applicability of the FIPS standard - -Within the US Federal government, the FIPS 140 standard applies to any security system (whether hardware, firmware, software, or a combination thereof) to be used by agencies for protecting sensitive but unclassified information. Some agencies have expanded its use by requiring that the modules to be procured for secret systems also meet the FIPS 140 requirements. - -The FIPS 140 standard has also been used by different standards bodies, specification groups, nations, and private institutions as a requirement or guideline for those products (e.g. – Digital Cinema Systems Specification). - -### History of 140-1 - -FIPS 140-1 is the original working version of the standard made official on January 11, 1994. The standard remained in effect until FIPS 140-2 became mandatory for new products on May 25, 2002. - -### FIPS 140-2 - -FIPS 140-2 is currently the active version of the standard. - -### Microsoft FIPS Support Policy - -Microsoft actively maintains FIPS 140 validation for its cryptographic modules. - -### FIPS Mode of Operation - -The common term “FIPS mode” is used in this document and Security Policy documents. When a cryptographic module contains both FIPS-approved and non-FIPS approved security methods, it must have a "FIPS mode of operation" to ensure only FIPS-approved security methods may be used. When a module is in "FIPS mode", a non-FIPS approved method cannot be used instead of a FIPS-approved method. - -## Microsoft Product Validation (Information for Procurement Officers and Auditors) - -This section provides information for Procurement Officers and Auditors who are responsible for ensuring that Microsoft products with FIPS 140 validated cryptographic modules are used in their organization. The goal of this section is to provide an overview of the Microsoft developed products and modules and explain how the validated cryptographic modules are used. - -### Microsoft Product Relationship with CNG and CAPI libraries - -Rather than validate individual components and products, Microsoft chooses to validate only the underlying cryptographic modules. Subsequently, many Windows components and Microsoft products are built to rely on the Cryptographic API: Next Generation (CNG) and legacy Cryptographic API (CAPI) FIPS 140 validated cryptographic modules. Windows components and Microsoft products use the documented application programming interfaces (APIs) for each of the modules to access various cryptographic services. - -The following list contains some of the Windows components and Microsoft products that rely on FIPS 140 validated cryptographic modules: - - - Schannel Security Package - - Remote Desktop Protocol (RDP) Client - - Encrypting File System (EFS) - - Some Microsoft .NET Framework Applications (.NET also provides cryptographic algorithm implementations that have not been FIPS 140 validated.) - - BitLocker® Drive Full-volume Encryption - - IPsec Settings of Windows Firewall - -## Information for System Integrators - -This section provides information for System Integrators and Auditors who are responsible for deploying Microsoft products in a manner consistent with the product’s FIPS 140 Security Policy. - -There are two steps to ensure that Microsoft products operate in FIPS mode: - -1. Selecting/Installing FIPS 140 validated cryptographic modules -2. Setting FIPS local/group security policy flag. - -### Step 1 – Selecting/Installing FIPS 140 Validated Cryptographic Modules - -Systems Integrators must ensure that all cryptographic modules installed are, in fact, FIPS 140 validated. This can be accomplished by cross-checking the version number of the installed module with the list of validated binaries. The list of validated CAPI binaries is identified in the [CAPI Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_capi_validated_cryptographic) section below and the list of validated CNG binaries is identified in the [CNG Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_cng_validated_cryptographic) section below. There are similar sections for all other validated cryptographic modules. - -The version number of the installed binary is found by right-clicking the module file and clicking on the Version or Details tab. Cryptographic modules are stored in the "windows\\system32" or "windows\\system32\\drivers" directory. - -### Step 2 – Setting FIPS Local/Group Security Policy Flag - -The Windows operating system provides a group (or local) security policy setting, “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing”, which is used by many Microsoft products to determine whether to operate in a FIPS-approved mode. When this policy is set, the validated cryptographic modules in Windows will also operate in a FIPS-approved mode. - -**Note** – There is no enforcement of the FIPS policy by the operating system or the validated cryptographic modules. Instead, each individual application must check this flag and enforce the Security Policy of the validated cryptographic modules. - -#### Instructions on Setting the FIPS Local/Group Security Policy Flag - -While there are alternative methods for setting the FIPS local/group security policy flag, the following method is included as a guide to users with Administrative privileges. This description is for the Local Security Policy, but the Group Security Policy may be set in a similar manner. - -1. Open the 'Run' menu by pressing the combination 'Windows Key + R'. -2. Type 'secpol.msc' and press 'Enter' or click the 'Ok' button. -3. In the Local Security Policy management console window that opens, use the left tab to navigate to the Local Policies -\> Security Options. -4. Scroll down the right pane and double-click 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing'. -5. In the properties window, select the 'Enabled' option and click the 'Apply' button. - -#### Microsoft Components and Products That Utilize FIPS Local/Group Security Policy - -The following list details some of the Microsoft components that use the cryptographic functionality implemented by either CNG or legacy CAPI. When the FIPS Local/Group Security Policy is set, the following components will enforce the validated module Security Policy. - - - Schannel Security Package - - Remote Desktop Protocol (RDP) Client - - Encrypting File System (EFS) - - Some Microsoft .NET Framework Applications (.NET also provides cryptographic algorithm implementations that have not been FIPS 140 validated.) - - BitLocker® Drive Full-volume Encryption - - IPsec Settings of Windows Firewall - -#### Effects of Setting FIPS Local/Group Security Policy Flag - -When setting the FIPS local/group security policy flag, the behavior of several Microsoft components and products are affected. The most noticeable difference will be that the components enforcing this setting will only use those algorithms approved or allowed in FIPS mode. The specific changes to the products listed above are: - +--- +title: FIPS 140 Validation +description: This topic provides information on how Microsoft products and cryptographic modules comply with the U.S. Federal government standard FIPS 140. +ms.prod: w10 +audience: ITPro +author: dulcemontemayor +ms.author: dolmont +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +ms.localizationpriority: medium +ms.date: 04/03/2018 +ms.reviewer: +--- + + +# FIPS 140 Validation + +On this page + + - [Introduction](https://technet.microsoft.com/library/cc750357.aspx#id0eo) + - [FIPS 140 Overview](https://technet.microsoft.com/library/cc750357.aspx#id0ebd) + - [Microsoft Product Validation (Information for Procurement Officers and Auditors)](https://technet.microsoft.com/library/cc750357.aspx#id0ezd) + - [Information for System Integrators](https://technet.microsoft.com/library/cc750357.aspx#id0eve) + - [Information for Software Developers](https://technet.microsoft.com/library/cc750357.aspx#id0eibac) + - [FIPS 140 FAQ](https://technet.microsoft.com/library/cc750357.aspx#id0eqcac) + - [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#id0ewfac) + - [Cryptographic Algorithms](https://technet.microsoft.com/library/cc750357.aspx#id0erobg) + +Updated: March 2018 + + + +## Introduction + +This document provides information on how Microsoft products and cryptographic modules comply with the U.S. Federal government standard, *Federal Information Processing Standard (FIPS) 140 – Security Requirements for Cryptographic Modules* \[FIPS 140\]. + +### Audience + +This document is primarily focused on providing information for three parties: + +[Procurement Officer](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_product_validation) – Responsible for verifying that Microsoft products (or even third-party applications) are either FIPS 140 validated or utilize a Microsoft FIPS 140 validated cryptographic module. + +[System Integrator](https://technet.microsoft.com/library/cc750357.aspx#_information_for_system) – Responsible for ensuring that Microsoft Products are configured properly to use only FIPS 140 validated cryptographic modules. + +[Software Developer](https://technet.microsoft.com/library/cc750357.aspx#_information_for_software) – Responsible for building software products that utilize Microsoft FIPS 140 validated cryptographic modules. + +### Document Map + +This document is broken into seven major sections: + +[FIPS 140 Overview](https://technet.microsoft.com/library/cc750357.aspx#_fips_140_overview) – Provides an overview of the FIPS 140 standard as well as provides some historical information about the standard. + +[Microsoft Product Validation (Information for Procurement Officers and Auditors)](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_product_validation) – Provides information on how Microsoft products are FIPS 140 validated. + +[Information for System Integrators](https://technet.microsoft.com/library/cc750357.aspx#_information_for_system) – Describes how to configure and verify that Microsoft Products are being used in a manner consistent with the product’s FIPS 140 Security Policy. + +[Information for Software Developers](https://technet.microsoft.com/library/cc750357.aspx#_information_for_software) – Identifies how developers can leverage the Microsoft FIPS 140 validated cryptographic modules. + +[FAQ](https://technet.microsoft.com/library/cc750357.aspx#_fips_140_faq) – Frequently Asked Questions. + +[Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140) – Explains Microsoft cryptographic architecture and identifies specific modules that are FIPS 140 validated. + +[Cryptographic Algorithms](https://technet.microsoft.com/library/cc750357.aspx#_cryptographic_algorithms) – Lists the cryptographic algorithm, modes, states, key sizes, Windows versions, and corresponding cryptographic algorithm validation certificates. + +## FIPS 140 Overview + +### FIPS 140 Standard + +FIPS 140 is a US government and Canadian government standard that defines a minimum set of the security requirements for products that implement cryptography. This standard is designed for cryptographic modules that are used to secure sensitive but unclassified information. Testing against the FIPS 140 standard is maintained by the Cryptographic Module Validation Program (CMVP), a joint effort between the US National Institute of Standards and Technology (NIST) and the Communications Security Establishment of Canada (CSEC). + +The current standard defines four-levels of increasing security, 1 through 4. Most software products (including all Microsoft products) are tested against the Level 1 security requirements. + +### Applicability of the FIPS standard + +Within the US Federal government, the FIPS 140 standard applies to any security system (whether hardware, firmware, software, or a combination thereof) to be used by agencies for protecting sensitive but unclassified information. Some agencies have expanded its use by requiring that the modules to be procured for secret systems also meet the FIPS 140 requirements. + +The FIPS 140 standard has also been used by different standards bodies, specification groups, nations, and private institutions as a requirement or guideline for those products (e.g. – Digital Cinema Systems Specification). + +### History of 140-1 + +FIPS 140-1 is the original working version of the standard made official on January 11, 1994. The standard remained in effect until FIPS 140-2 became mandatory for new products on May 25, 2002. + +### FIPS 140-2 + +FIPS 140-2 is currently the active version of the standard. + +### Microsoft FIPS Support Policy + +Microsoft actively maintains FIPS 140 validation for its cryptographic modules. + +### FIPS Mode of Operation + +The common term “FIPS mode” is used in this document and Security Policy documents. When a cryptographic module contains both FIPS-approved and non-FIPS approved security methods, it must have a "FIPS mode of operation" to ensure only FIPS-approved security methods may be used. When a module is in "FIPS mode", a non-FIPS approved method cannot be used instead of a FIPS-approved method. + +## Microsoft Product Validation (Information for Procurement Officers and Auditors) + +This section provides information for Procurement Officers and Auditors who are responsible for ensuring that Microsoft products with FIPS 140 validated cryptographic modules are used in their organization. The goal of this section is to provide an overview of the Microsoft developed products and modules and explain how the validated cryptographic modules are used. + +### Microsoft Product Relationship with CNG and CAPI libraries + +Rather than validate individual components and products, Microsoft chooses to validate only the underlying cryptographic modules. Subsequently, many Windows components and Microsoft products are built to rely on the Cryptographic API: Next Generation (CNG) and legacy Cryptographic API (CAPI) FIPS 140 validated cryptographic modules. Windows components and Microsoft products use the documented application programming interfaces (APIs) for each of the modules to access various cryptographic services. + +The following list contains some of the Windows components and Microsoft products that rely on FIPS 140 validated cryptographic modules: + + - Schannel Security Package + - Remote Desktop Protocol (RDP) Client + - Encrypting File System (EFS) + - Some Microsoft .NET Framework Applications (.NET also provides cryptographic algorithm implementations that have not been FIPS 140 validated.) + - BitLocker® Drive Full-volume Encryption + - IPsec Settings of Windows Firewall + +## Information for System Integrators + +This section provides information for System Integrators and Auditors who are responsible for deploying Microsoft products in a manner consistent with the product’s FIPS 140 Security Policy. + +There are two steps to ensure that Microsoft products operate in FIPS mode: + +1. Selecting/Installing FIPS 140 validated cryptographic modules +2. Setting FIPS local/group security policy flag. + +### Step 1 – Selecting/Installing FIPS 140 Validated Cryptographic Modules + +Systems Integrators must ensure that all cryptographic modules installed are, in fact, FIPS 140 validated. This can be accomplished by cross-checking the version number of the installed module with the list of validated binaries. The list of validated CAPI binaries is identified in the [CAPI Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_capi_validated_cryptographic) section below and the list of validated CNG binaries is identified in the [CNG Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_cng_validated_cryptographic) section below. There are similar sections for all other validated cryptographic modules. + +The version number of the installed binary is found by right-clicking the module file and clicking on the Version or Details tab. Cryptographic modules are stored in the "windows\\system32" or "windows\\system32\\drivers" directory. + +### Step 2 – Setting FIPS Local/Group Security Policy Flag + +The Windows operating system provides a group (or local) security policy setting, “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing”, which is used by many Microsoft products to determine whether to operate in a FIPS-approved mode. When this policy is set, the validated cryptographic modules in Windows will also operate in a FIPS-approved mode. + +**Note** – There is no enforcement of the FIPS policy by the operating system or the validated cryptographic modules. Instead, each individual application must check this flag and enforce the Security Policy of the validated cryptographic modules. + +#### Instructions on Setting the FIPS Local/Group Security Policy Flag + +While there are alternative methods for setting the FIPS local/group security policy flag, the following method is included as a guide to users with Administrative privileges. This description is for the Local Security Policy, but the Group Security Policy may be set in a similar manner. + +1. Open the 'Run' menu by pressing the combination 'Windows Key + R'. +2. Type 'secpol.msc' and press 'Enter' or click the 'Ok' button. +3. In the Local Security Policy management console window that opens, use the left tab to navigate to the Local Policies -\> Security Options. +4. Scroll down the right pane and double-click 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing'. +5. In the properties window, select the 'Enabled' option and click the 'Apply' button. + +#### Microsoft Components and Products That Utilize FIPS Local/Group Security Policy + +The following list details some of the Microsoft components that use the cryptographic functionality implemented by either CNG or legacy CAPI. When the FIPS Local/Group Security Policy is set, the following components will enforce the validated module Security Policy. + + - Schannel Security Package + - Remote Desktop Protocol (RDP) Client + - Encrypting File System (EFS) + - Some Microsoft .NET Framework Applications (.NET also provides cryptographic algorithm implementations that have not been FIPS 140 validated.) + - BitLocker® Drive Full-volume Encryption + - IPsec Settings of Windows Firewall + +#### Effects of Setting FIPS Local/Group Security Policy Flag + +When setting the FIPS local/group security policy flag, the behavior of several Microsoft components and products are affected. The most noticeable difference will be that the components enforcing this setting will only use those algorithms approved or allowed in FIPS mode. The specific changes to the products listed above are: + - Schannel Security Package forced to negotiate sessions using TLS. The following supported Cipher Suites are disabled: - + - - TLS\_RSA\_WITH\_RC4\_128\_SHA - TLS\_RSA\_WITH\_RC4\_128\_MD5 - SSL\_CK\_RC4\_128\_WITH\_MD5 - SSL\_CK\_DES\_192\_EDE3\_CBC\_WITH\_MD5 - TLS\_RSA\_WITH\_NULL\_MD5 - TLS\_RSA\_WITH\_NULL\_SHA - + - The set of cryptographic algorithms that a Remote Desktop Protocol (RDP) server will use is scoped to: - + - - CALG\_RSA\_KEYX - RSA public key exchange algorithm - CALG\_3DES - Triple DES encryption algorithm - CALG\_AES\_128 - 128 bit AES @@ -175,6916 +175,6916 @@ When setting the FIPS local/group security policy flag, the behavior of several - CALG\_SHA\_256 - 256 bit SHA hashing algorithm - CALG\_SHA\_384 - 384 bit SHA hashing algorithm - CALG\_SHA\_512 - 512 bit SHA hashing algorithm - + - Any Microsoft .NET Framework applications, such as Microsoft ASP.NET or Windows Communication Foundation (WCF), only allow algorithm implementations that are validated to FIPS 140, meaning only classes that end in "CryptoServiceProvider" or "Cng" can be used. Any attempt to create an instance of other cryptographic algorithm classes or create instances that use non-allowed algorithms will cause an InvalidOperationException exception. - + - Verification of ClickOnce applications fails unless the client computer has .NET Framework 2.0 SP1 or later service pack installed or .NET Framework 3.5 or later installed. - + - On Windows Vista and Windows Server 2008 and later, BitLocker Drive Encryption switches from AES-128 using the elephant diffuser to using the approved AES-256 encryption. Recovery passwords are not created or backed up. Instead, backup a recovery key on a local drive or on a network share. To use the recovery key, put the key on a USB device and plug the device into the computer. - -Please be aware that selection of FIPS mode can limit product functionality (See ). - -## Information for Software Developers - -This section is targeted at developers who wish to build their own applications using the FIPS 140 validated cryptographic modules. - -Each of the validated cryptographic modules defines a series of rules that must be followed. The security rules for each validated cryptographic module are specified in the Security Policy document. Links to each of the Security Policy documents is provided in the [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140) section below. Generally, the restriction in Microsoft validated cryptographic modules is limiting the use of cryptography to only FIPS Approved cryptographic algorithms, modes, and key sizes. - -### Using Microsoft Cryptographic Modules in a FIPS mode of operation - -No matter whether developing with native languages or using .NET, it is important to first check whether the CNG modules for the target system are FIPS validated. The list of validated CNG binaries is identified in the [CNG Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_cng_validated_cryptographic) section. - -When developing using CNG directly, it is the responsibility of the developer to follow the security rules outlined in the FIPS 140 Security Policy for each module. The security policy for each module is provided on the CMVP website. Links to each of the Security Policy documents is provided in the tables below. It is important to remember that setting the FIPS local/group security policy Flag (discussed above) does not affect the behavior of the modules when used for developing custom applications. - -If you are developing your application using .NET instead of using the native libraries, then setting the FIPS local policy flag will generate an exception when an improper .NET class is used for cryptography (i.e. the cryptographic classes whose names end in "Managed"). The names of these allowed classes end with "Cng", which use the CNG binaries or "CryptoServiceProvider", which use the legacy CAPI binaries. - -### Key Strengths and Validity Periods - -NIST Special Publication 800-131A Revision 1, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, dated November 2015, \[[SP 800-131A](http://dx.doi.org/10.6028/nist.sp.800-131ar1)\], offers guidance for moving to stronger cryptographic keys and algorithms. This does not replace NIST SP 800-57, Recommendation for Key Management Part 1: General, \[[SP 800-57](http://csrc.nist.gov/publications/pubssps.html#800-57-part1)\], but gives more specific guidance. One of the most important topics discussed in these publications deals with the key strengths of FIPS Approved algorithms and their validity periods. When developing applications that use FIPS Approved algorithms, it is also extremely important to select appropriate key sizes based on the security lifetimes recommended by NIST. - -## FIPS 140 FAQ - -The following are answers to commonly asked questions for the FIPS 140-2 validation of Microsoft products. - -1. How does FIPS 140 relate to the Common Criteria? - **Answer:** These are two separate security standards with different, but complementary, purposes. FIPS 140 is a standard designed specifically for validating product modules that implement cryptography. On the other hand, Common Criteria is designed to help evaluate security functions in IT products. - In many cases, Common Criteria evaluations will rely on FIPS 140 validations to provide assurance that cryptographic functionality is implemented properly. -2. How does FIPS 140 relate to Suite B? - **Answer:** Suite B is simply a set of cryptographic algorithms defined by the U.S. National Security Agency (NSA) as part of its Cryptographic Modernization Program. The set of Suite B cryptographic algorithms are to be used for both unclassified information and most classified information. - The Suite B cryptographic algorithms are a subset of the FIPS Approved cryptographic algorithms as allowed by the FIPS 140 standard. -3. There are so many modules listed on the NIST website for each release, how are they related and how do I tell which one applies to me? - **Answer:** Microsoft strives to validate all releases of its cryptographic modules. Each module provides a different set of cryptographic algorithms. If you are required to use only FIPS validated cryptographic modules, you simply need to verify that the version being used appears on the validation list. - Please see the [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140)section for a complete list of Microsoft validated modules. -4. My application links against crypt32.dll, cryptsp.dll, advapi32.dll, bcrypt.dll, bcryptprimitives.dll, or ncrypt.dll. What do I need to do to assure I’m using FIPS 140 validated cryptographic modules? - **Answer:** crypt32.dll, cryptsp.dll, advapi32.dll, and ncrypt.dll are intermediary libraries that will offload all cryptographic operations to the FIPS validated cryptographic modules. Bcrypt.dll itself is a validated cryptographic module for Windows Vista and Windows Server 2008. For Windows 7 and Windows Server 2008 R2 and later, bcryptprimitives.dll is the validated module, but bcrypt.dll remains as one of the libraries to link against. - You must first verify that the underlying CNG cryptographic module is validated. Once verified, you'll need to confirm that you're using the module correctly in FIPS mode (See [Information for Software Developers](https://technet.microsoft.com/library/cc750357.aspx#_information_for_software) section for details). -5. What does "When operated in FIPS mode" mean on certificates? - **Answer:** This caveat identifies that a required configuration and security rules must be followed in order to use the cryptographic module in a manner consistent with its FIPS 140 Security Policy. The security rules are defined in the Security Policy for the module and usually revolve around using only FIPS Approved cryptographic algorithms and key sizes. Please see the Security Policy for the specific security rules for each cryptographic module (See [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140) section for links to each policy). -6. Which FIPS validated module is called when Windows 7 or Windows 8 is configured to use the FIPS setting in the wireless configuration? - **Answer:** CNG is used. This setting tells the wireless driver to call FIPS 140-2 validated cryptographic modules instead of using the driver’s own cryptography, if any. -7. Is BitLocker to Go FIPS 140-2 validated? - **Answer:** There are two separate parts for BitLocker to Go. One part is simply a native feature of BitLocker and as such, it uses FIPS 140-2 validated cryptographic modules. The other part is the BitLocker to Go Reader application for down-level support of older operating systems such as Windows XP and Windows Vista. The Reader application does not use FIPS 140-2 validated cryptographic modules. -8. Are applications FIPS 140-2 validated? - **Answer:** Microsoft only has low-level cryptographic modules in Windows FIPS 140-2 validated, not high-level applications. A better question is whether a certain application calls a FIPS 140-2 validated cryptographic module in the underlying Windows OS. That question needs to be directed to the company/product group that created the application of interest. -9. How can Systems Center Operations Manager 2012 be configured to use FIPS 140-2 validated cryptographic modules? - **Answer:** See [https://technet.microsoft.com/library/hh914094.aspx](https://technet.microsoft.com/library/hh914094.aspx) - -## Microsoft FIPS 140 Validated Cryptographic Modules - -### Modules By Operating System - -The following tables identify the Cryptographic Modules for an operating system. - -#### Windows - -##### Windows 10 Creators Update (Version 1703) - -Validated Editions: Home, Pro, Enterprise, Education, S, Surface Hub, Mobile - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.15063#3095

          FIPS Approved algorithms: AES (Cert. #4624); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2522); SHS (Cert. #3790); Triple-DES (Cert. #2459)
          -
          -Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #1281); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #1278)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.15063#3094

          #3094

          -

          FIPS Approved algorithms: AES (Certs. #4624 and #4626); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2523); SHS (Cert. #3790); Triple-DES (Cert. #2459)
          -
          -Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert.#1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert.#2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert.#1281)

          Boot Manager10.0.15063#3089

          FIPS Approved algorithms: AES (Certs. #4624 and #4625); CKG (vendor affirmed); HMAC (Cert. #3061); PBKDF (vendor affirmed); RSA (Cert. #2523); SHS (Cert. #3790)

          -

          Other algorithms: PBKDF (vendor affirmed); VMK KDF (vendor affirmed)

          Windows OS Loader10.0.15063#3090

          FIPS Approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790)

          -

          Other algorithms: NDRNG

          Windows Resume[1]10.0.15063#3091FIPS Approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790)
          BitLocker® Dump Filter[2]10.0.15063#3092FIPS Approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2522); SHS (Cert. #3790)
          Code Integrity (ci.dll)10.0.15063#3093

          FIPS Approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790)

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282)

          Secure Kernel Code Integrity (skci.dll)[3]10.0.15063#3096

          FIPS Approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790)

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282)

          - - -\[1\] Applies only to Home, Pro, Enterprise, Education and S - -\[2\] Applies only to Pro, Enterprise, Education, S, Mobile and Surface Hub - -\[3\] Applies only to Pro, Enterprise Education and S - -##### Windows 10 Anniversary Update (Version 1607) - -Validated Editions: Home, Pro, Enterprise, Enterprise LTSB, Mobile - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.14393#2937

          FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          -
          -Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #886)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.14393#2936

          FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          -
          -Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887)

          Boot Manager10.0.14393#2931

          FIPS Approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347)

          -

          Other algorithms: MD5; PBKDF (non-compliant); VMK KDF

          BitLocker® Windows OS Loader (winload)10.0.14393#2932FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          -
          -Other algorithms: NDRNG; MD5
          BitLocker® Windows Resume (winresume)[1]10.0.14393#2933FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[2]10.0.14393#2934FIPS Approved algorithms: AES (Certs. #4061 and #4064)
          Code Integrity (ci.dll)10.0.14393#2935

          FIPS Approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347)
          -
          -Other algorithms: AES (non-compliant); MD5

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888)

          Secure Kernel Code Integrity (skci.dll)[3]10.0.14393#2938

          FIPS Approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347)
          -
          -Other algorithms: MD5

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888)

          - - -\[1\] Applies only to Home, Pro, Enterprise and Enterprise LTSB - -\[2\] Applies only to Pro, Enterprise, Enterprise LTSB and Mobile - -\[3\] Applies only to Pro, Enterprise and Enterprise LTSB - -##### Windows 10 November 2015 Update (Version 1511) - -Validated Editions: Home, Pro, Enterprise, Enterprise LTSB, Mobile, Surface Hub - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.10586#2606

          FIPS Approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs. #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888 and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024)
          -
          -Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #664)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.10586#2605

          FIPS Approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs.  #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888 and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024)
          -
          -Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663)

          Boot Manager[4]10.0.10586#2700FIPS Approved algorithms: AES (Certs. #3653); HMAC (Cert. #2381); PBKDF (vendor affirmed); RSA (Cert. #1871); SHS (Certs. #3047 and #3048)
          -
          -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)[5]10.0.10586#2701FIPS Approved algorithms: AES (Certs. #3629 and #3653); RSA (Cert. #1871); SHS (Cert. #3048)
          -
          -Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[6]10.0.10586#2702FIPS Approved algorithms: AES (Certs. #3653); RSA (Cert. #1871); SHS (Cert. #3048)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[7]10.0.10586#2703FIPS Approved algorithms: AES (Certs. #3653)
          Code Integrity (ci.dll)10.0.10586#2604

          FIPS Approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048)
          -
          -Other algorithms: AES (non-compliant); MD5

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665)

          Secure Kernel Code Integrity (skci.dll)[8]10.0.10586#2607

          FIPS Approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048)
          -
          -Other algorithms: MD5

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665)

          - - -\[4\] Applies only to Home, Pro, Enterprise, Mobile and Surface Hub - -\[5\] Applies only to Home, Pro, Enterprise, Mobile and Surface Hub - -\[6\] Applies only to Home, Pro and Enterprise - -\[7\] Applies only to Pro, Enterprise, Mobile and Surface Hub - -\[8\] Applies only to Enterprise and Enterprise LTSB - -##### Windows 10 (Version 1507) - -Validated Editions: Home, Pro, Enterprise, Enterprise LTSB, Mobile, and Surface Hub - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.10240#2606

          FIPS Approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969)
          -
          -Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #575)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.10240#2605

          FIPS Approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969)
          -
          -Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576)

          Boot Manager[9]10.0.10240#2600FIPS Approved algorithms: AES (Cert. #3497); HMAC (Cert. #2233); KTS (AES Cert. #3498); PBKDF (vendor affirmed); RSA (Cert. #1784); SHS (Certs. #2871 and #2886)
          -
          -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)[10]10.0.10240#2601FIPS Approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871)
          -
          -Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[11]10.0.10240#2602FIPS Approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[12]10.0.10240#2603FIPS Approved algorithms: AES (Certs. #3497 and #3498)
          Code Integrity (ci.dll)10.0.10240#2604

          FIPS Approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871)
          -
          -Other algorithms: AES (non-compliant); MD5

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572)

          Secure Kernel Code Integrity (skci.dll)[13]10.0.10240#2607

          FIPS Approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871)
          -
          -Other algorithms: MD5

          -

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572)

          - - -\[9\] Applies only to Home, Pro, Enterprise and Enterprise LTSB - -\[10\] Applies only to Home, Pro, Enterprise and Enterprise LTSB - -\[11\] Applies only to Home, Pro, Enterprise and Enterprise LTSB - -\[12\] Applies only to Pro, Enterprise and Enterprise LTSB - -\[13\] Applies only to Enterprise and Enterprise LTSB - -##### Windows 8.1 - -Validated Editions: RT, Pro, Enterprise, Phone, Embedded - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)6.3.9600 6.3.9600.17031#2357

          FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692)
          -
          -Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)#2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #323)

          Kernel Mode Cryptographic Primitives Library (cng.sys)6.3.9600 6.3.9600.17042#2356

          FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692)
          -
          -Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)

          -

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289)

          Boot Manager6.3.9600 6.3.9600.17031#2351FIPS Approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          -
          -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)6.3.9600 6.3.9600.17031#2352FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396)
          -
          -Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[14]6.3.9600 6.3.9600.17031#2353FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)6.3.9600 6.3.9600.17031#2354FIPS Approved algorithms: AES (Cert. #2832)
          -
          -Other algorithms: N/A
          Code Integrity (ci.dll)6.3.9600 6.3.9600.17031#2355#2355

          FIPS Approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373)
          -
          -Other algorithms: MD5

          -

          Validated Component Implementations: PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289)

          - - -\[14\] Applies only to Pro, Enterprise, and Embedded 8. - -##### Windows 8 - -Validated Editions: RT, Home, Pro, Enterprise, Phone - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL)6.2.9200#1892FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          -
          -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258); DSA (Cert. ); ECDSA (Cert. ); HMAC (Cert. ); KAS (Cert. ); KBKDF (Cert. ); PBKDF (vendor affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          -
          -
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.2.9200#1891FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          -
          -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258 and ); ECDSA (Cert. ); HMAC (Cert. ); KAS (Cert. ); KBKDF (Cert. ); PBKDF (vendor affirmed); RNG (Cert. ); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          -
          -Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager6.2.9200#1895FIPS Approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: MD5
          BitLocker® Windows OS Loader (WINLOAD)6.2.9200#1896FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG
          BitLocker® Windows Resume (WINRESUME)[15]6.2.9200#1898FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (DUMPFVE.SYS)6.2.9200#1899FIPS Approved algorithms: AES (Certs. #2196 and #2198)
          -
          -Other algorithms: N/A
          Code Integrity (CI.DLL)6.2.9200#1897FIPS Approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: MD5
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL)6.2.9200#1893FIPS Approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed)
          -
          -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#1902); Triple-DES (Cert. ); Triple-DES MAC (Triple-DES Cert. , vendor affirmed)
          -
          -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. , key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced Cryptographic Provider (RSAENH.DLL)6.2.9200#1894FIPS Approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386)
          -
          -Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          - - -\[15\] Applies only to Home and Pro - -**Windows 7** - -Validated Editions: Windows 7, Windows 7 SP1 - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL)

          6.1.7600.16385

          -

          6.1.7601.17514

          1329FIPS Approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); DSA (Cert. #386); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846)
          -
          -Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4#559 and ); SHS (Cert. ); Triple-DES (Cert. )
          -
          -Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4
          Kernel Mode Cryptographic Primitives Library (cng.sys)

          6.1.7600.16385

          -

          6.1.7600.16915

          -

          6.1.7600.21092

          -

          6.1.7601.17514

          -

          6.1.7601.17725

          -

          6.1.7601.17919

          -

          6.1.7601.21861

          -

          6.1.7601.22076

          1328FIPS Approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846)
          -
          -Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4
          Boot Manager

          6.1.7600.16385

          -

          6.1.7601.17514

          1319FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #557); SHS (Cert. #1081)
          -
          -Other algorithms: MD5#1168 and ); HMAC (Cert. ); RSA (Cert. ); SHS (Cert. )
          -
          -Other algorithms: MD5
          Winload OS Loader (winload.exe)

          6.1.7600.16385

          -

          6.1.7600.16757

          -

          6.1.7600.20897

          -

          6.1.7600.20916

          -

          6.1.7601.17514

          -

          6.1.7601.17556

          -

          6.1.7601.21655

          -

          6.1.7601.21675

          1326FIPS Approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #557); SHS (Cert. #1081)
          -
          -Other algorithms: MD5
          BitLocker™ Drive Encryption

          6.1.7600.16385

          -

          6.1.7600.16429

          -

          6.1.7600.16757

          -

          6.1.7600.20536

          -

          6.1.7600.20873

          -

          6.1.7600.20897

          -

          6.1.7600.20916

          -

          6.1.7601.17514

          -

          6.1.7601.17556

          -

          6.1.7601.21634

          -

          6.1.7601.21655

          -

          6.1.7601.21675

          1332FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081)
          -
          -Other algorithms: Elephant Diffuser
          Code Integrity (CI.DLL)

          6.1.7600.16385

          -

          6.1.7600.17122

          -

          6.1.7600.21320

          -

          6.1.7601.17514

          -

          6.1.7601.17950

          -

          6.1.7601.22108

          1327FIPS Approved algorithms: RSA (Cert. #557); SHS (Cert. #1081)
          -
          -Other algorithms: MD5
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL)6.1.7600.16385
          -(no change in SP1)
          1331FIPS Approved algorithms: DSA (Cert. #385); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed)
          -
          -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4
          Enhanced Cryptographic Provider (RSAENH.DLL)6.1.7600.16385
          -(no change in SP1)
          1330FIPS Approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #673); SHS (Cert. #1081); RSA (Certs. #557 and #559); Triple-DES (Cert. #846)
          -
          -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 256-bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          - - -##### Windows Vista SP1 - -Validated Editions: Ultimate Edition - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Boot Manager (bootmgr)6.0.6001.18000 and 6.0.6002.18005978FIPS Approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #354); SHS (Cert. #753)
          Winload OS Loader (winload.exe)6.0.6001.18000, 6.0.6001.18027, 6.0.6001.18606, 6.0.6001.22125, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411 and 6.0.6002.22596979FIPS Approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #354); SHS (Cert. #753)
          -
          -Other algorithms: MD5
          Code Integrity (ci.dll)6.0.6001.18000, 6.0.6001.18023, 6.0.6001.22120, and 6.0.6002.18005980FIPS Approved algorithms: RSA (Cert. #354); SHS (Cert. #753)
          -
          -Other algorithms: MD5
          Kernel Mode Security Support Provider Interface (ksecdd.sys)6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742, and 6.0.6002.228696.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742, and 6.0.6002.228691000

          FIPS Approved algorithms: AES (Certs. #739 and #756); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656)#739 and ); ECDSA (Cert. ); HMAC (Cert. ); RNG (Cert.  and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )

          -

          Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)

          Cryptographic Primitives Library (bcrypt.dll)6.0.6001.22202, 6.0.6002.18005, and 6.0.6002.228726.0.6001.22202, 6.0.6002.18005, and 6.0.6002.228721001

          FIPS Approved algorithms: AES (Certs. #739 and #756); DSA (Cert. #283); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90, vendor affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656)

          -

          Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength)

          Enhanced Cryptographic Provider (RSAENH)6.0.6001.22202 and 6.0.6002.180056.0.6001.22202 and 6.0.6002.180051002

          FIPS Approved algorithms: AES (Cert. #739); HMAC (Cert. #407); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #354); SHS (Cert. #753); Triple-DES (Cert. #656)

          -

          Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.0.6001.18000 and 6.0.6002.180056.0.6001.18000 and 6.0.6002.180051003

          FIPS Approved algorithms: DSA (Cert. #281); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed)

          -

          Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4

          - - -##### Windows Vista - -Validated Editions: Ultimate Edition - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced Cryptographic Provider (RSAENH)6.0.6000.16386893FIPS Approved algorithms: AES (Cert. #553); HMAC (Cert. #297); RNG (Cert. #321); RSA (Certs. #255 and #258); SHS (Cert. #618); Triple-DES (Cert. #549)
          -
          -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.0.6000.16386894FIPS Approved algorithms: DSA (Cert. #226); RNG (Cert. #321); SHS (Cert. #618); Triple-DES (Cert. #549); Triple-DES MAC (Triple-DES Cert. #549, vendor affirmed)
          -
          -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4
          BitLocker™ Drive Encryption6.0.6000.16386947FIPS Approved algorithms: AES (Cert. #715); HMAC (Cert. #386); SHS (Cert. #737)
          -
          -Other algorithms: Elephant Diffuser
          Kernel Mode Security Support Provider Interface (ksecdd.sys)6.0.6000.16386, 6.0.6000.16870 and 6.0.6000.21067891FIPS Approved algorithms: AES (Cert. #553); ECDSA (Cert. #60); HMAC (Cert. #298); RNG (Cert. #321); RSA (Certs. #257 and #258); SHS (Cert. #618); Triple-DES (Cert. #549)
          -
          -Other algorithms: DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 to 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; HMAC MD5
          - - -##### Windows XP SP3 - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.1.2600.5512997

          FIPS Approved algorithms: HMAC (Cert. #429); RNG (Cert. #449); SHS (Cert. #785); Triple-DES (Cert. #677); Triple-DES MAC (Triple-DES Cert. #677, vendor affirmed)

          -

          Other algorithms: DES; MD5; HMAC MD5

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.1.2600.5507990

          FIPS Approved algorithms: DSA (Cert. #292); RNG (Cert. #448); SHS (Cert. #784); Triple-DES (Cert. #676); Triple-DES MAC (Triple-DES Cert. #676, vendor affirmed)

          -

          Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits); MD5; RC2; RC4

          Enhanced Cryptographic Provider (RSAENH)5.1.2600.5507989

          FIPS Approved algorithms: AES (Cert. #781); HMAC (Cert. #428); RNG (Cert. #447); RSA (Cert. #371); SHS (Cert. #783); Triple-DES (Cert. #675); Triple-DES MAC (Triple-DES Cert. #675, vendor affirmed)

          -

          Other algorithms: DES; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits)

          - - -##### Windows XP SP2 - - ------ - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          DSS/Diffie-Hellman Enhanced Cryptographic Provider5.1.2600.2133240

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #29)

          -

          Other algorithms: DES (Cert. #66); RC2; RC4; MD5; DES40; Diffie-Hellman (key agreement)

          Microsoft Enhanced Cryptographic Provider5.1.2600.2161238

          FIPS Approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed)

          -

          Other algorithms: DES (Cert. #156); RC2; RC4; MD5

          - - -##### Windows XP SP1 - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Microsoft Enhanced Cryptographic Provider5.1.2600.1029238

          FIPS Approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed)

          -

          Other algorithms: DES (Cert. #156); RC2; RC4; MD5

          - - -##### Windows XP - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module5.1.2600.0241

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #35); HMAC-SHA-1 (Cert. #35, vendor affirmed)

          -

          Other algorithms: DES (Cert. #89)

          - - -##### Windows 2000 SP3 - - ------ - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.0.2195.1569106

          FIPS Approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35)

          -

          Other algorithms: DES (Certs. #89)

          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider

          (Base DSS: 5.0.2195.3665 [SP3])

          -

          (Base: 5.0.2195.3839 [SP3])

          -

          (DSS/DH Enh: 5.0.2195.3665 [SP3])

          -

          (Enh: 5.0.2195.3839 [SP3]

          103

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed)

          -

          Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5

          - - -##### Windows 2000 SP2 - - ------ - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.0.2195.1569106

          FIPS Approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35)

          -

          Other algorithms: DES (Certs. #89)

          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider

          (Base DSS:

          -

          5.0.2195.2228 [SP2])

          -

          (Base:

          -

          5.0.2195.2228 [SP2])

          -

          (DSS/DH Enh:

          -

          5.0.2195.2228 [SP2])

          -

          (Enh:

          -

          5.0.2195.2228 [SP2])

          103

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed)

          -

          Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5

          - - -##### Windows 2000 SP1 - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider

          (Base DSS: 5.0.2150.1391 [SP1])

          -

          (Base: 5.0.2150.1391 [SP1])

          -

          (DSS/DH Enh: 5.0.2150.1391 [SP1])

          -

          (Enh: 5.0.2150.1391 [SP1])

          103

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed)

          -

          Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5

          - - -##### Windows 2000 - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enchanced Cryptographic Provider, and Enhanced Cryptographic Provider5.0.2150.176

          FIPS Approved algorithms: Triple-DES (vendor affirmed); DSA/SHA-1 (Certs. #28 and 29); RSA (vendor affirmed)

          -

          Other algorithms: DES (Certs. #65, 66, 67 and 68); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement)

          - - -##### Windows 95 and Windows 98 - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enchanced Cryptographic Provider, and Enhanced Cryptographic Provider5.0.1877.6 and 5.0.1877.775

          FIPS Approved algorithms: Triple-DES (vendor affirmed); SHA-1 (Certs. #20 and 21); DSA/SHA-1 (Certs. #25 and 26); RSA (vendor- affirmed)

          -

          Other algorithms: DES (Certs. #61, 62, 63 and 64); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement)

          - - -##### Windows NT 4.0 - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base Cryptographic Provider5.0.1877.6 and 5.0.1877.768FIPS Approved algorithms: SHA-1 (Certs. #20 and 21); DSA/SHA- 1 (Certs. #25 and 26); RSA (vendor affirmed)
          -
          -Other algorithms: DES (Certs. #61, 62, 63 and 64); Triple-DES (allowed for US and Canadian Government use); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement)
          - - -#### Windows Server - -##### Windows Server 2016 - -Validated Editions: Standard, Datacenter, Storage Server - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.143932937FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          -
          -Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)
          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.143932936FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          -
          -Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager10.0.143932931

          FIPS Approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347)

          -

          Other algorithms: MD5; PBKDF (non-compliant); VMK KDF

          BitLocker® Windows OS Loader (winload)10.0.143932932FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          -
          -Other algorithms: NDRNG; MD5
          BitLocker® Windows Resume (winresume)10.0.143932933FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)10.0.143932934FIPS Approved algorithms: AES (Certs. #4061 and #4064)
          Code Integrity (ci.dll)10.0.143932935FIPS Approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347)
          -
          -Other algorithms: AES (non-compliant); MD5
          Secure Kernel Code Integrity (skci.dll)10.0.143932938FIPS Approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347)
          -
          -Other algorithms: MD5
          - - -##### Windows Server 2012 R2 - -Validated Editions: Server, Storage Server, - -**StorSimple 8000 Series, Azure StorSimple Virtual Array Windows Server 2012 R2** - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)6.3.9600 6.3.9600.170312357FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692)
          -
          -Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.3.9600 6.3.9600.170422356FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692)
          -
          -Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager6.3.9600 6.3.9600.170312351FIPS Approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          -
          -Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)6.3.9600 6.3.9600.170312352FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396)
          -
          -Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[16]6.3.9600 6.3.9600.170312353FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[17]6.3.9600 6.3.9600.170312354FIPS Approved algorithms: AES (Cert. #2832)
          -
          -Other algorithms: N/A
          Code Integrity (ci.dll)6.3.9600 6.3.9600.170312355FIPS Approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373)
          -
          -Other algorithms: MD5
          - - -\[16\] Does not apply to **Azure StorSimple Virtual Array Windows Server 2012 R2** - -\[17\] Does not apply to **Azure StorSimple Virtual Array Windows Server 2012 R2** - -**Windows Server 2012** - -Validated Editions: Server, Storage Server - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL)6.2.92001892FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          -
          -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#687); ECDSA (Cert. ); HMAC (Cert. #); KAS (Cert. ); KBKDF (Cert. ); PBKDF (vendor affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          -
          -Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.2.92001891FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          -
          -Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#1110); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          -
          -Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager6.2.92001895FIPS Approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: MD5
          BitLocker® Windows OS Loader (WINLOAD)6.2.92001896FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG
          BitLocker® Windows Resume (WINRESUME)6.2.92001898FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: MD5
          BitLocker® Dump Filter (DUMPFVE.SYS)6.2.92001899FIPS Approved algorithms: AES (Certs. #2196 and #2198)
          -
          -Other algorithms: N/A
          Code Integrity (CI.DLL)6.2.92001897FIPS Approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903)
          -
          -Other algorithms: MD5
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL)6.2.92001893FIPS Approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed)
          -
          -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced Cryptographic Provider (RSAENH.DLL)6.2.92001894FIPS Approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386)
          -
          -Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          - - -##### Windows Server 2008 R2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Boot Manager (bootmgr)6.1.7600.16385 or 6.1.7601.175146.1.7600.16385 or 6.1.7601.175141321FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #568); SHS (Cert. #1081)
          -
          -Other algorithms: MD5
          Winload OS Loader (winload.exe)6.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.216756.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.216751333FIPS Approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #568); SHS (Cert. #1081)
          -
          -Other algorithms: MD5
          Code Integrity (ci.dll)6.1.7600.16385, 6.1.7600.17122, 6.1.7600.21320, 6.1.7601.17514, 6.1.7601.17950 and 6.1.7601.221086.1.7600.16385, 6.1.7600.17122, 6.1.7600.21320, 6.1.7601.17514, 6.1.7601.17950 and 6.1.7601.221081334FIPS Approved algorithms: RSA (Cert. #568); SHS (Cert. #1081)
          -
          -Other algorithms: MD5
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.220766.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.220761335FIPS Approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846)
          -
          --Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4
          Cryptographic Primitives Library (bcryptprimitives.dll)66.1.7600.16385 or 6.1.7601.1751466.1.7600.16385 or 6.1.7601.175141336FIPS Approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); DSA (Cert. #391); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846)
          -
          -Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; HMAC MD5; MD2; MD4; MD5; RC2; RC4
          Enhanced Cryptographic Provider (RSAENH)6.1.7600.163851337FIPS Approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #687); SHS (Cert. #1081); RSA (Certs. #559 and #568); Triple-DES (Cert. #846)
          -
          -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.1.7600.163851338FIPS Approved algorithms: DSA (Cert. #390); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed)
          -
          -Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4
          BitLocker™ Drive Encryption6.1.7600.16385, 6.1.7600.16429, 6.1.7600.16757, 6.1.7600.20536, 6.1.7600.20873, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21634, 6.1.7601.21655 or 6.1.7601.216756.1.7600.16385, 6.1.7600.16429, 6.1.7600.16757, 6.1.7600.20536, 6.1.7600.20873, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21634, 6.1.7601.21655 or 6.1.7601.216751339FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081)
          -
          -Other algorithms: Elephant Diffuser
          - - -##### Windows Server 2008 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Boot Manager (bootmgr)6.0.6001.18000, 6.0.6002.18005 and 6.0.6002.224976.0.6001.18000, 6.0.6002.18005 and 6.0.6002.224971004FIPS Approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #355); SHS (Cert. #753)
          -
          -Other algorithms: N/A
          Winload OS Loader (winload.exe)6.0.6001.18000, 6.0.6001.18606, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411, 6.0.6002.22497 and 6.0.6002.225966.0.6001.18000, 6.0.6001.18606, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411, 6.0.6002.22497 and 6.0.6002.225961005FIPS Approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #355); SHS (Cert. #753)
          -
          -Other algorithms: MD5
          Code Integrity (ci.dll)6.0.6001.18000 and 6.0.6002.180056.0.6001.18000 and 6.0.6002.180051006FIPS Approved algorithms: RSA (Cert. #355); SHS (Cert. #753)
          -
          -Other algorithms: MD5
          Kernel Mode Security Support Provider Interface (ksecdd.sys)6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742 and 6.0.6002.228696.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742 and 6.0.6002.228691007FIPS Approved algorithms: AES (Certs. #739 and #757); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90 AES-CTR, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656)
          -
          -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#83); HMAC (Cert. ); RNG (Cert.  and SP800-90 AES-CTR, vendor affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          -
          -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Cryptographic Primitives Library (bcrypt.dll)6.0.6001.22202, 6.0.6002.18005 and 6.0.6002.228726.0.6001.22202, 6.0.6002.18005 and 6.0.6002.228721008FIPS Approved algorithms: AES (Certs. #739 and #757); DSA (Cert. #284); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656)
          -
          -Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength)
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.0.6001.18000 and 6.0.6002.180056.0.6001.18000 and 6.0.6002.180051009FIPS Approved algorithms: DSA (Cert. #282); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed)
          -
          --Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4
          Enhanced Cryptographic Provider (RSAENH)6.0.6001.22202 and 6.0.6002.180056.0.6001.22202 and 6.0.6002.180051010FIPS Approved algorithms: AES (Cert. #739); HMAC (Cert. #408); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #355); SHS (Cert. #753); Triple-DES (Cert. #656)
          -
          -Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          - - -##### Windows Server 2003 SP2 - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.2.3790.3959875

          FIPS Approved algorithms: DSA (Cert. #221); RNG (Cert. #314); RSA (Cert. #245); SHS (Cert. #611); Triple-DES (Cert. #543)

          -

          Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC4

          Kernel Mode Cryptographic Module (FIPS.SYS)5.2.3790.3959869

          FIPS Approved algorithms: HMAC (Cert. #287); RNG (Cert. #313); SHS (Cert. #610); Triple-DES (Cert. #542)

          -

          Other algorithms: DES; HMAC-MD5

          Enhanced Cryptographic Provider (RSAENH)5.2.3790.3959868

          FIPS Approved algorithms: AES (Cert. #548); HMAC (Cert. #289); RNG (Cert. #316); RSA (Cert. #245); SHS (Cert. #613); Triple-DES (Cert. #544)

          -

          Other algorithms: DES; RC2; RC4; MD2; MD4; MD5; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength)

          - - -##### Windows Server 2003 SP1 - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.2.3790.1830 [SP1]405

          FIPS Approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2])

          -

          Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant)

          -

          [1] x86
          -[2] SP1 x86, x64, IA64

          Enhanced Cryptographic Provider (RSAENH)5.2.3790.1830 [Service Pack 1])382

          FIPS Approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2])

          -

          Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5

          -

          [1] x86
          -[2] SP1 x86, x64, IA64

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.2.3790.1830 [Service Pack 1]381

          FIPS Approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81)

          -

          Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40

          -

          [1] x86
          -[2] SP1 x86, x64, IA64

          - - -##### Windows Server 2003 - - ------ - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.2.3790.0405

          FIPS Approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2])

          -

          Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant)

          -

          [1] x86
          -[2] SP1 x86, x64, IA64

          Enhanced Cryptographic Provider (RSAENH)5.2.3790.0382

          FIPS Approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2])

          -

          Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5

          -

          [1] x86
          -[2] SP1 x86, x64, IA64

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.2.3790.0381

          FIPS Approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81)

          -

          Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40

          -

          [1] x86
          -[2] SP1 x86, x64, IA64

          - - -#### Other Products - -##### Windows Embedded Compact 7 and Windows Embedded Compact 8 - - ------ - - - - - - - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced Cryptographic Provider7.00.2872 [1] and 8.00.6246 [2]2957

          FIPS Approved algorithms: AES (Certs.#4433and#4434); CKG (vendor affirmed); DRBG (Certs.#1432and#1433); HMAC (Certs.#2946and#2945); RSA (Certs.#2414and#2415); SHS (Certs.#3651and#3652); Triple-DES (Certs.#2383and#2384)

          -

          Allowed algorithms: HMAC-MD5; MD5; NDRNG

          Cryptographic Primitives Library (bcrypt.dll)7.00.2872 [1] and 8.00.6246 [2]2956

          FIPS Approved algorithms: AES (Certs.#4430and#4431); CKG (vendor affirmed); CVL (Certs.#1139and#1140); DRBG (Certs.#1429and#1430); DSA (Certs.#1187and#1188); ECDSA (Certs.#1072and#1073); HMAC (Certs.#2942and#2943); KAS (Certs.#114and#115); RSA (Certs.#2411and#2412); SHS (Certs.#3648and#3649); Triple-DES (Certs.#2381and#2382)

          -

          Allowed algorithms: MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength

          - - - -##### Windows CE 6.0 and Windows Embedded Compact 7 - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced Cryptographic Provider6.00.1937 [1] and 7.00.1687 [2]825

          FIPS Approved algorithms: AES (Certs. #516 [1] and #2024 [2]); HMAC (Certs. #267 [1] and #1227 [2]); RNG (Certs. #292 [1] and #1060 [2]); RSA (Cert. #230 [1] and #1052 [2]); SHS (Certs. #589 [1] and #1774 [2]); Triple-DES (Certs. #526 [1] and #1308 [2])

          -

          Other algorithms: MD5; HMAC-MD5; RC2; RC4; DES

          - - -##### Outlook Cryptographic Provider - - ------ - - - - - - - - - - - - - - -
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Outlook Cryptographic Provider (EXCHCSP)SR-1A (3821)SR-1A (3821)110

          FIPS Approved algorithms: Triple-DES (Cert. #18); SHA-1 (Certs. #32); RSA (vendor affirmed)

          -

          Other algorithms: DES (Certs. #91); DES MAC; RC2; MD2; MD5

          - - - -### Cryptographic Algorithms - -The following tables are organized by cryptographic algorithms with their modes, states, and key sizes. For each algorithm implementation (operating system / platform), there is a link to the Cryptographic Algorithm Validation Program (CAVP) issued certificate. - -### Advanced Encryption Standard (AES) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • AES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CFB128:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CTR:
          • -
            • -
            • Counter Source: Internal
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-OFB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -

          Microsoft Surface Hub Virtual TPM Implementations #4904

          -

          Version 10.0.15063.674

            -
          • AES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CFB128:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CTR:
          • -
            • -
            • Counter Source: Internal
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-OFB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #4903

          -

          Version 10.0.16299

            -
          • AES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CCM:
          • -
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
            • Tag Lengths: 32, 48, 64, 80, 96, 112, 128 (bits)
            • -
            • IV Lengths: 56, 64, 72, 80, 88, 96, 104 (bits)
            • -
            • Plain Text Length: 0-32
            • -
            • AAD Length: 0-65536
            • -
          • -
          • AES-CFB128:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CFB8:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CMAC:
          • -
            • -
            • Generation:
            • -
              • -
              • AES-128:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-192:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-256:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
            • -
            • Verification:
            • -
              • -
              • AES-128:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-192:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-256:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
            • -
          • -
          • AES-CTR:
          • -
            • -
            • Counter Source: Internal
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-ECB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-GCM:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
            • Tag Lengths: 96, 104, 112, 120, 128 (bits)
            • -
            • Plain Text Lengths: 0, 8, 1016, 1024 (bits)
            • -
            • AAD Lengths: 0, 8, 1016, 1024 (bits)
            • -
            • 96 bit IV supported
            • -
          • -
          • AES-XTS:
          • -
            • -
            • Key Size: 128:
            • -
              • -
              • Modes: Decrypt, Encrypt
              • -
              • Block Sizes: Full
              • -
            • -
            • Key Size: 256:
            • -
              • -
              • Modes: Decrypt, Encrypt
              • -
              • Block Sizes: Full
              • -
            • -
          • -

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #4902

          -

          Version 10.0.15063.674

            -
          • AES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CCM:
          • -
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
            • Tag Lengths: 32, 48, 64, 80, 96, 112, 128 (bits)
            • -
            • IV Lengths: 56, 64, 72, 80, 88, 96, 104 (bits)
            • -
            • Plain Text Length: 0-32
            • -
            • AAD Length: 0-65536
            • -
          • -
          • AES-CFB128:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CFB8:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CMAC:
          • -
            • -
            • Generation:
            • -
              • -
              • AES-128:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-192:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-256:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
            • -
            • Verification:
            • -
              • -
              • AES-128:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-192:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-256:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
            • -
          • -
          • AES-CTR:
          • -
            • -
            • Counter Source: Internal
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-ECB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-GCM:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
            • Tag Lengths: 96, 104, 112, 120, 128 (bits)
            • -
            • Plain Text Lengths: 0, 8, 1016, 1024 (bits)
            • -
            • AAD Lengths: 0, 8, 1016, 1024 (bits)
            • -
            • 96 bit IV supported
            • -
          • -
          • AES-XTS:
          • -
            • -
            • Key Size: 128:
            • -
              • -
              • Modes: Decrypt, Encrypt
              • -
              • Block Sizes: Full
              • -
            • -
            • Key Size: 256:
            • -
              • -
              • Modes: Decrypt, Encrypt
              • -
              • Block Sizes: Full
              • -
            • -
          • -

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4901

          -

          Version 10.0.15254

            -
          • AES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CCM:
          • -
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
            • Tag Lengths: 32, 48, 64, 80, 96, 112, 128 (bits)
            • -
            • IV Lengths: 56, 64, 72, 80, 88, 96, 104 (bits)
            • -
            • Plain Text Length: 0-32
            • -
            • AAD Length: 0-65536
            • -
          • -
          • AES-CFB128:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CFB8:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-CMAC:
          • -
            • -
            • Generation:
            • -
              • -
              • AES-128:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-192:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-256:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
            • -
            • Verification:
            • -
              • -
              • AES-128:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-192:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
              • AES-256:
              • -
                • -
                • Block Sizes: Full, Partial
                • -
                • Message Length: 0-65536
                • -
                • Tag Length: 16-16
                • -
              • -
            • -
          • -
          • AES-CTR:
          • -
            • -
            • Counter Source: Internal
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-ECB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
          • -
          • AES-GCM:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • IV Generation: External
            • -
            • Key Lengths: 128, 192, 256 (bits)
            • -
            • Tag Lengths: 96, 104, 112, 120, 128 (bits)
            • -
            • Plain Text Lengths: 0, 8, 1016, 1024 (bits)
            • -
            • AAD Lengths: 0, 8, 1016, 1024 (bits)
            • -
            • 96 bit IV supported
            • -
          • -
          • AES-XTS:
          • -
            • -
            • Key Size: 128:
            • -
              • -
              • Modes: Decrypt, Encrypt
              • -
              • Block Sizes: Full
              • -
            • -
            • Key Size: 256:
            • -
              • -
              • Modes: Decrypt, Encrypt
              • -
              • Block Sizes: Full
              • -
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4897

          -

          Version 10.0.16299

          AES-KW:

          -
            -
          • Modes: Decrypt, Encrypt
          • -
          • CIPHK transformation direction: Forward
          • -
          • Key Lengths: 128, 192, 256 (bits)
          • -
          • Plain Text Lengths: 128, 192, 256, 320, 2048 (bits)
          • -
          -

          AES Val#4902

          Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #4900

          -

          Version 10.0.15063.674

          AES-KW:

          -
            -
          • Modes: Decrypt, Encrypt
          • -
          • CIPHK transformation direction: Forward
          • -
          • Key Lengths: 128, 192, 256 (bits)
          • -
          • Plain Text Lengths: 128, 192, 256, 320, 2048 (bits)
          • -
          -

          AES Val#4901

          Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #4899

          -

          Version 10.0.15254

          AES-KW:

          -
            -
          • Modes: Decrypt, Encrypt
          • -
          • CIPHK transformation direction: Forward
          • -
          • Key Lengths: 128, 192, 256 (bits)
          • -
          • Plain Text Lengths: 128, 192, 256, 320, 2048 (bits)
          • -
          -

          AES Val#4897

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #4898

          -

          Version 10.0.16299

          AES-CCM:

          -
            -
          • Key Lengths: 256 (bits)
          • -
          • Tag Lengths: 128 (bits)
          • -
          • IV Lengths: 96 (bits)
          • -
          • Plain Text Length: 0-32
          • -
          • AAD Length: 0-65536
          • -
          -

          AES Val#4902

          Microsoft Surface Hub BitLocker(R) Cryptographic Implementations #4896

          -

          Version 10.0.15063.674

          AES-CCM:

          -
            -
          • Key Lengths: 256 (bits)
          • -
          • Tag Lengths: 128 (bits)
          • -
          • IV Lengths: 96 (bits)
          • -
          • Plain Text Length: 0-32
          • -
          • AAD Length: 0-65536
          • -
          -

          AES Val#4901

          Windows 10 Mobile (version 1709) BitLocker(R) Cryptographic Implementations #4895

          -

          Version 10.0.15254

          AES-CCM:

          -
            -
          • Key Lengths: 256 (bits)
          • -
          • Tag Lengths: 128 (bits)
          • -
          • IV Lengths: 96 (bits)
          • -
          • Plain Text Length: 0-32
          • -
          • AAD Length: 0-65536
          • -
          -

          AES Val#4897

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); BitLocker(R) Cryptographic Implementations #4894

          -

          Version 10.0.16299

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB128 ( e/d; 128 , 192 , 256 );

          -

          OFB ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #4627

          -

          Version 10.0.15063

          KW ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 256 , 192 , 320 , 2048 )

          -

          AES Val#4624

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #4626

          -

          Version 10.0.15063

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          -

          AES Val#4624

          -

           

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile BitLocker(R) Cryptographic Implementations #4625

          -

          Version 10.0.15063

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

          CFB128 ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          -

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          -

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 )

          -

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )

          -

          (KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )

          -

          IV Generated: ( External ) ; PT Lengths Tested: ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested: ( 0 , 1024 , 8 , 1016 ) ; 96BitIV_Supported

          -

          GMAC_Supported

          -

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #4624

          -

          Version 10.0.15063

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4434

          -

          Version 7.00.2872

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4433

          -

          Version 8.00.6246

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4431

          -

          Version 7.00.2872

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4430

          -

          Version 8.00.6246

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB128 ( e/d; 128 , 192 , 256 );

          -

          OFB ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #4074

          -

          Version 10.0.14393

          ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB8 ( e/d; 128 , 192 , 256 ); CFB128 ( e/d; 128 , 192 , 256 ); CTR ( int only; 128 , 192 , 256 )

          -

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          -

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          -

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          -(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          -IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 0 , 0 ) ; 96BitIV_Supported
          -GMAC_Supported

          -

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #4064

          -

          Version 10.0.14393

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

           

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #4063
          -Version 10.0.14393

          KW  ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 192 , 256 , 320 , 2048 )

          -

          AES Val#4064

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #4062

          -

          Version 10.0.14393

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          -

          AES Val#4064

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BitLocker® Cryptographic Implementations #4061

          -

          Version 10.0.14393

          KW  ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 256 , 192 , 320 , 2048 )

          -

          AES Val#3629

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #3652

          -

          Version 10.0.10586

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          -

          AES Val#3629

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BitLocker® Cryptographic Implementations #3653

          -

          Version 10.0.10586

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

           

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA32 Algorithm Implementations #3630
          -Version 10.0.10586

          ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB8 ( e/d; 128 , 192 , 256 ); CFB128 ( e/d; 128 , 192 , 256 ); CTR ( int only; 128 , 192 , 256 )

          -

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          -

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          -

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          -(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          -IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 0 , 0 ) ; 96BitIV_Supported
          -GMAC_Supported

          -

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #3629
          -
          -

          -

          Version 10.0.10586

          KW  ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 256 , 192 , 320 , 2048 )

          -

          AES Val#3497

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #3507

          -

          Version 10.0.10240

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          -

          AES Val#3497

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BitLocker® Cryptographic Implementations #3498

          -

          Version 10.0.10240

          ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB8 ( e/d; 128 , 192 , 256 ); CFB128 ( e/d; 128 , 192 , 256 ); CTR ( int only; 128 , 192 , 256 )

          -

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          -

          CMAC(Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          -

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          -(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          -IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 0 , 0 ) ; 96BitIV_Supported
          -GMAC_Supported

          -

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #3497
          -Version 10.0.10240

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

           

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #3476
          -Version 10.0.10240

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

           

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2853

          -

          Version 6.3.9600

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          -

          AES Val#2832

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 BitLocker� Cryptographic Implementations #2848

          -

          Version 6.3.9600

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 0 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          -

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          -

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )

          -

          (KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )

          -

          IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 128 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 128 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 8 , 1024 ) ; 96BitIV_Supported ;
          -OtherIVLen_Supported
          -GMAC_Supported

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2832

          -

          Version 6.3.9600

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )
          -AES Val#2197

          -

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 192; Block Size(s): ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 256; Block Size(s): ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 )
          -AES Val#2197

          -

          GCM(KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          -(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          -IV Generated: ( Externally ) ; PT Lengths Tested: ( 0 , 128 , 1024 , 8 , 1016 ) ; AAD Lengths tested: ( 0 , 128 , 1024 , 8 , 1016 ) ; IV Lengths Tested: ( 8 , 1024 ) ; 96BitIV_Supported
          -GMAC_Supported

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #2216

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          -

          AES Val#2196

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #2198

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

          CFB128 ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #2197

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

           

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #2196
          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 – 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )
          -AES Val#1168

          Windows Server 2008 R2 and SP1 CNG algorithms #1187

          -

          Windows 7 Ultimate and SP1 CNG algorithms #1178

          CCM (KS: 128 , 256 ) (Assoc. Data Len Range: 0 - 8 ) (Payload Length Range: 4 - 32 ( Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16 )
          -AES Val#1168
          Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #1177

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          -

           

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168

          GCM

          -

          GMAC

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168 , vendor-affirmed
          CCM (KS: 128 , 256 ) (Assoc. Data Len Range: 0 - 8 ) (Payload Length Range: 4 - 32 ( Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16 )Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #760
          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 1 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          Windows Server 2008 CNG algorithms #757

          -

          Windows Vista Ultimate SP1 CNG algorithms #756

          CBC ( e/d; 128 , 256 );

          -

          CCM (KS: 128 , 256 ) (Assoc. Data Len Range: 0 - 8 ) (Payload Length Range: 4 - 32 ( Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16 )

          Windows Vista Ultimate BitLocker Drive Encryption #715

          -

          Windows Vista Ultimate BitLocker Drive Encryption #424

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CFB8 ( e/d; 128 , 192 , 256 );

          Windows Vista Ultimate SP1 and Windows Server 2008 Symmetric Algorithm Implementation #739

          -

          Windows Vista Symmetric Algorithm Implementation #553

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          -

          CTR ( int only; 128 , 192 , 256 )

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #2023

          ECB ( e/d; 128 , 192 , 256 );

          -

          CBC ( e/d; 128 , 192 , 256 );

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #2024

          -

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #818

          -

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #781

          -

          Windows 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #548

          -

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #516

          -

          Windows CE and Windows Mobile 6, 6.1, and 6.5 Enhanced Cryptographic Provider (RSAENH) #507

          -

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #290

          -

          Windows CE 5.0 and 5.1 Enhanced Cryptographic Provider (RSAENH) #224

          -

          Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #80

          -

          Windows XP, SP1, and SP2 Enhanced Cryptographic Provider (RSAENH) #33

          - - -Deterministic Random Bit Generator (DRBG) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • Counter:
          • -
            • -
            • Modes: AES-256
            • -
            • Derivation Function States: Derivation Function not used
            • -
            • Prediction Resistance Modes: Not Enabled
            • -
          • -
          -

          Prerequisite: AES #4904

          Microsoft Surface Hub Virtual TPM Implementations #1734

          -

          Version 10.0.15063.674

            -
          • Counter:
          • -
            • -
            • Modes: AES-256
            • -
            • Derivation Function States: Derivation Function not used
            • -
            • Prediction Resistance Modes: Not Enabled
            • -
          • -
          -

          Prerequisite: AES #4903

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1733

          -

          Version 10.0.16299

            -
          • Counter:
          • -
            • -
            • Modes: AES-256
            • -
            • Derivation Function States: Derivation Function used
            • -
            • Prediction Resistance Modes: Not Enabled
            • -
          • -
          -

          Prerequisite: AES #4902

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1732

          -

          Version 10.0.15063.674

            -
          • Counter:
          • -
            • -
            • Modes: AES-256
            • -
            • Derivation Function States: Derivation Function used
            • -
            • Prediction Resistance Modes: Not Enabled
            • -
          • -
          -

          Prerequisite: AES #4901

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1731

          -

          Version 10.0.15254

            -
          • Counter:
          • -
            • -
            • Modes: AES-256
            • -
            • Derivation Function States: Derivation Function used
            • -
            • Prediction Resistance Modes: Not Enabled
            • -
          • -
          -

          Prerequisite: AES #4897

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1730

          -

          Version 10.0.16299

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4627 ) ]

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1556

          -

          Version 10.0.15063

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#4624 ) ]

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1555

          -

          Version 10.0.15063

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4434 ) ]

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1433

          -

          Version 7.00.2872

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4433 ) ]

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1432

          -

          Version 8.00.6246

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4431 ) ]

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1430

          -

          Version 7.00.2872

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4430 ) ]

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1429

          -

          Version 8.00.6246

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4074 ) ]

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #1222

          -

          Version 10.0.14393

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#4064 ) ]

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #1217

          -

          Version 10.0.14393

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#3629 ) ]

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #955

          -

          Version 10.0.10586

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#3497 ) ]

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #868

          -

          Version 10.0.10240

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#2832 ) ]

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #489

          -

          Version 6.3.9600

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#2197 ) ]Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #258
          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#2023 ) ]Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #193
          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#1168 ) ]Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 RNG Library #23
          DRBG (SP 800–90)Windows Vista Ultimate SP1, vendor-affirmed
          - - -#### Digital Signature Algorithm (DSA) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • DSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • PQGGen:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • PQGVer:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • SigGen:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • SigVer:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • KeyPair:
              • -
                • -
                • L = 2048, N = 256
                • -
                • L = 3072, N = 256
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1303

          -

          Version 10.0.15063.674

            -
          • DSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • PQGGen:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • PQGVer:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • SigGen:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • SigVer:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • KeyPair:
              • -
                • -
                •  
                • -
                •  
                • -
                • L = 2048, N = 256
                • -
                • L = 3072, N = 256
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1302

          -

          Version 10.0.15254

            -
          • DSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • PQGGen:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • PQGVer:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • SigGen:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • SigVer:
              • -
                • -
                • L = 2048, N = 256 SHA: SHA-256
                • -
                • L = 3072, N = 256 SHA: SHA-256
                • -
              • -
              • KeyPair:
              • -
                • -
                • L = 2048, N = 256
                • -
                • L = 3072, N = 256
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1301

          -

          Version 10.0.16299

          FIPS186-4:

          -

          PQG(gen)PARMS TESTED:   [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          KeyPairGen:   [ (2048,256) ; (3072,256) ]

          -

          SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]

          -

          SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          SHS: Val#3790

          -

          DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1223

          -

          Version 10.0.15063

          FIPS186-4:
          -PQG(ver)PARMS TESTED:
            [ (1024,160) SHA( 1 ); ]
          -SIG(ver)PARMS TESTED:   [ (1024,160) SHA( 1 ); ]
          -SHS: Val# 3649

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1188

          -

          Version 7.00.2872

          FIPS186-4:
          -PQG(ver)PARMS TESTED:
            [ (1024,160) SHA( 1 ); ]
          -SIG(ver)PARMS TESTED:   [ (1024,160) SHA( 1 ); ]
          -SHS: Val#3648

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1187

          -

          Version 8.00.6246

          FIPS186-4:
          -PQG(gen)
          PARMS TESTED: [
          -(2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          -PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          -KeyPairGen:    [ (2048,256) ; (3072,256) ]
          -SIG(gen)PARMS TESTED:   [ (2048,256)
          -SHA( 256 ); (3072,256) SHA( 256 ); ]
          -SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          SHS: Val# 3347
          -DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #1098

          -

          Version 10.0.14393

          FIPS186-4:
          -PQG(gen)
          PARMS TESTED:   [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ] PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 )]
          -KeyPairGen:    [ (2048,256) ; (3072,256) ] SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]
          -SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          SHS: Val# 3047
          -DRBG: Val# 955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #1024

          -

          Version 10.0.10586

          FIPS186-4:
          -PQG(gen)
          PARMS TESTED:   [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          -PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          -KeyPairGen:    [ (2048,256) ; (3072,256) ]
          -SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ] SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          SHS: Val# 2886
          -DRBG: Val# 868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #983

          -

          Version 10.0.10240

          FIPS186-4:
          -PQG(gen)
          PARMS TESTED:   [
          -(2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          -PQG(ver)PARMS TESTED:   [ (2048,256)
          -SHA( 256 ); (3072,256) SHA( 256 ) ]
          -KeyPairGen:    [ (2048,256) ; (3072,256) ]
          -SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]
          -SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          -

          SHS: Val# 2373
          -DRBG: Val# 489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #855

          -

          Version 6.3.9600

          FIPS186-2:
          -PQG(ver) MOD(1024);
          -SIG(ver) MOD(1024);
          -SHS: #1903
          -DRBG: #258

          -

          FIPS186-4:
          -PQG(gen)PARMS TESTED
          : [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          -PQG(ver)PARMS TESTED: [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          -SIG(gen)PARMS TESTED: [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]
          -SIG(ver)PARMS TESTED: [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          -SHS: #1903
          -DRBG: #258
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#687.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #687
          FIPS186-2:
          -PQG(ver)
          MOD(1024);
          -SIG(ver) MOD(1024);
          -SHS: #1902
          -DRBG: #258
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#686.
          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 DSS and Diffie-Hellman Enhanced Cryptographic Provider (DSSENH) #686
          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 1773
          -DRBG: Val# 193
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#645.
          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #645
          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 1081
          -DRBG: Val# 23
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#391. See Historical DSA List Val#386.

          Windows Server 2008 R2 and SP1 CNG algorithms #391

          -

          Windows 7 Ultimate and SP1 CNG algorithms #386

          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 1081
          -RNG: Val# 649
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#390. See Historical DSA List Val#385.

          Windows Server 2008 R2 and SP1 Enhanced DSS (DSSENH) #390

          -

          Windows 7 Ultimate and SP1 Enhanced DSS (DSSENH) #385

          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 753
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#284. See Historical DSA List Val#283.

          Windows Server 2008 CNG algorithms #284

          -

          Windows Vista Ultimate SP1 CNG algorithms #283

          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 753
          -RNG: Val# 435
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#282. See Historical DSA List Val#281.

          Windows Server 2008 Enhanced DSS (DSSENH) #282

          -

          Windows Vista Ultimate SP1 Enhanced DSS (DSSENH) #281

          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 618
          -RNG: Val# 321
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#227. See Historical DSA List Val#226.

          Windows Vista CNG algorithms #227

          -

          Windows Vista Enhanced DSS (DSSENH) #226

          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 784
          -RNG: Val# 448
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#292.
          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #292
          FIPS186-2:
          -SIG(ver)
          MOD(1024);
          -SHS: Val# 783
          -RNG: Val# 447
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#291.
          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #291
          FIPS186-2:
          -PQG(gen)
          MOD(1024);
          -PQG(ver) MOD(1024);
          -KEYGEN(Y) MOD(1024);
          -SIG(gen) MOD(1024);
          -SIG(ver) MOD(1024);
          -SHS: Val# 611
          -RNG: Val# 314
          Windows 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #221
          FIPS186-2:
          -PQG(gen)
          MOD(1024);
          -PQG(ver) MOD(1024);
          -KEYGEN(Y) MOD(1024);
          -SIG(gen) MOD(1024);
          -SIG(ver) MOD(1024);
          -SHS: Val# 385
          Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #146
          FIPS186-2:
          -PQG(ver)
          MOD(1024);
          -KEYGEN(Y) MOD(1024);
          -SIG(gen) MOD(1024);
          -SIG(ver) MOD(1024);
          -SHS: Val# 181
          -
          -
          Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #95
          FIPS186-2:
          -PQG(gen)
          MOD(1024);
          -PQG(ver) MOD(1024);
          -KEYGEN(Y) MOD(1024);
          -SIG(gen) MOD(1024);
          -SHS: SHA-1 (BYTE)
          -SIG(ver) MOD(1024);
          -SHS: SHA-1 (BYTE)

          Windows 2000 DSSENH.DLL #29

          -

          Windows 2000 DSSBASE.DLL #28

          -

          Windows NT 4 SP6 DSSENH.DLL #26

          -

          Windows NT 4 SP6 DSSBASE.DLL #25

          FIPS186-2: PRIME;
          -FIPS186-2:

          -

          KEYGEN(Y):
          -SHS: SHA-1 (BYTE)

          -

          SIG(gen):
          -SIG(ver)
          MOD(1024);
          -SHS: SHA-1 (BYTE)

          Windows NT 4.0 SP4 Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider #17
          - - -#### Elliptic Curve Digital Signature Algorithm (ECDSA) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #2373, DRBG #489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1263

          -

          Version 6.3.9600

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384
                • -
                • Generation Methods: Testing Candidates
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1734

          Microsoft Surface Hub Virtual TPM Implementations #1253

          -

          Version 10.0.15063.674

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384
                • -
                • Generation Methods: Testing Candidates
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1733

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1252

          -

          Version 10.0.16299

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1251

          -

          Version 10.0.15063.674

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1250

          -

          Version 10.0.15063.674

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1249

          -

          Version 10.0.15254

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1248

          -

          Version 10.0.15254

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1247

          -

          Version 10.0.16299

            -
          • ECDSA:
          • -
            • -
            • 186-4:
            • -
              • -
              • Key Pair Generation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
                • Generation Methods: Extra Random Bits
                • -
              • -
              • Public Key Validation:
              • -
                • -
                • Curves: P-256, P-384, P-521
                • -
              • -
              • Signature Generation:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
              • Signature Verification:
              • -
                • -
                • P-256 SHA: SHA-256
                • -
                • P-384 SHA: SHA-384
                • -
                • P-521 SHA: SHA-512
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1246

          -

          Version 10.0.16299

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 TestingCandidates )
          -SHS: Val#3790
          -DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1136

          -

          Version 10.0.15063

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -PKV: CURVES( P-256 P-384 P-521 )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          -SHS: Val#3790
          -DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1135

          -

          Version 10.0.15063

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -PKV: CURVES( P-256 P-384 P-521 )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          -SHS: Val#3790
          -DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1133

          -

          Version 10.0.15063

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -PKV: CURVES( P-256 P-384 P-521 )
          -SigGen: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -SigVer: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) )
          -SHS:Val# 3649
          -DRBG:Val# 1430

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1073

          -

          Version 7.00.2872

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -PKV: CURVES( P-256 P-384 P-521 )
          -SigGen: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -SigVer: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) )
          -SHS:Val#3648
          -DRBG:Val# 1429

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1072

          -

          Version 8.00.6246

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 TestingCandidates )
          -PKV: CURVES( P-256 P-384 )
          -SigGen: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 256, 384) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -SigVer: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 256, 384) )

          -

          SHS: Val# 3347
          -DRBG: Val# 1222

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #920

          -

          Version 10.0.14393

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -PKV: CURVES( P-256 P-384 P-521 )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          -

          SHS: Val# 3347
          -DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #911

          -

          Version 10.0.14393

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          -

          SHS: Val# 3047
          -DRBG: Val# 955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #760

          -

          Version 10.0.10586

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          -

          SHS: Val# 2886
          -DRBG: Val# 868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #706

          -

          Version 10.0.10240

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          -

          SHS: Val#2373
          -DRBG: Val# 489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #505

          -

          Version 6.3.9600

          FIPS186-2:
          -PKG: CURVES
          ( P-256 P-384 P-521 )
          -SHS: #1903
          -DRBG: #258
          -SIG(ver):CURVES( P-256 P-384 P-521 )
          -SHS: #1903
          -DRBG: #258

          -

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          -SHS: #1903
          -DRBG: #258
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#341.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #341

          FIPS186-2:
          -PKG: CURVES
          ( P-256 P-384 P-521 )
          -SHS: Val#1773
          -DRBG: Val# 193
          -SIG(ver): CURVES( P-256 P-384 P-521 )
          -SHS: Val#1773
          -DRBG: Val# 193

          -

          FIPS186-4:
          -PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          -SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          -SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          -SHS: Val#1773
          -DRBG: Val# 193
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#295.

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #295
          FIPS186-2:
          -PKG: CURVES
          ( P-256 P-384 P-521 )
          -SHS: Val#1081
          -DRBG: Val# 23
          -SIG(ver): CURVES( P-256 P-384 P-521 )
          -SHS: Val#1081
          -DRBG: Val# 23
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#142. See Historical ECDSA List Val#141.

          Windows Server 2008 R2 and SP1 CNG algorithms #142

          -

          Windows 7 Ultimate and SP1 CNG algorithms #141

          FIPS186-2:
          -PKG: CURVES
          ( P-256 P-384 P-521 )
          -SHS: Val#753
          -SIG(ver): CURVES( P-256 P-384 P-521 )
          -SHS: Val#753
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#83. See Historical ECDSA List Val#82.

          Windows Server 2008 CNG algorithms #83

          -

          Windows Vista Ultimate SP1 CNG algorithms #82

          FIPS186-2:
          -PKG: CURVES
          ( P-256 P-384 P-521 )
          -SHS: Val#618
          -RNG: Val# 321
          -SIG(ver): CURVES( P-256 P-384 P-521 )
          -SHS: Val#618
          -RNG: Val# 321
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#60.
          Windows Vista CNG algorithms #60
          - - -#### Keyed-Hash Message Authentication Code (HMAC) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • HMAC-SHA-1:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-256:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-384:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          -

          Prerequisite: SHS #4011

          Microsoft Surface Hub Virtual TPM Implementations #3271

          -

          Version 10.0.15063.674

            -
          • HMAC-SHA-1:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-256:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-384:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          -

          Prerequisite: SHS #4009

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #3270

          -

          Version 10.0.16299

            -
          • HMAC-SHA-1:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-256:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-384:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-512:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          -

          Prerequisite: SHS #4011

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #3269

          -

          Version 10.0.15063.674

            -
          • HMAC-SHA-1:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-256:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-384:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-512:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          -

          Prerequisite: SHS #4010

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #3268

          -

          Version 10.0.15254

            -
          • HMAC-SHA-1:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-256:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-384:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          • HMAC-SHA2-512:
          • -
            • -
            • Key Sizes &lt; Block Size
            • -
            • Key Sizes &gt; Block Size
            • -
            • Key Sizes = Block Size
            • -
          • -
          -

          Prerequisite: SHS #4009

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #3267

          -

          Version 10.0.16299

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3790

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #3062

          -

          Version 10.0.15063

          HMAC-SHA1(Key Sizes Ranges Tested: KSBS ) SHS Val#3790

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3061

          -

          Version 10.0.15063

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3652

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3652

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3652

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#3652

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2946

          -

          Version 7.00.2872

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3651

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3651

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3651

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#3651

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2945

          -

          Version 8.00.6246

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val# 3649

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val# 3649

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val# 3649

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal# 3649

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2943

          -

          Version 7.00.2872

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3648

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3648

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3648

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#3648

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2942

          -

          Version 8.00.6246

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          -SHS Val# 3347

          -

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          -SHS Val# 3347

          -

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          -SHS Val# 3347

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2661

          -

          Version 10.0.14393

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val# 3347

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val# 3347

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val# 3347

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS Val# 3347

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2651

          -

          Version 10.0.14393

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          -SHS Val# 3047

          -

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          -SHS Val# 3047

          -

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          -SHS Val# 3047

          -

          HMAC-SHA512 ( Key Size Ranges Tested:  KSBS )
          -SHS Val# 3047

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #2381

          -

          Version 10.0.10586

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          -SHSVal# 2886

          -

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          -SHSVal# 2886

          -

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          - SHSVal# 2886

          -

          HMAC-SHA512 ( Key Size Ranges Tested:  KSBS )
          -SHSVal# 2886

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2233

          -

          Version 10.0.10240

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          -SHS Val#2373

          -

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          -SHS Val#2373

          -

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          -SHS Val#2373

          -

          HMAC-SHA512 ( Key Size Ranges Tested:  KSBS )
          -SHS Val#2373

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1773

          -

          Version 6.3.9600

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#2764

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#2764

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#2764

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS Val#2764

          Windows CE and Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) #2122

          -

          Version 5.2.29344

          HMAC-SHA1 (Key Sizes Ranges Tested: KS#1902

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KS#1902

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #1347

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS#1902

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS#1902

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS#1902

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS#1902

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1346

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS )

          -

          SHS#1903

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS )

          -

          SHS#1903

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS )

          -

          SHS#1903

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS )

          -

          SHS#1903

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1345

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#1773

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#1773

          -

          Tinker HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#1773

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#1773

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1364

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#1774

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#1774

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#1774

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#1774

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1227

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#1081

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#1081

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#1081

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#1081

          Windows Server 2008 R2 and SP1 CNG algorithms #686

          -

          Windows 7 and SP1 CNG algorithms #677

          -

          Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH) #687

          -

          Windows 7 Enhanced Cryptographic Provider (RSAENH) #673

          HMAC-SHA1(Key Sizes Ranges Tested: KSVal#1081

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#1081

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #675

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#816

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#816

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#816

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#816

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #452

          HMAC-SHA1 (Key Sizes Ranges Tested: KSVal#753

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#753

          Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #415

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#753

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS )SHS Val#753

          Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #408

          -

          Windows Vista Enhanced Cryptographic Provider (RSAENH) #407

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS )SHSVal#618

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          Windows Vista Enhanced Cryptographic Provider (RSAENH) #297
          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#785

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #429

          -

          Windows XP, vendor-affirmed

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#783

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#783

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#783

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#783

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #428

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#613

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#613

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#613

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#613

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #289
          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#610Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #287

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#753

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          Windows Server 2008 CNG algorithms #413

          -

          Windows Vista Ultimate SP1 CNG algorithms #412

          HMAC-SHA1 (Key Sizes Ranges Tested: KSVal#737

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#737

          Windows Vista Ultimate BitLocker Drive Encryption #386

          HMAC-SHA1 ( Key Sizes Ranges Tested: KSBS ) SHSVal#618

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          Windows Vista CNG algorithms #298

          HMAC-SHA1 ( Key Sizes Ranges Tested: KSBS ) SHSVal#589

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS )SHSVal#589

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#589

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#589

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #267

          HMAC-SHA1 ( Key Sizes Ranges Tested: KSBS ) SHSVal#578

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#578

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#578

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#578

          Windows CE and Windows Mobile 6.0 and Windows Mobil 6.5 Enhanced Cryptographic Provider (RSAENH) #260

          HMAC-SHA1 (Key Sizes Ranges Tested: KSVal#495

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#495

          Windows Vista BitLocker Drive Encryption #199
          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#364

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #99

          -

          Windows XP, vendor-affirmed

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#305

          -

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#305

          -

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#305

          -

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#305

          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #31
          - - -#### Key Agreement Scheme (KAS) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • KAS ECC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
            • -
            • Schemes:
            • -
              • -
              • Full Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • KDFs: Concatenation
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, ECDSA #1253, DRBG #1734

          Microsoft Surface Hub Virtual TPM Implementations #150

          -

          Version 10.0.15063.674

            -
          • KAS ECC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
            • -
            • Schemes:
            • -
              • -
              • Full Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • KDFs: Concatenation
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, ECDSA #1252, DRBG #1733

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #149

          -

          Version 10.0.16299

            -
          • KAS ECC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • -
            • Schemes:
            • -
              • -
              • Ephemeral Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • KDFs: Concatenation
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • One Pass DH:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • Static Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, ECDSA #1250, DRBG #1732

          -
            -
          • KAS FFC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
            • -
            • Schemes:
            • -
              • -
              • dhEphem:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • dhOneFlow:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • dhStatic:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DSA #1303, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #148

          -

          Version 10.0.15063.674

            -
          • KAS ECC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • -
            • Schemes:
            • -
              • -
              • Ephemeral Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • KDFs: Concatenation
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • One Pass DH:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • Static Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, ECDSA #1249, DRBG #1731

          -
            -
          • KAS FFC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
            • -
            • Schemes:
            • -
              • -
              • dhEphem:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • dhOneFlow:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • dhStatic:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DSA #1302, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #147

          -

          Version 10.0.15254

            -
          • KAS ECC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • -
            • Schemes:
            • -
              • -
              • Ephemeral Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • KDFs: Concatenation
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • One Pass DH:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • Static Unified:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • EC:
                  • -
                    • -
                    • Curve: P-256
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • ED:
                  • -
                    • -
                    • Curve: P-384
                    • -
                    • SHA: SHA-384
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • EE:
                  • -
                    • -
                    • Curve: P-521
                    • -
                    • SHA: SHA-512
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, ECDSA #1246, DRBG #1730

          -
            -
          • KAS FFC:
          • -
            • -
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
            • -
            • Schemes:
            • -
              • -
              • dhEphem:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • dhOneFlow:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
              • dhStatic:
              • -
                • -
                • Key Agreement Roles: Initiator, Responder
                • -
                • Parameter Sets:
                • -
                  • -
                  • FB:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                  • FC:
                  • -
                    • -
                    • SHA: SHA-256
                    • -
                    • MAC: HMAC
                    • -
                  • -
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DSA #1301, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #146

          -

          Version 10.0.16299

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Full Validation   Key Regeneration ) SCHEMES [ FullUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ]

          -

          SHS Val#3790
          -DSA Val#1135
          -DRBG Val#1556

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #128

          -

          Version 10.0.15063

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          -SHS Val#3790
          -DSA Val#1223
          -DRBG Val#1555

          -

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ EphemeralUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -
          -SHS Val#3790
          -ECDSA Val#1133
          -DRBG Val#1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #127

          -

          Version 10.0.15063

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          -SHS Val# 3649
          -DSA Val#1188
          -DRBG Val#1430

          -

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #115

          -

          Version 7.00.2872

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhHybridOneFlow ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB:SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          -[ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB:SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          -SHS Val#3648
          -DSA Val#1187
          -DRBG Val#1429

          -

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -
          -SHS Val#3648
          -ECDSA Val#1072
          -DRBG Val#1429

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #114

          -

          Version 8.00.6246

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Full Validation   Key Regeneration )
          -SCHEMES  [ FullUnified  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; &lt; KDF: CONCAT &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ]

          -

          SHS Val# 3347 ECDSA Val#920 DRBG Val#1222

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #93

          -

          Version 10.0.14393

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation )
          -SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic (No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          -

          SHS Val# 3347 DSA Val#1098 DRBG Val#1217

          -

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          -

          SHS Val# 3347 DSA Val#1098 ECDSA Val#911 DRBG Val#1217 HMAC Val#2651

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #92

          -

          Version 10.0.14393

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          -

          SHS Val# 3047 DSA Val#1024 DRBG Val#955

          -

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          -

          SHS Val# 3047 ECDSA Val#760 DRBG Val#955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #72

          -

          Version 10.0.10586

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          -

          SHS Val# 2886 DSA Val#983 DRBG Val#868

          -

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          -

          SHS Val# 2886 ECDSA Val#706 DRBG Val#868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #64

          -

          Version 10.0.10240

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          -( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          -

          SHS Val#2373 DSA Val#855 DRBG Val#489

          -

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          -[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          -

          SHS Val#2373 ECDSA Val#505 DRBG Val#489

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #47

          -

          Version 6.3.9600

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          -( FA: SHA256 ) ( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FA: SHA256 ) ( FB: SHA256 ) ( FC: SHA256 ) ]
          -[ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FA: SHA256 HMAC ) ( FB: SHA256 HMAC ) ( FC: SHA256 HMAC ) ]
          -SHS #1903 DSA Val#687 DRBG #258

          -

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256 SHA256 HMAC ) ( ED: P-384 SHA384 HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          -[ OnePassDH( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256 SHA256 ) ( ED: P-384 SHA384 ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ) ]
          -[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256 SHA256 HMAC ) ( ED: P-384 SHA384 HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ]
          -
          -SHS #1903 ECDSA Val#341 DRBG #258

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #36

          KAS (SP 800–56A)

          -

          key agreement

          -

          key establishment methodology provides 80 to 256 bits of encryption strength

          Windows 7 and SP1, vendor-affirmed

          -

          Windows Server 2008 R2 and SP1, vendor-affirmed

          - - -SP 800-108 Key-Based Key Derivation Functions (KBKDF) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • Counter:
          • -
            • -
            • MACs: HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384
            • -
          • -
          -

          MAC prerequisite: HMAC #3271

          -
          -
            -
          • Counter Location: Before Fixed Data
          • -
          • R Length: 32 (bits)
          • -
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • -
          -
          -

          K prerequisite: DRBG #1734, KAS #150

          Microsoft Surface Hub Virtual TPM Implementations #161

          -

          Version 10.0.15063.674

            -
          • Counter:
          • -
            • -
            • MACs: HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384
            • -
          • -
          -

          MAC prerequisite: HMAC #3270

          -
          -
            -
          • Counter Location: Before Fixed Data
          • -
          • R Length: 32 (bits)
          • -
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • -
          -
          -

          K prerequisite: DRBG #1733, KAS #149

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #160

          -

          Version 10.0.16299

            -
          • Counter:
          • -
            • -
            • MACs: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
            • -
          • -
          -

          MAC prerequisite: AES #4902, HMAC #3269

          -
          -
            -
          • Counter Location: Before Fixed Data
          • -
          • R Length: 32 (bits)
          • -
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • -
          • K prerequisite: KAS #148
          • -
          -

          Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #159

          -

          Version 10.0.15063.674

            -
          • Counter:
          • -
            • -
            • MACs: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
            • -
          • -
          -

          MAC prerequisite: AES #4901, HMAC #3268

          -
          -
            -
          • Counter Location: Before Fixed Data
          • -
          • R Length: 32 (bits)
          • -
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • -
          -
          -

          K prerequisite: KAS #147

          Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #158

          -

          Version 10.0.15254

            -
          • Counter:
          • -
            • -
            • MACs: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
            • -
          • -
          -

          MAC prerequisite: AES #4897, HMAC #3267

          -
          -
            -
          • Counter Location: Before Fixed Data
          • -
          • R Length: 32 (bits)
          • -
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • -
          -
          -

          K prerequisite: KAS #146

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #157

          -

          Version 10.0.16299

          CTR_Mode: ( Llength( Min0 Max0 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA384] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )
          -
          -KAS Val#128
          -DRBG Val#1556
          -MAC Val#3062

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #141

          -

          Version 10.0.15063

          CTR_Mode: ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )
          -
          -KAS Val#127
          -AES Val#4624
          -DRBG Val#1555
          -MAC Val#3061

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #140

          -

          Version 10.0.15063

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA384] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          -

          KAS Val#93 DRBG Val#1222 MAC Val#2661

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #102

          -

          Version 10.0.14393

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          -

          KAS Val#92 AES Val#4064 DRBG Val#1217 MAC Val#2651

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #101

          -

          Version 10.0.14393

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          -

          KAS Val#72 AES Val#3629 DRBG Val#955 MAC Val#2381

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #72

          -

          Version 10.0.10586

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          -

          KAS Val#64 AES Val#3497 RBG Val#868 MAC Val#2233

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #66

          -

          Version 10.0.10240

          CTR_Mode:  ( Llength( Min0 Max0 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          -

          DRBG Val#489 MAC Val#1773

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #30

          -

          Version 6.3.9600

          CTR_Mode: ( Llength( Min0 Max4 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          -

          DRBG #258 HMAC Val#1345

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #3
          - - -Random Number Generator (RNG) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #

          FIPS 186-2 General Purpose

          -

          [ (x-Original); (SHA-1) ]

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1110
          FIPS 186-2
          -[ (x-Original); (SHA-1) ]

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1060

          -

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #292

          -

          Windows CE and Windows Mobile 6.0 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #286

          -

          Windows CE 5.00 and Window CE 5.01 Enhanced Cryptographic Provider (RSAENH) #66

          FIPS 186-2
          -[ (x-Change Notice); (SHA-1) ]

          -

          FIPS 186-2 General Purpose
          -[ (x-Change Notice); (SHA-1) ]

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 RNG Library #649

          -

          Windows Vista Ultimate SP1 and Windows Server 2008 RNG Implementation #435

          -

          Windows Vista RNG implementation #321

          FIPS 186-2 General Purpose
          -[ (x-Change Notice); (SHA-1) ]

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #470

          -

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #449

          -

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #447

          -

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #316

          -

          Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #313

          FIPS 186-2
          -[ (x-Change Notice); (SHA-1) ]

          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #448

          -

          Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #314

          - - -#### RSA - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1734

          Microsoft Surface Hub Virtual TPM Implementations #2677

          -

          Version 10.0.15063.674

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 240 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1733

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #2676

          -

          Version 10.0.16299

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub RSA32 Algorithm Implementations #2675

          -

          Version 10.0.15063.674

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); RSA32 Algorithm Implementations #2674

          -

          Version 10.0.16299

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) RSA32 Algorithm Implementations #2673

          -

          Version 10.0.15254

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
              • -
              • Public Key Exponent: Fixed (10001)
              • -
              • Provable Primes with Conditions:
              • -
                • -
                • Mod lengths: 2048, 3072 (bits)
                • -
                • Primality Tests: C.3
                • -
              • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 496 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub MsBignum Cryptographic Implementations #2672

          -

          Version 10.0.15063.674

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
              • -
              • Probable Random Primes:
              • -
                • -
                • Mod lengths: 2048, 3072 (bits)
                • -
                • Primality Tests: C.2
                • -
              • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 496 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #2671

          -

          Version 10.0.15063.674

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
              • -
              • Probable Random Primes:
              • -
                • -
                • Mod lengths: 2048, 3072 (bits)
                • -
                • Primality Tests: C.2
                • -
              • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 496 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2670

          -

          Version 10.0.15254

          RSA:

          -
            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
              • -
              • Public Key Exponent: Fixed (10001)
              • -
              • Provable Primes with Conditions:
              • -
                • -
                • Mod lengths: 2048, 3072 (bits)
                • -
                • Primality Tests: C.3
                • -
              • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 496 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #2669

          -

          Version 10.0.15254

            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
              • -
              • Public Key Exponent: Fixed (10001)
              • -
              • Provable Primes with Conditions:
              • -
                • -
                • Mod lengths: 2048, 3072 (bits)
                • -
                • Primality Tests: C.3
                • -
              • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 496 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #2668

          -

          Version 10.0.16299

            -
          • 186-4:
          • -
            • -
            • Key Generation:
            • -
              • -
              • Probable Random Primes:
              • -
                • -
                • Mod lengths: 2048, 3072 (bits)
                • -
                • Primality Tests: C.2
                • -
              • -
            • -
            • Signature Generation PKCS1.5:
            • -
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Generation PSS:
            • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
            • Signature Verification PKCS1.5:
            • -
              • -
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • -
            • -
            • Signature Verification PSS:
            • -
              • -
              • Mod 1024:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 496 (bits)
                • -
              • -
              • Mod 2048:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
              • Mod 3072:
              • -
                • -
                • SHA-1: Salt Length: 160 (bits)
                • -
                • SHA-256: Salt Length: 256 (bits)
                • -
                • SHA-384: Salt Length: 384 (bits)
                • -
                • SHA-512: Salt Length: 512 (bits)
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2667

          -

          Version 10.0.16299

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 1 , 256 , 384 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 )) (2048 SHA( 1 , 256 , 384 ))
          -[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) ))
          -SHA Val#3790

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #2524

          -

          Version 10.0.15063

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -SHA Val#3790

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile RSA32 Algorithm Implementations #2523

          -

          Version 10.0.15063

          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e ( 10001 ) ;
          -PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )
          -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          -SHA Val#3790
          -DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #2522

          -

          Version 10.0.15063

          FIPS186-4:
          -186-4KEY(gen):
          -PGM(ProbRandom:
          ( 2048 , 3072 ) PPTT:( C.2 )
          -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          -SHA Val#3790

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2521

          -

          Version 10.0.15063

          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3652
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 4096 , SHS: SHA-256Val#3652, SHA-384Val#3652, SHA-512Val#3652
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3652, SHA-256Val#3652, SHA-384Val#3652, SHA-512Val#3652

          -

          FIPS186-4:
          -ALG[ANSIX9.31]
          Sig(Gen): (2048 SHA( 1 )) (3072 SHA( 1 ))
          -SIG(gen) with SHA-1 affirmed for use with protocols only.
          Sig(Ver): (1024 SHA( 1 )) (2048 SHA( 1 )) (3072 SHA( 1 ))
          -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -SHA Val#3652

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2415

          -

          Version 7.00.2872

          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3651
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 4096 , SHS: SHA-256Val#3651, SHA-384Val#3651, SHA-512Val#3651
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3651, SHA-256Val#3651, SHA-384Val#3651, SHA-512Val#3651

          -

          FIPS186-4:
          -ALG[ANSIX9.31]
          Sig(Gen): (2048 SHA( 1 )) (3072 SHA( 1 ))
          -SIG(gen) with SHA-1 affirmed for use with protocols only.
          Sig(Ver): (1024 SHA( 1 )) (2048 SHA( 1 )) (3072 SHA( 1 ))
          -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -SHA Val#3651

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2414

          -

          Version 8.00.6246

          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 4096 , SHS: SHA-256Val# 3649 , SHA-384Val# 3649 , SHA-512Val# 3649
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val# 3649 , SHA-256Val# 3649 , SHA-384Val# 3649 , SHA-512Val# 3649

          -

          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e (10001) ;
          -PGM(ProbRandom: ( 2048 , 3072 ) PPTT:( C.2 )
          -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -SHA Val# 3649
          -DRBG: Val# 1430

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2412

          -

          Version 7.00.2872

          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 4096 , SHS: SHA-256Val#3648, SHA-384Val#3648, SHA-512Val#3648
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3648, SHA-256Val#3648, SHA-384Val#3648, SHA-512Val#3648

          -

          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e (10001) ;
          -PGM(ProbRandom: ( 2048 , 3072 ) PPTT:( C.2 )
          -ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          -SHA Val#3648
          -DRBG: Val# 1429

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2411

          -

          Version 8.00.6246

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 1 , 256 , 384 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -SIG(Ver) (1024 SHA( 1 , 256 , 384 )) (2048 SHA( 1 , 256 , 384 ))
          -[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          -Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) ))

          -

          SHA Val# 3347

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2206

          -

          Version 10.0.14393

          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e ( 10001 ) ;
          -PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          -

          SHA Val# 3347 DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA Key Generation Implementation #2195

          -

          Version 10.0.14393

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val#3346

          soft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #2194

          -

          Version 10.0.14393

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          -SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val# 3347 DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #2193

          -

          Version 10.0.14393

          FIPS186-4:
          -[RSASSA-PSS]: Sig(Gen):
          (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          -

          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          -

          SHA Val# 3347 DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #2192

          -

          Version 10.0.14393

          FIPS186-4:
          -186-4KEY(gen)
          :  FIPS186-4_Fixed_e ( 10001 ) ;
          -PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          -

          SHA Val# 3047 DRBG: Val# 955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA Key Generation Implementation #1889

          -

          Version 10.0.10586

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val#3048

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #1871

          -

          Version 10.0.10586

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          -SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val# 3047

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub MsBignum Cryptographic Implementations #1888

          -

          Version 10.0.10586

          FIPS186-4:
          -[RSASSA-PSS]: Sig(Gen)
          : (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          -Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          -

          SHA Val# 3047

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #1887

          -

          Version 10.0.10586

          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e ( 10001 ) ;
          -PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          -

          SHA Val# 2886 DRBG: Val# 868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA Key Generation Implementation #1798

          -

          Version 10.0.10240

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val#2871

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #1784

          -

          Version 10.0.10240

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val#2871

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #1783

          -

          Version 10.0.10240

          FIPS186-4:
          -[RSASSA-PSS]:
          Sig(Gen): (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          -Sig(Ver): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          -

          SHA Val# 2886

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #1802

          -

          Version 10.0.10240

          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e ;
          -PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          -

          SHA Val#2373 DRBG: Val# 489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 RSA Key Generation Implementation #1487

          -

          Version 6.3.9600

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val#2373

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #1494

          -

          Version 6.3.9600

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5
          ] SIG(gen) (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          -SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          -

          SHA Val#2373

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1493

          -

          Version 6.3.9600

          FIPS186-4:
          -[RSASSA-PSS]:
          Sig(Gen): (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          - Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          -

          SHA Val#2373

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #1519

          -

          Version 6.3.9600

          FIPS186-4:
          -ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 256 , 384 , 512-256 )) (3072 SHA( 256 , 384 , 512-256 ))
          -SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512-256 )) (2048 SHA( 1 , 256 , 384 , 512-256 )) (3072 SHA( 1 , 256 , 384 , 512-256 ))
          -[RSASSA-PSS]: Sig(Gen): (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          -Sig(Ver): (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 , 512 ))
          -SHA #1903

          -

          Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1134.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1134
          FIPS186-4:
          -186-4KEY(gen):
          FIPS186-4_Fixed_e , FIPS186-4_Fixed_e_Value
          -PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )
          -SHA #1903 DRBG: #258
          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 RSA Key Generation Implementation #1133
          FIPS186-2:
          -ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 DRBG: #258
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256#1902, SHA-384#1902, SHA-512#1902,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1#1902, SHA-256#1902, SHA-#1902, SHA-512#1902,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1132.
          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1132
          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1774
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1774, SHA-384Val#1774, SHA-512Val#1774,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1774, SHA-256Val#1774, SHA-384Val#1774, SHA-512Val#1774,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1052.
          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1052
          FIPS186-2:
          -ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 DRBG: Val# 193
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1773, SHA-384Val#1773, SHA-512Val#1773,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1773, SHA-256Val#1773, SHA-384Val#1773, SHA-512Val#1773,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1051.
          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1051
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#568.
          Windows Server 2008 R2 and SP1 Enhanced Cryptographic Provider (RSAENH) #568
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          -ALG[RSASSA-PSS]: SIG(gen); 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081
          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#567. See Historical RSA List Val#560.

          Windows Server 2008 R2 and SP1 CNG algorithms #567

          -

          Windows 7 and SP1 CNG algorithms #560

          FIPS186-2:
          -ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 DRBG: Val# 23
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#559.
          Windows 7 and SP1 and Server 2008 R2 and SP1 RSA Key Generation Implementation #559
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#557.
          Windows 7 and SP1 Enhanced Cryptographic Provider (RSAENH) #557
          FIPS186-2:
          -ALG[ANSIX9.31]:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#816, SHA-384Val#816, SHA-512Val#816,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#816, SHA-256Val#816, SHA-384Val#816, SHA-512Val#816,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#395.
          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #395
          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#783
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#783, SHA-384Val#783, SHA-512Val#783,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#371.
          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #371
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753, SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          -ALG[RSASSA-PSS]: SIG(gen); 2048 , 3072 , 4096 , SHS: SHA-256Val#753, SHA-384Val#753, SHA-512Val#753
          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753, SHA-256Val#753, SHA-384Val#753, SHA-512Val#753
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#358. See Historical RSA List Val#357.

          Windows Server 2008 CNG algorithms #358

          -

          Windows Vista SP1 CNG algorithms #357

          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753, SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#355. See Historical RSA List Val#354.

          Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #355

          -

          Windows Vista SP1 Enhanced Cryptographic Provider (RSAENH) #354

          FIPS186-2:
          -ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#353.
          Windows Vista SP1 and Windows Server 2008 RSA Key Generation Implementation #353
          FIPS186-2:
          -ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 RNG: Val# 321
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#258.
          Windows Vista RSA key generation implementation #258
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#618, SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          -ALG[RSASSA-PSS]: SIG(gen); 2048 , 3072 , 4096 , SHS: SHA-256Val#618, SHA-384Val#618, SHA-512Val#618
          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#618, SHA-256Val#618, SHA-384Val#618, SHA-512Val#618
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#257.
          Windows Vista CNG algorithms #257
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#618, SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#255.
          Windows Vista Enhanced Cryptographic Provider (RSAENH) #255
          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#613
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#613, SHA-384Val#613, SHA-512Val#613,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#613, SHA-256Val#613, SHA-384Val#613, SHA-512Val#613,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#245.
          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #245
          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#589
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#589, SHA-384Val#589, SHA-512Val#589,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#589, SHA-256Val#589, SHA-384Val#589, SHA-512Val#589,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#230.
          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #230
          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#578
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#578, SHA-384Val#578, SHA-512Val#578,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#578, SHA-256Val#578, SHA-384Val#578, SHA-512Val#578,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#222.
          Windows CE and Windows Mobile 6 and Windows Mobile 6.1 Enhanced Cryptographic Provider (RSAENH) #222
          FIPS186-2:
          -ALG[RSASSA-PKCS1_V1_5]:

          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#364
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#81.
          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #81
          FIPS186-2:
          -ALG[ANSIX9.31]:

          -SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#305
          -ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#305, SHA-384Val#305, SHA-512Val#305,
          -SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#305, SHA-256Val#305, SHA-384Val#305, SHA-512Val#305,
          -Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#52.
          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #52

          FIPS186-2:

          -

          – PKCS#1 v1.5, signature generation and verification

          -

          – Mod sizes: 1024, 1536, 2048, 3072, 4096

          -

          – SHS: SHA–1/256/384/512

          Windows XP, vendor-affirmed

          -

          Windows 2000, vendor-affirmed

          - - -#### Secure Hash Standard (SHS) - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • SHA-1:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-256:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-384:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-512:
          • -
            • -
            • Supports Empty Message
            • -
          • -

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #4011

          -

          Version 10.0.15063.674

            -
          • SHA-1:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-256:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-384:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-512:
          • -
            • -
            • Supports Empty Message
            • -
          • -

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4010

          -

          Version 10.0.15254

            -
          • SHA-1:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-256:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-384:
          • -
            • -
            • Supports Empty Message
            • -
          • -
          • SHA-512:
          • -
            • -
            • Supports Empty Message
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4009

          -

          Version 10.0.16299

          SHA-1      (BYTE-only)
          -SHA-256  (BYTE-only)
          -SHA-384  (BYTE-only)
          -SHA-512  (BYTE-only)

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3790

          -

          Version 10.0.15063

          SHA-1      (BYTE-only)
          -SHA-256  (BYTE-only)
          -SHA-384  (BYTE-only)
          -SHA-512  (BYTE-only)

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3652

          -

          Version 7.00.2872

          SHA-1      (BYTE-only)
          -SHA-256  (BYTE-only)
          -SHA-384  (BYTE-only)
          -SHA-512  (BYTE-only)

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3651

          -

          Version 8.00.6246

          SHA-1      (BYTE-only)
          -SHA-256  (BYTE-only)
          -SHA-384  (BYTE-only)
          -SHA-512  (BYTE-only)

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3649

          -

          Version 7.00.2872

          SHA-1      (BYTE-only)
          -SHA-256  (BYTE-only)
          -SHA-384  (BYTE-only)
          -SHA-512  (BYTE-only)

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3648

          -

          Version 8.00.6246

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #3347
          -Version 10.0.14393
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #3346
          -Version 10.0.14393
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #3048
          -Version 10.0.10586
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #3047
          -Version 10.0.10586
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2886
          -Version 10.0.10240
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #2871
          -Version 10.0.10240
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2396
          -Version 6.3.9600
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2373
          -Version 6.3.9600

          SHA-1 (BYTE-only)

          -

          SHA-256 (BYTE-only)

          -

          SHA-384 (BYTE-only)

          -

          SHA-512 (BYTE-only)

          -

          Implementation does not support zero-length (null) messages.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1903

          -

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1902

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1774

          -

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1773

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)

          Windows 7and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1081

          -

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #816

          SHA-1 (BYTE-only)

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #785

          -

          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #784

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)
          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #783
          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)

          Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #753

          -

          Windows Vista Symmetric Algorithm Implementation #618

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)

          Windows Vista BitLocker Drive Encryption #737

          -

          Windows Vista Beta 2 BitLocker Drive Encryption #495

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #613

          -

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #364

          SHA-1 (BYTE-only)

          Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #611

          -

          Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #610

          -

          Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #385

          -

          Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #371

          -

          Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #181

          -

          Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #177

          -

          Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #176

          SHA-1 (BYTE-only)
          -SHA-256 (BYTE-only)
          -SHA-384 (BYTE-only)
          -SHA-512 (BYTE-only)

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #589

          -

          Windows CE and Windows Mobile 6 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #578

          -

          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #305

          SHA-1 (BYTE-only)

          Windows XP Microsoft Enhanced Cryptographic Provider #83

          -

          Crypto Driver for Windows 2000 (fips.sys) #35

          -

          Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #32

          -

          Windows 2000 RSAENH.DLL #24

          -

          Windows 2000 RSABASE.DLL #23

          -

          Windows NT 4 SP6 RSAENH.DLL #21

          -

          Windows NT 4 SP6 RSABASE.DLL #20

          - - -#### Triple DES - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            -
          • TDES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-CFB64:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-CFB8:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-ECB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #2558

          -

          Version 10.0.15063.674

            -
          • TDES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-CFB64:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-CFB8:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-ECB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2557

          -

          Version 10.0.15254

            -
          • TDES-CBC:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-CFB64:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-CFB8:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -
          • TDES-ECB:
          • -
            • -
            • Modes: Decrypt, Encrypt
            • -
            • Keying Option: 1
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2556

          -

          Version 10.0.16299

          TECB( KO 1 e/d, ) ; TCBC( KO 1 e/d, ) ; TCFB8( KO 1 e/d, ) ; TCFB64( KO 1 e/d, )

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2459

          -

          Version 10.0.15063

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, )

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2384

          -

          Version 8.00.6246

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, )

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2383

          -

          Version 8.00.6246

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, ) ;

          -

          CTR ( int only )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2382

          -

          Version 7.00.2872

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2381

          -

          Version 8.00.6246

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, ) ;

          -

          TCFB8( KO 1 e/d, ) ;

          -

          TCFB64( KO 1 e/d, )

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2227
          -
          -

          -

          Version 10.0.14393

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, ) ;

          -

          TCFB8( KO 1 e/d, ) ;

          -

          TCFB64( KO 1 e/d, )

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #2024
          -
          -

          -

          Version 10.0.10586

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, ) ;

          -

          TCFB8( KO 1 e/d, ) ;

          -

          TCFB64( KO 1 e/d, )

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #1969
          -
          -

          -

          Version 10.0.10240

          TECB( KO 1 e/d, ) ;

          -

          TCBC( KO 1 e/d, ) ;

          -

          TCFB8( KO 1 e/d, ) ;

          -

          TCFB64( KO 1 e/d, )

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1692

          -

          Version 6.3.9600

          TECB( e/d; KO 1,2 ) ;

          -

          TCBC( e/d; KO 1,2 ) ;

          -

          TCFB8( e/d; KO 1,2 ) ;

          -

          TCFB64( e/d; KO 1,2 )

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1387

          TECB( e/d; KO 1,2 ) ;

          -

          TCBC( e/d; KO 1,2 ) ;

          -

          TCFB8( e/d; KO 1,2 )

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1386

          TECB( e/d; KO 1,2 ) ;

          -

          TCBC( e/d; KO 1,2 ) ;

          -

          TCFB8( e/d; KO 1,2 )

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #846

          TECB( e/d; KO 1,2 ) ;

          -

          TCBC( e/d; KO 1,2 ) ;

          -

          TCFB8( e/d; KO 1,2 )

          Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #656

          TECB( e/d; KO 1,2 ) ;

          -

          TCBC( e/d; KO 1,2 ) ;

          -

          TCFB8( e/d; KO 1,2 )

          Windows Vista Symmetric Algorithm Implementation #549
          Triple DES MAC

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 #1386, vendor-affirmed

          -

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 #846, vendor-affirmed

          TECB( e/d; KO 1,2 ) ;

          -

          TCBC( e/d; KO 1,2 )

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1308

          -

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1307

          -

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #691

          -

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #677

          -

          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #676

          -

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #675

          -

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #544

          -

          Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #543

          -

          Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #542

          -

          Windows CE 6.0 and Window CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #526

          -

          Windows CE and Windows Mobile 6 and Windows Mobile 6.1 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #517

          -

          Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #381

          -

          Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #370

          -

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #365

          -

          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #315

          -

          Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #201

          -

          Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #199

          -

          Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #192

          -

          Windows XP Microsoft Enhanced Cryptographic Provider #81

          -

          Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #18

          -

          Crypto Driver for Windows 2000 (fips.sys) #16

          - - -#### SP 800-132 Password Based Key Derivation Function (PBKDF) - - - - - - - - - - - - - - -
          - Modes / States / Key Sizes - - Algorithm Implementation and Certificate # -
          - PBKDF (vendor affirmed) -

           Kernel Mode Cryptographic Primitives Library (cng.sys) Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2937
          (Software Version: 10.0.14393)

          -

          Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936
          (Software Version: 10.0.14393)

          -

          Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2935
          (Software Version: 10.0.14393)

          -

          Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2931
          (Software Version: 10.0.14393)

          -
          - PBKDF (vendor affirmed) -

          Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936
          (Software Version: 10.0.14393)

          -

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG), vendor-affirmed

          -
          - - -#### Component Validation List - - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
          Publication / Component Validated / DescriptionImplementation and Certificate #
            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

          Prerequisite: DRBG #489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1540

          -

          Version 6.3.9600

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Microsoft Surface Hub Virtual TPM Implementations #1519

          -

          Version 10.0.15063.674

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1518

          -

          Version 10.0.16299

            -
          • RSADP:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
          • -

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1517

          -

          Version 10.0.15063.674

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1516

          -

          Version 10.0.15063.674

            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

           Prerequisite: DRBG #1732

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1515

          -

          Version 10.0.15063.674

            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

          Prerequisite: DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1514

          -

          Version 10.0.15063.674

            -
          • RSADP:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
          • -

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1513

          -

          Version 10.0.15063.674

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1512

          -

          Version 10.0.15063.674

            -
          • IKEv1:
          • -
            • -
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • -
            • Pre-shared Key Length: 64-2048
            • -
            • Diffie-Hellman shared secrets:
            • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 2048 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 256 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 384 (bits)
                • -
                • SHA Functions: SHA-384
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, HMAC #3269

          -
            -
          • IKEv2:
          • -
            • -
            • Derived Keying Material length: 192-1792
            • -
            • Diffie-Hellman shared secrets:
            • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 2048 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 256 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 384 (bits)
                • -
                • SHA Functions: SHA-384
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, HMAC #3269

          -
            -
          • TLS:
          • -
            • -
            • Supports TLS 1.0/1.1
            • -
            • Supports TLS 1.2:
            • -
              • -
              • SHA Functions: SHA-256, SHA-384
              • -
            • -
          • -
          -

          Prerequisite: SHS #4011, HMAC #3269

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1511

          -

          Version 10.0.15063.674

            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

          Prerequisite: DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1510

          -

          Version 10.0.15254

            -
          • RSADP:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
          • -

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1509

          -

          Version 10.0.15254

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1508

          -

          Version 10.0.15254

            -
          • IKEv1:
          • -
            • -
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • -
            • Pre-shared Key Length: 64-2048
            • -
            • Diffie-Hellman shared secrets:
            • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 2048 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 256 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 384 (bits)
                • -
                • SHA Functions: SHA-384
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, HMAC #3268

          -
            -
          • IKEv2:
          • -
            • -
            • Derived Keying Material length: 192-1792
            • -
            • Diffie-Hellman shared secrets:
            • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 2048 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 256 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 384 (bits)
                • -
                • SHA Functions: SHA-384
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, HMAC #3268

          -
            -
          • TLS:
          • -
            • -
            • Supports TLS 1.0/1.1
            • -
            • Supports TLS 1.2:
            • -
              • -
              • SHA Functions: SHA-256, SHA-384
              • -
            • -
          • -
          -

          Prerequisite: SHS #4010, HMAC #3268

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1507

          -

          Version 10.0.15254

            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

          Prerequisite: DRBG #1731

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1506

          -

          Version 10.0.15254

            -
          • RSADP:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
          • -

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1505

          -

          Version 10.0.15254

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1504

          -

          Version 10.0.15254

            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

          Prerequisite: DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1503

          -

          Version 10.0.16299

            -
          • RSADP:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1502

          -

          Version 10.0.16299

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1501

          -

          Version 10.0.16299

            -
          • ECDSA SigGen:
          • -
            • -
            • P-256 SHA: SHA-256
            • -
            • P-384 SHA: SHA-384
            • -
            • P-521 SHA: SHA-512
            • -
          • -
          -

          Prerequisite: DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1499

          -

          Version 10.0.16299

            -
          • RSADP:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1498

          -

          Version 10.0.16299

          -

           

            -
          • RSASP1:
          • -
            • -
            • Modulus Size: 2048 (bits)
            • -
            • Padding Algorithms: PKCS 1.5
            • -
          • -

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations  #1497

          -

          Version 10.0.16299

            -
          • IKEv1:
          • -
            • -
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • -
            • Pre-shared Key Length: 64-2048
            • -
            • Diffie-Hellman shared secrets:
            • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 2048 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 256 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 384 (bits)
                • -
                • SHA Functions: SHA-384
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, HMAC #3267

          -
            -
          • IKEv2:
          • -
            • -
            • Derived Keying Material length: 192-1792
            • -
            • Diffie-Hellman shared secrets:
            • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 2048 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 256 (bits)
                • -
                • SHA Functions: SHA-256
                • -
              • -
              • Diffie-Hellman shared secret:
              • -
                • -
                • Length: 384 (bits)
                • -
                • SHA Functions: SHA-384
                • -
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, HMAC #3267

          -
            -
          • TLS:
          • -
            • -
            • Supports TLS 1.0/1.1
            • -
            • Supports TLS 1.2:
            • -
              • -
              • SHA Functions: SHA-256, SHA-384
              • -
            • -
          • -
          -

          Prerequisite: SHS #4009, HMAC #3267

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations  #1496

          -

          Version 10.0.16299

          FIPS186-4 ECDSA

          -

          Signature Generation of hash sized messages

          -

          ECDSA SigGen Component: CURVES( P-256 P-384 P-521 )

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1284
          -Version 10.0. 15063

          -

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1279
          -Version 10.0. 15063

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #922
          -Version 10.0.14393

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #894
          -Version 10.0.14393icrosoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #666
          -Version 10.0.10586

          -

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #288
          -Version 6.3.9600

          FIPS186-4 RSA; PKCS#1 v2.1

          -

          RSASP1 Signature Primitive

          -

          RSASP1: (Mod2048: PKCS1.5 PKCSPSS)

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1285
          -Version 10.0.15063

          -

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1282
          -Version 10.0.15063

          -

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1280
          -Version 10.0.15063

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #893
          -Version 10.0.14393

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #888
          -Version 10.0.14393

          -

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #665
          -Version 10.0.10586

          -

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #572
          -Version  10.0.10240

          -

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry MsBignum Cryptographic Implementations #289
          -Version 6.3.9600

          FIPS186-4 RSA; RSADP

          -

          RSADP Primitive

          -

          RSADP: (Mod2048)

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1283
          -Version 10.0.15063

          -

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1281
          -Version 10.0.15063

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #895
          -Version 10.0.14393

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #887
          -Version 10.0.14393

          -

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #663
          -Version 10.0.10586

          -

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #576
          -Version  10.0.10240

          SP800-135

          -

          Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations  #1496

          -

          Version 10.0.16299

          -

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1278
          -Version 10.0.15063

          -

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1140
          -Version 7.00.2872

          -

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1139
          -Version 8.00.6246

          -

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BcryptPrimitives and NCryptSSLp #886
          -Version 10.0.14393

          -

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BCryptPrimitives and NCryptSSLp #664
          -Version 10.0.10586

          -

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BCryptPrimitives and NCryptSSLp #575
          -Version  10.0.10240

          -

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 BCryptPrimitives and NCryptSSLp #323
          -Version 6.3.9600

          - - -## References - -\[[FIPS 140](http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf)\] - FIPS 140-2, Security Requirements for Cryptographic Modules - -\[[FIPS FAQ](http://csrc.nist.gov/groups/stm/cmvp/documents/cmvpfaq.pdf)\] - Cryptographic Module Validation Program (CMVP) FAQ - -\[[SP 800-57](http://csrc.nist.gov/publications/pubssps.html#800-57-part1)\] - Recommendation for Key Management – Part 1: General (Revised) - -\[[SP 800-131A](http://csrc.nist.gov/publications/nistpubs/800-131a/sp800-131a.pdf)\] - Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths - -## Additional Microsoft References - -Enabling FIPS mode - - -Cipher Suites in Schannel - [https://msdn.microsoft.com/library/aa374757(VS.85).aspx](https://msdn.microsoft.com/library/aa374757\(vs.85\).aspx) - + +Please be aware that selection of FIPS mode can limit product functionality (See ). + +## Information for Software Developers + +This section is targeted at developers who wish to build their own applications using the FIPS 140 validated cryptographic modules. + +Each of the validated cryptographic modules defines a series of rules that must be followed. The security rules for each validated cryptographic module are specified in the Security Policy document. Links to each of the Security Policy documents is provided in the [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140) section below. Generally, the restriction in Microsoft validated cryptographic modules is limiting the use of cryptography to only FIPS Approved cryptographic algorithms, modes, and key sizes. + +### Using Microsoft Cryptographic Modules in a FIPS mode of operation + +No matter whether developing with native languages or using .NET, it is important to first check whether the CNG modules for the target system are FIPS validated. The list of validated CNG binaries is identified in the [CNG Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_cng_validated_cryptographic) section. + +When developing using CNG directly, it is the responsibility of the developer to follow the security rules outlined in the FIPS 140 Security Policy for each module. The security policy for each module is provided on the CMVP website. Links to each of the Security Policy documents is provided in the tables below. It is important to remember that setting the FIPS local/group security policy Flag (discussed above) does not affect the behavior of the modules when used for developing custom applications. + +If you are developing your application using .NET instead of using the native libraries, then setting the FIPS local policy flag will generate an exception when an improper .NET class is used for cryptography (i.e. the cryptographic classes whose names end in "Managed"). The names of these allowed classes end with "Cng", which use the CNG binaries or "CryptoServiceProvider", which use the legacy CAPI binaries. + +### Key Strengths and Validity Periods + +NIST Special Publication 800-131A Revision 1, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, dated November 2015, \[[SP 800-131A](http://dx.doi.org/10.6028/nist.sp.800-131ar1)\], offers guidance for moving to stronger cryptographic keys and algorithms. This does not replace NIST SP 800-57, Recommendation for Key Management Part 1: General, \[[SP 800-57](http://csrc.nist.gov/publications/pubssps.html#800-57-part1)\], but gives more specific guidance. One of the most important topics discussed in these publications deals with the key strengths of FIPS Approved algorithms and their validity periods. When developing applications that use FIPS Approved algorithms, it is also extremely important to select appropriate key sizes based on the security lifetimes recommended by NIST. + +## FIPS 140 FAQ + +The following are answers to commonly asked questions for the FIPS 140-2 validation of Microsoft products. + +1. How does FIPS 140 relate to the Common Criteria? + **Answer:** These are two separate security standards with different, but complementary, purposes. FIPS 140 is a standard designed specifically for validating product modules that implement cryptography. On the other hand, Common Criteria is designed to help evaluate security functions in IT products. + In many cases, Common Criteria evaluations will rely on FIPS 140 validations to provide assurance that cryptographic functionality is implemented properly. +2. How does FIPS 140 relate to Suite B? + **Answer:** Suite B is simply a set of cryptographic algorithms defined by the U.S. National Security Agency (NSA) as part of its Cryptographic Modernization Program. The set of Suite B cryptographic algorithms are to be used for both unclassified information and most classified information. + The Suite B cryptographic algorithms are a subset of the FIPS Approved cryptographic algorithms as allowed by the FIPS 140 standard. +3. There are so many modules listed on the NIST website for each release, how are they related and how do I tell which one applies to me? + **Answer:** Microsoft strives to validate all releases of its cryptographic modules. Each module provides a different set of cryptographic algorithms. If you are required to use only FIPS validated cryptographic modules, you simply need to verify that the version being used appears on the validation list. + Please see the [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140)section for a complete list of Microsoft validated modules. +4. My application links against crypt32.dll, cryptsp.dll, advapi32.dll, bcrypt.dll, bcryptprimitives.dll, or ncrypt.dll. What do I need to do to assure I’m using FIPS 140 validated cryptographic modules? + **Answer:** crypt32.dll, cryptsp.dll, advapi32.dll, and ncrypt.dll are intermediary libraries that will offload all cryptographic operations to the FIPS validated cryptographic modules. Bcrypt.dll itself is a validated cryptographic module for Windows Vista and Windows Server 2008. For Windows 7 and Windows Server 2008 R2 and later, bcryptprimitives.dll is the validated module, but bcrypt.dll remains as one of the libraries to link against. + You must first verify that the underlying CNG cryptographic module is validated. Once verified, you'll need to confirm that you're using the module correctly in FIPS mode (See [Information for Software Developers](https://technet.microsoft.com/library/cc750357.aspx#_information_for_software) section for details). +5. What does "When operated in FIPS mode" mean on certificates? + **Answer:** This caveat identifies that a required configuration and security rules must be followed in order to use the cryptographic module in a manner consistent with its FIPS 140 Security Policy. The security rules are defined in the Security Policy for the module and usually revolve around using only FIPS Approved cryptographic algorithms and key sizes. Please see the Security Policy for the specific security rules for each cryptographic module (See [Microsoft FIPS 140 Validated Cryptographic Modules](https://technet.microsoft.com/library/cc750357.aspx#_microsoft_fips_140) section for links to each policy). +6. Which FIPS validated module is called when Windows 7 or Windows 8 is configured to use the FIPS setting in the wireless configuration? + **Answer:** CNG is used. This setting tells the wireless driver to call FIPS 140-2 validated cryptographic modules instead of using the driver’s own cryptography, if any. +7. Is BitLocker to Go FIPS 140-2 validated? + **Answer:** There are two separate parts for BitLocker to Go. One part is simply a native feature of BitLocker and as such, it uses FIPS 140-2 validated cryptographic modules. The other part is the BitLocker to Go Reader application for down-level support of older operating systems such as Windows XP and Windows Vista. The Reader application does not use FIPS 140-2 validated cryptographic modules. +8. Are applications FIPS 140-2 validated? + **Answer:** Microsoft only has low-level cryptographic modules in Windows FIPS 140-2 validated, not high-level applications. A better question is whether a certain application calls a FIPS 140-2 validated cryptographic module in the underlying Windows OS. That question needs to be directed to the company/product group that created the application of interest. +9. How can Systems Center Operations Manager 2012 be configured to use FIPS 140-2 validated cryptographic modules? + **Answer:** See [https://technet.microsoft.com/library/hh914094.aspx](https://technet.microsoft.com/library/hh914094.aspx) + +## Microsoft FIPS 140 Validated Cryptographic Modules + +### Modules By Operating System + +The following tables identify the Cryptographic Modules for an operating system. + +#### Windows + +##### Windows 10 Creators Update (Version 1703) + +Validated Editions: Home, Pro, Enterprise, Education, S, Surface Hub, Mobile + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.15063#3095

          FIPS Approved algorithms: AES (Cert. #4624); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2522); SHS (Cert. #3790); Triple-DES (Cert. #2459)
          +
          +Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #1281); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #1278)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.15063#3094

          #3094

          +

          FIPS Approved algorithms: AES (Certs. #4624 and #4626); CKG (vendor affirmed); CVL (Certs. #1278 and #1281); DRBG (Cert. #1555); DSA (Cert. #1223); ECDSA (Cert. #1133); HMAC (Cert. #3061); KAS (Cert. #127); KBKDF (Cert. #140); KTS (AES Cert. #4626; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2521 and #2523); SHS (Cert. #3790); Triple-DES (Cert. #2459)
          +
          +Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert.#1133); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert.#2521); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert.#1281)

          Boot Manager10.0.15063#3089

          FIPS Approved algorithms: AES (Certs. #4624 and #4625); CKG (vendor affirmed); HMAC (Cert. #3061); PBKDF (vendor affirmed); RSA (Cert. #2523); SHS (Cert. #3790)

          +

          Other algorithms: PBKDF (vendor affirmed); VMK KDF (vendor affirmed)

          Windows OS Loader10.0.15063#3090

          FIPS Approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790)

          +

          Other algorithms: NDRNG

          Windows Resume[1]10.0.15063#3091FIPS Approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2523); SHS (Cert. #3790)
          BitLocker® Dump Filter[2]10.0.15063#3092FIPS Approved algorithms: AES (Certs. #4624 and #4625); RSA (Cert. #2522); SHS (Cert. #3790)
          Code Integrity (ci.dll)10.0.15063#3093

          FIPS Approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790)

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282)

          Secure Kernel Code Integrity (skci.dll)[3]10.0.15063#3096

          FIPS Approved algorithms: AES (Cert. #4624); RSA (Certs. #2522 and #2523); SHS (Cert. #3790)

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v1.5 - RSASP1 Signature Primitive (Cert. #1282)

          + + +\[1\] Applies only to Home, Pro, Enterprise, Education and S + +\[2\] Applies only to Pro, Enterprise, Education, S, Mobile and Surface Hub + +\[3\] Applies only to Pro, Enterprise Education and S + +##### Windows 10 Anniversary Update (Version 1607) + +Validated Editions: Home, Pro, Enterprise, Enterprise LTSB, Mobile + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.14393#2937

          FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          +
          +Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #886)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.14393#2936

          FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          +
          +Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #922); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #887)

          Boot Manager10.0.14393#2931

          FIPS Approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347)

          +

          Other algorithms: MD5; PBKDF (non-compliant); VMK KDF

          BitLocker® Windows OS Loader (winload)10.0.14393#2932FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          +
          +Other algorithms: NDRNG; MD5
          BitLocker® Windows Resume (winresume)[1]10.0.14393#2933FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[2]10.0.14393#2934FIPS Approved algorithms: AES (Certs. #4061 and #4064)
          Code Integrity (ci.dll)10.0.14393#2935

          FIPS Approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347)
          +
          +Other algorithms: AES (non-compliant); MD5

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888)

          Secure Kernel Code Integrity (skci.dll)[3]10.0.14393#2938

          FIPS Approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347)
          +
          +Other algorithms: MD5

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #888)

          + + +\[1\] Applies only to Home, Pro, Enterprise and Enterprise LTSB + +\[2\] Applies only to Pro, Enterprise, Enterprise LTSB and Mobile + +\[3\] Applies only to Pro, Enterprise and Enterprise LTSB + +##### Windows 10 November 2015 Update (Version 1511) + +Validated Editions: Home, Pro, Enterprise, Enterprise LTSB, Mobile, Surface Hub + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.10586#2606

          FIPS Approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs. #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888 and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024)
          +
          +Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #664)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.10586#2605

          FIPS Approved algorithms: AES (Certs. #3629); DRBG (Certs. #955); DSA (Certs.  #1024); ECDSA (Certs. #760); HMAC (Certs. #2381); KAS (Certs. #72; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #72); KTS (AES Certs. #3653; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1887, #1888 and #1889); SHS (Certs. #3047); Triple-DES (Certs. #2024)
          +
          +Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #666); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #663)

          Boot Manager[4]10.0.10586#2700FIPS Approved algorithms: AES (Certs. #3653); HMAC (Cert. #2381); PBKDF (vendor affirmed); RSA (Cert. #1871); SHS (Certs. #3047 and #3048)
          +
          +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)[5]10.0.10586#2701FIPS Approved algorithms: AES (Certs. #3629 and #3653); RSA (Cert. #1871); SHS (Cert. #3048)
          +
          +Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[6]10.0.10586#2702FIPS Approved algorithms: AES (Certs. #3653); RSA (Cert. #1871); SHS (Cert. #3048)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[7]10.0.10586#2703FIPS Approved algorithms: AES (Certs. #3653)
          Code Integrity (ci.dll)10.0.10586#2604

          FIPS Approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048)
          +
          +Other algorithms: AES (non-compliant); MD5

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665)

          Secure Kernel Code Integrity (skci.dll)[8]10.0.10586#2607

          FIPS Approved algorithms: RSA (Certs. #1871); SHS (Certs. #3048)
          +
          +Other algorithms: MD5

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #665)

          + + +\[4\] Applies only to Home, Pro, Enterprise, Mobile and Surface Hub + +\[5\] Applies only to Home, Pro, Enterprise, Mobile and Surface Hub + +\[6\] Applies only to Home, Pro and Enterprise + +\[7\] Applies only to Pro, Enterprise, Mobile and Surface Hub + +\[8\] Applies only to Enterprise and Enterprise LTSB + +##### Windows 10 (Version 1507) + +Validated Editions: Home, Pro, Enterprise, Enterprise LTSB, Mobile, and Surface Hub + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.10240#2606

          FIPS Approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969)
          +
          +Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #575)

          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.10240#2605

          FIPS Approved algorithms: AES (Certs. #3497); DRBG (Certs. #868); DSA (Certs. #983); ECDSA (Certs. #706); HMAC (Certs. #2233); KAS (Certs. #64; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); KBKDF (Certs. #66); KTS (AES Certs. #3507; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1783, #1798, and #1802); SHS (Certs. #2886); Triple-DES (Certs. #1969)
          +
          +Other algorithms: DES; HMAC-MD5; Legacy CAPI KDF; MD2; MD4; MD5; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572); FIPS186-4 RSA; RSADP - RSADP Primitive (Cert. #576)

          Boot Manager[9]10.0.10240#2600FIPS Approved algorithms: AES (Cert. #3497); HMAC (Cert. #2233); KTS (AES Cert. #3498); PBKDF (vendor affirmed); RSA (Cert. #1784); SHS (Certs. #2871 and #2886)
          +
          +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)[10]10.0.10240#2601FIPS Approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871)
          +
          +Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[11]10.0.10240#2602FIPS Approved algorithms: AES (Certs. #3497 and #3498); RSA (Cert. #1784); SHS (Cert. #2871)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[12]10.0.10240#2603FIPS Approved algorithms: AES (Certs. #3497 and #3498)
          Code Integrity (ci.dll)10.0.10240#2604

          FIPS Approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871)
          +
          +Other algorithms: AES (non-compliant); MD5

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572)

          Secure Kernel Code Integrity (skci.dll)[13]10.0.10240#2607

          FIPS Approved algorithms: RSA (Certs. #1784); SHS (Certs. #2871)
          +
          +Other algorithms: MD5

          +

          Validated Component Implementations: FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #572)

          + + +\[9\] Applies only to Home, Pro, Enterprise and Enterprise LTSB + +\[10\] Applies only to Home, Pro, Enterprise and Enterprise LTSB + +\[11\] Applies only to Home, Pro, Enterprise and Enterprise LTSB + +\[12\] Applies only to Pro, Enterprise and Enterprise LTSB + +\[13\] Applies only to Enterprise and Enterprise LTSB + +##### Windows 8.1 + +Validated Editions: RT, Pro, Enterprise, Phone, Embedded + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)6.3.9600 6.3.9600.17031#2357

          FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692)
          +
          +Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)#2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289); SP800-135 - Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS (Cert. #323)

          Kernel Mode Cryptographic Primitives Library (cng.sys)6.3.9600 6.3.9600.17042#2356

          FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692)
          +
          +Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)

          +

          Validated Component Implementations: FIPS186-4 ECDSA - Signature Generation of hash sized messages (Cert. #288); FIPS186-4 RSA; PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289)

          Boot Manager6.3.9600 6.3.9600.17031#2351FIPS Approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          +
          +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)6.3.9600 6.3.9600.17031#2352FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396)
          +
          +Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[14]6.3.9600 6.3.9600.17031#2353FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)6.3.9600 6.3.9600.17031#2354FIPS Approved algorithms: AES (Cert. #2832)
          +
          +Other algorithms: N/A
          Code Integrity (ci.dll)6.3.9600 6.3.9600.17031#2355#2355

          FIPS Approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373)
          +
          +Other algorithms: MD5

          +

          Validated Component Implementations: PKCS#1 v2.1 - RSASP1 Signature Primitive (Cert. #289)

          + + +\[14\] Applies only to Pro, Enterprise, and Embedded 8. + +##### Windows 8 + +Validated Editions: RT, Home, Pro, Enterprise, Phone + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL)6.2.9200#1892FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          +
          +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258); DSA (Cert. ); ECDSA (Cert. ); HMAC (Cert. ); KAS (Cert. ); KBKDF (Cert. ); PBKDF (vendor affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          +
          +
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.2.9200#1891FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          +
          +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#258 and ); ECDSA (Cert. ); HMAC (Cert. ); KAS (Cert. ); KBKDF (Cert. ); PBKDF (vendor affirmed); RNG (Cert. ); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          +
          +Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager6.2.9200#1895FIPS Approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: MD5
          BitLocker® Windows OS Loader (WINLOAD)6.2.9200#1896FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG
          BitLocker® Windows Resume (WINRESUME)[15]6.2.9200#1898FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (DUMPFVE.SYS)6.2.9200#1899FIPS Approved algorithms: AES (Certs. #2196 and #2198)
          +
          +Other algorithms: N/A
          Code Integrity (CI.DLL)6.2.9200#1897FIPS Approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: MD5
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL)6.2.9200#1893FIPS Approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed)
          +
          +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#1902); Triple-DES (Cert. ); Triple-DES MAC (Triple-DES Cert. , vendor affirmed)
          +
          +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. , key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced Cryptographic Provider (RSAENH.DLL)6.2.9200#1894FIPS Approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386)
          +
          +Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          + + +\[15\] Applies only to Home and Pro + +**Windows 7** + +Validated Editions: Windows 7, Windows 7 SP1 + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL)

          6.1.7600.16385

          +

          6.1.7601.17514

          1329FIPS Approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); DSA (Cert. #386); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846)
          +
          +Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4#559 and ); SHS (Cert. ); Triple-DES (Cert. )
          +
          +Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4
          Kernel Mode Cryptographic Primitives Library (cng.sys)

          6.1.7600.16385

          +

          6.1.7600.16915

          +

          6.1.7600.21092

          +

          6.1.7601.17514

          +

          6.1.7601.17725

          +

          6.1.7601.17919

          +

          6.1.7601.21861

          +

          6.1.7601.22076

          1328FIPS Approved algorithms: AES (Certs. #1168 and #1178); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #24); ECDSA (Cert. #141); HMAC (Cert. #677); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides 80 to 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #560); SHS (Cert. #1081); Triple-DES (Cert. #846)
          +
          +Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4
          Boot Manager

          6.1.7600.16385

          +

          6.1.7601.17514

          1319FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #557); SHS (Cert. #1081)
          +
          +Other algorithms: MD5#1168 and ); HMAC (Cert. ); RSA (Cert. ); SHS (Cert. )
          +
          +Other algorithms: MD5
          Winload OS Loader (winload.exe)

          6.1.7600.16385

          +

          6.1.7600.16757

          +

          6.1.7600.20897

          +

          6.1.7600.20916

          +

          6.1.7601.17514

          +

          6.1.7601.17556

          +

          6.1.7601.21655

          +

          6.1.7601.21675

          1326FIPS Approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #557); SHS (Cert. #1081)
          +
          +Other algorithms: MD5
          BitLocker™ Drive Encryption

          6.1.7600.16385

          +

          6.1.7600.16429

          +

          6.1.7600.16757

          +

          6.1.7600.20536

          +

          6.1.7600.20873

          +

          6.1.7600.20897

          +

          6.1.7600.20916

          +

          6.1.7601.17514

          +

          6.1.7601.17556

          +

          6.1.7601.21634

          +

          6.1.7601.21655

          +

          6.1.7601.21675

          1332FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081)
          +
          +Other algorithms: Elephant Diffuser
          Code Integrity (CI.DLL)

          6.1.7600.16385

          +

          6.1.7600.17122

          +

          6.1.7600.21320

          +

          6.1.7601.17514

          +

          6.1.7601.17950

          +

          6.1.7601.22108

          1327FIPS Approved algorithms: RSA (Cert. #557); SHS (Cert. #1081)
          +
          +Other algorithms: MD5
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL)6.1.7600.16385
          +(no change in SP1)
          1331FIPS Approved algorithms: DSA (Cert. #385); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed)
          +
          +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4
          Enhanced Cryptographic Provider (RSAENH.DLL)6.1.7600.16385
          +(no change in SP1)
          1330FIPS Approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #673); SHS (Cert. #1081); RSA (Certs. #557 and #559); Triple-DES (Cert. #846)
          +
          +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 256-bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          + + +##### Windows Vista SP1 + +Validated Editions: Ultimate Edition + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Boot Manager (bootmgr)6.0.6001.18000 and 6.0.6002.18005978FIPS Approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #354); SHS (Cert. #753)
          Winload OS Loader (winload.exe)6.0.6001.18000, 6.0.6001.18027, 6.0.6001.18606, 6.0.6001.22125, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411 and 6.0.6002.22596979FIPS Approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #354); SHS (Cert. #753)
          +
          +Other algorithms: MD5
          Code Integrity (ci.dll)6.0.6001.18000, 6.0.6001.18023, 6.0.6001.22120, and 6.0.6002.18005980FIPS Approved algorithms: RSA (Cert. #354); SHS (Cert. #753)
          +
          +Other algorithms: MD5
          Kernel Mode Security Support Provider Interface (ksecdd.sys)6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742, and 6.0.6002.228696.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742, and 6.0.6002.228691000

          FIPS Approved algorithms: AES (Certs. #739 and #756); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656)#739 and ); ECDSA (Cert. ); HMAC (Cert. ); RNG (Cert.  and SP 800-90 AES-CTR, vendor-affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )

          +

          Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)

          Cryptographic Primitives Library (bcrypt.dll)6.0.6001.22202, 6.0.6002.18005, and 6.0.6002.228726.0.6001.22202, 6.0.6002.18005, and 6.0.6002.228721001

          FIPS Approved algorithms: AES (Certs. #739 and #756); DSA (Cert. #283); ECDSA (Cert. #82); HMAC (Cert. #412); RNG (Cert. #435 and SP 800-90, vendor affirmed); RSA (Certs. #353 and #357); SHS (Cert. #753); Triple-DES (Cert. #656)

          +

          Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength)

          Enhanced Cryptographic Provider (RSAENH)6.0.6001.22202 and 6.0.6002.180056.0.6001.22202 and 6.0.6002.180051002

          FIPS Approved algorithms: AES (Cert. #739); HMAC (Cert. #407); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #354); SHS (Cert. #753); Triple-DES (Cert. #656)

          +

          Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.0.6001.18000 and 6.0.6002.180056.0.6001.18000 and 6.0.6002.180051003

          FIPS Approved algorithms: DSA (Cert. #281); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed)

          +

          Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4

          + + +##### Windows Vista + +Validated Editions: Ultimate Edition + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced Cryptographic Provider (RSAENH)6.0.6000.16386893FIPS Approved algorithms: AES (Cert. #553); HMAC (Cert. #297); RNG (Cert. #321); RSA (Certs. #255 and #258); SHS (Cert. #618); Triple-DES (Cert. #549)
          +
          +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.0.6000.16386894FIPS Approved algorithms: DSA (Cert. #226); RNG (Cert. #321); SHS (Cert. #618); Triple-DES (Cert. #549); Triple-DES MAC (Triple-DES Cert. #549, vendor affirmed)
          +
          +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4
          BitLocker™ Drive Encryption6.0.6000.16386947FIPS Approved algorithms: AES (Cert. #715); HMAC (Cert. #386); SHS (Cert. #737)
          +
          +Other algorithms: Elephant Diffuser
          Kernel Mode Security Support Provider Interface (ksecdd.sys)6.0.6000.16386, 6.0.6000.16870 and 6.0.6000.21067891FIPS Approved algorithms: AES (Cert. #553); ECDSA (Cert. #60); HMAC (Cert. #298); RNG (Cert. #321); RSA (Certs. #257 and #258); SHS (Cert. #618); Triple-DES (Cert. #549)
          +
          +Other algorithms: DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 to 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; HMAC MD5
          + + +##### Windows XP SP3 + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.1.2600.5512997

          FIPS Approved algorithms: HMAC (Cert. #429); RNG (Cert. #449); SHS (Cert. #785); Triple-DES (Cert. #677); Triple-DES MAC (Triple-DES Cert. #677, vendor affirmed)

          +

          Other algorithms: DES; MD5; HMAC MD5

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.1.2600.5507990

          FIPS Approved algorithms: DSA (Cert. #292); RNG (Cert. #448); SHS (Cert. #784); Triple-DES (Cert. #676); Triple-DES MAC (Triple-DES Cert. #676, vendor affirmed)

          +

          Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits); MD5; RC2; RC4

          Enhanced Cryptographic Provider (RSAENH)5.1.2600.5507989

          FIPS Approved algorithms: AES (Cert. #781); HMAC (Cert. #428); RNG (Cert. #447); RSA (Cert. #371); SHS (Cert. #783); Triple-DES (Cert. #675); Triple-DES MAC (Triple-DES Cert. #675, vendor affirmed)

          +

          Other algorithms: DES; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits)

          + + +##### Windows XP SP2 + + ++++++ + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          DSS/Diffie-Hellman Enhanced Cryptographic Provider5.1.2600.2133240

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #29)

          +

          Other algorithms: DES (Cert. #66); RC2; RC4; MD5; DES40; Diffie-Hellman (key agreement)

          Microsoft Enhanced Cryptographic Provider5.1.2600.2161238

          FIPS Approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed)

          +

          Other algorithms: DES (Cert. #156); RC2; RC4; MD5

          + + +##### Windows XP SP1 + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Microsoft Enhanced Cryptographic Provider5.1.2600.1029238

          FIPS Approved algorithms: Triple-DES (Cert. #81); AES (Cert. #33); SHA-1 (Cert. #83); RSA (PKCS#1, vendor affirmed); HMAC-SHA-1 (Cert. #83, vendor affirmed)

          +

          Other algorithms: DES (Cert. #156); RC2; RC4; MD5

          + + +##### Windows XP + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module5.1.2600.0241

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Cert. #35); HMAC-SHA-1 (Cert. #35, vendor affirmed)

          +

          Other algorithms: DES (Cert. #89)

          + + +##### Windows 2000 SP3 + + ++++++ + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.0.2195.1569106

          FIPS Approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35)

          +

          Other algorithms: DES (Certs. #89)

          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider

          (Base DSS: 5.0.2195.3665 [SP3])

          +

          (Base: 5.0.2195.3839 [SP3])

          +

          (DSS/DH Enh: 5.0.2195.3665 [SP3])

          +

          (Enh: 5.0.2195.3839 [SP3]

          103

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed)

          +

          Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5

          + + +##### Windows 2000 SP2 + + ++++++ + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.0.2195.1569106

          FIPS Approved algorithms: Triple-DES (Cert. #16); SHA-1 (Certs. #35)

          +

          Other algorithms: DES (Certs. #89)

          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider

          (Base DSS:

          +

          5.0.2195.2228 [SP2])

          +

          (Base:

          +

          5.0.2195.2228 [SP2])

          +

          (DSS/DH Enh:

          +

          5.0.2195.2228 [SP2])

          +

          (Enh:

          +

          5.0.2195.2228 [SP2])

          103

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed)

          +

          Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5

          + + +##### Windows 2000 SP1 + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider

          (Base DSS: 5.0.2150.1391 [SP1])

          +

          (Base: 5.0.2150.1391 [SP1])

          +

          (DSS/DH Enh: 5.0.2150.1391 [SP1])

          +

          (Enh: 5.0.2150.1391 [SP1])

          103

          FIPS Approved algorithms: Triple-DES (Cert. #16); DSA/SHA-1 (Certs. #28 and #29); RSA (vendor affirmed)

          +

          Other algorithms: DES (Certs. #65, 66, 67 and 68); Diffie-Hellman (key agreement); RC2; RC4; MD2; MD4; MD5

          + + +##### Windows 2000 + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enchanced Cryptographic Provider, and Enhanced Cryptographic Provider5.0.2150.176

          FIPS Approved algorithms: Triple-DES (vendor affirmed); DSA/SHA-1 (Certs. #28 and 29); RSA (vendor affirmed)

          +

          Other algorithms: DES (Certs. #65, 66, 67 and 68); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement)

          + + +##### Windows 95 and Windows 98 + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enchanced Cryptographic Provider, and Enhanced Cryptographic Provider5.0.1877.6 and 5.0.1877.775

          FIPS Approved algorithms: Triple-DES (vendor affirmed); SHA-1 (Certs. #20 and 21); DSA/SHA-1 (Certs. #25 and 26); RSA (vendor- affirmed)

          +

          Other algorithms: DES (Certs. #61, 62, 63 and 64); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement)

          + + +##### Windows NT 4.0 + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Base Cryptographic Provider5.0.1877.6 and 5.0.1877.768FIPS Approved algorithms: SHA-1 (Certs. #20 and 21); DSA/SHA- 1 (Certs. #25 and 26); RSA (vendor affirmed)
          +
          +Other algorithms: DES (Certs. #61, 62, 63 and 64); Triple-DES (allowed for US and Canadian Government use); RC2; RC4; MD2; MD4; MD5; Diffie-Hellman (key agreement)
          + + +#### Windows Server + +##### Windows Server 2016 + +Validated Editions: Standard, Datacenter, Storage Server + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)10.0.143932937FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          +
          +Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)
          Kernel Mode Cryptographic Primitives Library (cng.sys)10.0.143932936FIPS Approved algorithms: AES (Cert. #4064); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)
          +
          +Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager10.0.143932931

          FIPS Approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347)

          +

          Other algorithms: MD5; PBKDF (non-compliant); VMK KDF

          BitLocker® Windows OS Loader (winload)10.0.143932932FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          +
          +Other algorithms: NDRNG; MD5
          BitLocker® Windows Resume (winresume)10.0.143932933FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)10.0.143932934FIPS Approved algorithms: AES (Certs. #4061 and #4064)
          Code Integrity (ci.dll)10.0.143932935FIPS Approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347)
          +
          +Other algorithms: AES (non-compliant); MD5
          Secure Kernel Code Integrity (skci.dll)10.0.143932938FIPS Approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347)
          +
          +Other algorithms: MD5
          + + +##### Windows Server 2012 R2 + +Validated Editions: Server, Storage Server, + +**StorSimple 8000 Series, Azure StorSimple Virtual Array Windows Server 2012 R2** + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll)6.3.9600 6.3.9600.170312357FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); DSA (Cert. #855); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. #2373); Triple-DES (Cert. #1692)
          +
          +Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.3.9600 6.3.9600.170422356FIPS Approved algorithms: AES (Cert. #2832); DRBG (Certs. #489); ECDSA (Cert. #505); HMAC (Cert. #1773); KAS (Cert. #47); KBKDF (Cert. #30); PBKDF (vendor affirmed); RSA (Certs. #1487, #1493 and #1519); SHS (Cert. # 2373); Triple-DES (Cert. #1692)
          +
          +Other algorithms: AES (Cert. #2832, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); AES-GCM encryption (non-compliant); DES; HMAC MD5; Legacy CAPI KDF; MD2; MD4; MD5; NDRNG; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager6.3.9600 6.3.9600.170312351FIPS Approved algorithms: AES (Cert. #2832); HMAC (Cert. #1773); PBKDF (vendor affirmed); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          +
          +Other algorithms: MD5; KDF (non-compliant); PBKDF (non-compliant)
          BitLocker® Windows OS Loader (winload)6.3.9600 6.3.9600.170312352FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Cert. #2396)
          +
          +Other algorithms: MD5; NDRNG
          BitLocker® Windows Resume (winresume)[16]6.3.9600 6.3.9600.170312353FIPS Approved algorithms: AES (Cert. #2832); RSA (Cert. #1494); SHS (Certs. # 2373 and #2396)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (dumpfve.sys)[17]6.3.9600 6.3.9600.170312354FIPS Approved algorithms: AES (Cert. #2832)
          +
          +Other algorithms: N/A
          Code Integrity (ci.dll)6.3.9600 6.3.9600.170312355FIPS Approved algorithms: RSA (Cert. #1494); SHS (Cert. # 2373)
          +
          +Other algorithms: MD5
          + + +\[16\] Does not apply to **Azure StorSimple Virtual Array Windows Server 2012 R2** + +\[17\] Does not apply to **Azure StorSimple Virtual Array Windows Server 2012 R2** + +**Windows Server 2012** + +Validated Editions: Server, Storage Server + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL)6.2.92001892FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258); DSA (Cert. #687); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          +
          +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#687); ECDSA (Cert. ); HMAC (Cert. #); KAS (Cert. ); KBKDF (Cert. ); PBKDF (vendor affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          +
          +Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.2.92001891FIPS Approved algorithms: AES (Certs. #2197 and #2216); DRBG (Certs. #258 and #259); ECDSA (Cert. #341); HMAC (Cert. #1345); KAS (Cert. #36); KBKDF (Cert. #3); PBKDF (vendor affirmed); RNG (Cert. #1110); RSA (Certs. #1133 and #1134); SHS (Cert. #1903); Triple-DES (Cert. #1387)
          +
          +Other algorithms: AES (Cert. #2197, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)#1110); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          +
          +Other algorithms: AES (Cert. , key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Legacy CAPI KDF; MD2; MD4; MD5; HMAC MD5; RC2; RC4; RSA (encrypt/decrypt)
          Boot Manager6.2.92001895FIPS Approved algorithms: AES (Certs. #2196 and #2198); HMAC (Cert. #1347); RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: MD5
          BitLocker® Windows OS Loader (WINLOAD)6.2.92001896FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: AES (Cert. #2197; non-compliant); MD5; Non-Approved RNG
          BitLocker® Windows Resume (WINRESUME)6.2.92001898FIPS Approved algorithms: AES (Certs. #2196 and #2198); RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: MD5
          BitLocker® Dump Filter (DUMPFVE.SYS)6.2.92001899FIPS Approved algorithms: AES (Certs. #2196 and #2198)
          +
          +Other algorithms: N/A
          Code Integrity (CI.DLL)6.2.92001897FIPS Approved algorithms: RSA (Cert. #1132); SHS (Cert. #1903)
          +
          +Other algorithms: MD5
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH.DLL)6.2.92001893FIPS Approved algorithms: DSA (Cert. #686); SHS (Cert. #1902); Triple-DES (Cert. #1386); Triple-DES MAC (Triple-DES Cert. #1386, vendor affirmed)
          +
          +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4; Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced Cryptographic Provider (RSAENH.DLL)6.2.92001894FIPS Approved algorithms: AES (Cert. #2196); HMAC (Cert. #1346); RSA (Cert. #1132); SHS (Cert. #1902); Triple-DES (Cert. #1386)
          +
          +Other algorithms: AES (Cert. #2196, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #1386, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          + + +##### Windows Server 2008 R2 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Boot Manager (bootmgr)6.1.7600.16385 or 6.1.7601.175146.1.7600.16385 or 6.1.7601.175141321FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); RSA (Cert. #568); SHS (Cert. #1081)
          +
          +Other algorithms: MD5
          Winload OS Loader (winload.exe)6.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.216756.1.7600.16385, 6.1.7600.16757, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21655 and 6.1.7601.216751333FIPS Approved algorithms: AES (Certs. #1168 and #1177); RSA (Cert. #568); SHS (Cert. #1081)
          +
          +Other algorithms: MD5
          Code Integrity (ci.dll)6.1.7600.16385, 6.1.7600.17122, 6.1.7600.21320, 6.1.7601.17514, 6.1.7601.17950 and 6.1.7601.221086.1.7600.16385, 6.1.7600.17122, 6.1.7600.21320, 6.1.7601.17514, 6.1.7601.17950 and 6.1.7601.221081334FIPS Approved algorithms: RSA (Cert. #568); SHS (Cert. #1081)
          +
          +Other algorithms: MD5
          Kernel Mode Cryptographic Primitives Library (cng.sys)6.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.220766.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.220761335FIPS Approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846)
          +
          +-Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4
          Cryptographic Primitives Library (bcryptprimitives.dll)66.1.7600.16385 or 6.1.7601.1751466.1.7600.16385 or 6.1.7601.175141336FIPS Approved algorithms: AES (Certs. #1168 and #1177); AES GCM (Cert. #1168, vendor-affirmed); AES GMAC (Cert. #1168, vendor-affirmed); DRBG (Certs. #23 and #27); DSA (Cert. #391); ECDSA (Cert. #142); HMAC (Cert. #686); KAS (SP 800-56A, vendor affirmed, key agreement; key establishment methodology provides between 80 and 256 bits of encryption strength); RNG (Cert. #649); RSA (Certs. #559 and #567); SHS (Cert. #1081); Triple-DES (Cert. #846)
          +
          +Other algorithms: AES (Cert. #1168, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); DES; HMAC MD5; MD2; MD4; MD5; RC2; RC4
          Enhanced Cryptographic Provider (RSAENH)6.1.7600.163851337FIPS Approved algorithms: AES (Cert. #1168); DRBG (Cert. #23); HMAC (Cert. #687); SHS (Cert. #1081); RSA (Certs. #559 and #568); Triple-DES (Cert. #846)
          +
          +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.1.7600.163851338FIPS Approved algorithms: DSA (Cert. #390); RNG (Cert. #649); SHS (Cert. #1081); Triple-DES (Cert. #846); Triple-DES MAC (Triple-DES Cert. #846, vendor affirmed)
          +
          +Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman; MD5; RC2; RC2 MAC; RC4
          BitLocker™ Drive Encryption6.1.7600.16385, 6.1.7600.16429, 6.1.7600.16757, 6.1.7600.20536, 6.1.7600.20873, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21634, 6.1.7601.21655 or 6.1.7601.216756.1.7600.16385, 6.1.7600.16429, 6.1.7600.16757, 6.1.7600.20536, 6.1.7600.20873, 6.1.7600.20897, 6.1.7600.20916, 6.1.7601.17514, 6.1.7601.17556, 6.1.7601.21634, 6.1.7601.21655 or 6.1.7601.216751339FIPS Approved algorithms: AES (Certs. #1168 and #1177); HMAC (Cert. #675); SHS (Cert. #1081)
          +
          +Other algorithms: Elephant Diffuser
          + + +##### Windows Server 2008 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Boot Manager (bootmgr)6.0.6001.18000, 6.0.6002.18005 and 6.0.6002.224976.0.6001.18000, 6.0.6002.18005 and 6.0.6002.224971004FIPS Approved algorithms: AES (Certs. #739 and #760); HMAC (Cert. #415); RSA (Cert. #355); SHS (Cert. #753)
          +
          +Other algorithms: N/A
          Winload OS Loader (winload.exe)6.0.6001.18000, 6.0.6001.18606, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411, 6.0.6002.22497 and 6.0.6002.225966.0.6001.18000, 6.0.6001.18606, 6.0.6001.22861, 6.0.6002.18005, 6.0.6002.18411, 6.0.6002.22497 and 6.0.6002.225961005FIPS Approved algorithms: AES (Certs. #739 and #760); RSA (Cert. #355); SHS (Cert. #753)
          +
          +Other algorithms: MD5
          Code Integrity (ci.dll)6.0.6001.18000 and 6.0.6002.180056.0.6001.18000 and 6.0.6002.180051006FIPS Approved algorithms: RSA (Cert. #355); SHS (Cert. #753)
          +
          +Other algorithms: MD5
          Kernel Mode Security Support Provider Interface (ksecdd.sys)6.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742 and 6.0.6002.228696.0.6001.18709, 6.0.6001.18272, 6.0.6001.18796, 6.0.6001.22202, 6.0.6001.22450, 6.0.6001.22987, 6.0.6001.23069, 6.0.6002.18005, 6.0.6002.18051, 6.0.6002.18541, 6.0.6002.18643, 6.0.6002.22152, 6.0.6002.22742 and 6.0.6002.228691007FIPS Approved algorithms: AES (Certs. #739 and #757); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90 AES-CTR, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656)
          +
          +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)#83); HMAC (Cert. ); RNG (Cert.  and SP800-90 AES-CTR, vendor affirmed); RSA (Certs.  and ); SHS (Cert. ); Triple-DES (Cert. )
          +
          +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; HMAC MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping: key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          Cryptographic Primitives Library (bcrypt.dll)6.0.6001.22202, 6.0.6002.18005 and 6.0.6002.228726.0.6001.22202, 6.0.6002.18005 and 6.0.6002.228721008FIPS Approved algorithms: AES (Certs. #739 and #757); DSA (Cert. #284); ECDSA (Cert. #83); HMAC (Cert. #413); RNG (Cert. #435 and SP800-90, vendor affirmed); RSA (Certs. #353 and #358); SHS (Cert. #753); Triple-DES (Cert. #656)
          +
          +Other algorithms: AES (GCM and GMAC; non-compliant); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; MD5; RC2; RC4; RNG (SP 800-90 Dual-EC; non-compliant); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant provides less than 112 bits of encryption strength)
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)6.0.6001.18000 and 6.0.6002.180056.0.6001.18000 and 6.0.6002.180051009FIPS Approved algorithms: DSA (Cert. #282); RNG (Cert. #435); SHS (Cert. #753); Triple-DES (Cert. #656); Triple-DES MAC (Triple-DES Cert. #656, vendor affirmed)
          +
          +-Other algorithms: DES; DES MAC; DES40; DES40 MAC; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC2 MAC; RC4
          Enhanced Cryptographic Provider (RSAENH)6.0.6001.22202 and 6.0.6002.180056.0.6001.22202 and 6.0.6002.180051010FIPS Approved algorithms: AES (Cert. #739); HMAC (Cert. #408); RNG (SP 800-90, vendor affirmed); RSA (Certs. #353 and #355); SHS (Cert. #753); Triple-DES (Cert. #656)
          +
          +Other algorithms: DES; MD2; MD4; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
          + + +##### Windows Server 2003 SP2 + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.2.3790.3959875

          FIPS Approved algorithms: DSA (Cert. #221); RNG (Cert. #314); RSA (Cert. #245); SHS (Cert. #611); Triple-DES (Cert. #543)

          +

          Other algorithms: DES; DES40; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RC2; RC4

          Kernel Mode Cryptographic Module (FIPS.SYS)5.2.3790.3959869

          FIPS Approved algorithms: HMAC (Cert. #287); RNG (Cert. #313); SHS (Cert. #610); Triple-DES (Cert. #542)

          +

          Other algorithms: DES; HMAC-MD5

          Enhanced Cryptographic Provider (RSAENH)5.2.3790.3959868

          FIPS Approved algorithms: AES (Cert. #548); HMAC (Cert. #289); RNG (Cert. #316); RSA (Cert. #245); SHS (Cert. #613); Triple-DES (Cert. #544)

          +

          Other algorithms: DES; RC2; RC4; MD2; MD4; MD5; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength)

          + + +##### Windows Server 2003 SP1 + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.2.3790.1830 [SP1]405

          FIPS Approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2])

          +

          Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant)

          +

          [1] x86
          +[2] SP1 x86, x64, IA64

          Enhanced Cryptographic Provider (RSAENH)5.2.3790.1830 [Service Pack 1])382

          FIPS Approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2])

          +

          Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5

          +

          [1] x86
          +[2] SP1 x86, x64, IA64

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.2.3790.1830 [Service Pack 1]381

          FIPS Approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81)

          +

          Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40

          +

          [1] x86
          +[2] SP1 x86, x64, IA64

          + + +##### Windows Server 2003 + + ++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Kernel Mode Cryptographic Module (FIPS.SYS)5.2.3790.0405

          FIPS Approved algorithms: Triple-DES (Certs. #201[1] and #370[1]); SHS (Certs. #177[1] and #371[2])

          +

          Other algorithms: DES (Cert. #230[1]); HMAC-MD5; HMAC-SHA-1 (non-compliant)

          +

          [1] x86
          +[2] SP1 x86, x64, IA64

          Enhanced Cryptographic Provider (RSAENH)5.2.3790.0382

          FIPS Approved algorithms: Triple-DES (Cert. #192[1] and #365[2]); AES (Certs. #80[1] and #290[2]); SHS (Cert. #176[1] and #364[2]); HMAC (Cert. #176, vendor affirmed[1] and #99[2]); RSA (PKCS#1, vendor affirmed[1] and #81[2])

          +

          Other algorithms: DES (Cert. #226[1]); SHA-256[1]; SHA-384[1]; SHA-512[1]; RC2; RC4; MD2; MD4; MD5

          +

          [1] x86
          +[2] SP1 x86, x64, IA64

          Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)5.2.3790.0381

          FIPS Approved algorithms: Triple-DES (Certs. #199[1] and #381[2]); SHA-1 (Certs. #181[1] and #385[2]); DSA (Certs. #95[1] and #146[2]); RSA (Cert. #81)

          +

          Other algorithms: DES (Cert. #229[1]); Diffie-Hellman (key agreement); RC2; RC4; MD5; DES 40

          +

          [1] x86
          +[2] SP1 x86, x64, IA64

          + + +#### Other Products + +##### Windows Embedded Compact 7 and Windows Embedded Compact 8 + + ++++++ + + + + + + + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced Cryptographic Provider7.00.2872 [1] and 8.00.6246 [2]2957

          FIPS Approved algorithms: AES (Certs.#4433and#4434); CKG (vendor affirmed); DRBG (Certs.#1432and#1433); HMAC (Certs.#2946and#2945); RSA (Certs.#2414and#2415); SHS (Certs.#3651and#3652); Triple-DES (Certs.#2383and#2384)

          +

          Allowed algorithms: HMAC-MD5; MD5; NDRNG

          Cryptographic Primitives Library (bcrypt.dll)7.00.2872 [1] and 8.00.6246 [2]2956

          FIPS Approved algorithms: AES (Certs.#4430and#4431); CKG (vendor affirmed); CVL (Certs.#1139and#1140); DRBG (Certs.#1429and#1430); DSA (Certs.#1187and#1188); ECDSA (Certs.#1072and#1073); HMAC (Certs.#2942and#2943); KAS (Certs.#114and#115); RSA (Certs.#2411and#2412); SHS (Certs.#3648and#3649); Triple-DES (Certs.#2381and#2382)

          +

          Allowed algorithms: MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength

          + + + +##### Windows CE 6.0 and Windows Embedded Compact 7 + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Enhanced Cryptographic Provider6.00.1937 [1] and 7.00.1687 [2]825

          FIPS Approved algorithms: AES (Certs. #516 [1] and #2024 [2]); HMAC (Certs. #267 [1] and #1227 [2]); RNG (Certs. #292 [1] and #1060 [2]); RSA (Cert. #230 [1] and #1052 [2]); SHS (Certs. #589 [1] and #1774 [2]); Triple-DES (Certs. #526 [1] and #1308 [2])

          +

          Other algorithms: MD5; HMAC-MD5; RC2; RC4; DES

          + + +##### Outlook Cryptographic Provider + + ++++++ + + + + + + + + + + + + + + +
          Cryptographic ModuleVersion (link to Security Policy)FIPS Certificate #Algorithms
          Outlook Cryptographic Provider (EXCHCSP)SR-1A (3821)SR-1A (3821)110

          FIPS Approved algorithms: Triple-DES (Cert. #18); SHA-1 (Certs. #32); RSA (vendor affirmed)

          +

          Other algorithms: DES (Certs. #91); DES MAC; RC2; MD2; MD5

          + + + +### Cryptographic Algorithms + +The following tables are organized by cryptographic algorithms with their modes, states, and key sizes. For each algorithm implementation (operating system / platform), there is a link to the Cryptographic Algorithm Validation Program (CAVP) issued certificate. + +### Advanced Encryption Standard (AES) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • AES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CFB128:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CTR:
          • +
            • +
            • Counter Source: Internal
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-OFB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +

          Microsoft Surface Hub Virtual TPM Implementations #4904

          +

          Version 10.0.15063.674

            +
          • AES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CFB128:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CTR:
          • +
            • +
            • Counter Source: Internal
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-OFB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #4903

          +

          Version 10.0.16299

            +
          • AES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CCM:
          • +
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
            • Tag Lengths: 32, 48, 64, 80, 96, 112, 128 (bits)
            • +
            • IV Lengths: 56, 64, 72, 80, 88, 96, 104 (bits)
            • +
            • Plain Text Length: 0-32
            • +
            • AAD Length: 0-65536
            • +
          • +
          • AES-CFB128:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CFB8:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CMAC:
          • +
            • +
            • Generation:
            • +
              • +
              • AES-128:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-192:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-256:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
            • +
            • Verification:
            • +
              • +
              • AES-128:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-192:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-256:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
            • +
          • +
          • AES-CTR:
          • +
            • +
            • Counter Source: Internal
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-ECB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-GCM:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
            • Tag Lengths: 96, 104, 112, 120, 128 (bits)
            • +
            • Plain Text Lengths: 0, 8, 1016, 1024 (bits)
            • +
            • AAD Lengths: 0, 8, 1016, 1024 (bits)
            • +
            • 96 bit IV supported
            • +
          • +
          • AES-XTS:
          • +
            • +
            • Key Size: 128:
            • +
              • +
              • Modes: Decrypt, Encrypt
              • +
              • Block Sizes: Full
              • +
            • +
            • Key Size: 256:
            • +
              • +
              • Modes: Decrypt, Encrypt
              • +
              • Block Sizes: Full
              • +
            • +
          • +

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #4902

          +

          Version 10.0.15063.674

            +
          • AES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CCM:
          • +
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
            • Tag Lengths: 32, 48, 64, 80, 96, 112, 128 (bits)
            • +
            • IV Lengths: 56, 64, 72, 80, 88, 96, 104 (bits)
            • +
            • Plain Text Length: 0-32
            • +
            • AAD Length: 0-65536
            • +
          • +
          • AES-CFB128:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CFB8:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CMAC:
          • +
            • +
            • Generation:
            • +
              • +
              • AES-128:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-192:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-256:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
            • +
            • Verification:
            • +
              • +
              • AES-128:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-192:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-256:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
            • +
          • +
          • AES-CTR:
          • +
            • +
            • Counter Source: Internal
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-ECB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-GCM:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
            • Tag Lengths: 96, 104, 112, 120, 128 (bits)
            • +
            • Plain Text Lengths: 0, 8, 1016, 1024 (bits)
            • +
            • AAD Lengths: 0, 8, 1016, 1024 (bits)
            • +
            • 96 bit IV supported
            • +
          • +
          • AES-XTS:
          • +
            • +
            • Key Size: 128:
            • +
              • +
              • Modes: Decrypt, Encrypt
              • +
              • Block Sizes: Full
              • +
            • +
            • Key Size: 256:
            • +
              • +
              • Modes: Decrypt, Encrypt
              • +
              • Block Sizes: Full
              • +
            • +
          • +

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4901

          +

          Version 10.0.15254

            +
          • AES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CCM:
          • +
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
            • Tag Lengths: 32, 48, 64, 80, 96, 112, 128 (bits)
            • +
            • IV Lengths: 56, 64, 72, 80, 88, 96, 104 (bits)
            • +
            • Plain Text Length: 0-32
            • +
            • AAD Length: 0-65536
            • +
          • +
          • AES-CFB128:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CFB8:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-CMAC:
          • +
            • +
            • Generation:
            • +
              • +
              • AES-128:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-192:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-256:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
            • +
            • Verification:
            • +
              • +
              • AES-128:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-192:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
              • AES-256:
              • +
                • +
                • Block Sizes: Full, Partial
                • +
                • Message Length: 0-65536
                • +
                • Tag Length: 16-16
                • +
              • +
            • +
          • +
          • AES-CTR:
          • +
            • +
            • Counter Source: Internal
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-ECB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
          • +
          • AES-GCM:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • IV Generation: External
            • +
            • Key Lengths: 128, 192, 256 (bits)
            • +
            • Tag Lengths: 96, 104, 112, 120, 128 (bits)
            • +
            • Plain Text Lengths: 0, 8, 1016, 1024 (bits)
            • +
            • AAD Lengths: 0, 8, 1016, 1024 (bits)
            • +
            • 96 bit IV supported
            • +
          • +
          • AES-XTS:
          • +
            • +
            • Key Size: 128:
            • +
              • +
              • Modes: Decrypt, Encrypt
              • +
              • Block Sizes: Full
              • +
            • +
            • Key Size: 256:
            • +
              • +
              • Modes: Decrypt, Encrypt
              • +
              • Block Sizes: Full
              • +
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4897

          +

          Version 10.0.16299

          AES-KW:

          +
            +
          • Modes: Decrypt, Encrypt
          • +
          • CIPHK transformation direction: Forward
          • +
          • Key Lengths: 128, 192, 256 (bits)
          • +
          • Plain Text Lengths: 128, 192, 256, 320, 2048 (bits)
          • +
          +

          AES Val#4902

          Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #4900

          +

          Version 10.0.15063.674

          AES-KW:

          +
            +
          • Modes: Decrypt, Encrypt
          • +
          • CIPHK transformation direction: Forward
          • +
          • Key Lengths: 128, 192, 256 (bits)
          • +
          • Plain Text Lengths: 128, 192, 256, 320, 2048 (bits)
          • +
          +

          AES Val#4901

          Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #4899

          +

          Version 10.0.15254

          AES-KW:

          +
            +
          • Modes: Decrypt, Encrypt
          • +
          • CIPHK transformation direction: Forward
          • +
          • Key Lengths: 128, 192, 256 (bits)
          • +
          • Plain Text Lengths: 128, 192, 256, 320, 2048 (bits)
          • +
          +

          AES Val#4897

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #4898

          +

          Version 10.0.16299

          AES-CCM:

          +
            +
          • Key Lengths: 256 (bits)
          • +
          • Tag Lengths: 128 (bits)
          • +
          • IV Lengths: 96 (bits)
          • +
          • Plain Text Length: 0-32
          • +
          • AAD Length: 0-65536
          • +
          +

          AES Val#4902

          Microsoft Surface Hub BitLocker(R) Cryptographic Implementations #4896

          +

          Version 10.0.15063.674

          AES-CCM:

          +
            +
          • Key Lengths: 256 (bits)
          • +
          • Tag Lengths: 128 (bits)
          • +
          • IV Lengths: 96 (bits)
          • +
          • Plain Text Length: 0-32
          • +
          • AAD Length: 0-65536
          • +
          +

          AES Val#4901

          Windows 10 Mobile (version 1709) BitLocker(R) Cryptographic Implementations #4895

          +

          Version 10.0.15254

          AES-CCM:

          +
            +
          • Key Lengths: 256 (bits)
          • +
          • Tag Lengths: 128 (bits)
          • +
          • IV Lengths: 96 (bits)
          • +
          • Plain Text Length: 0-32
          • +
          • AAD Length: 0-65536
          • +
          +

          AES Val#4897

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); BitLocker(R) Cryptographic Implementations #4894

          +

          Version 10.0.16299

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB128 ( e/d; 128 , 192 , 256 );

          +

          OFB ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #4627

          +

          Version 10.0.15063

          KW ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 256 , 192 , 320 , 2048 )

          +

          AES Val#4624

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #4626

          +

          Version 10.0.15063

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          +

          AES Val#4624

          +

           

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile BitLocker(R) Cryptographic Implementations #4625

          +

          Version 10.0.15063

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

          CFB128 ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          +

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          +

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 )

          +

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )

          +

          (KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )

          +

          IV Generated: ( External ) ; PT Lengths Tested: ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested: ( 0 , 1024 , 8 , 1016 ) ; 96BitIV_Supported

          +

          GMAC_Supported

          +

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #4624

          +

          Version 10.0.15063

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4434

          +

          Version 7.00.2872

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #4433

          +

          Version 8.00.6246

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4431

          +

          Version 7.00.2872

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #4430

          +

          Version 8.00.6246

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB128 ( e/d; 128 , 192 , 256 );

          +

          OFB ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #4074

          +

          Version 10.0.14393

          ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB8 ( e/d; 128 , 192 , 256 ); CFB128 ( e/d; 128 , 192 , 256 ); CTR ( int only; 128 , 192 , 256 )

          +

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          +

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          +

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          +(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          +IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 0 , 0 ) ; 96BitIV_Supported
          +GMAC_Supported

          +

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #4064

          +

          Version 10.0.14393

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

           

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #4063
          +Version 10.0.14393

          KW  ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 192 , 256 , 320 , 2048 )

          +

          AES Val#4064

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #4062

          +

          Version 10.0.14393

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          +

          AES Val#4064

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BitLocker® Cryptographic Implementations #4061

          +

          Version 10.0.14393

          KW  ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 256 , 192 , 320 , 2048 )

          +

          AES Val#3629

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #3652

          +

          Version 10.0.10586

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          +

          AES Val#3629

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BitLocker® Cryptographic Implementations #3653

          +

          Version 10.0.10586

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

           

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA32 Algorithm Implementations #3630
          +Version 10.0.10586

          ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB8 ( e/d; 128 , 192 , 256 ); CFB128 ( e/d; 128 , 192 , 256 ); CTR ( int only; 128 , 192 , 256 )

          +

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          +

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          +

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          +(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          +IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 0 , 0 ) ; 96BitIV_Supported
          +GMAC_Supported

          +

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #3629
          +
          +

          +

          Version 10.0.10586

          KW  ( AE , AD , AES-128 , AES-192 , AES-256 , FWD , 128 , 256 , 192 , 320 , 2048 )

          +

          AES Val#3497

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #3507

          +

          Version 10.0.10240

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          +

          AES Val#3497

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BitLocker® Cryptographic Implementations #3498

          +

          Version 10.0.10240

          ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB8 ( e/d; 128 , 192 , 256 ); CFB128 ( e/d; 128 , 192 , 256 ); CTR ( int only; 128 , 192 , 256 )

          +

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          +

          CMAC(Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          +

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          +(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          +IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 0 , 0 ) ; 96BitIV_Supported
          +GMAC_Supported

          +

          XTS( (KS: XTS_128( (e/d) (f) ) KS: XTS_256( (e/d) (f) )

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #3497
          +Version 10.0.10240

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

           

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #3476
          +Version 10.0.10240

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

           

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2853

          +

          Version 6.3.9600

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          +

          AES Val#2832

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 BitLocker� Cryptographic Implementations #2848

          +

          Version 6.3.9600

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 0 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          +

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 192; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 ) (KS: 256; Block Size(s): Full / Partial ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 0 Max: 16 )

          +

          GCM (KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )

          +

          (KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )

          +

          IV Generated:  ( Externally ) ; PT Lengths Tested:  ( 0 , 128 , 1024 , 8 , 1016 ) ; AAD Lengths tested:  ( 0 , 128 , 1024 , 8 , 1016 ) ; IV Lengths Tested:  ( 8 , 1024 ) ; 96BitIV_Supported ;
          +OtherIVLen_Supported
          +GMAC_Supported

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2832

          +

          Version 6.3.9600

          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )
          +AES Val#2197

          +

          CMAC (Generation/Verification ) (KS: 128; Block Size(s): ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 192; Block Size(s): ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 ) (KS: 256; Block Size(s): ; Msg Len(s) Min: 0 Max: 2^16 ; Tag Len(s) Min: 16 Max: 16 )
          +AES Val#2197

          +

          GCM(KS: AES_128( e/d ) Tag Length(s): 128 120 112 104 96 ) (KS: AES_192( e/d ) Tag Length(s): 128 120 112 104 96 )
          +(KS: AES_256( e/d ) Tag Length(s): 128 120 112 104 96 )
          +IV Generated: ( Externally ) ; PT Lengths Tested: ( 0 , 128 , 1024 , 8 , 1016 ) ; AAD Lengths tested: ( 0 , 128 , 1024 , 8 , 1016 ) ; IV Lengths Tested: ( 8 , 1024 ) ; 96BitIV_Supported
          +GMAC_Supported

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #2216

          CCM (KS: 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 12 (Tag Length(s): 16 )

          +

          AES Val#2196

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #2198

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

          CFB128 ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #2197

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

           

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #2196
          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 – 0 , 2^16 ) (Payload Length Range: 0 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )
          +AES Val#1168

          Windows Server 2008 R2 and SP1 CNG algorithms #1187

          +

          Windows 7 Ultimate and SP1 CNG algorithms #1178

          CCM (KS: 128 , 256 ) (Assoc. Data Len Range: 0 - 8 ) (Payload Length Range: 4 - 32 ( Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16 )
          +AES Val#1168
          Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #1177

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          +

           

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168

          GCM

          +

          GMAC

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1168 , vendor-affirmed
          CCM (KS: 128 , 256 ) (Assoc. Data Len Range: 0 - 8 ) (Payload Length Range: 4 - 32 ( Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16 )Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #760
          CCM (KS: 128 , 192 , 256 ) (Assoc. Data Len Range: 0 - 0 , 2^16 ) (Payload Length Range: 1 - 32 ( Nonce Length(s): 7 8 9 10 11 12 13 (Tag Length(s): 4 6 8 10 12 14 16 )

          Windows Server 2008 CNG algorithms #757

          +

          Windows Vista Ultimate SP1 CNG algorithms #756

          CBC ( e/d; 128 , 256 );

          +

          CCM (KS: 128 , 256 ) (Assoc. Data Len Range: 0 - 8 ) (Payload Length Range: 4 - 32 ( Nonce Length(s): 7 8 12 13 (Tag Length(s): 4 6 8 14 16 )

          Windows Vista Ultimate BitLocker Drive Encryption #715

          +

          Windows Vista Ultimate BitLocker Drive Encryption #424

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CFB8 ( e/d; 128 , 192 , 256 );

          Windows Vista Ultimate SP1 and Windows Server 2008 Symmetric Algorithm Implementation #739

          +

          Windows Vista Symmetric Algorithm Implementation #553

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          +

          CTR ( int only; 128 , 192 , 256 )

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #2023

          ECB ( e/d; 128 , 192 , 256 );

          +

          CBC ( e/d; 128 , 192 , 256 );

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #2024

          +

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #818

          +

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #781

          +

          Windows 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #548

          +

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #516

          +

          Windows CE and Windows Mobile 6, 6.1, and 6.5 Enhanced Cryptographic Provider (RSAENH) #507

          +

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #290

          +

          Windows CE 5.0 and 5.1 Enhanced Cryptographic Provider (RSAENH) #224

          +

          Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #80

          +

          Windows XP, SP1, and SP2 Enhanced Cryptographic Provider (RSAENH) #33

          + + +Deterministic Random Bit Generator (DRBG) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • Counter:
          • +
            • +
            • Modes: AES-256
            • +
            • Derivation Function States: Derivation Function not used
            • +
            • Prediction Resistance Modes: Not Enabled
            • +
          • +
          +

          Prerequisite: AES #4904

          Microsoft Surface Hub Virtual TPM Implementations #1734

          +

          Version 10.0.15063.674

            +
          • Counter:
          • +
            • +
            • Modes: AES-256
            • +
            • Derivation Function States: Derivation Function not used
            • +
            • Prediction Resistance Modes: Not Enabled
            • +
          • +
          +

          Prerequisite: AES #4903

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1733

          +

          Version 10.0.16299

            +
          • Counter:
          • +
            • +
            • Modes: AES-256
            • +
            • Derivation Function States: Derivation Function used
            • +
            • Prediction Resistance Modes: Not Enabled
            • +
          • +
          +

          Prerequisite: AES #4902

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1732

          +

          Version 10.0.15063.674

            +
          • Counter:
          • +
            • +
            • Modes: AES-256
            • +
            • Derivation Function States: Derivation Function used
            • +
            • Prediction Resistance Modes: Not Enabled
            • +
          • +
          +

          Prerequisite: AES #4901

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1731

          +

          Version 10.0.15254

            +
          • Counter:
          • +
            • +
            • Modes: AES-256
            • +
            • Derivation Function States: Derivation Function used
            • +
            • Prediction Resistance Modes: Not Enabled
            • +
          • +
          +

          Prerequisite: AES #4897

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1730

          +

          Version 10.0.16299

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4627 ) ]

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1556

          +

          Version 10.0.15063

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#4624 ) ]

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1555

          +

          Version 10.0.15063

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4434 ) ]

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1433

          +

          Version 7.00.2872

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4433 ) ]

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #1432

          +

          Version 8.00.6246

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4431 ) ]

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1430

          +

          Version 7.00.2872

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4430 ) ]

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1429

          +

          Version 8.00.6246

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#4074 ) ]

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #1222

          +

          Version 10.0.14393

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#4064 ) ]

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #1217

          +

          Version 10.0.14393

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#3629 ) ]

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #955

          +

          Version 10.0.10586

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#3497 ) ]

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #868

          +

          Version 10.0.10240

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#2832 ) ]

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #489

          +

          Version 6.3.9600

          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_Use_df: ( AES-256 ) ( AES Val#2197 ) ]Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #258
          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#2023 ) ]Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #193
          CTR_DRBG: [ Prediction Resistance Tested: Not Enabled; BlockCipher_No_df: ( AES-256 ) ( AES Val#1168 ) ]Windows 7 Ultimate and SP1 and Windows Server 2008 R2 and SP1 RNG Library #23
          DRBG (SP 800–90)Windows Vista Ultimate SP1, vendor-affirmed
          + + +#### Digital Signature Algorithm (DSA) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • DSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • PQGGen:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • PQGVer:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • SigGen:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • SigVer:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • KeyPair:
              • +
                • +
                • L = 2048, N = 256
                • +
                • L = 3072, N = 256
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1303

          +

          Version 10.0.15063.674

            +
          • DSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • PQGGen:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • PQGVer:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • SigGen:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • SigVer:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • KeyPair:
              • +
                • +
                •  
                • +
                •  
                • +
                • L = 2048, N = 256
                • +
                • L = 3072, N = 256
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1302

          +

          Version 10.0.15254

            +
          • DSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • PQGGen:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • PQGVer:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • SigGen:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • SigVer:
              • +
                • +
                • L = 2048, N = 256 SHA: SHA-256
                • +
                • L = 3072, N = 256 SHA: SHA-256
                • +
              • +
              • KeyPair:
              • +
                • +
                • L = 2048, N = 256
                • +
                • L = 3072, N = 256
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1301

          +

          Version 10.0.16299

          FIPS186-4:

          +

          PQG(gen)PARMS TESTED:   [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          KeyPairGen:   [ (2048,256) ; (3072,256) ]

          +

          SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]

          +

          SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          SHS: Val#3790

          +

          DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1223

          +

          Version 10.0.15063

          FIPS186-4:
          +PQG(ver)PARMS TESTED:
            [ (1024,160) SHA( 1 ); ]
          +SIG(ver)PARMS TESTED:   [ (1024,160) SHA( 1 ); ]
          +SHS: Val# 3649

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1188

          +

          Version 7.00.2872

          FIPS186-4:
          +PQG(ver)PARMS TESTED:
            [ (1024,160) SHA( 1 ); ]
          +SIG(ver)PARMS TESTED:   [ (1024,160) SHA( 1 ); ]
          +SHS: Val#3648

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1187

          +

          Version 8.00.6246

          FIPS186-4:
          +PQG(gen)
          PARMS TESTED: [
          +(2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          +PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          +KeyPairGen:    [ (2048,256) ; (3072,256) ]
          +SIG(gen)PARMS TESTED:   [ (2048,256)
          +SHA( 256 ); (3072,256) SHA( 256 ); ]
          +SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          SHS: Val# 3347
          +DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #1098

          +

          Version 10.0.14393

          FIPS186-4:
          +PQG(gen)
          PARMS TESTED:   [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ] PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 )]
          +KeyPairGen:    [ (2048,256) ; (3072,256) ] SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]
          +SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          SHS: Val# 3047
          +DRBG: Val# 955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #1024

          +

          Version 10.0.10586

          FIPS186-4:
          +PQG(gen)
          PARMS TESTED:   [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          +PQG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          +KeyPairGen:    [ (2048,256) ; (3072,256) ]
          +SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ] SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          SHS: Val# 2886
          +DRBG: Val# 868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #983

          +

          Version 10.0.10240

          FIPS186-4:
          +PQG(gen)
          PARMS TESTED:   [
          +(2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          +PQG(ver)PARMS TESTED:   [ (2048,256)
          +SHA( 256 ); (3072,256) SHA( 256 ) ]
          +KeyPairGen:    [ (2048,256) ; (3072,256) ]
          +SIG(gen)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]
          +SIG(ver)PARMS TESTED:   [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]

          +

          SHS: Val# 2373
          +DRBG: Val# 489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #855

          +

          Version 6.3.9600

          FIPS186-2:
          +PQG(ver) MOD(1024);
          +SIG(ver) MOD(1024);
          +SHS: #1903
          +DRBG: #258

          +

          FIPS186-4:
          +PQG(gen)PARMS TESTED
          : [ (2048,256)SHA( 256 ); (3072,256) SHA( 256 ) ]
          +PQG(ver)PARMS TESTED: [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          +SIG(gen)PARMS TESTED: [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ); ]
          +SIG(ver)PARMS TESTED: [ (2048,256) SHA( 256 ); (3072,256) SHA( 256 ) ]
          +SHS: #1903
          +DRBG: #258
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#687.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #687
          FIPS186-2:
          +PQG(ver)
          MOD(1024);
          +SIG(ver) MOD(1024);
          +SHS: #1902
          +DRBG: #258
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#686.
          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 DSS and Diffie-Hellman Enhanced Cryptographic Provider (DSSENH) #686
          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 1773
          +DRBG: Val# 193
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#645.
          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #645
          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 1081
          +DRBG: Val# 23
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#391. See Historical DSA List Val#386.

          Windows Server 2008 R2 and SP1 CNG algorithms #391

          +

          Windows 7 Ultimate and SP1 CNG algorithms #386

          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 1081
          +RNG: Val# 649
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#390. See Historical DSA List Val#385.

          Windows Server 2008 R2 and SP1 Enhanced DSS (DSSENH) #390

          +

          Windows 7 Ultimate and SP1 Enhanced DSS (DSSENH) #385

          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 753
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#284. See Historical DSA List Val#283.

          Windows Server 2008 CNG algorithms #284

          +

          Windows Vista Ultimate SP1 CNG algorithms #283

          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 753
          +RNG: Val# 435
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#282. See Historical DSA List Val#281.

          Windows Server 2008 Enhanced DSS (DSSENH) #282

          +

          Windows Vista Ultimate SP1 Enhanced DSS (DSSENH) #281

          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 618
          +RNG: Val# 321
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#227. See Historical DSA List Val#226.

          Windows Vista CNG algorithms #227

          +

          Windows Vista Enhanced DSS (DSSENH) #226

          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 784
          +RNG: Val# 448
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#292.
          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #292
          FIPS186-2:
          +SIG(ver)
          MOD(1024);
          +SHS: Val# 783
          +RNG: Val# 447
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical DSA List Val#291.
          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #291
          FIPS186-2:
          +PQG(gen)
          MOD(1024);
          +PQG(ver) MOD(1024);
          +KEYGEN(Y) MOD(1024);
          +SIG(gen) MOD(1024);
          +SIG(ver) MOD(1024);
          +SHS: Val# 611
          +RNG: Val# 314
          Windows 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #221
          FIPS186-2:
          +PQG(gen)
          MOD(1024);
          +PQG(ver) MOD(1024);
          +KEYGEN(Y) MOD(1024);
          +SIG(gen) MOD(1024);
          +SIG(ver) MOD(1024);
          +SHS: Val# 385
          Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #146
          FIPS186-2:
          +PQG(ver)
          MOD(1024);
          +KEYGEN(Y) MOD(1024);
          +SIG(gen) MOD(1024);
          +SIG(ver) MOD(1024);
          +SHS: Val# 181
          +
          +
          Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #95
          FIPS186-2:
          +PQG(gen)
          MOD(1024);
          +PQG(ver) MOD(1024);
          +KEYGEN(Y) MOD(1024);
          +SIG(gen) MOD(1024);
          +SHS: SHA-1 (BYTE)
          +SIG(ver) MOD(1024);
          +SHS: SHA-1 (BYTE)

          Windows 2000 DSSENH.DLL #29

          +

          Windows 2000 DSSBASE.DLL #28

          +

          Windows NT 4 SP6 DSSENH.DLL #26

          +

          Windows NT 4 SP6 DSSBASE.DLL #25

          FIPS186-2: PRIME;
          +FIPS186-2:

          +

          KEYGEN(Y):
          +SHS: SHA-1 (BYTE)

          +

          SIG(gen):
          +SIG(ver)
          MOD(1024);
          +SHS: SHA-1 (BYTE)

          Windows NT 4.0 SP4 Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider #17
          + + +#### Elliptic Curve Digital Signature Algorithm (ECDSA) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #2373, DRBG #489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1263

          +

          Version 6.3.9600

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384
                • +
                • Generation Methods: Testing Candidates
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1734

          Microsoft Surface Hub Virtual TPM Implementations #1253

          +

          Version 10.0.15063.674

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384
                • +
                • Generation Methods: Testing Candidates
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1733

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1252

          +

          Version 10.0.16299

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1251

          +

          Version 10.0.15063.674

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1250

          +

          Version 10.0.15063.674

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1249

          +

          Version 10.0.15254

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1248

          +

          Version 10.0.15254

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1247

          +

          Version 10.0.16299

            +
          • ECDSA:
          • +
            • +
            • 186-4:
            • +
              • +
              • Key Pair Generation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
                • Generation Methods: Extra Random Bits
                • +
              • +
              • Public Key Validation:
              • +
                • +
                • Curves: P-256, P-384, P-521
                • +
              • +
              • Signature Generation:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
              • Signature Verification:
              • +
                • +
                • P-256 SHA: SHA-256
                • +
                • P-384 SHA: SHA-384
                • +
                • P-521 SHA: SHA-512
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1246

          +

          Version 10.0.16299

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 TestingCandidates )
          +SHS: Val#3790
          +DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1136

          +

          Version 10.0.15063

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +PKV: CURVES( P-256 P-384 P-521 )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          +SHS: Val#3790
          +DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1135

          +

          Version 10.0.15063

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +PKV: CURVES( P-256 P-384 P-521 )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          +SHS: Val#3790
          +DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1133

          +

          Version 10.0.15063

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +PKV: CURVES( P-256 P-384 P-521 )
          +SigGen: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +SigVer: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) )
          +SHS:Val# 3649
          +DRBG:Val# 1430

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1073

          +

          Version 7.00.2872

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +PKV: CURVES( P-256 P-384 P-521 )
          +SigGen: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +SigVer: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 384) P-521: (SHA-1, 512) )
          +SHS:Val#3648
          +DRBG:Val# 1429

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1072

          +

          Version 8.00.6246

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 TestingCandidates )
          +PKV: CURVES( P-256 P-384 )
          +SigGen: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 256, 384) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +SigVer: CURVES( P-256: (SHA-1, 256) P-384: (SHA-1, 256, 384) )

          +

          SHS: Val# 3347
          +DRBG: Val# 1222

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #920

          +

          Version 10.0.14393

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +PKV: CURVES( P-256 P-384 P-521 )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          +

          SHS: Val# 3347
          +DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #911

          +

          Version 10.0.14393

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          +

          SHS: Val# 3047
          +DRBG: Val# 955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #760

          +

          Version 10.0.10586

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          +

          SHS: Val# 2886
          +DRBG: Val# 868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #706

          +

          Version 10.0.10240

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )

          +

          SHS: Val#2373
          +DRBG: Val# 489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #505

          +

          Version 6.3.9600

          FIPS186-2:
          +PKG: CURVES
          ( P-256 P-384 P-521 )
          +SHS: #1903
          +DRBG: #258
          +SIG(ver):CURVES( P-256 P-384 P-521 )
          +SHS: #1903
          +DRBG: #258

          +

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          +SHS: #1903
          +DRBG: #258
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#341.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #341

          FIPS186-2:
          +PKG: CURVES
          ( P-256 P-384 P-521 )
          +SHS: Val#1773
          +DRBG: Val# 193
          +SIG(ver): CURVES( P-256 P-384 P-521 )
          +SHS: Val#1773
          +DRBG: Val# 193

          +

          FIPS186-4:
          +PKG: CURVES
          ( P-256 P-384 P-521 ExtraRandomBits )
          +SigGen: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512)
          +SigVer: CURVES( P-256: (SHA-256) P-384: (SHA-384) P-521: (SHA-512) )
          +SHS: Val#1773
          +DRBG: Val# 193
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#295.

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #295
          FIPS186-2:
          +PKG: CURVES
          ( P-256 P-384 P-521 )
          +SHS: Val#1081
          +DRBG: Val# 23
          +SIG(ver): CURVES( P-256 P-384 P-521 )
          +SHS: Val#1081
          +DRBG: Val# 23
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#142. See Historical ECDSA List Val#141.

          Windows Server 2008 R2 and SP1 CNG algorithms #142

          +

          Windows 7 Ultimate and SP1 CNG algorithms #141

          FIPS186-2:
          +PKG: CURVES
          ( P-256 P-384 P-521 )
          +SHS: Val#753
          +SIG(ver): CURVES( P-256 P-384 P-521 )
          +SHS: Val#753
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#83. See Historical ECDSA List Val#82.

          Windows Server 2008 CNG algorithms #83

          +

          Windows Vista Ultimate SP1 CNG algorithms #82

          FIPS186-2:
          +PKG: CURVES
          ( P-256 P-384 P-521 )
          +SHS: Val#618
          +RNG: Val# 321
          +SIG(ver): CURVES( P-256 P-384 P-521 )
          +SHS: Val#618
          +RNG: Val# 321
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical ECDSA List Val#60.
          Windows Vista CNG algorithms #60
          + + +#### Keyed-Hash Message Authentication Code (HMAC) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • HMAC-SHA-1:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-256:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-384:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          +

          Prerequisite: SHS #4011

          Microsoft Surface Hub Virtual TPM Implementations #3271

          +

          Version 10.0.15063.674

            +
          • HMAC-SHA-1:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-256:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-384:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          +

          Prerequisite: SHS #4009

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #3270

          +

          Version 10.0.16299

            +
          • HMAC-SHA-1:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-256:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-384:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-512:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          +

          Prerequisite: SHS #4011

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #3269

          +

          Version 10.0.15063.674

            +
          • HMAC-SHA-1:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-256:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-384:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-512:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          +

          Prerequisite: SHS #4010

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #3268

          +

          Version 10.0.15254

            +
          • HMAC-SHA-1:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-256:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-384:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          • HMAC-SHA2-512:
          • +
            • +
            • Key Sizes &lt; Block Size
            • +
            • Key Sizes &gt; Block Size
            • +
            • Key Sizes = Block Size
            • +
          • +
          +

          Prerequisite: SHS #4009

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #3267

          +

          Version 10.0.16299

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3790

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #3062

          +

          Version 10.0.15063

          HMAC-SHA1(Key Sizes Ranges Tested: KSBS ) SHS Val#3790

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS Val#3790

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3061

          +

          Version 10.0.15063

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3652

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3652

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3652

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#3652

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2946

          +

          Version 7.00.2872

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3651

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3651

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3651

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#3651

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2945

          +

          Version 8.00.6246

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val# 3649

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val# 3649

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val# 3649

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal# 3649

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2943

          +

          Version 7.00.2872

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#3648

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#3648

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#3648

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#3648

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2942

          +

          Version 8.00.6246

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          +SHS Val# 3347

          +

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          +SHS Val# 3347

          +

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          +SHS Val# 3347

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2661

          +

          Version 10.0.14393

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val# 3347

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val# 3347

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val# 3347

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS Val# 3347

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2651

          +

          Version 10.0.14393

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          +SHS Val# 3047

          +

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          +SHS Val# 3047

          +

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          +SHS Val# 3047

          +

          HMAC-SHA512 ( Key Size Ranges Tested:  KSBS )
          +SHS Val# 3047

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” SymCrypt Cryptographic Implementations #2381

          +

          Version 10.0.10586

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          +SHSVal# 2886

          +

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          +SHSVal# 2886

          +

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          + SHSVal# 2886

          +

          HMAC-SHA512 ( Key Size Ranges Tested:  KSBS )
          +SHSVal# 2886

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2233

          +

          Version 10.0.10240

          HMAC-SHA1 (Key Sizes Ranges Tested:  KSBS )
          +SHS Val#2373

          +

          HMAC-SHA256 ( Key Size Ranges Tested:  KSBS )
          +SHS Val#2373

          +

          HMAC-SHA384 ( Key Size Ranges Tested:  KSBS )
          +SHS Val#2373

          +

          HMAC-SHA512 ( Key Size Ranges Tested:  KSBS )
          +SHS Val#2373

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1773

          +

          Version 6.3.9600

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS Val#2764

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS Val#2764

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS Val#2764

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS Val#2764

          Windows CE and Windows Mobile, and Windows Embedded Handheld Enhanced Cryptographic Provider (RSAENH) #2122

          +

          Version 5.2.29344

          HMAC-SHA1 (Key Sizes Ranges Tested: KS#1902

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KS#1902

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 BitLocker® Cryptographic Implementations #1347

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS#1902

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHS#1902

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHS#1902

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHS#1902

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1346

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS )

          +

          SHS#1903

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS )

          +

          SHS#1903

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS )

          +

          SHS#1903

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS )

          +

          SHS#1903

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1345

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#1773

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#1773

          +

          Tinker HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#1773

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#1773

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1364

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#1774

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#1774

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#1774

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#1774

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1227

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#1081

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#1081

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#1081

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#1081

          Windows Server 2008 R2 and SP1 CNG algorithms #686

          +

          Windows 7 and SP1 CNG algorithms #677

          +

          Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH) #687

          +

          Windows 7 Enhanced Cryptographic Provider (RSAENH) #673

          HMAC-SHA1(Key Sizes Ranges Tested: KSVal#1081

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#1081

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 BitLocker Algorithm Implementations #675

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#816

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#816

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#816

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#816

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #452

          HMAC-SHA1 (Key Sizes Ranges Tested: KSVal#753

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#753

          Windows Vista Ultimate SP1 and Windows Server 2008 BitLocker Algorithm Implementations #415

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#753

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS )SHS Val#753

          Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #408

          +

          Windows Vista Enhanced Cryptographic Provider (RSAENH) #407

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS )SHSVal#618

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          Windows Vista Enhanced Cryptographic Provider (RSAENH) #297
          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#785

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #429

          +

          Windows XP, vendor-affirmed

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#783

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#783

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#783

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#783

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #428

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#613

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#613

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#613

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#613

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #289
          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#610Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #287

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#753

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#753

          Windows Server 2008 CNG algorithms #413

          +

          Windows Vista Ultimate SP1 CNG algorithms #412

          HMAC-SHA1 (Key Sizes Ranges Tested: KSVal#737

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#737

          Windows Vista Ultimate BitLocker Drive Encryption #386

          HMAC-SHA1 ( Key Sizes Ranges Tested: KSBS ) SHSVal#618

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#618

          Windows Vista CNG algorithms #298

          HMAC-SHA1 ( Key Sizes Ranges Tested: KSBS ) SHSVal#589

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS )SHSVal#589

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#589

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#589

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #267

          HMAC-SHA1 ( Key Sizes Ranges Tested: KSBS ) SHSVal#578

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#578

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#578

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#578

          Windows CE and Windows Mobile 6.0 and Windows Mobil 6.5 Enhanced Cryptographic Provider (RSAENH) #260

          HMAC-SHA1 (Key Sizes Ranges Tested: KSVal#495

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSVal#495

          Windows Vista BitLocker Drive Encryption #199
          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#364

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #99

          +

          Windows XP, vendor-affirmed

          HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHSVal#305

          +

          HMAC-SHA256 ( Key Size Ranges Tested: KSBS ) SHSVal#305

          +

          HMAC-SHA384 ( Key Size Ranges Tested: KSBS ) SHSVal#305

          +

          HMAC-SHA512 ( Key Size Ranges Tested: KSBS ) SHSVal#305

          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #31
          + + +#### Key Agreement Scheme (KAS) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • KAS ECC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
            • +
            • Schemes:
            • +
              • +
              • Full Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • KDFs: Concatenation
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, ECDSA #1253, DRBG #1734

          Microsoft Surface Hub Virtual TPM Implementations #150

          +

          Version 10.0.15063.674

            +
          • KAS ECC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
            • +
            • Schemes:
            • +
              • +
              • Full Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • KDFs: Concatenation
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, ECDSA #1252, DRBG #1733

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #149

          +

          Version 10.0.16299

            +
          • KAS ECC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • +
            • Schemes:
            • +
              • +
              • Ephemeral Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • KDFs: Concatenation
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • One Pass DH:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • Static Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, ECDSA #1250, DRBG #1732

          +
            +
          • KAS FFC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
            • +
            • Schemes:
            • +
              • +
              • dhEphem:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • dhOneFlow:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • dhStatic:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DSA #1303, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #148

          +

          Version 10.0.15063.674

            +
          • KAS ECC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • +
            • Schemes:
            • +
              • +
              • Ephemeral Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • KDFs: Concatenation
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • One Pass DH:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • Static Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, ECDSA #1249, DRBG #1731

          +
            +
          • KAS FFC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
            • +
            • Schemes:
            • +
              • +
              • dhEphem:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • dhOneFlow:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • dhStatic:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DSA #1302, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #147

          +

          Version 10.0.15254

            +
          • KAS ECC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • +
            • Schemes:
            • +
              • +
              • Ephemeral Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • KDFs: Concatenation
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • One Pass DH:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • Static Unified:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • EC:
                  • +
                    • +
                    • Curve: P-256
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • ED:
                  • +
                    • +
                    • Curve: P-384
                    • +
                    • SHA: SHA-384
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • EE:
                  • +
                    • +
                    • Curve: P-521
                    • +
                    • SHA: SHA-512
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, ECDSA #1246, DRBG #1730

          +
            +
          • KAS FFC:
          • +
            • +
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
            • +
            • Schemes:
            • +
              • +
              • dhEphem:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • dhOneFlow:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
              • dhStatic:
              • +
                • +
                • Key Agreement Roles: Initiator, Responder
                • +
                • Parameter Sets:
                • +
                  • +
                  • FB:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                  • FC:
                  • +
                    • +
                    • SHA: SHA-256
                    • +
                    • MAC: HMAC
                    • +
                  • +
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DSA #1301, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #146

          +

          Version 10.0.16299

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Full Validation   Key Regeneration ) SCHEMES [ FullUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ]

          +

          SHS Val#3790
          +DSA Val#1135
          +DRBG Val#1556

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #128

          +

          Version 10.0.15063

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          +SHS Val#3790
          +DSA Val#1223
          +DRBG Val#1555

          +

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ EphemeralUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +
          +SHS Val#3790
          +ECDSA Val#1133
          +DRBG Val#1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #127

          +

          Version 10.0.15063

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          +SHS Val# 3649
          +DSA Val#1188
          +DRBG Val#1430

          +

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #115

          +

          Version 7.00.2872

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhHybridOneFlow ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB:SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          +[ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FB:SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
          +SHS Val#3648
          +DSA Val#1187
          +DRBG Val#1429

          +

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +
          +SHS Val#3648
          +ECDSA Val#1072
          +DRBG Val#1429

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #114

          +

          Version 8.00.6246

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Full Validation   Key Regeneration )
          +SCHEMES  [ FullUnified  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; &lt; KDF: CONCAT &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ]

          +

          SHS Val# 3347 ECDSA Val#920 DRBG Val#1222

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #93

          +

          Version 10.0.14393

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation )
          +SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic (No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          +

          SHS Val# 3347 DSA Val#1098 DRBG Val#1217

          +

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          +

          SHS Val# 3347 DSA Val#1098 ECDSA Val#911 DRBG Val#1217 HMAC Val#2651

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #92

          +

          Version 10.0.14393

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          +

          SHS Val# 3047 DSA Val#1024 DRBG Val#955

          +

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          +

          SHS Val# 3047 ECDSA Val#760 DRBG Val#955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #72

          +

          Version 10.0.10586

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          +

          SHS Val# 2886 DSA Val#983 DRBG Val#868

          +

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          +

          SHS Val# 2886 ECDSA Val#706 DRBG Val#868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #64

          +

          Version 10.0.10240

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES  [ dhEphem  ( KARole(s): Initiator / Responder )
          +( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB:  SHA256 ) ( FC:  SHA256 ) ] [ dhStatic ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( FB:  SHA256 HMAC ) ( FC:  SHA256   HMAC ) ]

          +

          SHS Val#2373 DSA Val#855 DRBG Val#489

          +

          ECC:  (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES  [ EphemeralUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH  ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]
          +[ StaticUnified ( No_KC  &lt; KARole(s): Initiator / Responder &gt; ) ( EC:  P-256   SHA256   HMAC ) ( ED:  P-384   SHA384   HMAC ) ( EE:  P-521   HMAC (SHA512, HMAC_SHA512) ) ]

          +

          SHS Val#2373 ECDSA Val#505 DRBG Val#489

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #47

          +

          Version 6.3.9600

          FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
          +( FA: SHA256 ) ( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FA: SHA256 ) ( FB: SHA256 ) ( FC: SHA256 ) ]
          +[ dhStatic ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( FA: SHA256 HMAC ) ( FB: SHA256 HMAC ) ( FC: SHA256 HMAC ) ]
          +SHS #1903 DSA Val#687 DRBG #258

          +

          ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG DPV KPG Partial Validation Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256 SHA256 HMAC ) ( ED: P-384 SHA384 HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
          +[ OnePassDH( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256 SHA256 ) ( ED: P-384 SHA384 ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ) ]
          +[ StaticUnified ( No_KC &lt; KARole(s): Initiator / Responder&gt; ) ( EC: P-256 SHA256 HMAC ) ( ED: P-384 SHA384 HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ]
          +
          +SHS #1903 ECDSA Val#341 DRBG #258

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #36

          KAS (SP 800–56A)

          +

          key agreement

          +

          key establishment methodology provides 80 to 256 bits of encryption strength

          Windows 7 and SP1, vendor-affirmed

          +

          Windows Server 2008 R2 and SP1, vendor-affirmed

          + + +SP 800-108 Key-Based Key Derivation Functions (KBKDF) + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • Counter:
          • +
            • +
            • MACs: HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384
            • +
          • +
          +

          MAC prerequisite: HMAC #3271

          +
          +
            +
          • Counter Location: Before Fixed Data
          • +
          • R Length: 32 (bits)
          • +
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • +
          +
          +

          K prerequisite: DRBG #1734, KAS #150

          Microsoft Surface Hub Virtual TPM Implementations #161

          +

          Version 10.0.15063.674

            +
          • Counter:
          • +
            • +
            • MACs: HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384
            • +
          • +
          +

          MAC prerequisite: HMAC #3270

          +
          +
            +
          • Counter Location: Before Fixed Data
          • +
          • R Length: 32 (bits)
          • +
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • +
          +
          +

          K prerequisite: DRBG #1733, KAS #149

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #160

          +

          Version 10.0.16299

            +
          • Counter:
          • +
            • +
            • MACs: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
            • +
          • +
          +

          MAC prerequisite: AES #4902, HMAC #3269

          +
          +
            +
          • Counter Location: Before Fixed Data
          • +
          • R Length: 32 (bits)
          • +
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • +
          • K prerequisite: KAS #148
          • +
          +

          Microsoft Surface Hub Cryptography Next Generation (CNG) Implementations #159

          +

          Version 10.0.15063.674

            +
          • Counter:
          • +
            • +
            • MACs: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
            • +
          • +
          +

          MAC prerequisite: AES #4901, HMAC #3268

          +
          +
            +
          • Counter Location: Before Fixed Data
          • +
          • R Length: 32 (bits)
          • +
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • +
          +
          +

          K prerequisite: KAS #147

          Windows 10 Mobile (version 1709) Cryptography Next Generation (CNG) Implementations #158

          +

          Version 10.0.15254

            +
          • Counter:
          • +
            • +
            • MACs: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
            • +
          • +
          +

          MAC prerequisite: AES #4897, HMAC #3267

          +
          +
            +
          • Counter Location: Before Fixed Data
          • +
          • R Length: 32 (bits)
          • +
          • SPs used to generate K: SP 800-56A, SP 800-90A
          • +
          +
          +

          K prerequisite: KAS #146

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Cryptography Next Generation (CNG) Implementations #157

          +

          Version 10.0.16299

          CTR_Mode: ( Llength( Min0 Max0 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA384] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )
          +
          +KAS Val#128
          +DRBG Val#1556
          +MAC Val#3062

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #141

          +

          Version 10.0.15063

          CTR_Mode: ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )
          +
          +KAS Val#127
          +AES Val#4624
          +DRBG Val#1555
          +MAC Val#3061

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile Cryptography Next Generation (CNG) Implementations #140

          +

          Version 10.0.15063

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA384] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          +

          KAS Val#93 DRBG Val#1222 MAC Val#2661

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #102

          +

          Version 10.0.14393

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          +

          KAS Val#92 AES Val#4064 DRBG Val#1217 MAC Val#2651

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #101

          +

          Version 10.0.14393

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          +

          KAS Val#72 AES Val#3629 DRBG Val#955 MAC Val#2381

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #72

          +

          Version 10.0.10586

          CTR_Mode:  ( Llength( Min20 Max64 ) MACSupported( [CMACAES128] [CMACAES192] [CMACAES256] [HMACSHA1] [HMACSHA256] [HMACSHA384] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          +

          KAS Val#64 AES Val#3497 RBG Val#868 MAC Val#2233

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #66

          +

          Version 10.0.10240

          CTR_Mode:  ( Llength( Min0 Max0 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          +

          DRBG Val#489 MAC Val#1773

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #30

          +

          Version 6.3.9600

          CTR_Mode: ( Llength( Min0 Max4 ) MACSupported( [HMACSHA1] [HMACSHA256] [HMACSHA512] ) LocationCounter( [BeforeFixedData] ) rlength( [32] ) )

          +

          DRBG #258 HMAC Val#1345

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #3
          + + +Random Number Generator (RNG) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #

          FIPS 186-2 General Purpose

          +

          [ (x-Original); (SHA-1) ]

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1110
          FIPS 186-2
          +[ (x-Original); (SHA-1) ]

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1060

          +

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #292

          +

          Windows CE and Windows Mobile 6.0 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #286

          +

          Windows CE 5.00 and Window CE 5.01 Enhanced Cryptographic Provider (RSAENH) #66

          FIPS 186-2
          +[ (x-Change Notice); (SHA-1) ]

          +

          FIPS 186-2 General Purpose
          +[ (x-Change Notice); (SHA-1) ]

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 RNG Library #649

          +

          Windows Vista Ultimate SP1 and Windows Server 2008 RNG Implementation #435

          +

          Windows Vista RNG implementation #321

          FIPS 186-2 General Purpose
          +[ (x-Change Notice); (SHA-1) ]

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #470

          +

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #449

          +

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #447

          +

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #316

          +

          Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #313

          FIPS 186-2
          +[ (x-Change Notice); (SHA-1) ]

          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #448

          +

          Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #314

          + + +#### RSA + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1734

          Microsoft Surface Hub Virtual TPM Implementations #2677

          +

          Version 10.0.15063.674

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 240 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1733

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #2676

          +

          Version 10.0.16299

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub RSA32 Algorithm Implementations #2675

          +

          Version 10.0.15063.674

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); RSA32 Algorithm Implementations #2674

          +

          Version 10.0.16299

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) RSA32 Algorithm Implementations #2673

          +

          Version 10.0.15254

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
              • +
              • Public Key Exponent: Fixed (10001)
              • +
              • Provable Primes with Conditions:
              • +
                • +
                • Mod lengths: 2048, 3072 (bits)
                • +
                • Primality Tests: C.3
                • +
              • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 496 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub MsBignum Cryptographic Implementations #2672

          +

          Version 10.0.15063.674

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
              • +
              • Probable Random Primes:
              • +
                • +
                • Mod lengths: 2048, 3072 (bits)
                • +
                • Primality Tests: C.2
                • +
              • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 496 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #2671

          +

          Version 10.0.15063.674

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
              • +
              • Probable Random Primes:
              • +
                • +
                • Mod lengths: 2048, 3072 (bits)
                • +
                • Primality Tests: C.2
                • +
              • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 496 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2670

          +

          Version 10.0.15254

          RSA:

          +
            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
              • +
              • Public Key Exponent: Fixed (10001)
              • +
              • Provable Primes with Conditions:
              • +
                • +
                • Mod lengths: 2048, 3072 (bits)
                • +
                • Primality Tests: C.3
                • +
              • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 496 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, DRBG #1731

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #2669

          +

          Version 10.0.15254

            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
              • +
              • Public Key Exponent: Fixed (10001)
              • +
              • Provable Primes with Conditions:
              • +
                • +
                • Mod lengths: 2048, 3072 (bits)
                • +
                • Primality Tests: C.3
                • +
              • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 496 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #2668

          +

          Version 10.0.16299

            +
          • 186-4:
          • +
            • +
            • Key Generation:
            • +
              • +
              • Probable Random Primes:
              • +
                • +
                • Mod lengths: 2048, 3072 (bits)
                • +
                • Primality Tests: C.2
                • +
              • +
            • +
            • Signature Generation PKCS1.5:
            • +
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Generation PSS:
            • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
            • Signature Verification PKCS1.5:
            • +
              • +
              • Mod 1024 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 2048 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
              • Mod 3072 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • +
            • +
            • Signature Verification PSS:
            • +
              • +
              • Mod 1024:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 496 (bits)
                • +
              • +
              • Mod 2048:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
              • Mod 3072:
              • +
                • +
                • SHA-1: Salt Length: 160 (bits)
                • +
                • SHA-256: Salt Length: 256 (bits)
                • +
                • SHA-384: Salt Length: 384 (bits)
                • +
                • SHA-512: Salt Length: 512 (bits)
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2667

          +

          Version 10.0.16299

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 1 , 256 , 384 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 )) (2048 SHA( 1 , 256 , 384 ))
          +[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) ))
          +SHA Val#3790

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #2524

          +

          Version 10.0.15063

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +SHA Val#3790

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile RSA32 Algorithm Implementations #2523

          +

          Version 10.0.15063

          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e ( 10001 ) ;
          +PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )
          +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          +SHA Val#3790
          +DRBG: Val# 1555

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #2522

          +

          Version 10.0.15063

          FIPS186-4:
          +186-4KEY(gen):
          +PGM(ProbRandom:
          ( 2048 , 3072 ) PPTT:( C.2 )
          +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          +SHA Val#3790

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2521

          +

          Version 10.0.15063

          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3652
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 4096 , SHS: SHA-256Val#3652, SHA-384Val#3652, SHA-512Val#3652
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3652, SHA-256Val#3652, SHA-384Val#3652, SHA-512Val#3652

          +

          FIPS186-4:
          +ALG[ANSIX9.31]
          Sig(Gen): (2048 SHA( 1 )) (3072 SHA( 1 ))
          +SIG(gen) with SHA-1 affirmed for use with protocols only.
          Sig(Ver): (1024 SHA( 1 )) (2048 SHA( 1 )) (3072 SHA( 1 ))
          +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +SHA Val#3652

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2415

          +

          Version 7.00.2872

          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3651
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 4096 , SHS: SHA-256Val#3651, SHA-384Val#3651, SHA-512Val#3651
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3651, SHA-256Val#3651, SHA-384Val#3651, SHA-512Val#3651

          +

          FIPS186-4:
          +ALG[ANSIX9.31]
          Sig(Gen): (2048 SHA( 1 )) (3072 SHA( 1 ))
          +SIG(gen) with SHA-1 affirmed for use with protocols only.
          Sig(Ver): (1024 SHA( 1 )) (2048 SHA( 1 )) (3072 SHA( 1 ))
          +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +SHA Val#3651

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2414

          +

          Version 8.00.6246

          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 4096 , SHS: SHA-256Val# 3649 , SHA-384Val# 3649 , SHA-512Val# 3649
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val# 3649 , SHA-256Val# 3649 , SHA-384Val# 3649 , SHA-512Val# 3649

          +

          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e (10001) ;
          +PGM(ProbRandom: ( 2048 , 3072 ) PPTT:( C.2 )
          +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +SHA Val# 3649
          +DRBG: Val# 1430

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2412

          +

          Version 7.00.2872

          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 4096 , SHS: SHA-256Val#3648, SHA-384Val#3648, SHA-512Val#3648
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#3648, SHA-256Val#3648, SHA-384Val#3648, SHA-512Val#3648

          +

          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e (10001) ;
          +PGM(ProbRandom: ( 2048 , 3072 ) PPTT:( C.2 )
          +ALG[RSASSA-PKCS1_V1_5] SIG(gen) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))
          +SHA Val#3648
          +DRBG: Val# 1429

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2411

          +

          Version 8.00.6246

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 1 , 256 , 384 )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +SIG(Ver) (1024 SHA( 1 , 256 , 384 )) (2048 SHA( 1 , 256 , 384 ))
          +[RSASSA-PSS]: Sig(Gen): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) SIG(gen) with SHA-1 affirmed for use with protocols only.
          +Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) ))

          +

          SHA Val# 3347

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #2206

          +

          Version 10.0.14393

          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e ( 10001 ) ;
          +PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          +

          SHA Val# 3347 DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA Key Generation Implementation #2195

          +

          Version 10.0.14393

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val#3346

          soft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #2194

          +

          Version 10.0.14393

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          +SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val# 3347 DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #2193

          +

          Version 10.0.14393

          FIPS186-4:
          +[RSASSA-PSS]: Sig(Gen):
          (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          +

          Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          +

          SHA Val# 3347 DRBG: Val# 1217

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #2192

          +

          Version 10.0.14393

          FIPS186-4:
          +186-4KEY(gen)
          :  FIPS186-4_Fixed_e ( 10001 ) ;
          +PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          +

          SHA Val# 3047 DRBG: Val# 955

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” RSA Key Generation Implementation #1889

          +

          Version 10.0.10586

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val#3048

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #1871

          +

          Version 10.0.10586

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          +SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val# 3047

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub MsBignum Cryptographic Implementations #1888

          +

          Version 10.0.10586

          FIPS186-4:
          +[RSASSA-PSS]: Sig(Gen)
          : (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          +Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          +

          SHA Val# 3047

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub Cryptography Next Generation (CNG) Implementations #1887

          +

          Version 10.0.10586

          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e ( 10001 ) ;
          +PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          +

          SHA Val# 2886 DRBG: Val# 868

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA Key Generation Implementation #1798

          +

          Version 10.0.10240

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val#2871

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #1784

          +

          Version 10.0.10240

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val#2871

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #1783

          +

          Version 10.0.10240

          FIPS186-4:
          +[RSASSA-PSS]:
          Sig(Gen): (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          +Sig(Ver): (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          +

          SHA Val# 2886

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #1802

          +

          Version 10.0.10240

          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e ;
          +PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )

          +

          SHA Val#2373 DRBG: Val# 489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 RSA Key Generation Implementation #1487

          +

          Version 6.3.9600

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val#2373

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #1494

          +

          Version 6.3.9600

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5
          ] SIG(gen) (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          +SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 ))

          +

          SHA Val#2373

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1493

          +

          Version 6.3.9600

          FIPS186-4:
          +[RSASSA-PSS]:
          Sig(Gen): (2048 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))
          + Sig(Ver): (1024 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 62 ) )) (2048 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) )) (3072 SHA( 1 SaltLen( 20 ) , 256 SaltLen( 32 ) , 384 SaltLen( 48 ) , 512 SaltLen( 64 ) ))

          +

          SHA Val#2373

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 Cryptography Next Generation Cryptographic Implementations #1519

          +

          Version 6.3.9600

          FIPS186-4:
          +ALG[RSASSA-PKCS1_V1_5]
          SIG(gen) (2048 SHA( 256 , 384 , 512-256 )) (3072 SHA( 256 , 384 , 512-256 ))
          +SIG(Ver) (1024 SHA( 1 , 256 , 384 , 512-256 )) (2048 SHA( 1 , 256 , 384 , 512-256 )) (3072 SHA( 1 , 256 , 384 , 512-256 ))
          +[RSASSA-PSS]: Sig(Gen): (2048 SHA( 256 , 384 , 512 )) (3072 SHA( 256 , 384 , 512 ))
          +Sig(Ver): (1024 SHA( 1 , 256 , 384 , 512 )) (2048 SHA( 1 , 256 , 384 , 512 )) (3072 SHA( 1 , 256 , 384 , 512 , 512 ))
          +SHA #1903

          +

          Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1134.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations #1134
          FIPS186-4:
          +186-4KEY(gen):
          FIPS186-4_Fixed_e , FIPS186-4_Fixed_e_Value
          +PGM(ProbPrimeCondition): 2048 , 3072 PPTT:( C.3 )
          +SHA #1903 DRBG: #258
          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 RSA Key Generation Implementation #1133
          FIPS186-2:
          +ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 DRBG: #258
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256#1902, SHA-384#1902, SHA-512#1902,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1#1902, SHA-256#1902, SHA-#1902, SHA-512#1902,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1132.
          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Enhanced Cryptographic Provider (RSAENH) #1132
          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1774
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1774, SHA-384Val#1774, SHA-512Val#1774,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1774, SHA-256Val#1774, SHA-384Val#1774, SHA-512Val#1774,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1052.
          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1052
          FIPS186-2:
          +ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 DRBG: Val# 193
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1773, SHA-384Val#1773, SHA-512Val#1773,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1773, SHA-256Val#1773, SHA-384Val#1773, SHA-512Val#1773,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#1051.
          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1051
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#568.
          Windows Server 2008 R2 and SP1 Enhanced Cryptographic Provider (RSAENH) #568
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          +ALG[RSASSA-PSS]: SIG(gen); 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081
          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#567. See Historical RSA List Val#560.

          Windows Server 2008 R2 and SP1 CNG algorithms #567

          +

          Windows 7 and SP1 CNG algorithms #560

          FIPS186-2:
          +ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 DRBG: Val# 23
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#559.
          Windows 7 and SP1 and Server 2008 R2 and SP1 RSA Key Generation Implementation #559
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#1081, SHA-256Val#1081, SHA-384Val#1081, SHA-512Val#1081,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#557.
          Windows 7 and SP1 Enhanced Cryptographic Provider (RSAENH) #557
          FIPS186-2:
          +ALG[ANSIX9.31]:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#816, SHA-384Val#816, SHA-512Val#816,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#816, SHA-256Val#816, SHA-384Val#816, SHA-512Val#816,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#395.
          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #395
          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#783
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#783, SHA-384Val#783, SHA-512Val#783,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#371.
          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #371
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753, SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          +ALG[RSASSA-PSS]: SIG(gen); 2048 , 3072 , 4096 , SHS: SHA-256Val#753, SHA-384Val#753, SHA-512Val#753
          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753, SHA-256Val#753, SHA-384Val#753, SHA-512Val#753
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#358. See Historical RSA List Val#357.

          Windows Server 2008 CNG algorithms #358

          +

          Windows Vista SP1 CNG algorithms #357

          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#753, SHA-256Val#753, SHA-384Val#753, SHA-512Val#753,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#355. See Historical RSA List Val#354.

          Windows Server 2008 Enhanced Cryptographic Provider (RSAENH) #355

          +

          Windows Vista SP1 Enhanced Cryptographic Provider (RSAENH) #354

          FIPS186-2:
          +ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#353.
          Windows Vista SP1 and Windows Server 2008 RSA Key Generation Implementation #353
          FIPS186-2:
          +ALG[ANSIX9.31]:
          Key(gen)(MOD: 2048 , 3072 , 4096 PubKey Values: 65537 RNG: Val# 321
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#258.
          Windows Vista RSA key generation implementation #258
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#618, SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          +ALG[RSASSA-PSS]: SIG(gen); 2048 , 3072 , 4096 , SHS: SHA-256Val#618, SHA-384Val#618, SHA-512Val#618
          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#618, SHA-256Val#618, SHA-384Val#618, SHA-512Val#618
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#257.
          Windows Vista CNG algorithms #257
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:
          SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#618, SHA-256Val#618, SHA-384Val#618, SHA-512Val#618,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#255.
          Windows Vista Enhanced Cryptographic Provider (RSAENH) #255
          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#613
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#613, SHA-384Val#613, SHA-512Val#613,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#613, SHA-256Val#613, SHA-384Val#613, SHA-512Val#613,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#245.
          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #245
          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#589
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#589, SHA-384Val#589, SHA-512Val#589,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#589, SHA-256Val#589, SHA-384Val#589, SHA-512Val#589,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#230.
          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #230
          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#578
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#578, SHA-384Val#578, SHA-512Val#578,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#578, SHA-256Val#578, SHA-384Val#578, SHA-512Val#578,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#222.
          Windows CE and Windows Mobile 6 and Windows Mobile 6.1 Enhanced Cryptographic Provider (RSAENH) #222
          FIPS186-2:
          +ALG[RSASSA-PKCS1_V1_5]:

          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#364
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#81.
          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #81
          FIPS186-2:
          +ALG[ANSIX9.31]:

          +SIG(ver); 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#305
          +ALG[RSASSA-PKCS1_V1_5]: SIG(gen) 2048 , 3072 , 4096 , SHS: SHA-256Val#305, SHA-384Val#305, SHA-512Val#305,
          +SIG(ver): 1024 , 1536 , 2048 , 3072 , 4096 , SHS: SHA-1Val#305, SHA-256Val#305, SHA-384Val#305, SHA-512Val#305,
          +Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical RSA List Val#52.
          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #52

          FIPS186-2:

          +

          – PKCS#1 v1.5, signature generation and verification

          +

          – Mod sizes: 1024, 1536, 2048, 3072, 4096

          +

          – SHS: SHA–1/256/384/512

          Windows XP, vendor-affirmed

          +

          Windows 2000, vendor-affirmed

          + + +#### Secure Hash Standard (SHS) + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • SHA-1:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-256:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-384:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-512:
          • +
            • +
            • Supports Empty Message
            • +
          • +

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #4011

          +

          Version 10.0.15063.674

            +
          • SHA-1:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-256:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-384:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-512:
          • +
            • +
            • Supports Empty Message
            • +
          • +

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #4010

          +

          Version 10.0.15254

            +
          • SHA-1:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-256:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-384:
          • +
            • +
            • Supports Empty Message
            • +
          • +
          • SHA-512:
          • +
            • +
            • Supports Empty Message
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #4009

          +

          Version 10.0.16299

          SHA-1      (BYTE-only)
          +SHA-256  (BYTE-only)
          +SHA-384  (BYTE-only)
          +SHA-512  (BYTE-only)

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #3790

          +

          Version 10.0.15063

          SHA-1      (BYTE-only)
          +SHA-256  (BYTE-only)
          +SHA-384  (BYTE-only)
          +SHA-512  (BYTE-only)

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3652

          +

          Version 7.00.2872

          SHA-1      (BYTE-only)
          +SHA-256  (BYTE-only)
          +SHA-384  (BYTE-only)
          +SHA-512  (BYTE-only)

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #3651

          +

          Version 8.00.6246

          SHA-1      (BYTE-only)
          +SHA-256  (BYTE-only)
          +SHA-384  (BYTE-only)
          +SHA-512  (BYTE-only)

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3649

          +

          Version 7.00.2872

          SHA-1      (BYTE-only)
          +SHA-256  (BYTE-only)
          +SHA-384  (BYTE-only)
          +SHA-512  (BYTE-only)

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #3648

          +

          Version 8.00.6246

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #3347
          +Version 10.0.14393
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update RSA32 Algorithm Implementations #3346
          +Version 10.0.14393
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub RSA32 Algorithm Implementations #3048
          +Version 10.0.10586
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #3047
          +Version 10.0.10586
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #2886
          +Version 10.0.10240
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 RSA32 Algorithm Implementations #2871
          +Version 10.0.10240
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry RSA32 Algorithm Implementations #2396
          +Version 6.3.9600
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #2373
          +Version 6.3.9600

          SHA-1 (BYTE-only)

          +

          SHA-256 (BYTE-only)

          +

          SHA-384 (BYTE-only)

          +

          SHA-512 (BYTE-only)

          +

          Implementation does not support zero-length (null) messages.

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1903

          +

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1902

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1774

          +

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1773

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)

          Windows 7and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1081

          +

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #816

          SHA-1 (BYTE-only)

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #785

          +

          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #784

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)
          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #783
          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)

          Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #753

          +

          Windows Vista Symmetric Algorithm Implementation #618

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)

          Windows Vista BitLocker Drive Encryption #737

          +

          Windows Vista Beta 2 BitLocker Drive Encryption #495

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #613

          +

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #364

          SHA-1 (BYTE-only)

          Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #611

          +

          Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #610

          +

          Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #385

          +

          Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #371

          +

          Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #181

          +

          Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #177

          +

          Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #176

          SHA-1 (BYTE-only)
          +SHA-256 (BYTE-only)
          +SHA-384 (BYTE-only)
          +SHA-512 (BYTE-only)

          Windows CE 6.0 and Windows CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #589

          +

          Windows CE and Windows Mobile 6 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #578

          +

          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #305

          SHA-1 (BYTE-only)

          Windows XP Microsoft Enhanced Cryptographic Provider #83

          +

          Crypto Driver for Windows 2000 (fips.sys) #35

          +

          Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #32

          +

          Windows 2000 RSAENH.DLL #24

          +

          Windows 2000 RSABASE.DLL #23

          +

          Windows NT 4 SP6 RSAENH.DLL #21

          +

          Windows NT 4 SP6 RSABASE.DLL #20

          + + +#### Triple DES + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Modes / States / Key SizesAlgorithm Implementation and Certificate #
            +
          • TDES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-CFB64:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-CFB8:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-ECB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #2558

          +

          Version 10.0.15063.674

            +
          • TDES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-CFB64:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-CFB8:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-ECB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #2557

          +

          Version 10.0.15254

            +
          • TDES-CBC:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-CFB64:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-CFB8:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +
          • TDES-ECB:
          • +
            • +
            • Modes: Decrypt, Encrypt
            • +
            • Keying Option: 1
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #2556

          +

          Version 10.0.16299

          TECB( KO 1 e/d, ) ; TCBC( KO 1 e/d, ) ; TCFB8( KO 1 e/d, ) ; TCFB64( KO 1 e/d, )

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #2459

          +

          Version 10.0.15063

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, )

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2384

          +

          Version 8.00.6246

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, )

          Windows Embedded Compact Enhanced Cryptographic Provider (RSAENH) #2383

          +

          Version 8.00.6246

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, ) ;

          +

          CTR ( int only )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2382

          +

          Version 7.00.2872

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, )

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #2381

          +

          Version 8.00.6246

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, ) ;

          +

          TCFB8( KO 1 e/d, ) ;

          +

          TCFB64( KO 1 e/d, )

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update SymCrypt Cryptographic Implementations #2227
          +
          +

          +

          Version 10.0.14393

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, ) ;

          +

          TCFB8( KO 1 e/d, ) ;

          +

          TCFB64( KO 1 e/d, )

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub and Surface Hub SymCrypt Cryptographic Implementations #2024
          +
          +

          +

          Version 10.0.10586

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, ) ;

          +

          TCFB8( KO 1 e/d, ) ;

          +

          TCFB64( KO 1 e/d, )

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 SymCrypt Cryptographic Implementations #1969
          +
          +

          +

          Version 10.0.10240

          TECB( KO 1 e/d, ) ;

          +

          TCBC( KO 1 e/d, ) ;

          +

          TCFB8( KO 1 e/d, ) ;

          +

          TCFB64( KO 1 e/d, )

          Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 SymCrypt Cryptographic Implementations #1692

          +

          Version 6.3.9600

          TECB( e/d; KO 1,2 ) ;

          +

          TCBC( e/d; KO 1,2 ) ;

          +

          TCFB8( e/d; KO 1,2 ) ;

          +

          TCFB64( e/d; KO 1,2 )

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Next Generation Symmetric Cryptographic Algorithms Implementations (SYMCRYPT) #1387

          TECB( e/d; KO 1,2 ) ;

          +

          TCBC( e/d; KO 1,2 ) ;

          +

          TCFB8( e/d; KO 1,2 )

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Symmetric Algorithm Implementations (RSA32) #1386

          TECB( e/d; KO 1,2 ) ;

          +

          TCBC( e/d; KO 1,2 ) ;

          +

          TCFB8( e/d; KO 1,2 )

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #846

          TECB( e/d; KO 1,2 ) ;

          +

          TCBC( e/d; KO 1,2 ) ;

          +

          TCFB8( e/d; KO 1,2 )

          Windows Vista SP1 and Windows Server 2008 Symmetric Algorithm Implementation #656

          TECB( e/d; KO 1,2 ) ;

          +

          TCBC( e/d; KO 1,2 ) ;

          +

          TCFB8( e/d; KO 1,2 )

          Windows Vista Symmetric Algorithm Implementation #549
          Triple DES MAC

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 #1386, vendor-affirmed

          +

          Windows 7 and SP1 and Windows Server 2008 R2 and SP1 #846, vendor-affirmed

          TECB( e/d; KO 1,2 ) ;

          +

          TCBC( e/d; KO 1,2 )

          Windows Embedded Compact 7 Enhanced Cryptographic Provider (RSAENH) #1308

          +

          Windows Embedded Compact 7 Cryptographic Primitives Library (bcrypt.dll) #1307

          +

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #691

          +

          Windows XP Professional SP3 Kernel Mode Cryptographic Module (fips.sys) #677

          +

          Windows XP Professional SP3 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #676

          +

          Windows XP Professional SP3 Enhanced Cryptographic Provider (RSAENH) #675

          +

          Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #544

          +

          Windows Server 2003 SP2 Enhanced DSS and Diffie-Hellman Cryptographic Provider #543

          +

          Windows Server 2003 SP2 Kernel Mode Cryptographic Module (fips.sys) #542

          +

          Windows CE 6.0 and Window CE 6.0 R2 and Windows Mobile Enhanced Cryptographic Provider (RSAENH) #526

          +

          Windows CE and Windows Mobile 6 and Windows Mobile 6.1 and Windows Mobile 6.5 Enhanced Cryptographic Provider (RSAENH) #517

          +

          Windows Server 2003 SP1 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #381

          +

          Windows Server 2003 SP1 Kernel Mode Cryptographic Module (fips.sys) #370

          +

          Windows Server 2003 SP1 Enhanced Cryptographic Provider (RSAENH) #365

          +

          Windows CE 5.00 and Windows CE 5.01 Enhanced Cryptographic Provider (RSAENH) #315

          +

          Windows Server 2003 Kernel Mode Cryptographic Module (fips.sys) #201

          +

          Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) #199

          +

          Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) #192

          +

          Windows XP Microsoft Enhanced Cryptographic Provider #81

          +

          Windows 2000 Microsoft Outlook Cryptographic Provider (EXCHCSP.DLL) SR-1A (3821) #18

          +

          Crypto Driver for Windows 2000 (fips.sys) #16

          + + +#### SP 800-132 Password Based Key Derivation Function (PBKDF) + + + + + + + + + + + + + + +
          + Modes / States / Key Sizes + + Algorithm Implementation and Certificate # +
          + PBKDF (vendor affirmed) +

           Kernel Mode Cryptographic Primitives Library (cng.sys) Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2937
          (Software Version: 10.0.14393)

          +

          Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936
          (Software Version: 10.0.14393)

          +

          Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2935
          (Software Version: 10.0.14393)

          +

          Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2931
          (Software Version: 10.0.14393)

          +
          + PBKDF (vendor affirmed) +

          Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 #2936
          (Software Version: 10.0.14393)

          +

          Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG), vendor-affirmed

          +
          + + +#### Component Validation List + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
          Publication / Component Validated / DescriptionImplementation and Certificate #
            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

          Prerequisite: DRBG #489

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #1540

          +

          Version 6.3.9600

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Microsoft Surface Hub Virtual TPM Implementations #1519

          +

          Version 10.0.15063.674

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations #1518

          +

          Version 10.0.16299

            +
          • RSADP:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
          • +

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1517

          +

          Version 10.0.15063.674

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1516

          +

          Version 10.0.15063.674

            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

           Prerequisite: DRBG #1732

          Microsoft Surface Hub MsBignum Cryptographic Implementations #1515

          +

          Version 10.0.15063.674

            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

          Prerequisite: DRBG #1732

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1514

          +

          Version 10.0.15063.674

            +
          • RSADP:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
          • +

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1513

          +

          Version 10.0.15063.674

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1512

          +

          Version 10.0.15063.674

            +
          • IKEv1:
          • +
            • +
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • +
            • Pre-shared Key Length: 64-2048
            • +
            • Diffie-Hellman shared secrets:
            • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 2048 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 256 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 384 (bits)
                • +
                • SHA Functions: SHA-384
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, HMAC #3269

          +
            +
          • IKEv2:
          • +
            • +
            • Derived Keying Material length: 192-1792
            • +
            • Diffie-Hellman shared secrets:
            • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 2048 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 256 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 384 (bits)
                • +
                • SHA Functions: SHA-384
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, HMAC #3269

          +
            +
          • TLS:
          • +
            • +
            • Supports TLS 1.0/1.1
            • +
            • Supports TLS 1.2:
            • +
              • +
              • SHA Functions: SHA-256, SHA-384
              • +
            • +
          • +
          +

          Prerequisite: SHS #4011, HMAC #3269

          Microsoft Surface Hub SymCrypt Cryptographic Implementations #1511

          +

          Version 10.0.15063.674

            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

          Prerequisite: DRBG #1731

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1510

          +

          Version 10.0.15254

            +
          • RSADP:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
          • +

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1509

          +

          Version 10.0.15254

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1508

          +

          Version 10.0.15254

            +
          • IKEv1:
          • +
            • +
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • +
            • Pre-shared Key Length: 64-2048
            • +
            • Diffie-Hellman shared secrets:
            • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 2048 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 256 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 384 (bits)
                • +
                • SHA Functions: SHA-384
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, HMAC #3268

          +
            +
          • IKEv2:
          • +
            • +
            • Derived Keying Material length: 192-1792
            • +
            • Diffie-Hellman shared secrets:
            • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 2048 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 256 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 384 (bits)
                • +
                • SHA Functions: SHA-384
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, HMAC #3268

          +
            +
          • TLS:
          • +
            • +
            • Supports TLS 1.0/1.1
            • +
            • Supports TLS 1.2:
            • +
              • +
              • SHA Functions: SHA-256, SHA-384
              • +
            • +
          • +
          +

          Prerequisite: SHS #4010, HMAC #3268

          Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations #1507

          +

          Version 10.0.15254

            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

          Prerequisite: DRBG #1731

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1506

          +

          Version 10.0.15254

            +
          • RSADP:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
          • +

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1505

          +

          Version 10.0.15254

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations #1504

          +

          Version 10.0.15254

            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

          Prerequisite: DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1503

          +

          Version 10.0.16299

            +
          • RSADP:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1502

          +

          Version 10.0.16299

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations #1501

          +

          Version 10.0.16299

            +
          • ECDSA SigGen:
          • +
            • +
            • P-256 SHA: SHA-256
            • +
            • P-384 SHA: SHA-384
            • +
            • P-521 SHA: SHA-512
            • +
          • +
          +

          Prerequisite: DRBG #1730

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1499

          +

          Version 10.0.16299

            +
          • RSADP:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations #1498

          +

          Version 10.0.16299

          +

           

            +
          • RSASP1:
          • +
            • +
            • Modulus Size: 2048 (bits)
            • +
            • Padding Algorithms: PKCS 1.5
            • +
          • +

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations  #1497

          +

          Version 10.0.16299

            +
          • IKEv1:
          • +
            • +
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • +
            • Pre-shared Key Length: 64-2048
            • +
            • Diffie-Hellman shared secrets:
            • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 2048 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 256 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 384 (bits)
                • +
                • SHA Functions: SHA-384
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, HMAC #3267

          +
            +
          • IKEv2:
          • +
            • +
            • Derived Keying Material length: 192-1792
            • +
            • Diffie-Hellman shared secrets:
            • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 2048 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 256 (bits)
                • +
                • SHA Functions: SHA-256
                • +
              • +
              • Diffie-Hellman shared secret:
              • +
                • +
                • Length: 384 (bits)
                • +
                • SHA Functions: SHA-384
                • +
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, HMAC #3267

          +
            +
          • TLS:
          • +
            • +
            • Supports TLS 1.0/1.1
            • +
            • Supports TLS 1.2:
            • +
              • +
              • SHA Functions: SHA-256, SHA-384
              • +
            • +
          • +
          +

          Prerequisite: SHS #4009, HMAC #3267

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations  #1496

          +

          Version 10.0.16299

          FIPS186-4 ECDSA

          +

          Signature Generation of hash sized messages

          +

          ECDSA SigGen Component: CURVES( P-256 P-384 P-521 )

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1284
          +Version 10.0. 15063

          +

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1279
          +Version 10.0. 15063

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #922
          +Version 10.0.14393

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #894
          +Version 10.0.14393icrosoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #666
          +Version 10.0.10586

          +

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations #288
          +Version 6.3.9600

          FIPS186-4 RSA; PKCS#1 v2.1

          +

          RSASP1 Signature Primitive

          +

          RSASP1: (Mod2048: PKCS1.5 PKCSPSS)

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations #1285
          +Version 10.0.15063

          +

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1282
          +Version 10.0.15063

          +

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1280
          +Version 10.0.15063

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #893
          +Version 10.0.14393

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations #888
          +Version 10.0.14393

          +

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” MsBignum Cryptographic Implementations #665
          +Version 10.0.10586

          +

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 MsBignum Cryptographic Implementations #572
          +Version  10.0.10240

          +

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry MsBignum Cryptographic Implementations #289
          +Version 6.3.9600

          FIPS186-4 RSA; RSADP

          +

          RSADP Primitive

          +

          RSADP: (Mod2048)

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations #1283
          +Version 10.0.15063

          +

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1281
          +Version 10.0.15063

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations #895
          +Version 10.0.14393

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update Cryptography Next Generation (CNG) Implementations #887
          +Version 10.0.14393

          +

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” Cryptography Next Generation (CNG) Implementations #663
          +Version 10.0.10586

          +

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 Cryptography Next Generation (CNG) Implementations #576
          +Version  10.0.10240

          SP800-135

          +

          Section 4.1.1, IKEv1 Section 4.1.2, IKEv2 Section 4.2, TLS

          Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations  #1496

          +

          Version 10.0.16299

          +

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations #1278
          +Version 10.0.15063

          +

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1140
          +Version 7.00.2872

          +

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll) #1139
          +Version 8.00.6246

          +

          Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update BcryptPrimitives and NCryptSSLp #886
          +Version 10.0.14393

          +

          Microsoft Windows 10 November 2015 Update; Microsoft Surface Book, Surface Pro 4, Surface Pro 3, Surface 3, Surface Pro 2, and Surface Pro w/ Windows 10 November 2015 Update; Windows 10 Mobile for Microsoft Lumia 950 and Microsoft Lumia 635; Windows 10 for Microsoft Surface Hub 84” and Surface Hub 55” BCryptPrimitives and NCryptSSLp #664
          +Version 10.0.10586

          +

          Microsoft Windows 10, Microsoft Surface Pro 3 with Windows 10, Microsoft Surface 3 with Windows 10, Microsoft Surface Pro 2 with Windows 10, Microsoft Surface Pro with Windows 10 BCryptPrimitives and NCryptSSLp #575
          +Version  10.0.10240

          +

          Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 BCryptPrimitives and NCryptSSLp #323
          +Version 6.3.9600

          + + +## References + +\[[FIPS 140](http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf)\] - FIPS 140-2, Security Requirements for Cryptographic Modules + +\[[FIPS FAQ](http://csrc.nist.gov/groups/stm/cmvp/documents/cmvpfaq.pdf)\] - Cryptographic Module Validation Program (CMVP) FAQ + +\[[SP 800-57](http://csrc.nist.gov/publications/pubssps.html#800-57-part1)\] - Recommendation for Key Management – Part 1: General (Revised) + +\[[SP 800-131A](http://csrc.nist.gov/publications/nistpubs/800-131a/sp800-131a.pdf)\] - Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths + +## Additional Microsoft References + +Enabling FIPS mode - + +Cipher Suites in Schannel - [https://msdn.microsoft.com/library/aa374757(VS.85).aspx](https://msdn.microsoft.com/library/aa374757\(vs.85\).aspx) + diff --git a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md index fffb9de72c..edc1463dfc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md @@ -1,57 +1,57 @@ ---- -title: Overview of Configuration score in Microsoft Defender Security Center -ms.reviewer: -description: Expand your visibility into the overall security configuration posture of your organization -keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: mjcaparas -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 04/11/2019 ---- -# Configuration score -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -[!include[Prerelease information](prerelease.md)] - ->[!NOTE] -> Secure score is now part of Threat & Vulnerability Management as Configuration score. We’ll keep the secure score page available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection) page. - -The Microsoft Defender Advanced Threat Protection Configuration score gives you visibility and control over your organization's security posture based on security best practices. - -Your configuration score widget shows the collective security configuration state of your machines across the following categories: -- Application -- Operating system -- Network -- Accounts -- Security controls - -## How it works - -What you'll see in the configuration score widget is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously: -- Compare collected configurations to the collected benchmarks to discover misconfigured assets -- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction) by remediating the misconfiguration -- Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams) -- Collect and monitor changes of security control configuration state from all assets - -From the widget, you'd be able to see which security aspect require attention. You can click the configuration score categories and it will take you to the **Security recommendations** page to see more details and understand the context of the issue. From there, you can take action based on security benchmarks. - -## Improve your configuration score -The goal is to improve your configuration score by remediating the issues in the security recommendations list. You can filter the view based on: -- **Related component** - **Accounts**, **Application**, **Network**, **OS**, or **Security controls** -- **Remediation type** - **Configuration change** or **Software update** - -## Related topics -- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) -- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) -- [Scenarios](threat-and-vuln-mgt-scenarios.md) +--- +title: Overview of Configuration score in Microsoft Defender Security Center +ms.reviewer: +description: Expand your visibility into the overall security configuration posture of your organization +keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mjcaparas +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +ms.date: 04/11/2019 +--- +# Configuration score +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + +>[!NOTE] +> Secure score is now part of Threat & Vulnerability Management as Configuration score. We’ll keep the secure score page available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection) page. + +The Microsoft Defender Advanced Threat Protection Configuration score gives you visibility and control over your organization's security posture based on security best practices. + +Your configuration score widget shows the collective security configuration state of your machines across the following categories: +- Application +- Operating system +- Network +- Accounts +- Security controls + +## How it works + +What you'll see in the configuration score widget is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously: +- Compare collected configurations to the collected benchmarks to discover misconfigured assets +- Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction) by remediating the misconfiguration +- Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams) +- Collect and monitor changes of security control configuration state from all assets + +From the widget, you'd be able to see which security aspect require attention. You can click the configuration score categories and it will take you to the **Security recommendations** page to see more details and understand the context of the issue. From there, you can take action based on security benchmarks. + +## Improve your configuration score +The goal is to improve your configuration score by remediating the issues in the security recommendations list. You can filter the view based on: +- **Related component** - **Accounts**, **Application**, **Network**, **OS**, or **Security controls** +- **Remediation type** - **Configuration change** or **Software update** + +## Related topics +- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) +- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) +- [Scenarios](threat-and-vuln-mgt-scenarios.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm.md index d1a14f1f7d..0911a2d722 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm.md @@ -1,45 +1,45 @@ ---- -title: Configure Threat & Vulnerability Management in Microsoft Defender ATP -ms.reviewer: -description: Configure your Threat & Vulnerability Management to allow security administrators and IT administrators to collaborate seamlessly to remediate issues via Microsoft intune and Microsoft System Center Configuration Manager (SCCM) integrations. -keywords: RBAC, Threat & Vulnerability Management configuration, Threat & Vulnerability Management integrations, Microsft Intune integration with TVM, SCCM integration with TVM -search.product: Windows 10 -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: mjcaparas -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- -# Configure Threat & Vulnerability Management -**Applies to:** -- [Microsoft Defender Advanced Threat Protection Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -[!include[Prerelease information](prerelease.md)] - -This section guides you through the steps you need to take to configure Threat & Vulnerability Management's integration with Microsoft Intune or Microsoft System Center Configuration Manager (SCCM) for a seamless collaboration of issue remediation. - -### Before you begin -> [!IMPORTANT] -> Threat & Vulnerability Management data currently supports Windows 10 machines. Upgrade to Windows 10 to account for the rest of your devices’ threat and vulnerability exposure data.
          - -Ensure that you have the right RBAC permissions to configure your Threat & Vulnerability Management integration with Microsoft Intune or Microsoft System Center Configuration Manager (SCCM). - ->[!WARNING] ->Only Intune and SCCM enrolled devices are supported in this scenario.
          ->Use any of the following options to enroll devices in Intune: ->- IT Admin: For more information on how to enabling auto-enrollment, see [Windows Enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment) ->- End-user: For more information on how to enroll your Windows 10 device in Intune, see [Enroll your Windows 10 device in Intune](https://docs.microsoft.com/intune-user-help/enroll-your-w10-device-access-work-or-school) ->- End-user alternative: For more information on joining an Azure AD domain, see [Set up Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/device-management-azuread-joined-devices-setup). - -## Related topics -- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) -- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) -- [Configuration score](configuration-score.md) -- [Scenarios](threat-and-vuln-mgt-scenarios.md) +--- +title: Configure Threat & Vulnerability Management in Microsoft Defender ATP +ms.reviewer: +description: Configure your Threat & Vulnerability Management to allow security administrators and IT administrators to collaborate seamlessly to remediate issues via Microsoft intune and Microsoft System Center Configuration Manager (SCCM) integrations. +keywords: RBAC, Threat & Vulnerability Management configuration, Threat & Vulnerability Management integrations, Microsft Intune integration with TVM, SCCM integration with TVM +search.product: Windows 10 +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mjcaparas +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- +# Configure Threat & Vulnerability Management +**Applies to:** +- [Microsoft Defender Advanced Threat Protection Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + +This section guides you through the steps you need to take to configure Threat & Vulnerability Management's integration with Microsoft Intune or Microsoft System Center Configuration Manager (SCCM) for a seamless collaboration of issue remediation. + +### Before you begin +> [!IMPORTANT] +> Threat & Vulnerability Management data currently supports Windows 10 machines. Upgrade to Windows 10 to account for the rest of your devices’ threat and vulnerability exposure data.
          + +Ensure that you have the right RBAC permissions to configure your Threat & Vulnerability Management integration with Microsoft Intune or Microsoft System Center Configuration Manager (SCCM). + +>[!WARNING] +>Only Intune and SCCM enrolled devices are supported in this scenario.
          +>Use any of the following options to enroll devices in Intune: +>- IT Admin: For more information on how to enabling auto-enrollment, see [Windows Enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment) +>- End-user: For more information on how to enroll your Windows 10 device in Intune, see [Enroll your Windows 10 device in Intune](https://docs.microsoft.com/intune-user-help/enroll-your-w10-device-access-work-or-school) +>- End-user alternative: For more information on joining an Azure AD domain, see [Set up Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/device-management-azuread-joined-devices-setup). + +## Related topics +- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) +- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) +- [Configuration score](configuration-score.md) +- [Scenarios](threat-and-vuln-mgt-scenarios.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md index 149999abec..c431ecb195 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response-command-examples.md @@ -1,212 +1,212 @@ ---- -title: Live response command examples -description: Learn about common commands and see examples on how it's used -keywords: example, command, cli, remote, shell, connection, live, response, real-time, command, script, remediate, hunt, export, log, drop, download, file -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Live response command examples - -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) - - -Learn about common commands used in live response and see examples on how they are typically used. - -Depending on the role that's been granted to you, you can run basic or advanced live response commands. For more information on basic and advanced commands, see [Investigate entities on machines using live response](live-response.md). - - -## analyze - -``` -# Analyze the file malware.txt -analyze file c:\Users\user\Desktop\malware.txt -``` - -``` -# Analyze the process by PID -analyze process 1234 -``` - -## connections - -``` -# List active connections in json format using parameter name -connections -output json -``` - -``` -# List active connections in json format without parameter name -connections json -``` - -## dir - -``` -# List files and sub-folders in the current folder -dir -``` - -``` -# List files and sub-folders in a specific folder -dir C:\Users\user\Desktop\ -``` - -``` -# List files and subfolders in the current folder in json format -dir -output json -``` - -## fileinfo - -``` -# Display information about a file -fileinfo C:\Windows\notepad.exe -``` - -## findfile - -``` -# Find file by name -findfile test.txt -``` - -## getfile - -``` -# Download a file from a machine -getfile c:\Users\user\Desktop\work.txt -``` - -``` -# Download a file from a machine, automatically run prerequisite commands -getfile c:\Users\user\Desktop\work.txt -auto -``` - -## processes -``` -# Show all processes -processes -``` - -``` -# Get process by pid -processes 123 -``` - -``` -# Get process by pid with argument name -processes -pid 123 -``` - -``` -# Get process by name -processes -name notepad.exe -``` - -## putfile - -``` -# Upload file from library -putfile get-process-by-name.ps1 -``` - -``` -# Upload file from library, overwrite file if it exists -putfile get-process-by-name.ps1 -overwrite -``` - -``` -# Upload file from library, keep it on the machine after a restart -putfile get-process-by-name.ps1 -keep -``` - -## registry - -``` -# Show information about the values in a registry key -registry HKEY_CURRENT_USER\Console -``` - -``` -# Show information about a specific registry value -registry HKEY_CURRENT_USER\Console\\ScreenBufferSize -``` - - -## remediate - -``` -# Remediate file in specific path -remediate file c:\Users\user\Desktop\malware.exe -``` - -``` -# Remediate process with specific PID -remediate process 7960 -``` - -``` -# See list of all remediated entities -remediate list -``` - -## run - -``` -# Run PowerShell script from the library without arguments -run script.ps1 -``` - -``` -# Run PowerShell script from the library with arguments -run get-process-by-name.ps1 -parameters "-processName Registry" -``` - -## scheduledtask - -``` -# Get all scheduled tasks -scheduledtasks -``` - -``` -# Get specific scheduled task by location and name -scheduledtasks Microsoft\Windows\Subscription\LicenseAcquisition -``` - -``` -# Get specific scheduled task by location and name with spacing -scheduledtasks "Microsoft\Configuration Manager\Configuration Manager Health Evaluation" -``` - - -## undo - -``` -# Restore remediated registry -undo registry HKEY_CURRENT_USER\Console\ScreenBufferSize -``` - -``` -# Restore remediated scheduledtask -undo scheduledtask Microsoft\Windows\Subscription\LicenseAcquisition -``` - -``` -# Restore remediated file -undo file c:\Users\user\Desktop\malware.exe -``` - +--- +title: Live response command examples +description: Learn about common commands and see examples on how it's used +keywords: example, command, cli, remote, shell, connection, live, response, real-time, command, script, remediate, hunt, export, log, drop, download, file +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Live response command examples + +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf) + + +Learn about common commands used in live response and see examples on how they are typically used. + +Depending on the role that's been granted to you, you can run basic or advanced live response commands. For more information on basic and advanced commands, see [Investigate entities on machines using live response](live-response.md). + + +## analyze + +``` +# Analyze the file malware.txt +analyze file c:\Users\user\Desktop\malware.txt +``` + +``` +# Analyze the process by PID +analyze process 1234 +``` + +## connections + +``` +# List active connections in json format using parameter name +connections -output json +``` + +``` +# List active connections in json format without parameter name +connections json +``` + +## dir + +``` +# List files and sub-folders in the current folder +dir +``` + +``` +# List files and sub-folders in a specific folder +dir C:\Users\user\Desktop\ +``` + +``` +# List files and subfolders in the current folder in json format +dir -output json +``` + +## fileinfo + +``` +# Display information about a file +fileinfo C:\Windows\notepad.exe +``` + +## findfile + +``` +# Find file by name +findfile test.txt +``` + +## getfile + +``` +# Download a file from a machine +getfile c:\Users\user\Desktop\work.txt +``` + +``` +# Download a file from a machine, automatically run prerequisite commands +getfile c:\Users\user\Desktop\work.txt -auto +``` + +## processes +``` +# Show all processes +processes +``` + +``` +# Get process by pid +processes 123 +``` + +``` +# Get process by pid with argument name +processes -pid 123 +``` + +``` +# Get process by name +processes -name notepad.exe +``` + +## putfile + +``` +# Upload file from library +putfile get-process-by-name.ps1 +``` + +``` +# Upload file from library, overwrite file if it exists +putfile get-process-by-name.ps1 -overwrite +``` + +``` +# Upload file from library, keep it on the machine after a restart +putfile get-process-by-name.ps1 -keep +``` + +## registry + +``` +# Show information about the values in a registry key +registry HKEY_CURRENT_USER\Console +``` + +``` +# Show information about a specific registry value +registry HKEY_CURRENT_USER\Console\\ScreenBufferSize +``` + + +## remediate + +``` +# Remediate file in specific path +remediate file c:\Users\user\Desktop\malware.exe +``` + +``` +# Remediate process with specific PID +remediate process 7960 +``` + +``` +# See list of all remediated entities +remediate list +``` + +## run + +``` +# Run PowerShell script from the library without arguments +run script.ps1 +``` + +``` +# Run PowerShell script from the library with arguments +run get-process-by-name.ps1 -parameters "-processName Registry" +``` + +## scheduledtask + +``` +# Get all scheduled tasks +scheduledtasks +``` + +``` +# Get specific scheduled task by location and name +scheduledtasks Microsoft\Windows\Subscription\LicenseAcquisition +``` + +``` +# Get specific scheduled task by location and name with spacing +scheduledtasks "Microsoft\Configuration Manager\Configuration Manager Health Evaluation" +``` + + +## undo + +``` +# Restore remediated registry +undo registry HKEY_CURRENT_USER\Console\ScreenBufferSize +``` + +``` +# Restore remediated scheduledtask +undo scheduledtask Microsoft\Windows\Subscription\LicenseAcquisition +``` + +``` +# Restore remediated file +undo file c:\Users\user\Desktop\malware.exe +``` + diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index d629bea4c6..d3ed3224e5 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -1,255 +1,255 @@ ---- -title: Investigate entities on machines using live response in Microsoft Defender ATP -description: Access a machine using a secure remote shell connection to do investigative work and take immediate response actions on a machine in real-time. -keywords: remote, shell, connection, live, response, real-time, command, script, remediate, hunt, export, log, drop, download, file, -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Investigate entities on machines using live response - -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -[!include[Prerelease information](prerelease.md)] - - -Live response is a capability that gives you instantaneous access to a machine using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats – real-time. - -Live response is designed to enhance investigations by enabling you to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats. - -With live response, analysts will have the ability to: -- Run basic and advanced commands to do investigative work -- Download files such as malware samples and outcomes of PowerShell scripts -- Upload a PowerShell script or executable to the library and run it on the machine from a tenant level -- Take or undo remediation actions - - -## Before you begin -Before you can initiate a session on a machine, make sure you fulfill the following requirements: - -- Machines must be Windows 10, version 18323 (also known as Windows 10 19H1) or later. - -- **Enable live response from the settings page**
          -You'll need to enable the live response capability in the [Advanced features settings](advanced-features.md) page. - - >[!NOTE] - >Only users with manage security or global admin roles can edit these settings. - -- **Enable live response unsigned script execution** (optional)
          - - >[!WARNING] - >Allowing the use of unsigned scripts may increase your exposure to threats. - - Running unsigned scripts is generally not recommended as it can increase your exposure to threats. If you must use them however, you'll need to enable the setting in the [Advanced features settings](advanced-features.md) page. - -- **Ensure that you have the appropriate permissions**
          - Only users who have been provisioned with the appropriate permissions can initiate a session. For more information on role assignments see, [Create and manage roles](user-roles.md). - - Depending on the role that's been granted to you, you can run basic or advanced live response commands. Users permission are controlled by RBAC custom role. - -## Live response dashboard overview -When you initiate a live response session on a machine, a dashboard opens. The dashboard provides information about the session such as: - -- Who created the session -- When the session started -- The duration of the session - -The dashboard also gives you access to: -- Disconnect session -- Upload files to the library -- Command console -- Command log - - -## Initiate a live response session on a machine - -1. Log in to Microsoft Defender Security Center. -2. Navigate to the machines list page and select a machine to investigate. The machine page opens. - - >[!NOTE] - >Machines must be on Windows 10, version 18323 (also known as Windows 10 19H1) or later. - -2. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the machine. -3. Use the built-in commands to do investigative work. For more information see, [Live response commands](#live-response-commands). -4. After completing your investigation, select **Disconnect session**, then select **Confirm**. - - - -## Live response commands -Depending on the role that's been granted to you, you can run basic or advanced live response commands. User permissions are controlled by RBAC custom roles. For more information on role assignments see, [Create and manage roles](user-roles.md). - -### Basic commands -The following commands are available for user roles that's been granted the ability to run **basic** live response commands. For more information on role assignments see, [Create and manage roles](user-roles.md). - -Command | Description -:---|:---|:--- -cd | Changes the current directory. -cls | Clears the console screen. -connect | Initiates a live response session to the machine. -connections | Shows all the active connections. -dir | Shows a list of files and subdirectories in a directory -drivers | Shows all drivers installed on the machine. -fileinfo | Get information about a file. -findfile | Locates files by a given name on the machine. -help | Provides help information for live response commands. -persistence | Shows all known persistence methods on the machine. -processes | Shows all processes running on the machine. -registry | Shows registry values. -scheduledtasks| Shows all scheduled tasks on the machine. -services | Shows all services on the machine. -trace | Sets the terminal's logging mode to debug. - - -### Advanced commands -The following commands are available for user roles that's been granted the ability to run **advanced** live response commands. For more information on role assignments see, [Create and manage roles](user-roles.md). - -Command | Description -:---|:--- -analyze | Analyses the entity with various incrimination engines to reach a verdict. -getfile | Gets a file from the machine.
          NOTE: This command has a prerequisite command. You can use the `-auto` command in conjuction with `getfile` to automatically run the prerequisite command. -run | Runs a PowerShell script from the library on the machine. -library | Lists files that were uploaded to the live response library. -putfile | Puts a file from the library to the machine. Files are saved in a working folder and are deleted when the machine restarts by default. -remediate | Remediates an entity on the machine. The remediation action will vary depending on the entity type:
          - File: delete
          - Process: stop, delete image file
          - Service: stop, delete image file
          - Registry entry: delete
          - Scheduled task: remove
          - Startup folder item: delete file
          NOTE: This command has a prerequisite command. You can use the `-auto` command in conjuction with `remediate` to automatically run the prerequisite command. -undo | Restores an entity that was remediated. - - -## Use live response commands -The commands that you can use in the console follow similar principles as [Windows Commands](https://docs.microsoft.com/windows-server/administration/windows-commands/windows-commands#BKMK_c). - -The advanced commands offer a more robust set of actions that allow you to take more powerful actions such as download and upload a file, run scripts on the machine, and take remediation actions on an entity. - -### Get a file from the machine -For scenarios when you'd like get a file from a machine you're investigating, you can use the `getfile` command. This allows you to save the file from the machine for further investigation. - ->[!NOTE] ->There is a file size limit of 750mb. - -### Put a file in the library -Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level. - -Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them. - -You can have a collection of PowerShell scripts that can run on machines that you initiate live response sessions with. - -**To upload a file in the library:** -1. Click **Upload file to library**. -2. Click **Browse** and select the file. -3. Provide a brief description. -4. Specify if you'd like to overwrite a file with the same name. -5. If you'd like to be know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description. -6. Click **Confirm**. -7. (Optional) To verify that the file was uploaded to the library, run the `library` command. - - -### Cancel a command -Anytime during a session, you can cancel a command by pressing CTRL + C. - ->[!WARNING] ->Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled. - - - -### Automatically run prerequisite commands -Some commands have prerequisite commands to run. If you don't run the prerequisite command, you'll get an error. For example, running the `download` command without `fileinfo` will return an error. - -You can use the auto flag to automatically run prerequisite commands, for example: - -``` -getfile c:\Users\user\Desktop\work.txt -auto -``` - - -## Run a PowerShell script -Before you can run a PowerShell script, you must first upload it to the library. - -After uploading the script to the library, use the `run` command to run the script. - -If you plan to use an unsigned script in the session, you'll need to enable the setting in the [Advanced features settings](advanced-features.md) page. - ->[!WARNING] ->Allowing the use of unsigned scripts may increase your exposure to threats. - - - -## Apply command parameters -- View the console help to learn about command parameters. To learn about an individual command, run: - - `help ` - -- When applying parameters to commands, note that parameters are handled based on a fixed order: - - ` param1 param2` - -- When specifying parameters outside of the fixed order, specify the name of the parameter with a hyphen before providing the value: - - ` -param2_name param2` - -- When using commands that have prerequisite commands, you can use flags: - - ` -type file -id - auto` or `remediate file - auto`. - - - -## Supported output types -Live response supports table and JSON format output types. For each command, there's a default output behavior. You can modify the output in your preferred output format using the following commands: - -- `-output json` -- `-output table` - ->[!NOTE] ->Fewer fields are shown in table format due to the limited space. To see more details in the output, you can use the JSON output command so that more details are shown. - - -## Supported output pipes -Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt. - -Example: - -``` -processes > output.txt -``` - - - -## View the command log -Select the **Command log** tab to see the commands used on the machine during a session. -Each command is tracked with full details such as: -- ID -- Command line -- Duration -- Status and input or output side bar - - - - -## Limitations -- Live response sessions are limited to 10 live response sessions at a time -- Large scale command execution is not supported -- A user can only initiate one session at a time -- A machine can only be in one session at a time -- There is a file size limit of 750mb when downloading files from a machine - -## Related topic -- [Live response command examples](live-response-command-examples.md) - - - - - - - - - +--- +title: Investigate entities on machines using live response in Microsoft Defender ATP +description: Access a machine using a secure remote shell connection to do investigative work and take immediate response actions on a machine in real-time. +keywords: remote, shell, connection, live, response, real-time, command, script, remediate, hunt, export, log, drop, download, file, +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Investigate entities on machines using live response + +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + + +Live response is a capability that gives you instantaneous access to a machine using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions to promptly contain identified threats – real-time. + +Live response is designed to enhance investigations by enabling you to collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively hunt for emerging threats. + +With live response, analysts will have the ability to: +- Run basic and advanced commands to do investigative work +- Download files such as malware samples and outcomes of PowerShell scripts +- Upload a PowerShell script or executable to the library and run it on the machine from a tenant level +- Take or undo remediation actions + + +## Before you begin +Before you can initiate a session on a machine, make sure you fulfill the following requirements: + +- Machines must be Windows 10, version 18323 (also known as Windows 10 19H1) or later. + +- **Enable live response from the settings page**
          +You'll need to enable the live response capability in the [Advanced features settings](advanced-features.md) page. + + >[!NOTE] + >Only users with manage security or global admin roles can edit these settings. + +- **Enable live response unsigned script execution** (optional)
          + + >[!WARNING] + >Allowing the use of unsigned scripts may increase your exposure to threats. + + Running unsigned scripts is generally not recommended as it can increase your exposure to threats. If you must use them however, you'll need to enable the setting in the [Advanced features settings](advanced-features.md) page. + +- **Ensure that you have the appropriate permissions**
          + Only users who have been provisioned with the appropriate permissions can initiate a session. For more information on role assignments see, [Create and manage roles](user-roles.md). + + Depending on the role that's been granted to you, you can run basic or advanced live response commands. Users permission are controlled by RBAC custom role. + +## Live response dashboard overview +When you initiate a live response session on a machine, a dashboard opens. The dashboard provides information about the session such as: + +- Who created the session +- When the session started +- The duration of the session + +The dashboard also gives you access to: +- Disconnect session +- Upload files to the library +- Command console +- Command log + + +## Initiate a live response session on a machine + +1. Log in to Microsoft Defender Security Center. +2. Navigate to the machines list page and select a machine to investigate. The machine page opens. + + >[!NOTE] + >Machines must be on Windows 10, version 18323 (also known as Windows 10 19H1) or later. + +2. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the machine. +3. Use the built-in commands to do investigative work. For more information see, [Live response commands](#live-response-commands). +4. After completing your investigation, select **Disconnect session**, then select **Confirm**. + + + +## Live response commands +Depending on the role that's been granted to you, you can run basic or advanced live response commands. User permissions are controlled by RBAC custom roles. For more information on role assignments see, [Create and manage roles](user-roles.md). + +### Basic commands +The following commands are available for user roles that's been granted the ability to run **basic** live response commands. For more information on role assignments see, [Create and manage roles](user-roles.md). + +Command | Description +:---|:---|:--- +cd | Changes the current directory. +cls | Clears the console screen. +connect | Initiates a live response session to the machine. +connections | Shows all the active connections. +dir | Shows a list of files and subdirectories in a directory +drivers | Shows all drivers installed on the machine. +fileinfo | Get information about a file. +findfile | Locates files by a given name on the machine. +help | Provides help information for live response commands. +persistence | Shows all known persistence methods on the machine. +processes | Shows all processes running on the machine. +registry | Shows registry values. +scheduledtasks| Shows all scheduled tasks on the machine. +services | Shows all services on the machine. +trace | Sets the terminal's logging mode to debug. + + +### Advanced commands +The following commands are available for user roles that's been granted the ability to run **advanced** live response commands. For more information on role assignments see, [Create and manage roles](user-roles.md). + +Command | Description +:---|:--- +analyze | Analyses the entity with various incrimination engines to reach a verdict. +getfile | Gets a file from the machine.
          NOTE: This command has a prerequisite command. You can use the `-auto` command in conjuction with `getfile` to automatically run the prerequisite command. +run | Runs a PowerShell script from the library on the machine. +library | Lists files that were uploaded to the live response library. +putfile | Puts a file from the library to the machine. Files are saved in a working folder and are deleted when the machine restarts by default. +remediate | Remediates an entity on the machine. The remediation action will vary depending on the entity type:
          - File: delete
          - Process: stop, delete image file
          - Service: stop, delete image file
          - Registry entry: delete
          - Scheduled task: remove
          - Startup folder item: delete file
          NOTE: This command has a prerequisite command. You can use the `-auto` command in conjuction with `remediate` to automatically run the prerequisite command. +undo | Restores an entity that was remediated. + + +## Use live response commands +The commands that you can use in the console follow similar principles as [Windows Commands](https://docs.microsoft.com/windows-server/administration/windows-commands/windows-commands#BKMK_c). + +The advanced commands offer a more robust set of actions that allow you to take more powerful actions such as download and upload a file, run scripts on the machine, and take remediation actions on an entity. + +### Get a file from the machine +For scenarios when you'd like get a file from a machine you're investigating, you can use the `getfile` command. This allows you to save the file from the machine for further investigation. + +>[!NOTE] +>There is a file size limit of 750mb. + +### Put a file in the library +Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level. + +Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them. + +You can have a collection of PowerShell scripts that can run on machines that you initiate live response sessions with. + +**To upload a file in the library:** +1. Click **Upload file to library**. +2. Click **Browse** and select the file. +3. Provide a brief description. +4. Specify if you'd like to overwrite a file with the same name. +5. If you'd like to be know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description. +6. Click **Confirm**. +7. (Optional) To verify that the file was uploaded to the library, run the `library` command. + + +### Cancel a command +Anytime during a session, you can cancel a command by pressing CTRL + C. + +>[!WARNING] +>Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled. + + + +### Automatically run prerequisite commands +Some commands have prerequisite commands to run. If you don't run the prerequisite command, you'll get an error. For example, running the `download` command without `fileinfo` will return an error. + +You can use the auto flag to automatically run prerequisite commands, for example: + +``` +getfile c:\Users\user\Desktop\work.txt -auto +``` + + +## Run a PowerShell script +Before you can run a PowerShell script, you must first upload it to the library. + +After uploading the script to the library, use the `run` command to run the script. + +If you plan to use an unsigned script in the session, you'll need to enable the setting in the [Advanced features settings](advanced-features.md) page. + +>[!WARNING] +>Allowing the use of unsigned scripts may increase your exposure to threats. + + + +## Apply command parameters +- View the console help to learn about command parameters. To learn about an individual command, run: + + `help ` + +- When applying parameters to commands, note that parameters are handled based on a fixed order: + + ` param1 param2` + +- When specifying parameters outside of the fixed order, specify the name of the parameter with a hyphen before providing the value: + + ` -param2_name param2` + +- When using commands that have prerequisite commands, you can use flags: + + ` -type file -id - auto` or `remediate file - auto`. + + + +## Supported output types +Live response supports table and JSON format output types. For each command, there's a default output behavior. You can modify the output in your preferred output format using the following commands: + +- `-output json` +- `-output table` + +>[!NOTE] +>Fewer fields are shown in table format due to the limited space. To see more details in the output, you can use the JSON output command so that more details are shown. + + +## Supported output pipes +Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt. + +Example: + +``` +processes > output.txt +``` + + + +## View the command log +Select the **Command log** tab to see the commands used on the machine during a session. +Each command is tracked with full details such as: +- ID +- Command line +- Duration +- Status and input or output side bar + + + + +## Limitations +- Live response sessions are limited to 10 live response sessions at a time +- Large scale command execution is not supported +- A user can only initiate one session at a time +- A machine can only be in one session at a time +- There is a file size limit of 750mb when downloading files from a machine + +## Related topic +- [Live response command examples](live-response-command-examples.md) + + + + + + + + + diff --git a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md index 666ab6abfe..070ec84568 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md +++ b/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md @@ -1,68 +1,68 @@ ---- -title: Next-generation Threat & Vulnerability Management -ms.reviewer: -description: This new capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. -keywords: threat and vulnerability management, MDATP-TVM, vulnerability management, threat and vulnerability scanning -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: mjcaparas -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- - -# Threat & Vulnerability Management -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -[!include[Prerelease information](prerelease.md)] - -Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat & Vulnerability Management serves as an infrustructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. - -It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. - -## Next-generation capabilities -Threat & Vulnerability Management is built-in, real-time, cloud-powered, fully integrated with Microsoft endpoint security stack, the Microsoft Intelligent Security Graph, and the application analytics knowledgebase. - -It is the first solution in the industry to automate the remediation process through integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) for patching, configuration changes, or upgrades. ->[!Note] -> Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) integration will be available in the coming weeks. - -It provides the following solutions to frequently-cited gaps across security operations, security administration, and IT administration workflows and communication. -- Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities -- Linked machine vulnerability and security configuration assessment data in the context of exposure discovery -- Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager - -### Real-time discovery - -To discover endpoint vulnerabilities and misconfiguration, Threat & Vulnerability Management uses the same agentless built-in Microsoft Defender ATP sensors to reduce cumbersome network scans and IT overhead, and provides: -- Real-time device inventory. Devices onboarded to Microsoft Defender ATP automatically report and push vulnerability and security configuration data to the dashboard. -- Visibility into software and vulnerabilities. Optics into the organization’s software inventory, as well as software changes like installations, uninstallations, and patches. Newly discovered vulnerabilities are reported with actionable mitigation recommendations for 1st and 3rd party applications. -- Application runtime context. Constant visibility into application usage patterns for better prioritization and decision-making. Critical dependencies, such as vulnerable runtime libraries being loaded by other applications, are made visible. -- Configuration posture. Visibility into organizational security configuration, surfacing issues like disabled antivirus, enabled SMBv1, or misconfigurations that could allow escalation of privileges. Issues are reported in the dashboard with actionable security recommendations. - -### Intelligence-driven prioritization - -Threat & Vulnerability Management helps customers prioritize and focus on those weaknesses that pose the most urgent and the highest risk to the organization. Rather than using static prioritization by severity scores, Threat & Vulnerability Management in Microsoft Defender ATP highlights the most critical weaknesses that need attention by fusing its security recommendations with dynamic threat and business context: -- Exposing emerging attacks in the wild. Through its advanced cyber data and threat analytics platform, Threat & Vulnerability Management dynamically aligns the prioritization of its security recommendations to focus on vulnerabilities that are currently being exploited in the wild and emerging threats that pose the highest risk. -- Pinpointing active breaches. Microsoft Defender ATP correlates Threat & Vulnerability Management and EDR insights to provide the unique ability to prioritize vulnerabilities that are currently being exploited in an active breach within the organization. -- Protecting high-value assets. Microsoft Defender ATP’s integration with Azure Information Protection allows Threat & Vulnerability Management to call attention to exposed machines with business-critical applications, confidential data, or high-value users. - -### Seamless remediation - -Microsoft Defender ATP’s Threat & Vulnerability Management allows security administrators and IT administrators to collaborate seamlessly to remediate issues. -- One-click remediation requests to IT. Through Microsoft Defender ATP’s integration with Microsoft Intune and System Center Configuration Manager (SCCM), security administrators can create a remediation task in Microsoft Intune with one click. We plan to expand this capability to other IT security management platforms. -- Alternate mitigations. Threat & Vulnerability Management provides insights on additional mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities. -- Real-time remediation status. Microsoft Defender ATP provides real-time monitoring of the status and progress of remediation activities across the organization. - -## Related topics -- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) -- [Configuration score](configuration-score.md) -- [Scenarios](threat-and-vuln-mgt-scenarios.md) +--- +title: Next-generation Threat & Vulnerability Management +ms.reviewer: +description: This new capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. +keywords: threat and vulnerability management, MDATP-TVM, vulnerability management, threat and vulnerability scanning +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mjcaparas +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- + +# Threat & Vulnerability Management +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + +Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. Threat & Vulnerability Management serves as an infrustructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. + +It helps organizations discover vulnerabilities and misconfigurations in real-time, based on sensors, without the need of agents or periodic scans. It prioritizes vulnerabilities based on the threat landscape, detections in your organization, sensitive information on vulnerable devices, and business context. + +## Next-generation capabilities +Threat & Vulnerability Management is built-in, real-time, cloud-powered, fully integrated with Microsoft endpoint security stack, the Microsoft Intelligent Security Graph, and the application analytics knowledgebase. + +It is the first solution in the industry to automate the remediation process through integration with Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) for patching, configuration changes, or upgrades. +>[!Note] +> Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) integration will be available in the coming weeks. + +It provides the following solutions to frequently-cited gaps across security operations, security administration, and IT administration workflows and communication. +- Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities +- Linked machine vulnerability and security configuration assessment data in the context of exposure discovery +- Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager + +### Real-time discovery + +To discover endpoint vulnerabilities and misconfiguration, Threat & Vulnerability Management uses the same agentless built-in Microsoft Defender ATP sensors to reduce cumbersome network scans and IT overhead, and provides: +- Real-time device inventory. Devices onboarded to Microsoft Defender ATP automatically report and push vulnerability and security configuration data to the dashboard. +- Visibility into software and vulnerabilities. Optics into the organization’s software inventory, as well as software changes like installations, uninstallations, and patches. Newly discovered vulnerabilities are reported with actionable mitigation recommendations for 1st and 3rd party applications. +- Application runtime context. Constant visibility into application usage patterns for better prioritization and decision-making. Critical dependencies, such as vulnerable runtime libraries being loaded by other applications, are made visible. +- Configuration posture. Visibility into organizational security configuration, surfacing issues like disabled antivirus, enabled SMBv1, or misconfigurations that could allow escalation of privileges. Issues are reported in the dashboard with actionable security recommendations. + +### Intelligence-driven prioritization + +Threat & Vulnerability Management helps customers prioritize and focus on those weaknesses that pose the most urgent and the highest risk to the organization. Rather than using static prioritization by severity scores, Threat & Vulnerability Management in Microsoft Defender ATP highlights the most critical weaknesses that need attention by fusing its security recommendations with dynamic threat and business context: +- Exposing emerging attacks in the wild. Through its advanced cyber data and threat analytics platform, Threat & Vulnerability Management dynamically aligns the prioritization of its security recommendations to focus on vulnerabilities that are currently being exploited in the wild and emerging threats that pose the highest risk. +- Pinpointing active breaches. Microsoft Defender ATP correlates Threat & Vulnerability Management and EDR insights to provide the unique ability to prioritize vulnerabilities that are currently being exploited in an active breach within the organization. +- Protecting high-value assets. Microsoft Defender ATP’s integration with Azure Information Protection allows Threat & Vulnerability Management to call attention to exposed machines with business-critical applications, confidential data, or high-value users. + +### Seamless remediation + +Microsoft Defender ATP’s Threat & Vulnerability Management allows security administrators and IT administrators to collaborate seamlessly to remediate issues. +- One-click remediation requests to IT. Through Microsoft Defender ATP’s integration with Microsoft Intune and System Center Configuration Manager (SCCM), security administrators can create a remediation task in Microsoft Intune with one click. We plan to expand this capability to other IT security management platforms. +- Alternate mitigations. Threat & Vulnerability Management provides insights on additional mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities. +- Real-time remediation status. Microsoft Defender ATP provides real-time monitoring of the status and progress of remediation activities across the organization. + +## Related topics +- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) +- [Configuration score](configuration-score.md) +- [Scenarios](threat-and-vuln-mgt-scenarios.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 52e4081b29..504baecd76 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -1,108 +1,108 @@ ---- -title: Threat & Vulnerability Management scenarios -ms.reviewer: -description: Learn how to use Threat & Vulnerability Management in the context of scenarios that Security Administrators encounter when collaborating with IT Administrators and SecOps while protecting their organization from cybersecurity threats. -keywords: mdatp-tvm scenarios, mdatp, tvm, tvm scenarios, reduce threat & vulnerability exposure, reduce threat and vulnerability, improve security configuration, increase configuration score, increase threat & vulnerability configuration score, configuration score, exposure score, security controls -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: mjcaparas -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: article ---- - -# Threat & Vulnerability Management scenarios -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -[!include[Prerelease information](prerelease.md)] - -## Before you begin -Ensure that your machines: -- Are onboarded to Microsoft Defender Advanced Threat Protection -- Running with Windows 10 1709 (Fall Creators Update) or later -- Have the following mandatory updates installed: -- (1) RS3 customers | [KB4493441](https://support.microsoft.com/en-us/help/4493441/windows-10-update-kb4493441) -- (2) RS4 customers | [KB4493464](https://support.microsoft.com/en-us/help/4493464) -- Have at least one security recommendation that can be viewed in the machine page -- Are tagged or marked as co-managed - - -## Reduce your threat and vulnerability exposure -Threat & Vulnerability Management introduces a new exposure score metric which visually represents how exposed your machines are to imminent threats. - -The exposure score is continuously calculated on each device in the organization and influenced by the following factors: -- Weaknesses, such as vulnerabilities and misconfigurations discovered on the device -- External and internal threats such as public exploit code and security alerts -- Likelihood of the device getting breached given its current security posture -- Value of the device to the organization given its role and content - -The exposure score is broken down into the following levels: -- 0 to 29: low exposure score -- 30 to 69: medium exposure score -- 70 to 100: high exposure score - -You can reduce the exposure score by remediating issues based on prioritized security recommendations. Each software has weaknesses that are transformed into recommendations and prioritized based on risk to the organization. - -To lower down your threat and vulnerability exposure: - -1. Review the **Top security recommendations** from your **Threat & Vulnerability Management dashboard**, and select the first item on the list. This opens the **Security recommendation** page. - - >>![top security recommendations](images/tvm_security_recommendations.png) - - >[!NOTE] - > There are two types of recommendations: - > - Security update which refers to recommendations that require a package installation - > - Configuration change which refers to recommendations that require a registry or GPO modification - > Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight ![threat insight](images/tvm_bug_icon.png) icon. - -2. In the **Security recommendations** page, you will see the description of what needs to be done and why. It shows the vulnerability details, such as the associated exploits affecting what machines and its business impact. Click **Open software page** option from the flyout menu. ![details in security recommendations page](images/tvm_security_recommendations_page.png) - -3. Click **Installed machines** and select the affected machine from the list to open the flyout page with the relevant machine details, exposure and risk levels, alert and incident activities. ![details in software page](images/tvm_software_page_details.png) - -4. Click **Open machine page** to connect to the machine and apply the selected recommendation. ![details in machine page](images/tvm_machine_page_details.png) - -5. Allow a few hours for the changes to propagate in the system. - -6. Review the machine **Security recommendation** tab again. The recommendation you've chosen to remediate won't be listed there anymore, and the exposure score should decrease. - -## Improve your security configuration ->[!NOTE] -> Secure score is now part of Threat & Vulnerability Management as [configuration score](configuration-score.md). We’ll keep the secure score page available for a few weeks. View the [secure score](https://securitycenter.windows.com/securescore) page. - -Remediating issues in the security recommendations list will improve your configuration. As you do so, your configuration score improves, which means building your organization's resilience against cybersecurity threats and vulnerabilities stronger. - -1. From the Configuration score widget, select **Security controls**. This opens the **Security recommendations** page showing the list of issues related to security controls. - - >>![configuration score widget](images/tvm_config_score.png) - -2. Select the first item on the list. This opens the flyout menu with the description of the security controls issue, a short description of the potential risk, insights, configuration ID, exposed machines, and business impact. Click **Remediation options**. - ![security controls related security recommendations](images/tvm_security_controls.png) - -3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up. - - > >![request remediation](images/tvm_request_remediation.png). - > - > You will see a confirmation message that the remediation task has been created. - > ![remediation task creation confirmation](images/tvm_remediation_task_created.png) - -4. Save your CSV file. - ![save csv file](images/tvm_save_csv_file.png) - -5. Send a follow up email to your IT Administrator and allow the time that you have alloted for the remediation to propagate in the system. - -6. Review the machine **Configuration score** widget again. The number of the security controls issues will decrease. When you click **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be listed there anymore, and your configuration score should increase. - - -## Related topics -- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) -- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) -- [Configuration score](configuration-score.md) - +--- +title: Threat & Vulnerability Management scenarios +ms.reviewer: +description: Learn how to use Threat & Vulnerability Management in the context of scenarios that Security Administrators encounter when collaborating with IT Administrators and SecOps while protecting their organization from cybersecurity threats. +keywords: mdatp-tvm scenarios, mdatp, tvm, tvm scenarios, reduce threat & vulnerability exposure, reduce threat and vulnerability, improve security configuration, increase configuration score, increase threat & vulnerability configuration score, configuration score, exposure score, security controls +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: mjcaparas +author: mjcaparas +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: article +--- + +# Threat & Vulnerability Management scenarios +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + +## Before you begin +Ensure that your machines: +- Are onboarded to Microsoft Defender Advanced Threat Protection +- Running with Windows 10 1709 (Fall Creators Update) or later +- Have the following mandatory updates installed: +- (1) RS3 customers | [KB4493441](https://support.microsoft.com/en-us/help/4493441/windows-10-update-kb4493441) +- (2) RS4 customers | [KB4493464](https://support.microsoft.com/en-us/help/4493464) +- Have at least one security recommendation that can be viewed in the machine page +- Are tagged or marked as co-managed + + +## Reduce your threat and vulnerability exposure +Threat & Vulnerability Management introduces a new exposure score metric which visually represents how exposed your machines are to imminent threats. + +The exposure score is continuously calculated on each device in the organization and influenced by the following factors: +- Weaknesses, such as vulnerabilities and misconfigurations discovered on the device +- External and internal threats such as public exploit code and security alerts +- Likelihood of the device getting breached given its current security posture +- Value of the device to the organization given its role and content + +The exposure score is broken down into the following levels: +- 0 to 29: low exposure score +- 30 to 69: medium exposure score +- 70 to 100: high exposure score + +You can reduce the exposure score by remediating issues based on prioritized security recommendations. Each software has weaknesses that are transformed into recommendations and prioritized based on risk to the organization. + +To lower down your threat and vulnerability exposure: + +1. Review the **Top security recommendations** from your **Threat & Vulnerability Management dashboard**, and select the first item on the list. This opens the **Security recommendation** page. + + >>![top security recommendations](images/tvm_security_recommendations.png) + + >[!NOTE] + > There are two types of recommendations: + > - Security update which refers to recommendations that require a package installation + > - Configuration change which refers to recommendations that require a registry or GPO modification + > Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight ![threat insight](images/tvm_bug_icon.png) icon. + +2. In the **Security recommendations** page, you will see the description of what needs to be done and why. It shows the vulnerability details, such as the associated exploits affecting what machines and its business impact. Click **Open software page** option from the flyout menu. ![details in security recommendations page](images/tvm_security_recommendations_page.png) + +3. Click **Installed machines** and select the affected machine from the list to open the flyout page with the relevant machine details, exposure and risk levels, alert and incident activities. ![details in software page](images/tvm_software_page_details.png) + +4. Click **Open machine page** to connect to the machine and apply the selected recommendation. ![details in machine page](images/tvm_machine_page_details.png) + +5. Allow a few hours for the changes to propagate in the system. + +6. Review the machine **Security recommendation** tab again. The recommendation you've chosen to remediate won't be listed there anymore, and the exposure score should decrease. + +## Improve your security configuration +>[!NOTE] +> Secure score is now part of Threat & Vulnerability Management as [configuration score](configuration-score.md). We’ll keep the secure score page available for a few weeks. View the [secure score](https://securitycenter.windows.com/securescore) page. + +Remediating issues in the security recommendations list will improve your configuration. As you do so, your configuration score improves, which means building your organization's resilience against cybersecurity threats and vulnerabilities stronger. + +1. From the Configuration score widget, select **Security controls**. This opens the **Security recommendations** page showing the list of issues related to security controls. + + >>![configuration score widget](images/tvm_config_score.png) + +2. Select the first item on the list. This opens the flyout menu with the description of the security controls issue, a short description of the potential risk, insights, configuration ID, exposed machines, and business impact. Click **Remediation options**. + ![security controls related security recommendations](images/tvm_security_controls.png) + +3. Read the description to understand the context of the issue and what to do next. Select a due date, add notes, and select **Export all remediation activity data to CSV** so you can attach it to the email that you can send to your IT Administrator for follow-up. + + > >![request remediation](images/tvm_request_remediation.png). + > + > You will see a confirmation message that the remediation task has been created. + > ![remediation task creation confirmation](images/tvm_remediation_task_created.png) + +4. Save your CSV file. + ![save csv file](images/tvm_save_csv_file.png) + +5. Send a follow up email to your IT Administrator and allow the time that you have alloted for the remediation to propagate in the system. + +6. Review the machine **Configuration score** widget again. The number of the security controls issues will decrease. When you click **Security controls** to go back to the **Security recommendations** page, the item that you have addressed will not be listed there anymore, and your configuration score should increase. + + +## Related topics +- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) +- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) +- [Configuration score](configuration-score.md) + diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md index cccb23ec60..2f3d53c781 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights.md @@ -1,77 +1,77 @@ ---- -title: What's in the dashboard and what it means for my organization's security posture -ms.reviewer: -description: What's in the Threat & Vulnerability Management dashboard and how it can help SecOps and Security Administrators arrive at informed decisions in addressing cybersecurity threat vulnerabilities and building their organization's security resilience. -keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: eADQiWindows 10XVcnh -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: ellevin -author: levinec -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- -# Threat & Vulnerability Management dashboard overview - -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -[!include[Prerelease information](prerelease.md)] - ->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) - -Threat & Vulnerability Management is a component of Microsoft Defender ATP, and provides both security administrators and security operations teams with unique value, including: -- Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities -- Invaluable machine vulnerability context during incident investigations -- Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) - - >[!NOTE] - > Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) integration will be available in the coming weeks. - -You can use the Threat & Vulnerability Management capability in [Microsoft Defender Security Center](https://securitycenter.windows.com/) to: -- View exposure and configuration scores side-by-side with top security recommendations, software vulnerability, remediation activities, and exposed machines -- Correlate EDR insights with endpoint vulnerabilities and process them -- Select remediation options, triage and track the remediation tasks - -## Threat & Vulnerability Management in Microsoft Defender Security Center -When you open the portal, you’ll see the main areas of the capability: - - ![Microsoft Defender Advanced Threat Protection portal](images/tvm_dashboard.png) - - ![Threat & Vulnerability Management menu](images/tvm_menu.png) - -- (1) Menu in the navigation pane -- (2) Threat & Vulnerability Management icon -- (3) Threat & Vulnerability Management dashboard - -You can navigate through the portal using the menu options available in all sections. Refer to the following table for a description of each section. - -Area | Description -:---|:--- -(1) Menu | Select menu to expand the navigation pane and see the names of the Threat & Vulnerability Management capabilities. -(2) Threat & Vulnerability Management navigation pane | Use the navigation pane to move across the **Threat and Vulnerability Management Dashboard**, **Security recommendations**, **Remediation**, and **Software inventory**. -**Dashboards** | Get a high-level view of the organization exposure score, MDATP configuration score, top remediation activities, top security recommendations, top vulnerable software, and top exposed machines data. -**Security recommendations** | See the list of security recommendations, their related components, insights, number or exposed devices, impact, and request for remediation. You can click each item on the list and it will open a flyout pane where you will see vulnerability details, and have the option to open the software page, and see the remediation options. -**Remediation** | See the remediation activity, related component, remediation type, status, due date, option to export the remediation and process data to CSV. -**Software inventory** | See the list of applications, versions, weaknesses, whether there’s an exploit found on the application, prevalence in the organization, how many were installed, how many exposed devices are there, and the numerical value of the impact. You can select each item in the list and opt to open the software page which shows the vulnerabilities and misconfigurations associated and its machine and version distribution details. -(3) Threat & Vulnerability Management dashboard | Access the **Exposure score**, **Configuration score**, **Exposure distribution**, **Top security recommendations**, **Top vulnerable software**, **Top remediation activities**, **Top exposed machines**, and **Threat campaigns**. -**Organization Exposure score** | See the current state of your organization’s device exposure to threats and vulnerabilities. Several factors affect your organization’s exposure score: weaknesses discovered in your devices, likelihood of your devices to be breached, value of the devices to your organization, and relevant alerts discovered with your devices. The goal is to lower down your organization’s exposure score to be more secure. To reduce the score, you need to remediate the related security configuration issues listed in the security recommendations. -**MDATP Configuration score** | See the security posture of your organization’s operating system, applications, network, accounts and security controls. The goal is to increase your configuration score by remediating the related security configuration issues. You can click the bars and it will take you to the **Security recommendation** page for details. -**Machine exposure distribution** | See how many machines are exposed based on their exposure level. You can click the sections in the doughnut chart and it will take you to the **Machines list** page where you'll see the affected machine names, exposure level side by side with risk level, among other details such as domain, OS platform, its health state, when it was last seen, and its tags. -**Top security recommendations** | See the collated security recommendations which are sorted and prioritized based on your organization’s risk exposure and the urgency that it requires. Useful icons also quickly calls your attention on possible active alerts ![possible active alert](images/tvm_alert_icon.png), associated public exploits ![threat insight](images/tvm_bug_icon.png), and recommendation insights ![recommendation insight](images/tvm_insight_icon.png). You can drill down on the security recommendation to see the potential risks, list of exposed machines, and read the insights. Thus, providing you with an informed decision to either proceed with a remediation request. Click **Show more** to see the rest of the security recommendations in the list. -**Top vulnerable software** | Get real-time visibility into the organizational software inventory, with stack-ranked list of vulnerable software installed on your network’s devices and how they impact on your organizational exposure score. Click each item for details or **Show more** to see the rest of the vulnerable application list in the **Software inventory** page. -**Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list to see the details in the **Remediation** page or click **Show more** to see the rest of the remediation activities. -**Top exposed machines** | See the exposed machine names and their exposure level. You can click each machine name from the list and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine. You can also click **Show more** to see the rest of the exposed machines list. - -See [Microsoft Defender ATP icons](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal. - -## Related topics -- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) -- [Configuration score](configuration-score.md) -- [Scenarios](threat-and-vuln-mgt-scenarios.md) +--- +title: What's in the dashboard and what it means for my organization's security posture +ms.reviewer: +description: What's in the Threat & Vulnerability Management dashboard and how it can help SecOps and Security Administrators arrive at informed decisions in addressing cybersecurity threat vulnerabilities and building their organization's security resilience. +keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score +search.product: eADQiWindows 10XVcnh +search.appverid: met150 +ms.prod: eADQiWindows 10XVcnh +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: ellevin +author: levinec +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +--- +# Threat & Vulnerability Management dashboard overview + +**Applies to:** +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-portaloverview-abovefoldlink) + +Threat & Vulnerability Management is a component of Microsoft Defender ATP, and provides both security administrators and security operations teams with unique value, including: +- Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities +- Invaluable machine vulnerability context during incident investigations +- Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) + + >[!NOTE] + > Microsoft Intune and Microsoft System Center Configuration Manager (SCCM) integration will be available in the coming weeks. + +You can use the Threat & Vulnerability Management capability in [Microsoft Defender Security Center](https://securitycenter.windows.com/) to: +- View exposure and configuration scores side-by-side with top security recommendations, software vulnerability, remediation activities, and exposed machines +- Correlate EDR insights with endpoint vulnerabilities and process them +- Select remediation options, triage and track the remediation tasks + +## Threat & Vulnerability Management in Microsoft Defender Security Center +When you open the portal, you’ll see the main areas of the capability: + + ![Microsoft Defender Advanced Threat Protection portal](images/tvm_dashboard.png) + + ![Threat & Vulnerability Management menu](images/tvm_menu.png) + +- (1) Menu in the navigation pane +- (2) Threat & Vulnerability Management icon +- (3) Threat & Vulnerability Management dashboard + +You can navigate through the portal using the menu options available in all sections. Refer to the following table for a description of each section. + +Area | Description +:---|:--- +(1) Menu | Select menu to expand the navigation pane and see the names of the Threat & Vulnerability Management capabilities. +(2) Threat & Vulnerability Management navigation pane | Use the navigation pane to move across the **Threat and Vulnerability Management Dashboard**, **Security recommendations**, **Remediation**, and **Software inventory**. +**Dashboards** | Get a high-level view of the organization exposure score, MDATP configuration score, top remediation activities, top security recommendations, top vulnerable software, and top exposed machines data. +**Security recommendations** | See the list of security recommendations, their related components, insights, number or exposed devices, impact, and request for remediation. You can click each item on the list and it will open a flyout pane where you will see vulnerability details, and have the option to open the software page, and see the remediation options. +**Remediation** | See the remediation activity, related component, remediation type, status, due date, option to export the remediation and process data to CSV. +**Software inventory** | See the list of applications, versions, weaknesses, whether there’s an exploit found on the application, prevalence in the organization, how many were installed, how many exposed devices are there, and the numerical value of the impact. You can select each item in the list and opt to open the software page which shows the vulnerabilities and misconfigurations associated and its machine and version distribution details. +(3) Threat & Vulnerability Management dashboard | Access the **Exposure score**, **Configuration score**, **Exposure distribution**, **Top security recommendations**, **Top vulnerable software**, **Top remediation activities**, **Top exposed machines**, and **Threat campaigns**. +**Organization Exposure score** | See the current state of your organization’s device exposure to threats and vulnerabilities. Several factors affect your organization’s exposure score: weaknesses discovered in your devices, likelihood of your devices to be breached, value of the devices to your organization, and relevant alerts discovered with your devices. The goal is to lower down your organization’s exposure score to be more secure. To reduce the score, you need to remediate the related security configuration issues listed in the security recommendations. +**MDATP Configuration score** | See the security posture of your organization’s operating system, applications, network, accounts and security controls. The goal is to increase your configuration score by remediating the related security configuration issues. You can click the bars and it will take you to the **Security recommendation** page for details. +**Machine exposure distribution** | See how many machines are exposed based on their exposure level. You can click the sections in the doughnut chart and it will take you to the **Machines list** page where you'll see the affected machine names, exposure level side by side with risk level, among other details such as domain, OS platform, its health state, when it was last seen, and its tags. +**Top security recommendations** | See the collated security recommendations which are sorted and prioritized based on your organization’s risk exposure and the urgency that it requires. Useful icons also quickly calls your attention on possible active alerts ![possible active alert](images/tvm_alert_icon.png), associated public exploits ![threat insight](images/tvm_bug_icon.png), and recommendation insights ![recommendation insight](images/tvm_insight_icon.png). You can drill down on the security recommendation to see the potential risks, list of exposed machines, and read the insights. Thus, providing you with an informed decision to either proceed with a remediation request. Click **Show more** to see the rest of the security recommendations in the list. +**Top vulnerable software** | Get real-time visibility into the organizational software inventory, with stack-ranked list of vulnerable software installed on your network’s devices and how they impact on your organizational exposure score. Click each item for details or **Show more** to see the rest of the vulnerable application list in the **Software inventory** page. +**Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list to see the details in the **Remediation** page or click **Show more** to see the rest of the remediation activities. +**Top exposed machines** | See the exposed machine names and their exposure level. You can click each machine name from the list and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine. You can also click **Show more** to see the rest of the exposed machines list. + +See [Microsoft Defender ATP icons](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal. + +## Related topics +- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) +- [Configuration score](configuration-score.md) +- [Scenarios](threat-and-vuln-mgt-scenarios.md) diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 2023523f4a..c074504ddd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -1,58 +1,58 @@ ---- -title: Prevent security settings changes with Tamper Protection -ms.reviewer: -manager: dansimp -description: Use tamper protection to prevent malicious apps from changing important security settings. -keywords: malware, defender, antivirus, tamper protection -search.product: eADQiWindows 10XVcnh -ms.pagetype: security -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: dansimp -ms.author: dansimp ---- - -# Prevent security settings changes with tamper protection - -**Applies to:** - -- Windows 10 - -Tamper Protection helps prevent malicious apps from changing important security settings. These settings include: - -- Real-time protection -- Cloud-delivered protection -- IOfficeAntivirus (IOAV) -- Behavior monitoring -- Removing security intelligence updates - -With Tamper Protection set to **On**, you can still change these settings in the Windows Security app. The following apps and methods can't change these settings: - -- Mobile device management (MDM) apps like Intune -- Enterprise configuration management apps like System Center Configuration Manager (SCCM) -- Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures -- Windows System Image Manager (Windows SIM) settings DisableAntiSpyware and DisableAntiMalware (used in Windows unattended setup) -- Group Policy -- Other Windows Management Instrumentation (WMI) apps - -The Tamper Protection setting doesn't affect how third party antivirus apps register with the Windows Security app. - -On computers running Windows 10 Enterprise E5, users can't change the Tamper Protection setting. - -Tamper Protection is set to **On** by default. If you set Tamper Protection to **Off**, you will see a yellow warning in the Windows Security app under **Virus & Threat Protection**. - -## Configure tamper protection - -1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**. -2. Select **Virus & threat protection**, then select **Virus & threat protection settings**. -3. Set **Tamper Protection** to **On** or **Off**. - ->[!NOTE] ->Tamper Protection blocks attempts to modify Windows Defender Antivirus settings through the registry. -> ->To help ensure that Tamper Protection doesn’t interfere with third-party security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. -> ->Once you’ve made this update, Tamper Protection will continue to protect your registry settings, and will also log attempts to modify them without returning errors. +--- +title: Prevent security settings changes with Tamper Protection +ms.reviewer: +manager: dansimp +description: Use tamper protection to prevent malicious apps from changing important security settings. +keywords: malware, defender, antivirus, tamper protection +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +author: dansimp +ms.author: dansimp +--- + +# Prevent security settings changes with tamper protection + +**Applies to:** + +- Windows 10 + +Tamper Protection helps prevent malicious apps from changing important security settings. These settings include: + +- Real-time protection +- Cloud-delivered protection +- IOfficeAntivirus (IOAV) +- Behavior monitoring +- Removing security intelligence updates + +With Tamper Protection set to **On**, you can still change these settings in the Windows Security app. The following apps and methods can't change these settings: + +- Mobile device management (MDM) apps like Intune +- Enterprise configuration management apps like System Center Configuration Manager (SCCM) +- Command line instruction MpCmdRun.exe -removedefinitions -dynamicsignatures +- Windows System Image Manager (Windows SIM) settings DisableAntiSpyware and DisableAntiMalware (used in Windows unattended setup) +- Group Policy +- Other Windows Management Instrumentation (WMI) apps + +The Tamper Protection setting doesn't affect how third party antivirus apps register with the Windows Security app. + +On computers running Windows 10 Enterprise E5, users can't change the Tamper Protection setting. + +Tamper Protection is set to **On** by default. If you set Tamper Protection to **Off**, you will see a yellow warning in the Windows Security app under **Virus & Threat Protection**. + +## Configure tamper protection + +1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**. +2. Select **Virus & threat protection**, then select **Virus & threat protection settings**. +3. Set **Tamper Protection** to **On** or **Off**. + +>[!NOTE] +>Tamper Protection blocks attempts to modify Windows Defender Antivirus settings through the registry. +> +>To help ensure that Tamper Protection doesn’t interfere with third-party security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. +> +>Once you’ve made this update, Tamper Protection will continue to protect your registry settings, and will also log attempts to modify them without returning errors. diff --git a/windows/security/threat-protection/windows-platform-common-criteria.md b/windows/security/threat-protection/windows-platform-common-criteria.md index f5a711db65..d9cd25a523 100644 --- a/windows/security/threat-protection/windows-platform-common-criteria.md +++ b/windows/security/threat-protection/windows-platform-common-criteria.md @@ -1,177 +1,177 @@ ---- -title: Common Criteria Certifications -description: This topic details how Microsoft supports the Common Criteria certification program. -ms.prod: w10 -audience: ITPro -author: dulcemontemayor -ms.author: dolmont -manager: dansimp -ms.collection: M365-identity-device-management -ms.topic: article -ms.localizationpriority: medium -ms.date: 3/20/2019 -ms.reviewer: ---- - -# Common Criteria Certifications - -Microsoft is committed to optimizing the security of its products and services. As part of that commitment, Microsoft supports the Common Criteria certification program, continues to ensure that products incorporate the features and functions required by relevant Common Criteria protection profiles, and completes Common Criteria certifications of Microsoft Windows products. - -## Common Criteria Security Targets - -### Information for Systems Integrators and Accreditors - -The Security Target describes security functionality and assurance measures used to evaluate Windows. - - - [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/0/7/6/0764E933-DD0B-45A7-9144-1DD9F454DCEF/Windows%2010%201803%20GP%20OS%20Security%20Target.pdf) - - [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/B/6/A/B6A5EC2C-6351-4FB9-8FF1-643D4BD5BE6E/Windows%2010%201709%20GP%20OS%20Security%20Target.pdf) - - [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/8/b/e8b8c42a-a0b6-4ba1-9bdc-e704e8289697/windows%2010%20version%201703%20gp%20os%20security%20target%20-%20public%20\(january%2016,%202018\)\(final\)\(clean\).pdf) - - [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/1/c/3/1c3b5ab0-e064-4350-a31f-48312180d9b5/st_vid10823-st.pdf) - - [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/1/5/e/15eee6d3-f2a8-4441-8cb1-ce8c2ab91c24/windows%2010%20anniversary%20update%20mdf%20security%20target%20-%20public%20\(april%203%202017\).docx) - - [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/f/8/c/f8c1c2a4-719c-48ae-942f-9fd3ce5b238f/windows%2010%20au%20and%20server%202016%20gp%20os%20security%20target%20-%20public%20\(december%202%202016\)%20\(clean\).docx) - - [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client](https://download.microsoft.com/download/b/f/5/bf59e430-e57b-462d-8dca-8ac3c93cfcff/windows%2010%20anniversary%20update%20ipsec%20vpn%20client%20security%20target%20-%20public%20\(december%2029%202016\)%20\(clean\).docx) - - [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/3/7/2/372beb03-b1ed-4bb6-9b9b-b8f43afc570d/st_vid10746-st.pdf) - - [Microsoft Windows 10 November 2015 Update with Surface Book](https://download.microsoft.com/download/a/c/2/ac2a6ed8-4d2f-4f48-a9bf-f059d6c9af38/windows%2010%20mdf3%20security%20target%20-%20public%20\(june%2022%202016\)\(final\).docx) - - [Microsoft Windows 10 Mobile with Lumia 950, 950 XL, 550, 635, and Windows 10 with Surface Pro 4](https://www.niap-ccevs.org/st/st_vid10677-st.pdf) - - [Windows 10 and Windows Server 2012 R2](http://www.commoncriteriaportal.org/files/epfiles/st_windows10.pdf) - - [Windows 10](https://www.niap-ccevs.org/st/st_vid10677-st.pdf) - - [Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830](https://www.niap-ccevs.org/st/st_vid10635-st.pdf) - - [Microsoft Surface Pro 3 and Windows 8.1](https://www.niap-ccevs.org/st/st_vid10632-st.pdf) - - [Windows 8.1 and Windows Phone 8.1](https://www.niap-ccevs.org/st/st_vid10592-st.pdf) - - [Windows 8 and Windows Server 2012](https://www.niap-ccevs.org/st/st_vid10520-st.pdf) - - [Windows 8 and Windows RT](https://www.niap-ccevs.org/st/st_vid10620-st.pdf) - - [Windows 8 and Windows Server 2012 BitLocker](http://www.commoncriteriaportal.org/files/epfiles/st_vid10540-st.pdf) - - [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](http://www.commoncriteriaportal.org/files/epfiles/st_vid10529-st.pdf) - - [Windows 7 and Windows Server 2008 R2](http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf) - - [Microsoft Windows Server 2008 R2 Hyper-V Role](http://www.microsoft.com/download/en/details.aspx?id=29305) - - [Windows Vista and Windows Server 2008 at EAL4+](http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf) - - [Microsoft Windows Server 2008 Hyper-V Role](http://www.commoncriteriaportal.org/files/epfiles/0570b_pdf.pdf) - - [Windows Vista and Windows Server 2008 at EAL1](http://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_st_v1.0.pdf) - - [Windows Server 2003 SP2 including R2, x64, and IA64; Windows XP Professional SP2 and x64 SP2; and Windows XP Embedded SP2](http://www.commoncriteriaportal.org/files/epfiles/st_vid10184-st.pdf) - - [Windows Server 2003 Certificate Server](http://www.commoncriteriaportal.org/files/epfiles/st_vid9507-st.pdf) - - [Windows Rights Management Services (RMS) 1.0 SP2](http://www.commoncriteriaportal.org/files/epfiles/st_vid10224-st.pdf) - -## Common Criteria Deployment and Administration - -### Information for IT Administrators - -These documents describe how to configure Windows to replicate the configuration used during the Common Criteria evaluation. - -**Windows 10, Windows 10 Mobile, Windows Server 2016, Windows Server 2012 R2** - - - - [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/6/C/1/6C13FBFF-9CB0-455F-A1C8-3E3CB0ACBD7B/Windows%2010%201803%20GP%20OS%20Administrative%20Guide.pdf) - - [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/5/D/2/5D26F473-0FCE-4AC4-9065-6AEC0FE5B693/Windows%2010%201709%20GP%20OS%20Administrative%20Guide.pdf) - - [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/9/7/e97f0c7f-e741-4657-8f79-2c0a7ca928e3/windows%2010%20cu%20gp%20os%20operational%20guidance%20\(jan%208%202017%20-%20public\).pdf) - - [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/d/c/4/dc40b5c8-49c2-4587-8a04-ab3b81eb6fc4/st_vid10823-agd.pdf) - - [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/4/c/1/4c1f4ea4-2d66-4232-a0f5-925b2bc763bc/windows%2010%20au%20operational%20guidance%20\(16%20mar%202017\)\(clean\).docx) - - [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/b/5/2/b52e9081-05c6-4895-91a3-732bfa0eb4da/windows%2010%20au%20and%20server%202016%20gp%20os%20operational%20guidance%20\(final\).docx) - - [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client Operational Guidance](https://download.microsoft.com/download/2/c/c/2cc8f929-233e-4a40-b673-57b449680984/windows%2010%20au%20and%20server%202016%20ipsec%20vpn%20client%20operational%20guidance%20\(21%20dec%202016\)%20\(public\).docx) - - [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/3/3/f/33fa01dd-b380-46e1-833f-fd85854b4022/st_vid10746-agd.pdf) - - [Microsoft Windows 10 November 2015 Update with Surface Book Administrative Guide](https://download.microsoft.com/download/3/2/c/32c6fa02-b194-478f-a0f6-0215b47d0f40/windows%2010%20mdf3%20mobile%20device%20pp%20operational%20guidance%20\(may%2027,%202016\)\(public\).docx) - - [Microsoft Windows 10 Mobile and Windows 10 Administrative Guide](https://download.microsoft.com/download/2/d/c/2dce3435-9328-48e2-9813-c2559a8d39fa/microsoft%20windows%2010%20and%20windows%2010%20mobile%20guidance.pdf) - - [Windows 10 and Windows Server 2012 R2 Administrative Guide](https://download.microsoft.com/download/0/f/d/0fd33c9a-98ac-499e-882f-274f80f3d4f0/microsoft%20windows%2010%20and%20server%202012%20r2%20gp%20os%20guidance.pdf) - - [Windows 10 Common Criteria Operational Guidance](https://download.microsoft.com/download/d/6/f/d6fb4cec-f0f2-4d00-ab2e-63bde3713f44/windows%2010%20mobile%20device%20operational%20guidance.pdf) - -**Windows 8.1 and Windows Phone 8.1** - - - [Microsoft Surface Pro 3 Common Criteria Mobile Operational Guidance](https://download.microsoft.com/download/b/e/3/be365594-daa5-4af3-a6b5-9533d61eae32/surface%20pro%203%20mobile%20operational%20guidance.docx) - - [Windows 8.1 and Windows Phone 8.1 CC Supplemental Admin Guide](https://download.microsoft.com/download/b/0/e/b0e30225-5017-4241-ac0a-6c40bc8e6714/mobile%20operational%20guidance.docx) - -**Windows 8, Windows RT, and Windows Server 2012** - - - [Windows 8 and Windows Server 2012](https://download.microsoft.com/download/6/0/b/60b27ded-705a-4751-8e9f-642e635c3cf3/microsoft%20windows%208%20windows%20server%202012%20common%20criteria%20supplemental%20admin%20guidance.docx) - - [Windows 8 and Windows RT](https://download.microsoft.com/download/8/6/e/86e8c001-8556-4949-90cf-f5beac918026/microsoft%20windows%208%20microsoft%20windows%20rt%20common%20criteria%20supplemental%20admin.docx) - - [Windows 8 and Windows Server 2012 BitLocker](https://download.microsoft.com/download/0/8/4/08468080-540b-4326-91bf-f2a33b7e1764/administrative%20guidance%20for%20software%20full%20disk%20encryption%20clients.pdf) - - [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](https://download.microsoft.com/download/a/9/f/a9fd7e2d-023b-4925-a62f-58a7f1a6bd47/microsoft%20windows%208%20windows%20server%202012%20supplemental%20admin%20guidance%20ipsec%20vpn%20client.docx) - -**Windows 7 and Windows Server 2008 R2** - - - [Windows 7 and Windows Server 2008 R2 Supplemental CC Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=ee05b6d0-9939-4765-9217-63083bb94a00) - - [Windows Server 2008 R2 Hyper-V Common Criteria Configuration Guide](http://www.microsoft.com/download/en/details.aspx?id=29308) - -**Windows Vista and Windows Server 2008** - - - [Windows Vista and Windows Server 2008 Supplemental CC Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=06166288-24c4-4c42-9daa-2b2473ddf567) - - [Windows Server 2008 Hyper-V Role Common Criteria Administrator Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=cb19538d-9e13-4ab6-af38-8f48abfdad08) - -**Windows Server 2003 SP2 including R2, x64, and Itanium** - - - [Windows Server 2003 SP2 R2 Common Criteria Administrator Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=39598841-e693-4891-9234-cfd1550f3949) - - [Windows Server 2003 SP2 R2 Common Criteria Configuration Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=4f7b6a93-0307-480f-a5af-a20268cbd7cc) - -**Windows Server 2003 SP1(x86), x64, and IA64** - - - [Windows Server 2003 with x64 Hardware Administrator's Guide](http://www.microsoft.com/downloads/details.aspx?familyid=8a26829f-c177-4b79-913a-4135fb7b96ef) - - [Windows Server 2003 with x64 Hardware Configuration Guide](http://www.microsoft.com/downloads/details.aspx?familyid=3f9ecd0a-74dd-4d23-a4e5-d7b63fed70e8) - -**Windows Server 2003 SP1** - - - [Windows Server 2003 Administrator's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=75736009-59e9-4a71-879e-cf581817b8cc) - - [Windows Server 2003 Configuration Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=a0ad1856-beb7-4285-b47c-381e8a210c38) - -**Windows XP Professional SP2 (x86) and x64 Edition** - - - [Windows XP Common Criteria Administrator Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=9a7f0b16-72ce-4675-aec8-58785c4e37ee) - - [Windows XP Common Criteria Configuration Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=165da57d-f066-4ddf-9462-cbecfcd68694) - - [Windows XP Common Criteria User Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=7c1a4761-9b9e-429c-84eb-cd7b034c5779) - - [Windows XP Professional with x64 Hardware Administrator's Guide](http://www.microsoft.com/downloads/details.aspx?familyid=346f041e-d641-4af7-bdea-c5a3246d0431) - - [Windows XP Professional with x64 Hardware Configuration Guide](http://www.microsoft.com/downloads/details.aspx?familyid=a7075319-cc3d-4420-a00b-8c9a7068ad54) - - [Windows XP Professional with x64 Hardware User’s Guide](http://www.microsoft.com/downloads/details.aspx?familyid=26c49cf5-6159-4197-97ce-bf1fdfc54569) - -**Windows XP Professional SP2, and XP Embedded SP2** - - - [Windows XP Professional Administrator's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=9bcac470-a0b3-4d34-a561-fa8308c0ff60) - - [Windows XP Professional Configuration Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=9f04915e-571a-422d-8ffa-5797051e81de) - - [Windows XP Professional User's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=d39d0028-7093-495c-80da-2b5b29a54bd8) - -**Windows Server 2003 Certificate Server** - - - [Windows Server 2003 Certificate Server Administrator's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=445093d8-45e2-4cf6-884c-8802c1e6cb2d) - - [Windows Server 2003 Certificate Server Configuration Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=46abc8b5-11be-4e3d-85c2-63226c3688d2) - - [Windows Server 2003 Certificate Server User's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=74f66d84-2654-48d0-b9b5-b383d383425e) - -## Common Criteria Evaluation Technical Reports and Certification / Validation Reports - -### Information for Systems Integrators and Accreditors - -An Evaluation Technical Report (ETR) is a report submitted to the Common Criteria certification authority for how Windows complies with the claims made in the Security Target. A Certification / Validation Report provides the results of the evaluation by the validation team. - - - [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/6/7/1/67167BF2-885D-4646-A61E-96A0024B52BB/Windows%2010%201803%20GP%20OS%20Certification%20Report.pdf) - - [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/2/C/2/2C20D013-0610-4047-B2FA-516819DFAE0A/Windows%2010%201709%20GP%20OS%20Certification%20Report.pdf) - - [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/3/2/c/32cdf627-dd23-4266-90ff-2f9685fd15c0/2017-49%20inf-2218%20cr.pdf) - - [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/a/3/3/a336f881-4ac9-4c79-8202-95289f86bb7a/st_vid10823-vr.pdf) - - [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/f/2/f/f2f7176e-34f4-4ab0-993c-6606d207bb3c/st_vid10752-vr.pdf) - - [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/5/4/8/548cc06e-c671-4502-bebf-20d38e49b731/2016-36-inf-1779.pdf) - - [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client](https://download.microsoft.com/download/2/0/a/20a8e686-3cd9-43c4-a22a-54b552a9788a/st_vid10753-vr.pdf) - - [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/9/b/6/9b633763-6078-48aa-b9ba-960da2172a11/st_vid10746-vr.pdf) - - [Microsoft Windows 10 November 2015 Update with Surface Book](https://download.microsoft.com/download/d/c/b/dcb7097d-1b9f-4786-bb07-3c169fefb579/st_vid10715-vr.pdf) - - [Microsoft Windows 10 Mobile with Lumia 950, 950 XL, 550, 635, and Windows 10 with Surface Pro 4](https://www.niap-ccevs.org/st/st_vid10694-vr.pdf) - - [Windows 10 and Windows Server 2012 R2](https://www.commoncriteriaportal.org/files/epfiles/cr_windows10.pdf) - - [Windows 10](https://www.niap-ccevs.org/st/st_vid10677-vr.pdf) - - [Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830](https://www.niap-ccevs.org/st/st_vid10635-vr.pdf) - - [Microsoft Surface Pro 3 and Windows 8.1](https://www.niap-ccevs.org/st/st_vid10632-vr.pdf) - - [Windows 8.1 and Windows Phone 8.1](https://www.niap-ccevs.org/st/st_vid10592-vr.pdf) - - [Windows 8 and Windows Server 2012](https://www.niap-ccevs.org/st/st_vid10520-vr.pdf) - - [Windows 8 and Windows RT](https://www.niap-ccevs.org/st/st_vid10620-vr.pdf) - - [Windows 8 and Windows Server 2012 BitLocker](http://www.commoncriteriaportal.org/files/epfiles/st_vid10540-vr.pdf) - - [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](http://www.commoncriteriaportal.org/files/epfiles/st_vid10529-vr.pdf) - - [Windows 7 and Windows Server 2008 R2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf) - - [Windows Vista and Windows Server 2008 Validation Report at EAL4+](http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-vr.pdf) - - [Windows Server 2008 Hyper-V Role Certification Report](http://www.commoncriteriaportal.org/files/epfiles/0570a_pdf.pdf) - - [Windows Vista and Windows Server 2008 Certification Report at EAL1](http://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_cr_v1.0.pdf) - - [Windows XP / Windows Server 2003 with x64 Hardware ETR](http://www.microsoft.com/downloads/details.aspx?familyid=6e8d98f9-25b9-4c85-9bd9-24d91ea3c9ef) - - [Windows XP / Windows Server 2003 with x64 Hardware ETR, Part II](http://www.microsoft.com/downloads/details.aspx?familyid=0c35e7d8-9c56-4686-b902-d5ffb9915658) - - [Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions Validation Report](http://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) - - [Windows XP Professional SP2 and x64 SP2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) - - [Windows XP Embedded SP2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) - - [Windows XP and Windows Server 2003 ETR](http://www.microsoft.com/downloads/details.aspx?familyid=63cf2a1e-f578-4bb5-9245-d411f0f64265) - - [Windows XP and Windows Server 2003 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid9506-vr.pdf) - - [Windows Server 2003 Certificate Server ETR](http://www.microsoft.com/downloads/details.aspx?familyid=a594e77f-dcbb-4787-9d68-e4689e60a314) - - [Windows Server 2003 Certificate Server Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid9507-vr.pdf) - - [Microsoft Windows Rights Management Services (RMS) 1.0 SP2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid10224-vr.pdf) - -## Other Common Criteria Related Documents - - - [Identifying Windows XP and Windows Server 2003 Common Criteria Certified Requirements for the NIST Special Publication 800-53](https://download.microsoft.com/download/a/9/6/a96d1dfc-2bd4-408d-8d93-e0ede7529691/xpws03_ccto800-53.doc) - +--- +title: Common Criteria Certifications +description: This topic details how Microsoft supports the Common Criteria certification program. +ms.prod: w10 +audience: ITPro +author: dulcemontemayor +ms.author: dolmont +manager: dansimp +ms.collection: M365-identity-device-management +ms.topic: article +ms.localizationpriority: medium +ms.date: 3/20/2019 +ms.reviewer: +--- + +# Common Criteria Certifications + +Microsoft is committed to optimizing the security of its products and services. As part of that commitment, Microsoft supports the Common Criteria certification program, continues to ensure that products incorporate the features and functions required by relevant Common Criteria protection profiles, and completes Common Criteria certifications of Microsoft Windows products. + +## Common Criteria Security Targets + +### Information for Systems Integrators and Accreditors + +The Security Target describes security functionality and assurance measures used to evaluate Windows. + + - [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/0/7/6/0764E933-DD0B-45A7-9144-1DD9F454DCEF/Windows%2010%201803%20GP%20OS%20Security%20Target.pdf) + - [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/B/6/A/B6A5EC2C-6351-4FB9-8FF1-643D4BD5BE6E/Windows%2010%201709%20GP%20OS%20Security%20Target.pdf) + - [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/8/b/e8b8c42a-a0b6-4ba1-9bdc-e704e8289697/windows%2010%20version%201703%20gp%20os%20security%20target%20-%20public%20\(january%2016,%202018\)\(final\)\(clean\).pdf) + - [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/1/c/3/1c3b5ab0-e064-4350-a31f-48312180d9b5/st_vid10823-st.pdf) + - [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/1/5/e/15eee6d3-f2a8-4441-8cb1-ce8c2ab91c24/windows%2010%20anniversary%20update%20mdf%20security%20target%20-%20public%20\(april%203%202017\).docx) + - [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/f/8/c/f8c1c2a4-719c-48ae-942f-9fd3ce5b238f/windows%2010%20au%20and%20server%202016%20gp%20os%20security%20target%20-%20public%20\(december%202%202016\)%20\(clean\).docx) + - [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client](https://download.microsoft.com/download/b/f/5/bf59e430-e57b-462d-8dca-8ac3c93cfcff/windows%2010%20anniversary%20update%20ipsec%20vpn%20client%20security%20target%20-%20public%20\(december%2029%202016\)%20\(clean\).docx) + - [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/3/7/2/372beb03-b1ed-4bb6-9b9b-b8f43afc570d/st_vid10746-st.pdf) + - [Microsoft Windows 10 November 2015 Update with Surface Book](https://download.microsoft.com/download/a/c/2/ac2a6ed8-4d2f-4f48-a9bf-f059d6c9af38/windows%2010%20mdf3%20security%20target%20-%20public%20\(june%2022%202016\)\(final\).docx) + - [Microsoft Windows 10 Mobile with Lumia 950, 950 XL, 550, 635, and Windows 10 with Surface Pro 4](https://www.niap-ccevs.org/st/st_vid10677-st.pdf) + - [Windows 10 and Windows Server 2012 R2](http://www.commoncriteriaportal.org/files/epfiles/st_windows10.pdf) + - [Windows 10](https://www.niap-ccevs.org/st/st_vid10677-st.pdf) + - [Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830](https://www.niap-ccevs.org/st/st_vid10635-st.pdf) + - [Microsoft Surface Pro 3 and Windows 8.1](https://www.niap-ccevs.org/st/st_vid10632-st.pdf) + - [Windows 8.1 and Windows Phone 8.1](https://www.niap-ccevs.org/st/st_vid10592-st.pdf) + - [Windows 8 and Windows Server 2012](https://www.niap-ccevs.org/st/st_vid10520-st.pdf) + - [Windows 8 and Windows RT](https://www.niap-ccevs.org/st/st_vid10620-st.pdf) + - [Windows 8 and Windows Server 2012 BitLocker](http://www.commoncriteriaportal.org/files/epfiles/st_vid10540-st.pdf) + - [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](http://www.commoncriteriaportal.org/files/epfiles/st_vid10529-st.pdf) + - [Windows 7 and Windows Server 2008 R2](http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf) + - [Microsoft Windows Server 2008 R2 Hyper-V Role](http://www.microsoft.com/download/en/details.aspx?id=29305) + - [Windows Vista and Windows Server 2008 at EAL4+](http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf) + - [Microsoft Windows Server 2008 Hyper-V Role](http://www.commoncriteriaportal.org/files/epfiles/0570b_pdf.pdf) + - [Windows Vista and Windows Server 2008 at EAL1](http://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_st_v1.0.pdf) + - [Windows Server 2003 SP2 including R2, x64, and IA64; Windows XP Professional SP2 and x64 SP2; and Windows XP Embedded SP2](http://www.commoncriteriaportal.org/files/epfiles/st_vid10184-st.pdf) + - [Windows Server 2003 Certificate Server](http://www.commoncriteriaportal.org/files/epfiles/st_vid9507-st.pdf) + - [Windows Rights Management Services (RMS) 1.0 SP2](http://www.commoncriteriaportal.org/files/epfiles/st_vid10224-st.pdf) + +## Common Criteria Deployment and Administration + +### Information for IT Administrators + +These documents describe how to configure Windows to replicate the configuration used during the Common Criteria evaluation. + +**Windows 10, Windows 10 Mobile, Windows Server 2016, Windows Server 2012 R2** + + + - [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/6/C/1/6C13FBFF-9CB0-455F-A1C8-3E3CB0ACBD7B/Windows%2010%201803%20GP%20OS%20Administrative%20Guide.pdf) + - [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/5/D/2/5D26F473-0FCE-4AC4-9065-6AEC0FE5B693/Windows%2010%201709%20GP%20OS%20Administrative%20Guide.pdf) + - [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/e/9/7/e97f0c7f-e741-4657-8f79-2c0a7ca928e3/windows%2010%20cu%20gp%20os%20operational%20guidance%20\(jan%208%202017%20-%20public\).pdf) + - [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/d/c/4/dc40b5c8-49c2-4587-8a04-ab3b81eb6fc4/st_vid10823-agd.pdf) + - [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/4/c/1/4c1f4ea4-2d66-4232-a0f5-925b2bc763bc/windows%2010%20au%20operational%20guidance%20\(16%20mar%202017\)\(clean\).docx) + - [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/b/5/2/b52e9081-05c6-4895-91a3-732bfa0eb4da/windows%2010%20au%20and%20server%202016%20gp%20os%20operational%20guidance%20\(final\).docx) + - [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client Operational Guidance](https://download.microsoft.com/download/2/c/c/2cc8f929-233e-4a40-b673-57b449680984/windows%2010%20au%20and%20server%202016%20ipsec%20vpn%20client%20operational%20guidance%20\(21%20dec%202016\)%20\(public\).docx) + - [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/3/3/f/33fa01dd-b380-46e1-833f-fd85854b4022/st_vid10746-agd.pdf) + - [Microsoft Windows 10 November 2015 Update with Surface Book Administrative Guide](https://download.microsoft.com/download/3/2/c/32c6fa02-b194-478f-a0f6-0215b47d0f40/windows%2010%20mdf3%20mobile%20device%20pp%20operational%20guidance%20\(may%2027,%202016\)\(public\).docx) + - [Microsoft Windows 10 Mobile and Windows 10 Administrative Guide](https://download.microsoft.com/download/2/d/c/2dce3435-9328-48e2-9813-c2559a8d39fa/microsoft%20windows%2010%20and%20windows%2010%20mobile%20guidance.pdf) + - [Windows 10 and Windows Server 2012 R2 Administrative Guide](https://download.microsoft.com/download/0/f/d/0fd33c9a-98ac-499e-882f-274f80f3d4f0/microsoft%20windows%2010%20and%20server%202012%20r2%20gp%20os%20guidance.pdf) + - [Windows 10 Common Criteria Operational Guidance](https://download.microsoft.com/download/d/6/f/d6fb4cec-f0f2-4d00-ab2e-63bde3713f44/windows%2010%20mobile%20device%20operational%20guidance.pdf) + +**Windows 8.1 and Windows Phone 8.1** + + - [Microsoft Surface Pro 3 Common Criteria Mobile Operational Guidance](https://download.microsoft.com/download/b/e/3/be365594-daa5-4af3-a6b5-9533d61eae32/surface%20pro%203%20mobile%20operational%20guidance.docx) + - [Windows 8.1 and Windows Phone 8.1 CC Supplemental Admin Guide](https://download.microsoft.com/download/b/0/e/b0e30225-5017-4241-ac0a-6c40bc8e6714/mobile%20operational%20guidance.docx) + +**Windows 8, Windows RT, and Windows Server 2012** + + - [Windows 8 and Windows Server 2012](https://download.microsoft.com/download/6/0/b/60b27ded-705a-4751-8e9f-642e635c3cf3/microsoft%20windows%208%20windows%20server%202012%20common%20criteria%20supplemental%20admin%20guidance.docx) + - [Windows 8 and Windows RT](https://download.microsoft.com/download/8/6/e/86e8c001-8556-4949-90cf-f5beac918026/microsoft%20windows%208%20microsoft%20windows%20rt%20common%20criteria%20supplemental%20admin.docx) + - [Windows 8 and Windows Server 2012 BitLocker](https://download.microsoft.com/download/0/8/4/08468080-540b-4326-91bf-f2a33b7e1764/administrative%20guidance%20for%20software%20full%20disk%20encryption%20clients.pdf) + - [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](https://download.microsoft.com/download/a/9/f/a9fd7e2d-023b-4925-a62f-58a7f1a6bd47/microsoft%20windows%208%20windows%20server%202012%20supplemental%20admin%20guidance%20ipsec%20vpn%20client.docx) + +**Windows 7 and Windows Server 2008 R2** + + - [Windows 7 and Windows Server 2008 R2 Supplemental CC Guide](https://www.microsoft.com/downloads/en/details.aspx?familyid=ee05b6d0-9939-4765-9217-63083bb94a00) + - [Windows Server 2008 R2 Hyper-V Common Criteria Configuration Guide](http://www.microsoft.com/download/en/details.aspx?id=29308) + +**Windows Vista and Windows Server 2008** + + - [Windows Vista and Windows Server 2008 Supplemental CC Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=06166288-24c4-4c42-9daa-2b2473ddf567) + - [Windows Server 2008 Hyper-V Role Common Criteria Administrator Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=cb19538d-9e13-4ab6-af38-8f48abfdad08) + +**Windows Server 2003 SP2 including R2, x64, and Itanium** + + - [Windows Server 2003 SP2 R2 Common Criteria Administrator Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=39598841-e693-4891-9234-cfd1550f3949) + - [Windows Server 2003 SP2 R2 Common Criteria Configuration Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=4f7b6a93-0307-480f-a5af-a20268cbd7cc) + +**Windows Server 2003 SP1(x86), x64, and IA64** + + - [Windows Server 2003 with x64 Hardware Administrator's Guide](http://www.microsoft.com/downloads/details.aspx?familyid=8a26829f-c177-4b79-913a-4135fb7b96ef) + - [Windows Server 2003 with x64 Hardware Configuration Guide](http://www.microsoft.com/downloads/details.aspx?familyid=3f9ecd0a-74dd-4d23-a4e5-d7b63fed70e8) + +**Windows Server 2003 SP1** + + - [Windows Server 2003 Administrator's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=75736009-59e9-4a71-879e-cf581817b8cc) + - [Windows Server 2003 Configuration Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=a0ad1856-beb7-4285-b47c-381e8a210c38) + +**Windows XP Professional SP2 (x86) and x64 Edition** + + - [Windows XP Common Criteria Administrator Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=9a7f0b16-72ce-4675-aec8-58785c4e37ee) + - [Windows XP Common Criteria Configuration Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=165da57d-f066-4ddf-9462-cbecfcd68694) + - [Windows XP Common Criteria User Guide 3.0](http://www.microsoft.com/downloads/details.aspx?familyid=7c1a4761-9b9e-429c-84eb-cd7b034c5779) + - [Windows XP Professional with x64 Hardware Administrator's Guide](http://www.microsoft.com/downloads/details.aspx?familyid=346f041e-d641-4af7-bdea-c5a3246d0431) + - [Windows XP Professional with x64 Hardware Configuration Guide](http://www.microsoft.com/downloads/details.aspx?familyid=a7075319-cc3d-4420-a00b-8c9a7068ad54) + - [Windows XP Professional with x64 Hardware User’s Guide](http://www.microsoft.com/downloads/details.aspx?familyid=26c49cf5-6159-4197-97ce-bf1fdfc54569) + +**Windows XP Professional SP2, and XP Embedded SP2** + + - [Windows XP Professional Administrator's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=9bcac470-a0b3-4d34-a561-fa8308c0ff60) + - [Windows XP Professional Configuration Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=9f04915e-571a-422d-8ffa-5797051e81de) + - [Windows XP Professional User's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=d39d0028-7093-495c-80da-2b5b29a54bd8) + +**Windows Server 2003 Certificate Server** + + - [Windows Server 2003 Certificate Server Administrator's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=445093d8-45e2-4cf6-884c-8802c1e6cb2d) + - [Windows Server 2003 Certificate Server Configuration Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=46abc8b5-11be-4e3d-85c2-63226c3688d2) + - [Windows Server 2003 Certificate Server User's Guide](http://www.microsoft.com/downloads/en/details.aspx?familyid=74f66d84-2654-48d0-b9b5-b383d383425e) + +## Common Criteria Evaluation Technical Reports and Certification / Validation Reports + +### Information for Systems Integrators and Accreditors + +An Evaluation Technical Report (ETR) is a report submitted to the Common Criteria certification authority for how Windows complies with the claims made in the Security Target. A Certification / Validation Report provides the results of the evaluation by the validation team. + + - [Microsoft Windows 10 (April 2018 Update)](http://download.microsoft.com/download/6/7/1/67167BF2-885D-4646-A61E-96A0024B52BB/Windows%2010%201803%20GP%20OS%20Certification%20Report.pdf) + - [Microsoft Windows 10 (Fall Creators Update)](https://download.microsoft.com/download/2/C/2/2C20D013-0610-4047-B2FA-516819DFAE0A/Windows%2010%201709%20GP%20OS%20Certification%20Report.pdf) + - [Microsoft Windows 10 (Creators Update)](https://download.microsoft.com/download/3/2/c/32cdf627-dd23-4266-90ff-2f9685fd15c0/2017-49%20inf-2218%20cr.pdf) + - [Microsoft Windows Server 2016, Microsoft Windows Server 2012 R2, and Microsoft Windows 10 Hyper-V](https://download.microsoft.com/download/a/3/3/a336f881-4ac9-4c79-8202-95289f86bb7a/st_vid10823-vr.pdf) + - [Microsoft Windows 10 (Anniversary Update) and Windows 10 Mobile (Anniversary Update)](https://download.microsoft.com/download/f/2/f/f2f7176e-34f4-4ab0-993c-6606d207bb3c/st_vid10752-vr.pdf) + - [Microsoft Windows 10 (Anniversary Update) and Windows Server 2016](https://download.microsoft.com/download/5/4/8/548cc06e-c671-4502-bebf-20d38e49b731/2016-36-inf-1779.pdf) + - [Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client](https://download.microsoft.com/download/2/0/a/20a8e686-3cd9-43c4-a22a-54b552a9788a/st_vid10753-vr.pdf) + - [Microsoft Windows 10 IPsec VPN Client](https://download.microsoft.com/download/9/b/6/9b633763-6078-48aa-b9ba-960da2172a11/st_vid10746-vr.pdf) + - [Microsoft Windows 10 November 2015 Update with Surface Book](https://download.microsoft.com/download/d/c/b/dcb7097d-1b9f-4786-bb07-3c169fefb579/st_vid10715-vr.pdf) + - [Microsoft Windows 10 Mobile with Lumia 950, 950 XL, 550, 635, and Windows 10 with Surface Pro 4](https://www.niap-ccevs.org/st/st_vid10694-vr.pdf) + - [Windows 10 and Windows Server 2012 R2](https://www.commoncriteriaportal.org/files/epfiles/cr_windows10.pdf) + - [Windows 10](https://www.niap-ccevs.org/st/st_vid10677-vr.pdf) + - [Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830](https://www.niap-ccevs.org/st/st_vid10635-vr.pdf) + - [Microsoft Surface Pro 3 and Windows 8.1](https://www.niap-ccevs.org/st/st_vid10632-vr.pdf) + - [Windows 8.1 and Windows Phone 8.1](https://www.niap-ccevs.org/st/st_vid10592-vr.pdf) + - [Windows 8 and Windows Server 2012](https://www.niap-ccevs.org/st/st_vid10520-vr.pdf) + - [Windows 8 and Windows RT](https://www.niap-ccevs.org/st/st_vid10620-vr.pdf) + - [Windows 8 and Windows Server 2012 BitLocker](http://www.commoncriteriaportal.org/files/epfiles/st_vid10540-vr.pdf) + - [Windows 8, Windows RT, and Windows Server 2012 IPsec VPN Client](http://www.commoncriteriaportal.org/files/epfiles/st_vid10529-vr.pdf) + - [Windows 7 and Windows Server 2008 R2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf) + - [Windows Vista and Windows Server 2008 Validation Report at EAL4+](http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-vr.pdf) + - [Windows Server 2008 Hyper-V Role Certification Report](http://www.commoncriteriaportal.org/files/epfiles/0570a_pdf.pdf) + - [Windows Vista and Windows Server 2008 Certification Report at EAL1](http://www.commoncriteriaportal.org/files/epfiles/efs-t005_msvista_msserver2008_eal1_cr_v1.0.pdf) + - [Windows XP / Windows Server 2003 with x64 Hardware ETR](http://www.microsoft.com/downloads/details.aspx?familyid=6e8d98f9-25b9-4c85-9bd9-24d91ea3c9ef) + - [Windows XP / Windows Server 2003 with x64 Hardware ETR, Part II](http://www.microsoft.com/downloads/details.aspx?familyid=0c35e7d8-9c56-4686-b902-d5ffb9915658) + - [Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions Validation Report](http://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) + - [Windows XP Professional SP2 and x64 SP2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) + - [Windows XP Embedded SP2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/20080303_st_vid10184-vr.pdf) + - [Windows XP and Windows Server 2003 ETR](http://www.microsoft.com/downloads/details.aspx?familyid=63cf2a1e-f578-4bb5-9245-d411f0f64265) + - [Windows XP and Windows Server 2003 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid9506-vr.pdf) + - [Windows Server 2003 Certificate Server ETR](http://www.microsoft.com/downloads/details.aspx?familyid=a594e77f-dcbb-4787-9d68-e4689e60a314) + - [Windows Server 2003 Certificate Server Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid9507-vr.pdf) + - [Microsoft Windows Rights Management Services (RMS) 1.0 SP2 Validation Report](http://www.commoncriteriaportal.org/files/epfiles/st_vid10224-vr.pdf) + +## Other Common Criteria Related Documents + + - [Identifying Windows XP and Windows Server 2003 Common Criteria Certified Requirements for the NIST Special Publication 800-53](https://download.microsoft.com/download/a/9/6/a96d1dfc-2bd4-408d-8d93-e0ede7529691/xpws03_ccto800-53.doc) + From e1a4bd3ca15a9cec8ae1b56b7fa47742bc145931 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Mon, 17 Jun 2019 09:58:10 -0700 Subject: [PATCH 227/303] Added no index no follow on two placeholder topics --- devices/surface-hub/surface-hub-2s-service-update.md | 1 + devices/surface-hub/surface-hub-2s-startup.md | 1 + 2 files changed, 2 insertions(+) diff --git a/devices/surface-hub/surface-hub-2s-service-update.md b/devices/surface-hub/surface-hub-2s-service-update.md index cee17e9af4..75d2e652c6 100644 --- a/devices/surface-hub/surface-hub-2s-service-update.md +++ b/devices/surface-hub/surface-hub-2s-service-update.md @@ -9,6 +9,7 @@ ms.author: robmazz audience: Admin ms.topic: article ms.localizationpriority: Normal +ROBOTS: NOINDEX, NOFOLLOW --- # Servicing and updating Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-startup.md b/devices/surface-hub/surface-hub-2s-startup.md index 2ceccf0497..bef171d8ad 100644 --- a/devices/surface-hub/surface-hub-2s-startup.md +++ b/devices/surface-hub/surface-hub-2s-startup.md @@ -9,6 +9,7 @@ ms.author: robmazz audience: Admin ms.topic: article ms.localizationpriority: Normal +ROBOTS: NOINDEX, NOFOLLOW --- # Out-of-box startup for Surface Hub 2S From fa17b0052420383eb2f188f08914d0665f74151f Mon Sep 17 00:00:00 2001 From: Eric Orman Date: Mon, 17 Jun 2019 10:35:09 -0700 Subject: [PATCH 228/303] Refresh after migrating content to Intune Updated header Removed sections that were moved to Intune ESP doc Updated ESP syntax to be Enrollment Status Page. --- .../windows-autopilot/enrollment-status.md | 30 ++++--------------- 1 file changed, 5 insertions(+), 25 deletions(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 6f995f3299..b5f929c753 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -21,34 +21,14 @@ ms.topic: article **Applies to** -- Windows 10 +- Windows 10 (1803 and newer) -The Windows Autopilot Enrollment Status Page displays the status of the complete device configuration process. Incorporating feedback from customers, this provides information to the user to show that the device is being configured. The Enrollment Status Page can be also configured to prevent access to the desktop until the configuration process is complete. +The Enrollment Status Page (ESP) displays the status of the complete device configuration process when a MDM managed user signs into a device for the very first time. The benefit of using the ESP will help users understand the progress of their device provisioning status along with ensuring the device has met the organizations desired state before the user can access the desktop for the first time. + +The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an Administrator can deploy ESP profiles to a licensed Intune user along with configuring specific settings within the ESP profile; a few of these settings are, force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. Read more about [how to setup the Enrollment Status Page in Intune.] (https://docs.microsoft.com/en-us/intune/windows-enrollment-status). ![Enrollment status page](images/enrollment-status-page.png) -From Windows 10 version 1803 onwards, you can opt out of the account setup phase. If it is skipped, settings will be applied for users when they access their desktop for the first time. - -## Available settings - - The following settings can be configured to customize behavior of the enrollment status page: - - -
          SettingYesNo -
          Show app and profile installation progressThe enrollment status page is displayed.The enrollment status page is not displayed. -
          Block device use until all apps and profiles are installedThe settings in this table are made available to customize behavior of the enrollment status page, so that the user can address potential installation issues. -The enrollment status page is displayed with no additional options to address installation failures. -
          Allow users to reset device if installation error occursA Reset device button is displayed if there is an installation failure.The Reset device button is not displayed if there is an installation failure. -
          Allow users to use device if installation error occursA Continue anyway button is displayed if there is an installation failure.The Continue anyway button is not displayed if there is an installation failure. -
          Show error when installation takes longer than specified number of minutesSpecify the number of minutes to wait for installation to complete. A default value of 60 minutes is entered. -
          Show custom message when an error occursA text box is provided where you can specify a custom message to display in case of an installation error.The default message is displayed:
          Oh no! Something didn't do what it was supposed to. Please contact your IT department. -
          Allow users to collect logs about installation errorsIf there is an installation error, a Collect logs button is displayed.
          If the user clicks this button they are asked to choose a location to save the log file MDMDiagReport.cab
          The Collect logs button is not displayed if there is an installation error. -
          Block device use until these required apps are installed if they are assigned to the user/deviceChoose All or Selected.

          If Selected is chosen, a Select apps button is displayed that enables you to choose which apps must be installed prior to enabling device use. -
          - -See the following example: - - ![Enrollment status page settings](images/esp-settings.png) ## Installation progress tracking @@ -69,7 +49,7 @@ The following types of policies and installations are not tracked: ## More information -For more information on configuring the Enrollment Status page, see the [Microsoft Intune documentation](https://docs.microsoft.com/intune/windows-enrollment-status).
          +For more information on configuring the Enrollment Status Page, see the [Microsoft Intune documentation](https://docs.microsoft.com/intune/windows-enrollment-status).
          For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP documentation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).
          For more information about blocking for app installation: - [Blocking for app installation using Enrollment Status Page](https://blogs.technet.microsoft.com/mniehaus/2018/12/06/blocking-for-app-installation-using-enrollment-status-page/). From 3b808258c1876f835bd8338ba87a7909cf79de9c Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 17 Jun 2019 12:22:02 -0700 Subject: [PATCH 229/303] More updates --- devices/surface-hub/TOC.md | 4 +++- ...fferences-between-surface-hub-and-windows-10-enterprise.md | 2 +- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index c38d17ef4f..5af3f32fcc 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -13,6 +13,7 @@ #### [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) #### [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) #### [Customizing installation of Surface Hub 2S](surface-hub-2s-custom-install.md) +#### [Setup worksheet](setup-worksheet-surface-hub.md) #### [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) #### [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) ### [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) @@ -43,12 +44,13 @@ ## Support ### [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) +### [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) ### [Change history](surface-hub-2s-change-history.md) # Surface Hub ## Overview ### [What's new in Windows 10, version 1703 for Surface Hub?](surfacehub-whats-new-1703.md) -### [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) +### [Operating system essentials (Surface Hub)](differences-between-surface-hub-and-windows-10-enterprise.md) ## Plan ### [Prepare your environment for Microsoft Surface Hub](prepare-your-environment-for-surface-hub.md) diff --git a/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md b/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md index d611489003..3950b05bd1 100644 --- a/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md +++ b/devices/surface-hub/differences-between-surface-hub-and-windows-10-enterprise.md @@ -13,7 +13,7 @@ manager: dansimp ms.localizationpriority: medium --- -# Differences between Surface Hub and Windows 10 Enterprise +# Operating system essentials (Surface Hub) The Surface Hub operating system, Windows 10 Team, is based on Windows 10 Enterprise, providing rich support for enterprise management, security, and other features. However, there are important differences between them. While the Enterprise edition is designed for PCs, Windows 10 Team is designed from the ground up for large screens and meeting rooms. When you evaluate security and management requirements for Surface Hub, it's best to consider it as a new operating system. This article is designed to help highlight the key differences between Windows 10 Team on Surface Hub and Windows 10 Enterprise, and what the differences mean for your organization. From 7596deb49249efa9831a1ed3b45ee2b7731b5db5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 12:43:54 -0700 Subject: [PATCH 230/303] added a term page --- windows/deployment/planning/TOC.md | 1 + .../deployment/planning/features-lifecycle.md | 38 +++++++++++++++++++ 2 files changed, 39 insertions(+) create mode 100644 windows/deployment/planning/features-lifecycle.md diff --git a/windows/deployment/planning/TOC.md b/windows/deployment/planning/TOC.md index 0496ee97d5..dc77423c8a 100644 --- a/windows/deployment/planning/TOC.md +++ b/windows/deployment/planning/TOC.md @@ -5,6 +5,7 @@ ## [Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) ## Features removed or planned for replacement +### [Windows 10 features lifecycle](features-lifecycle.md) ### [Windows 10, version 1903](windows-10-1903-removed-features.md) ### [Windows 10, version 1809](windows-10-1809-removed-features.md) ### [Windows 10, version 1803](windows-10-1803-removed-features.md) diff --git a/windows/deployment/planning/features-lifecycle.md b/windows/deployment/planning/features-lifecycle.md new file mode 100644 index 0000000000..b0e171d783 --- /dev/null +++ b/windows/deployment/planning/features-lifecycle.md @@ -0,0 +1,38 @@ +--- +title: Windows 10 features lifecycle +description: Learn about the lifecycle of Windows 10 features +ms.prod: w10 +ms.mktglfcycl: plan +ms.localizationpriority: medium +ms.sitesec: library +author: greg-lindsay +ms.author: greglin +ms.topic: article +--- +# Windows 10 features lifecycle + +- Applies to: Windows 10 + +Each release of Windows 10 contains many new and improved features. Occasionally we also remove features and functionality, usually because there is a better option. + +## Features removed or planned for replacement + +See the following for details about feature support for each release of Windows 10. + +[Windows 10, version 1903](windows-10-1903-removed-features.md)
          +[Windows 10, version 1809](windows-10-1809-removed-features.md)
          +[Windows 10, version 1803](windows-10-1803-removed-features.md)
          +[Windows 10, version 1709](windows-10-1709-removed-features.md)
          +[Windows 10, version 1703](windows-10-1703-removed-features.md) + +Also see: [Windows 10 release information](https://docs.microsoft.com/windows/release-information/) + +## Terminology + +The following terms can be used to describe the status that might be assigned to a feature during its lifecycle. + +- **Deprecation**: The stage of the product lifecycle when a feature or functionality is no longer in active development and may be removed in future releases of a product or online service. +- **End of support**: The stage of the product lifecycle when support and servicing are no longer available for a product. +- **Retirement**: The stage of the product lifecycle when an online service is shut down so that it is no longer available for use. +- **Remove or retire a feature**: The stage of the product lifecycle when a feature or functionality is removed from an online service after it has been deprecated. +- **Replace a feature**: The stage of the product lifecycle when a feature or functionality in an online service is replaced with a different feature or functionality. From 5b3d4ea408947a69a34e81b419317c1ce294a2cf Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 12:47:44 -0700 Subject: [PATCH 231/303] Update enrollment-status.md --- windows/deployment/windows-autopilot/enrollment-status.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index b5f929c753..354d0a8574 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -21,7 +21,7 @@ ms.topic: article **Applies to** -- Windows 10 (1803 and newer) +- Windows 10, version 1803 and later The Enrollment Status Page (ESP) displays the status of the complete device configuration process when a MDM managed user signs into a device for the very first time. The benefit of using the ESP will help users understand the progress of their device provisioning status along with ensuring the device has met the organizations desired state before the user can access the desktop for the first time. From c13986984526a13a66b1832dd16dfc397272c0c5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 12:48:34 -0700 Subject: [PATCH 232/303] Update enrollment-status.md --- windows/deployment/windows-autopilot/enrollment-status.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 354d0a8574..6e687bfa01 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -23,7 +23,7 @@ ms.topic: article - Windows 10, version 1803 and later -The Enrollment Status Page (ESP) displays the status of the complete device configuration process when a MDM managed user signs into a device for the very first time. The benefit of using the ESP will help users understand the progress of their device provisioning status along with ensuring the device has met the organizations desired state before the user can access the desktop for the first time. +The Enrollment Status Page (ESP) displays the status of the complete device configuration process when an MDM managed user signs into a device for the very first time. The benefit of using the ESP will help users understand the progress of their device provisioning status along with ensuring the device has met the organizations desired state before the user can access the desktop for the first time. The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an Administrator can deploy ESP profiles to a licensed Intune user along with configuring specific settings within the ESP profile; a few of these settings are, force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. Read more about [how to setup the Enrollment Status Page in Intune.] (https://docs.microsoft.com/en-us/intune/windows-enrollment-status). From 9e75e77c51da99bc398485e03a3d32db921e8a2a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 12:52:17 -0700 Subject: [PATCH 233/303] Update enrollment-status.md --- windows/deployment/windows-autopilot/enrollment-status.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 6e687bfa01..e23bd3a77c 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -23,9 +23,9 @@ ms.topic: article - Windows 10, version 1803 and later -The Enrollment Status Page (ESP) displays the status of the complete device configuration process when an MDM managed user signs into a device for the very first time. The benefit of using the ESP will help users understand the progress of their device provisioning status along with ensuring the device has met the organizations desired state before the user can access the desktop for the first time. +The Enrollment Status Page (ESP) displays the status of the complete device configuration process when an MDM managed user signs into a device for the very first time. The ESP will help users understand the progress of device provisioning and ensures the device has met the organizations desired state before the user can access the desktop for the first time. -The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an Administrator can deploy ESP profiles to a licensed Intune user along with configuring specific settings within the ESP profile; a few of these settings are, force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. Read more about [how to setup the Enrollment Status Page in Intune.] (https://docs.microsoft.com/en-us/intune/windows-enrollment-status). +The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an administrator can deploy ESP profiles to a licensed Intune user and configure specific settings within the ESP profile; a few of these settings are: force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. For more information, see [how to setup the Enrollment Status Page in Intune.] (https://docs.microsoft.com/en-us/intune/windows-enrollment-status). ![Enrollment status page](images/enrollment-status-page.png) From c22e7ed5a44fdef2c21b39eb3d74cdeefc99b984 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 13:14:17 -0700 Subject: [PATCH 234/303] typo fixes and added a link --- windows/deployment/windows-autopilot/add-devices.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/windows-autopilot/add-devices.md b/windows/deployment/windows-autopilot/add-devices.md index ba8e94c735..73f7445a6c 100644 --- a/windows/deployment/windows-autopilot/add-devices.md +++ b/windows/deployment/windows-autopilot/add-devices.md @@ -40,7 +40,7 @@ Windows Autopilot does not require delegated administrator permissions when esta ## Automatic registration of existing devices -If an existing device is already running Windows 10 version 1703 or later and enrolled in an MDM service such an Intune, that MDM service can ask the device for the hardwareh ID (also known as a hardware hash). Once it has that, it can automatically register the device with Windows Autopilot. +If an existing device is already running Windows 10 version 1703 or later and enrolled in an MDM service such an Intune, that MDM service can ask the device for the hardware ID (also known as a hardware hash). Once it has that, it can automatically register the device with Windows Autopilot. For instructions on how to do this with Microsoft Intune, see [Create an Autopilot deployment profile](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-deployment-profile) documentation describing the "Convert all targeted devices to Autopilot" setting. @@ -48,7 +48,7 @@ Also note that when using the [Windows Autopilot for existing devices](https://d ## Manual registration -To perform manual registration of a device, you must first caputure its hardware ID (also known as a hardware hash). Once this process has completed, the resulting hardware ID can be uploaded to the Windows Autopilot service. Because this process requires booting the device into Windows 10 in order to obtain the hardware ID, this is intended primarily for testing and evaluation scenarios. +To perform manual registration of a device, you must first capture its hardware ID (also known as a hardware hash). Once this process has completed, the resulting hardware ID can be uploaded to the Windows Autopilot service. Because this process requires booting the device into Windows 10 in order to obtain the hardware ID, this is intended primarily for testing and evaluation scenarios. ## Device identification @@ -76,7 +76,7 @@ Install-Script -Name Get-WindowsAutoPilotInfo Get-WindowsAutoPilotInfo.ps1 -OutputFile AutoPilotHWID.csv ``` -The commands can also be run remotely, as long as WMI permissions are in place and WMI is accessible through the Windows Firewall on that remote computer. See the Get-WindowsAutoPilotInfo script’s help (using “Get-Help Get-WindowsAutoPilotInfo.ps1”) for more information about running the script. +The commands can also be run remotely, as long as WMI permissions are in place and WMI is accessible through the Windows Firewall on that remote computer. See the [Get-WindowsAutoPilotInfo](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) script’s help (using “Get-Help Get-WindowsAutoPilotInfo.ps1”) for more information about running the script. >[!IMPORTANT] >Do not connect devices to the Internet prior to capturing the hardware ID and creating an Autopilot device profile. This includes collecting the hardware ID, uploading the .CSV into MSfB or Intune, assigning the profile, and confirming the profile assignment. Connecting the device to the Internet before this process is complete will result in the device downloading a blank profile that is stored on the device until it is explicity removed. In Windows 10 version 1809, you can clear the cached profile by restarting OOBE. In previous versions, the only way to clear the stored profile is to re-install the OS, reimage the PC, or run **sysprep /generalize /oobe**.
          From fe6bff43f2b625aef508c695aab31c8120e3669a Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Mon, 17 Jun 2019 13:22:18 -0700 Subject: [PATCH 235/303] Testing new hub page design --- devices/surface/index-new.md | 137 +++++++++++++++++++++++++++++++++++ 1 file changed, 137 insertions(+) create mode 100644 devices/surface/index-new.md diff --git a/devices/surface/index-new.md b/devices/surface/index-new.md new file mode 100644 index 0000000000..480967a3f6 --- /dev/null +++ b/devices/surface/index-new.md @@ -0,0 +1,137 @@ +--- +title: Microsoft Surface documentation and resources +layout: HubPage +hide_bc: true +description: Surface and Surface Hub documentation for admins & IT professionals +author: robmazz +ms.author: robmazz +manager: laurawi +ms.topic: hub-page +keywords: Microsoft Surface, Microsoft Surface Hub, Surface documentation +localization_priority: Normal +audience: ITPro +ms.prod: Surface +description: Learn about Microsoft Surface and Surface Hub devices. +--- + + +--- + + \ No newline at end of file From a39ab0a7cc3531b858d6e76374c3b9af510cd693 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 13:35:32 -0700 Subject: [PATCH 236/303] capitalization --- windows/deployment/windows-autopilot/TOC.md | 2 +- .../deployment/windows-autopilot/enrollment-status.md | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/deployment/windows-autopilot/TOC.md b/windows/deployment/windows-autopilot/TOC.md index a2ae9455f6..4ad5db1e36 100644 --- a/windows/deployment/windows-autopilot/TOC.md +++ b/windows/deployment/windows-autopilot/TOC.md @@ -16,7 +16,7 @@ # Administering Windows Autopilot ## [Registering devices](add-devices.md) ## [Configuring device profiles](profiles.md) -## [Enrollment status page](enrollment-status.md) +## [Enrollment Status Page](enrollment-status.md) ## [BitLocker encryption](bitlocker.md) ## [Troubleshooting](troubleshooting.md) ## [Known issues](known-issues.md) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index e23bd3a77c..0f12ca2272 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -1,8 +1,8 @@ --- -title: Windows Autopilot Enrollment Status page +title: Windows Autopilot Enrollment Status Page ms.reviewer: manager: laurawi -description: Gives an overview of the enrollment status page capabilities, configuration +description: Gives an overview of the Enrollment Status Page capabilities, configuration keywords: Autopilot Plug and Forget, Windows 10 ms.prod: w10 ms.technology: Windows @@ -17,7 +17,7 @@ ms.topic: article --- -# Windows Autopilot Enrollment Status page +# Windows Autopilot Enrollment Status Page **Applies to** @@ -27,12 +27,12 @@ The Enrollment Status Page (ESP) displays the status of the complete device conf The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an administrator can deploy ESP profiles to a licensed Intune user and configure specific settings within the ESP profile; a few of these settings are: force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. For more information, see [how to setup the Enrollment Status Page in Intune.] (https://docs.microsoft.com/en-us/intune/windows-enrollment-status). - ![Enrollment status page](images/enrollment-status-page.png) + ![Enrollment Status Page](images/enrollment-status-page.png) ## Installation progress tracking -The Enrollment Status page tracks a subset of the available MDM CSP policies that are delivered to the device as part of the complete device configuration process. The specific types of policies that are tracked include: +The Enrollment Status Page tracks a subset of the available MDM CSP policies that are delivered to the device as part of the complete device configuration process. The specific types of policies that are tracked include: - Certain types of app installations. - Enterprise modern apps (Appx/MSIX) installed by the [Enterprise Modern App Managment CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisemodernappmanagement-csp). From fa80fbf517ec0f75016cb3c21ea0885149a860a5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 13:39:43 -0700 Subject: [PATCH 237/303] incorrectly linked text --- windows/deployment/windows-autopilot/enrollment-status.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 0f12ca2272..273db71731 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -25,7 +25,7 @@ ms.topic: article The Enrollment Status Page (ESP) displays the status of the complete device configuration process when an MDM managed user signs into a device for the very first time. The ESP will help users understand the progress of device provisioning and ensures the device has met the organizations desired state before the user can access the desktop for the first time. -The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an administrator can deploy ESP profiles to a licensed Intune user and configure specific settings within the ESP profile; a few of these settings are: force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. For more information, see [how to setup the Enrollment Status Page in Intune.] (https://docs.microsoft.com/en-us/intune/windows-enrollment-status). +The ESP will track the installation of applications, security policies, certificates and network connections. Within Intune, an administrator can deploy ESP profiles to a licensed Intune user and configure specific settings within the ESP profile; a few of these settings are: force the installation of specified applications, allow users to collect troubleshooting logs, specify what a user can do if device setup fails. For more information, see how to set up the [Enrollment Status Page in Intune](https://docs.microsoft.com/intune/windows-enrollment-status). ![Enrollment Status Page](images/enrollment-status-page.png) From 1169267ee07491768fe2bb6349047ae1a65fea7b Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 13:43:18 -0700 Subject: [PATCH 238/303] fix bad link --- devices/surface/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 3b0acc91f0..32e008d49c 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -29,7 +29,7 @@ ### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) ### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) ### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) -## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business-intro.md) +## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-for-business-intro.md) ### [Deploy Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) ### [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) ### [Run Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) From 248364d55d73cd37f48da0aae6172f72b3a73c16 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Mon, 17 Jun 2019 14:01:36 -0700 Subject: [PATCH 239/303] Second test hub page --- devices/surface/index-new2.md | 151 ++++++++++++++++++++++++++++++++++ 1 file changed, 151 insertions(+) create mode 100644 devices/surface/index-new2.md diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md new file mode 100644 index 0000000000..3d120d51eb --- /dev/null +++ b/devices/surface/index-new2.md @@ -0,0 +1,151 @@ +--- +layout: HubPage +hide_bc: true +title: Product +description: Product +--- + From cb487868b4cff6f30049e41148d6e95f34874655 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Mon, 17 Jun 2019 14:20:51 -0700 Subject: [PATCH 240/303] test index page metadata update --- devices/surface/index-new2.md | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 3d120d51eb..8a5972efe7 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -1,8 +1,17 @@ --- +title: Microsoft Surface documentation and resources layout: HubPage hide_bc: true -title: Product -description: Product +description: Surface and Surface Hub documentation for admins & IT professionals +author: robmazz +ms.author: robmazz +manager: laurawi +ms.topic: hub-page +keywords: Microsoft Surface, Microsoft Surface Hub, Surface documentation +localization_priority: Normal +audience: ITPro +ms.prod: Surface +description: Learn about Microsoft Surface and Surface Hub devices. ---
          From bb9e228dde1b51de384fe6196731cd39fa0c81c0 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 14:51:09 -0700 Subject: [PATCH 241/303] fix bad link --- windows/deployment/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 9e17a20e8b..9530728934 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -50,7 +50,7 @@ sections: [What's new in Windows 10 deployment](deploy-whats-new.md) See this topic for a summary of new features and some recent changes related to deploying Windows 10 in your organization. [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the key capabilities and limitations of each, is a key task. [Windows Autopilot](windows-autopilot/windows-autopilot.md) Windows Autopilot enables an IT department to pre-configure new devices and repurpose existing devices with a simple process that requires little to no infrastructure. - [Windows 10 Subscription Activation](windows-10-enterprise-subscription-activation.md) Windows 10 Enterprise has traditionally been sold as on premises software, however, with Windows 10 version 1703 (also known as the Creator’s Update), both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as true online services via subscription. You can move from Windows 10 Pro to Windows 10 Enterprise with no keys and no reboots. If you are using a Cloud Service Providers (CSP) see the related topic: [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md). + [Windows 10 Subscription Activation](windows-10-subscription-activation.md) Windows 10 Enterprise has traditionally been sold as on premises software, however, with Windows 10 version 1703 (also known as the Creator’s Update), both Windows 10 Enterprise E3 and Windows 10 Enterprise E5 are available as true online services via subscription. You can move from Windows 10 Pro to Windows 10 Enterprise with no keys and no reboots. If you are using a Cloud Service Providers (CSP) see the related topic: [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md). [Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) This topic provides a brief introduction to Windows 10 installation processes, and provides resolution procedures that IT administrators can use to resolve issues with Windows 10 upgrade. " From da25b81a443fa8e4e9422303d9290dd504902bac Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 17 Jun 2019 14:51:28 -0700 Subject: [PATCH 242/303] fix redirect --- .openpublishing.redirection.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4ce774ddfc..7254840960 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14958,8 +14958,8 @@ "redirect_document_id": true }, { -"source_path": "windows/windows/deployment/windows-10-enterprise-subscription-activation.md", -"redirect_url": "/windows/windows/deployment/windows-10-subscription-activation", +"source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md", +"redirect_url": "/windows/deployment/windows-10-subscription-activation", "redirect_document_id": true }, { From b5f2013f418e60acf2bdb8823ea52144e054ea10 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 15:26:12 -0700 Subject: [PATCH 243/303] edit --- windows/deployment/upgrade/setupdiag.md | 40 ++++++++++++++----------- 1 file changed, 22 insertions(+), 18 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 7cb1276811..2c1c65fbae 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -299,28 +299,32 @@ Each rule name and its associated unique rule identifier are listed with a descr - Indicates a sysPrep plug-in has failed in a critical operation. Indicates the plug-in name, operation name and error code. 53. UserProvidedDriverInjectionFailure - 2247C48A-7EE3-4037-AFAB-95B92DE1D980 - A driver provided to setup (via command line input) has failed in some way. Outputs the driver install function and error code. -54. New rule description. -55. New rule description. -56. New rule description. +54. PlugInComplianceBlock - D912150B-1302-4860-91B5-527907D08960 + - These are for server upgrades only, will output the compliance block and remediation required. +55. PreReleaseWimMountDriverFound - 31EC76CC-27EC-4ADC-9869-66AABEDB56F0 + - Captures failures due to having an unrecognized wimmount.sys driver registered on the system. +56. WinSetupBootFilterFailure - C073BFC8-5810-4E19-B53B-4280B79E096C + - Detects failures in the kernel mode file operations. +57. WimMountDriverIssue - 565B60DD-5403-4797-AE3E-BC5CB972FBAE + - Detects failures in WimMount.sys registration on the system. +58. DISMImageSessionFailure - 61B7886B-10CD-4C98-A299-B987CB24A11C + - Captures failure information when DISM fails to start an image session successfully. +59. FindEarlyDownlevelError - A4CE4FC9-5E10-4BB1-8ECE-3B29EB9D7C52 + - Detects failures in down-level phase before setup platform is invoked. +60. FindSPFatalError - A4028172-1B09-48F8-AD3B-86CDD7D55852 + - Captures failure information when setup platform encounters a fatal error. + ## Release notes -06/19/2019 - SetupDiag v1.5.0.0 is released with 56 rules, as a standalone tool available from the Download Center. - - All date and time outputs are updated to localized format per user request. - - SetupPhase and SetupOperation information has been added to /verbose output. - - Added las Setup Operation and last Setup Phase information to most rules where it make sense (see new output below). - - There is a huge performance improvement in searching setupact.logs to determine correct log to parse. What used to take a minute or more, now typically takes seconds. For example, a sample cab with 9 setupact.logs (three over 200mb each) that used to take nearly 2 minutes in version 1.4.1 now takes 12 seconds. - - Added SetupDiag version number to text report (xml and json always had it). +06/19/2019 - SetupDiag v1.5.0.0 is released with 60 rules, as a standalone tool available from the Download Center. + - Formatted Json output for easy readability. + - Added setup Operation and Phase information to /verbose log. + - Performance improvements when searching for setup logs; this should be much faster now. - Added "no match" reports for xml and json per user request. - - Added a rule for DISM Image Session Failures. - - Added a rule for failures revolving around WimMount registration (Driver location info in the registry). - - Added a rule for WinSetupBootFilter driver failures. - - Added a rule for early down-level failures that occur early in the down-level phase per user request. - - Overall rules processing performance is improved. - - Information is now output to the registry at **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag** - - This enables Configuration Manager, Intune and Enterprise customers to query the registry on targeted systems to get SetupDiag failure information. - - This registry information will soon be integrated with the GetHelp app to help customer service and support agents more quickly help with update failures. - - The **/AddReg** command was added to toggle registry output. This setting is **off** by default for offline mode, and **on** by default for online mode. The command has no effect for online mode and enables registry output for offline mode. + - Added 7 new rules: PlugInComplianceBlock, PreReleaseWimMountDriverFound, WinSetupBootFilterFailure, WimMountDriverIssue, DISMImageSessionFailure, FindEarlyDownlevelError, and FindSPFatalError. See the [Rules](#rules) section above for more information. + - Diagnostic information is now output to the registry at **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag** + - The **/AddReg** command was added to toggle registry output. This setting is off by default for offline mode, and on by default for online mode. The command has no effect for online mode and enables registry output for offline mode. - This registry key is deleted as soon as SetupDiag is run a second time, and replaced with current data, so it’s always up to date. - This registry key also gets deleted when a new update instance is invoked. - For an example, see [Sample registry key](#sample-registry-key). From 9743f2250411ad55ee8091a2e26aad7a39bc9e4e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 15:35:30 -0700 Subject: [PATCH 244/303] edit --- windows/deployment/upgrade/setupdiag.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index 2c1c65fbae..c2f9576692 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -318,8 +318,13 @@ Each rule name and its associated unique rule identifier are listed with a descr ## Release notes 06/19/2019 - SetupDiag v1.5.0.0 is released with 60 rules, as a standalone tool available from the Download Center. - - Formatted Json output for easy readability. + - All date and time outputs are updated to localized format per user request. - Added setup Operation and Phase information to /verbose log. + - Added last Setup Operation and last Setup Phase information to most rules where it make sense (see new output below). + - Performance improvement in searching setupact.logs to determine correct log to parse. + - Added SetupDiag version number to text report (xml and json always had it). + - Added "no match" reports for xml and json per user request. + - Formatted Json output for easy readability. - Performance improvements when searching for setup logs; this should be much faster now. - Added "no match" reports for xml and json per user request. - Added 7 new rules: PlugInComplianceBlock, PreReleaseWimMountDriverFound, WinSetupBootFilterFailure, WimMountDriverIssue, DISMImageSessionFailure, FindEarlyDownlevelError, and FindSPFatalError. See the [Rules](#rules) section above for more information. From f1878ef15affccc771497c980e2970230fb5de1f Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 15:43:41 -0700 Subject: [PATCH 245/303] edit --- windows/deployment/upgrade/setupdiag.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index c2f9576692..b6f9e9638f 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -326,7 +326,6 @@ Each rule name and its associated unique rule identifier are listed with a descr - Added "no match" reports for xml and json per user request. - Formatted Json output for easy readability. - Performance improvements when searching for setup logs; this should be much faster now. - - Added "no match" reports for xml and json per user request. - Added 7 new rules: PlugInComplianceBlock, PreReleaseWimMountDriverFound, WinSetupBootFilterFailure, WimMountDriverIssue, DISMImageSessionFailure, FindEarlyDownlevelError, and FindSPFatalError. See the [Rules](#rules) section above for more information. - Diagnostic information is now output to the registry at **HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag** - The **/AddReg** command was added to toggle registry output. This setting is off by default for offline mode, and on by default for online mode. The command has no effect for online mode and enables registry output for offline mode. From 7350bfe602f0d6cd01d231802db97b7757a2c4ec Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 17 Jun 2019 15:47:42 -0700 Subject: [PATCH 246/303] latest updates Monday --- devices/surface-hub/TOC.md | 4 +- devices/surface-hub/surface-hub-2s-account.md | 2 +- .../surface-hub-2s-phone-authenticate.md | 8 ++-- .../surface-hub-2s-prepare-environment.md | 10 ++--- .../surface-hub/surface-hub-2s-quick-start.md | 4 +- .../surface-hub-2s-recover-reset.md | 6 +-- .../surface-hub/surface-hub-2s-techspecs.md | 44 ------------------- .../surface-hub/surface-hub-2s-whats-new.md | 12 ++--- 8 files changed, 25 insertions(+), 65 deletions(-) diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 5af3f32fcc..361a36b075 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -25,8 +25,8 @@ ### [Deploy Surface Hub 2S](surface-hub-2s-deploy.md) ### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md) ### [Configure Surface Hub 2S with PowerShell](surface-hub-2s-configure-with-powershell.md) -### [Configure Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) -### [Out of box startup for Surface Hub 2S](surface-hub-2s-startup.md) +### [Create Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) +### [First time setup on Surface Hub 2S](surface-hub-2s-startup.md) ### [Deploy apps with Microsoft Intune](surface-hub-2s-deploy-apps-intune.md) ## Manage diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index a0a9772827..1303152bbf 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -44,7 +44,7 @@ For more information, see [Configure Surface Hub 2S accounts with PowerShell](su ## Finalize setup via PowerShell -- **Skype for Business:** If you did not choose an Office 365 Meeting Room license, you can enable the Skype for Business object by running *Enable-CsMeetingRoom*. +- **Skype for Business:** For Skype for Business only (On premises or online), you can enable the Skype for Business object by running Enable-CsMeetingRoom to enable features such as Meeting room prompt for audio and Lobby hold. - **Calling features:** Regardless of your Office 365 licensing configuration, run *Enable-CsMeetingRoom* to enable features such as **Meeting room prompt for audio** and **Lobby hold**. - **Calendar:** Set **Calendar Auto processing** for this account. diff --git a/devices/surface-hub/surface-hub-2s-phone-authenticate.md b/devices/surface-hub/surface-hub-2s-phone-authenticate.md index ea9a75e9d9..ba3e26231f 100644 --- a/devices/surface-hub/surface-hub-2s-phone-authenticate.md +++ b/devices/surface-hub/surface-hub-2s-phone-authenticate.md @@ -11,11 +11,13 @@ ms.topic: article ms.localizationpriority: Normal --- -# Configure phone authentication for Surface Hub 2S +# Configure Easy Authentication for Surface Hub 2S -Phone authentication simplifies signing-in to your meetings and files on Surface Hub 2S. +Easy Authentication simplifies signing-in to your meetings and files on Surface Hub 2S. -## To set up phone authentication +Note: Easy Authentication requires that your primary email address must match your UPN. + +## To set up Easy Authentication 1. Download the [Microsoft Authenticator](https://www.microsoft.com/en-us/account/authenticator) app for iPhone or Android to your phone. 2. From your PC, go to [https://aka.ms/MFASetup](https://aka.ms/MFASetup) , sign in with your account, and select **Next.** diff --git a/devices/surface-hub/surface-hub-2s-prepare-environment.md b/devices/surface-hub/surface-hub-2s-prepare-environment.md index 62e362147b..aeb812899d 100644 --- a/devices/surface-hub/surface-hub-2s-prepare-environment.md +++ b/devices/surface-hub/surface-hub-2s-prepare-environment.md @@ -24,20 +24,20 @@ Microsoft regularly updates the Office 365 service with new features and functio ## Device affiliation Use Device affiliation to manage user access to the Settings app on Surface Hub 2S. -With the Windows 10 Team Edition operating system — that runs on SH2 — only authorized users can adjust settings via the settings app. Since choosing the affiliation can impact feature availability, plan appropriately to ensure that users can access features as intended. +With the Windows 10 Team Edition operating system — that runs on Surface Hub 2S — only authorized users can adjust settings via the settings app. Since choosing the affiliation can impact feature availability, plan appropriately to ensure that users can access features as intended. > [!NOTE] > You can only set Device affiliation during the initial out-of-box experience (OOBE) setup. If you need to reset Device affiliation, you’ll have to repeat OOBE setup. -## No affiliation +##3 No affiliation No affiliation is like having Surface Hub 2S in a workgroup with a different local Administrator account on each Surface Hub 2S. If you choose No affiliation, you must locally save the [Bitlocker Key to a USB thumb drive](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-key-management-faq). You can still enroll the device with Intune, however only the local admin can access the Settings app using the account credentials configured during OOBE. You can change the Administrator account password from the Settings app. -## Active Directory Domain Services +### Active Directory Domain Services If you affiliate Surface Hub 2S with on-premises Active Directory Domain Services, you need to manage access to the Settings app via a security group on your domain, ensuring that all SG members have permissions to change settings on Surface Hub 2S. Note also the following: -- When Surface Hub 2S affiliates with your on-premises Active Directory Domain Services, the Bitlocker key is saved in the AD Schema and can be exported to a file. +- When Surface Hub 2S affiliates with your on-premises Active Directory Domain Services, the Bitlocker key is saved in the AD Schema. - Your organization’s Trusted Root CAs are pushed to the same container in Surface Hub 2S, which means you don’t need to import them using a provisioning package. - You can still enroll the device with Intune to centrally manage settings on your Surface Hub 2S. @@ -45,4 +45,4 @@ If you affiliate Surface Hub 2S with on-premises Active Directory Domain Service When choosing to affiliate your Surface Hub 2S with Azure AD, any user in the Global Admins Security Group can sign in to the Settings app on Surface Hub 2S. Currently, no other group can be delegated to sign in to the Settings app on Surface Hub 2S. -If you enabled Intune Automatic Enrollment for your organization, Surface Hub 2S will automatically enroll itself with Intune. The device’s Bitlocker key is automatically saved in Azure AD. When affiliating Surface Hub 2S with Azure AD, single sign-on and streamlined sign-on may not work. +If you enabled Intune Automatic Enrollment for your organization, Surface Hub 2S will automatically enroll itself with Intune. The device’s Bitlocker key is automatically saved in Azure AD. When affiliating Surface Hub 2S with Azure AD, single sign-on and Easy Authentication will not work. diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index 1dcda839ca..d9c490c776 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -33,9 +33,11 @@ ms.localizationpriority: Normal ## Install pen and camera 1. Attach Surface Hub 2 pen magnetically to your preferred side of the device. -2. Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. A red LED indicator light on the pen warns you when the battery is slow. ![*Surface Hub 2S pen *](images/sh2-pen.png)
          +A red LED indicator light on the pen warns you when the battery is low. + +2. Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. ## Start Surface Hub 2S diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index 596b858e38..a5eb1d9e80 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -21,7 +21,7 @@ To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** 1. To reset, select **Get Started**. 2. When the **Ready to reset this device** window appears, select **Reset**. Surface Hub 2S reinstalls the operating system from the recovery partition and may take up to one hour to complete. -3. Run **Setup** to reconfigure the device. +3. Run **the first time Setup program** to reconfigure the device. 4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). ![*Reset and recovery for Surface Hub 2S*](images/sh2-reset.png)
          @@ -32,7 +32,7 @@ To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** 1. To recover, select **Restart now**. 2. In advanced startup mode, select the option to recover the device from the cloud. Surface Hub 2S downloads the latest available customer image from the cloud and reinstalls the operating system. 3. Remain connected to the network during the recovery process. -4. Run **Setup** to reconfigure the device. +4. Run **the first time Setup program** to reconfigure the device. 5. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/en-us/intune/devices-wipe). ## Recover Surface Hub 2S using USB recovery drive @@ -51,4 +51,4 @@ Surface Hub 2S lets you reinstall the device using a recovery image, which allow 4. In the language selection screen, select the display language for your Surface Hub 2S. 5. Choose **Recover from a drive** and **Fully clean the drive** and then select **Recover**. If prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S reboots several times and takes approximately 30 minutes to complete the recovery process. -6. When the first OOBE startup screen appears, remove the USB drive. +Remove the USB drive when the first time setup screen appears. diff --git a/devices/surface-hub/surface-hub-2s-techspecs.md b/devices/surface-hub/surface-hub-2s-techspecs.md index 5af343c5f0..67b81fde8a 100644 --- a/devices/surface-hub/surface-hub-2s-techspecs.md +++ b/devices/surface-hub/surface-hub-2s-techspecs.md @@ -34,49 +34,5 @@ ms.localizationpriority: Normal |**What’s in the box**| One Surface Hub 2S
          One Surface Hub 2 Pen
          One Surface Hub 2 Camera
          2.5 m AC Power Cable
          Quick Start Guide | |**Warranty**| 1-year limited hardware warranty | -## Pen tech specs - -|**Item**|**Details**| -|:------ |:- ------ | -|**Dimensions**| 5.94" x 0.64" x 0.56” (151 mm x 16.3 mm x 14.3 mm) | -|**Weight**| 0.09 lbs. (41 g) | -|**Buttons**| Barrel button and tail eraser | -|**Color**| Grey | -|**Connector type**| Bluetooth 4.0 | -|**Compatibility**| Surface Hub 2S
          Surface Book 2 3
          Surface Book
          Surface Studio 2 3
          Surface Studio 3
          Surface Laptop
          | -|**Compatibility**| Surface Go
          Surface Go with LTE Advanced
          Surface Pro 6 3
          Surface Pro (5th Gen) 3
          Surface Pro (5th Gen) with LTE Advanced 3
          Surface Pro 4
          Surface Pro 3
          Surface 3 | - -## Camera tech specs - -|**Item**|**Specification Details**| -|:--- - |:--- ------------------ | -|**Dimensions**| 2.26" x 2.18" x 1.65” (57.5 mm x 55.3 mm x 42 mm) | -|**Weight**| 0.19 lbs. (88.01 g) | -|**Connection**| USB-C (with magnetic attach) | -|**Resolution**| 4K | -|**Field of View**| 90-degree HFOV | -|**Imaging Features**| Anti-flicker
          Face-based auto exposure
          Up to 30 frames per second
          | - -## Battery tech specs - -> [!NOTE] -> The optional mobile battery is sold separately. For more information, see [APC Charge Mobile Battery](https://www.apc.com/us/en/campaign/apc-charge-mobile-battery-for-microsoft-surface-hub-2.jsp). - -|**Item**|**Details**| -|:--- - |:-- ----- | -|**Dimensions**| 11 x 17 x 5 inches (282 x 432 x 127 mm) | -|**Weight**| ~30 lbs. (13.6 kg) | -|**Connection**| AC input/DC output & USB-A | -|**Voltage**| 48 V DC | -|**Capacity**| 8.2 Ah | -|**Energy**| 403 Wh (~10x Pro6) | -|**Power Delivery**| 387 W | -|**Battery Technology**| Li-Ion NMC523 | -|**Charger**| 600 W | -|**Charging Time**| 0–100 percent in ~1.5 hours | -|**Run Time**| 2 hours nominal | -|**AC output**| 88–265 V AC, 50–60 Hz, Max 8 A/400 W | -|**DC output**| 24 V DC, Max 16.2 A /387 W | - > [!NOTE] > 1 System software uses significant storage space. Available storage is subject to change based on system software updates and apps usage. 1 GB= 1 billion bytes. See Surface.com/Storage for more details.
          2 Software license required for some features. Sold separately.
          3 Tilt functionality is currently available diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 68977acc49..01d79cea18 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -18,14 +18,14 @@ Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork |**Capability**|**Summary**|**Learn more**| |:-------|:------|:----| |**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | -|**Cloud and on-premises coexistence**| Calling and meeting capabilities support coexistence of cloud and on premises solutions with side-by-side compatibility with Skype for Business. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | +|**Cloud and on-premises coexistence**| Supports on-premises, hybrid, or online. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | |**Reset and recovery**| Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | -|**Microsoft Whiteboard**| Active Directory integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers on Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | +|**Microsoft Whiteboard**| Ofice 365 integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers, Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | |**Microsoft Teams Meeting Room License**| Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | |**On-screen display**| Adjust volume, brightness, and input control directly on the display. | | -|**Sensor-activated Connected Standby**| Doppler sensor triggers energy conservation power state changes based on nearby presence, entering Connected Standby sleep state after 1 minute of inactivity.

          Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | -|**Surface Hub pen**| Ergonomically redesigned and easily attachable on the sides of the device. Pen firmware is updatable for future features. | | -|**Surface app for Surface Hub 2S**| | | +|**Sensor-activated Connected Standby**| Doppler sensor activates Connected Standby after 1 minute of inactivity.

          Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | +|**Surface Hub pen**| Ergonomically redesigned and easily attachable on the sides of the device. | | +|**Surface app for Surface Hub 2S**| Change audio settings and view your device's information from the Surface app | | |**Ready for tomorrow**| Removable cartridge facilitates upgrading to new features. | | For more information about what’s new in Surface Hub 2S, see: @@ -60,6 +60,6 @@ The following table details the differences between Surface Hub and Surface Hub |**Software**| Windows 10 + Office (Word, PowerPoint, Excel) | Windows 10 + Office (Word, PowerPoint, Excel) | Windows 10 + Office (Word, PowerPoint, Excel) | > [!NOTE] -> The NFC reader available Surface Hub v1 is discontinued in Surface Hub 2S and is no longer available. +> The NFC reader available in Surface Hub is discontinued in Surface Hub 2S and is no longer available. To learn more about what’s new in Surface Hub 2S, see [Behind the design: Surface Hub 2S](https://techcommunity.microsoft.com/t5/Surface-IT-Pro-Blog/Behind-the-design-Surface-Hub-2S/ba-p/464099). From cf33dd981297d3a5e98533aeb81d50c9f5c497ce Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 17 Jun 2019 15:52:25 -0700 Subject: [PATCH 247/303] Added June updates --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index b6546dfde8..7926c192ce 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1878,8 +1878,6 @@ How do I turn if off? | The service can be stopped from the "Services" console o |New or updated topic | Description| |--- | ---| |[Policy CSP - DeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md)|Added the following new policies:
          AllowDeviceHealthMonitoring, ConfigDeviceHealthMonitoringScope, ConfigDeviceHealthMonitoringUploadDestination.| -New or updated topic | Description| -|--- | ---| |[Policy CSP - TimeLanguageSettings](policy-csp-timelanguagesettings.md)|Added the following new policy:
          ConfigureTimeZone.| From 136dd39c5fa791631bf343e54352c88d277450ec Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 17 Jun 2019 16:50:09 -0700 Subject: [PATCH 248/303] Added 1809 and 1903 DDF links --- .../configuration-service-provider-reference.md | 5 +++-- windows/client-management/mdm/policy-ddf-file.md | 16 ++++++++-------- 2 files changed, 11 insertions(+), 10 deletions(-) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index b8cce9175a..13b5259010 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -19,7 +19,7 @@ ms.date: 05/13/2019 A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot. -For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/desktop/dn905224). For CSP DDF files, see [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). +For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/desktop/dn905224). For CSP DDF files, see [CSP DDF files download](#csp-ddf-files-download). Additional lists: @@ -2673,7 +2673,8 @@ Additional lists: ## CSP DDF files download You can download the DDF files for various CSPs from the links below: - +- [Download all the DDF files for Windows 10, version 1903](http://download.microsoft.com/download/6/F/0/6F019079-6EB0-41B5-88E8-D1CE77DBA27B/Windows10_1903_DDF_download.zip) +- [Download all the DDF files for Windows 10, version 1809](http://download.microsoft.com/download/6/A/7/6A735141-5CFA-4C1B-94F4-B292407AF662/Windows10_1809_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1803](https://download.microsoft.com/download/6/2/7/6276FE19-E3FD-4254-9C16-3C31CAA2DE50/Windows10_1803_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1709](https://download.microsoft.com/download/9/7/C/97C6CF99-F75C-475E-AF18-845F8CECCFA4/Windows10_1709_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1703](https://download.microsoft.com/download/C/7/C/C7C94663-44CF-4221-ABCA-BC895F42B6C2/Windows10_1703_DDF_download.zip) diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 82449daa56..7d9596ec8f 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -17,16 +17,16 @@ ms.date: 05/21/2019 This topic shows the OMA DM device description framework (DDF) for the **Policy** configuration service provider. DDF files are used only with OMA DM provisioning XML. -You can download the DDF files from the links below: +You can click the following links to view the Policy DDF files for different Windows 10 versions: -- [Download the Policy DDF file for Windows 10, version 1903](http://download.microsoft.com/download/0/C/D/0CD61812-8B9C-4846-AC4A-1545BFD201EE/PolicyDDF_all_1903.xml) -- [Download the Policy DDF file for Windows 10, version 1809](http://download.microsoft.com/download/7/3/5/735B8537-82F4-4CD1-B059-93984F9FAAC5/PolicyDDF_all_1809.xml) -- [Download the Policy DDF file for Windows 10, version 1803](https://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all.xml) -- [Download the Policy DDF file for Windows 10, version 1803 release C](http://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all_1809C_release.xml) -- [Download the Policy DDF file for Windows 10, version 1709](https://download.microsoft.com/download/8/C/4/8C43C116-62CB-470B-9B69-76A3E2BC32A8/PolicyDDF_all.xml) -- [Download the Policy DDF file for Windows 10, version 1703](https://download.microsoft.com/download/7/2/C/72C36C37-20F9-41BF-8E23-721F6FFC253E/PolicyDDF_all.xml) +- [View the Policy DDF file for Windows 10, version 1903](http://download.microsoft.com/download/0/C/D/0CD61812-8B9C-4846-AC4A-1545BFD201EE/PolicyDDF_all_1903.xml) +- [View the Policy DDF file for Windows 10, version 1809](http://download.microsoft.com/download/7/3/5/735B8537-82F4-4CD1-B059-93984F9FAAC5/Policy_DDF_all_1809.xml) +- [View the Policy DDF file for Windows 10, version 1803](https://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all.xml) +- [View the Policy DDF file for Windows 10, version 1803 release C](http://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all_1809C_release.xml) +- [View the Policy DDF file for Windows 10, version 1709](https://download.microsoft.com/download/8/C/4/8C43C116-62CB-470B-9B69-76A3E2BC32A8/PolicyDDF_all.xml) +- [View the Policy DDF file for Windows 10, version 1703](https://download.microsoft.com/download/7/2/C/72C36C37-20F9-41BF-8E23-721F6FFC253E/PolicyDDF_all.xml) - [Download the Policy DDF file for Windows 10, version 1607](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) -- [Download the Policy DDF file for Windows 10, version 1607 release 8C](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) +- [View the Policy DDF file for Windows 10, version 1607 release 8C](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) - [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download) The XML below is the DDF for Windows 10, version 1903. From 78e704c283129539cd06c4d8fa10b383e8bd7ea8 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 17 Jun 2019 17:05:34 -0700 Subject: [PATCH 249/303] fix some TOC nodes --- windows/deployment/TOC.md | 17 ++++++++++++----- windows/deployment/planning/TOC.md | 12 +++--------- .../planning/act-technical-reference.md | 17 ++++++----------- windows/deployment/planning/index.md | 2 +- 4 files changed, 22 insertions(+), 26 deletions(-) diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index 2f72d1d3b6..e0d4c6ae49 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -4,11 +4,15 @@ ## [What's new in Windows 10 deployment](deploy-whats-new.md) ## [Windows 10 deployment scenarios](windows-10-deployment-scenarios.md) ## [Windows Autopilot](windows-autopilot/windows-autopilot.md) -## [Windows 10 Subscription Activation](windows-10-subscription-activation.md) + +## Subscription Activation +### [Windows 10 Subscription Activation](windows-10-subscription-activation.md) ### [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md) ### [Configure VDA for Subscription Activation](vda-subscription-activation.md) ### [Deploy Windows 10 Enterprise licenses](deploy-enterprise-licenses.md) -## [Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) + +## Resolve upgrade errors +### [Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) ### [Quick fixes](upgrade\quick-fixes.md) ### [SetupDiag](upgrade/setupdiag.md) ### [Troubleshooting upgrade errors](upgrade/troubleshoot-upgrade-errors.md) @@ -18,7 +22,8 @@ ### [Resolution procedures](upgrade/resolution-procedures.md) ### [Submit Windows 10 upgrade errors](upgrade/submit-errors.md) -## [Deploy Windows 10](deploy.md) +## Deploy Windows 10 +### [Deploying Windows 10](deploy.md) ### [Windows Autopilot](windows-autopilot/windows-autopilot.md) ### [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) @@ -211,7 +216,8 @@ ###### [Offline Migration Reference](usmt/offline-migration-reference.md) ### [Install fonts in Windows 10](windows-10-missing-fonts.md) -## [Update Windows 10](update/index.md) +## Update Windows 10 +### [Update Windows 10 in enterprise deployments](update/index.md) ### [Windows as a service](update/windows-as-a-service.md) #### [Quick guide to Windows as a service](update/waas-quick-start.md) ##### [Servicing stack updates](update/servicing-stack-updates.md) @@ -249,7 +255,8 @@ ### [Manage additional Windows Update settings](update/waas-wu-settings.md) ### [Determine the source of Windows updates](update/windows-update-sources.md) -## [Windows Analytics](update/windows-analytics-overview.md) +## Windows Analytics +## [Windows Analytics overview](update/windows-analytics-overview.md) ### [Windows Analytics in the Azure Portal](update/windows-analytics-azure-portal.md) ### [Windows Analytics and privacy](update/windows-analytics-privacy.md) ### [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) diff --git a/windows/deployment/planning/TOC.md b/windows/deployment/planning/TOC.md index dc77423c8a..10bf286e0c 100644 --- a/windows/deployment/planning/TOC.md +++ b/windows/deployment/planning/TOC.md @@ -12,7 +12,8 @@ ### [Windows 10, version 1709](windows-10-1709-removed-features.md) ### [Windows 10, version 1703](windows-10-1703-removed-features.md) -## [Application Compatibility Toolkit (ACT) Technical Reference](act-technical-reference.md) +## Application Compatibility Toolkit (ACT) +### [Application Compatibility Toolkit (ACT) Technical Reference](act-technical-reference.md) ### [SUA User's Guide](sua-users-guide.md) #### [Using the SUA Wizard](using-the-sua-wizard.md) #### [Using the SUA Tool](using-the-sua-tool.md) @@ -36,11 +37,4 @@ ##### [Compatibility Fix Database Management Strategies and Deployment](compatibility-fix-database-management-strategies-and-deployment.md) ##### [Testing Your Application Mitigation Packages](testing-your-application-mitigation-packages.md) #### [Using the Sdbinst.exe Command-Line Tool](using-the-sdbinstexe-command-line-tool.md) -### [Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) - -## [Windows To Go: feature overview](windows-to-go-overview.md) -### [Best practice recommendations for Windows To Go](best-practice-recommendations-for-windows-to-go.md) -### [Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md) -### [Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md) -### [Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md) -### [Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md) \ No newline at end of file +### [Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) \ No newline at end of file diff --git a/windows/deployment/planning/act-technical-reference.md b/windows/deployment/planning/act-technical-reference.md index b7cf573864..62bd2bb5ec 100644 --- a/windows/deployment/planning/act-technical-reference.md +++ b/windows/deployment/planning/act-technical-reference.md @@ -20,28 +20,23 @@ ms.topic: article **Applies to** - Windows 10, version 1607 -We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with Upgrade Analytics, a solution in the Microsoft Operations Management Suite. Upgrade Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. +>[!IMPORTANT] +>We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. -Microsoft developed Upgrade Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Upgrade Analytics was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10. +Microsoft developed Windows Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Windows Analytics was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10. -With Windows diagnostic data enabled, Upgrade Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. +With Windows diagnostic data enabled, Windows Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. -Use Upgrade Analytics to get: +Use Windows Analytics to get: - A visual workflow that guides you from pilot to production - - Detailed computer and application inventory - - Powerful computer level search and drill-downs - - Guidance and insights into application and driver compatibility issues, with suggested fixes - - Data driven application rationalization tools - - Application usage information, allowing targeted validation; workflow to track validation progress and decisions - - Data export to commonly used software deployment tools, including System Center Configuration Manager -The Upgrade Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. For more information about Upgrade Analytics, see [Manage Windows upgrades with Upgrade Analytics](https://technet.microsoft.com/itpro/windows/deploy/manage-windows-upgrades-with-upgrade-analytics) +The Windows Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. At the same time, we've kept the Standard User Analyzer tool, which helps you test your apps and to monitor API calls for potential compatibility issues, and the Compatibility Administrator, which helps you to resolve potential compatibility issues. diff --git a/windows/deployment/planning/index.md b/windows/deployment/planning/index.md index c7f59cff36..e0816f65f8 100644 --- a/windows/deployment/planning/index.md +++ b/windows/deployment/planning/index.md @@ -22,7 +22,7 @@ Windows 10 provides new deployment capabilities, scenarios, and tools by buildi |[Windows 10 deployment considerations](windows-10-deployment-considerations.md) |There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. | |[Windows 10 compatibility](windows-10-compatibility.md) |Windows 10 will be compatible with most existing PC hardware; most devices running Windows 7, Windows 8, or Windows 8.1 will meet the requirements for Windows 10. | |[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) |There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization. | -|[Windows To Go: feature overview](windows-to-go-overview.md) |Windows To Go is a feature in Windows 10 Enterprise and Windows 10 Education that enables the creation of a Windows To Go workspace that can be booted from a USB-connected external drive on PCs. | +|[Features removed or planned for replacement](features-lifecycle.md) |Information is provided about Windows 10 features and functionality that are removed or planned for replacement. | |[Application Compatibility Toolkit (ACT) Technical Reference](act-technical-reference.md) |The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system. | ## Related topics From 49a7b1d644afe6cd126871a1ad5eaa50f219507a Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 17 Jun 2019 17:24:31 -0700 Subject: [PATCH 250/303] minor update --- windows/client-management/mdm/policy-ddf-file.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 7d9596ec8f..5eb7cc9fd5 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -17,7 +17,7 @@ ms.date: 05/21/2019 This topic shows the OMA DM device description framework (DDF) for the **Policy** configuration service provider. DDF files are used only with OMA DM provisioning XML. -You can click the following links to view the Policy DDF files for different Windows 10 versions: +To view the Policy DDF files for different Windows 10 versions, click the respective links below: - [View the Policy DDF file for Windows 10, version 1903](http://download.microsoft.com/download/0/C/D/0CD61812-8B9C-4846-AC4A-1545BFD201EE/PolicyDDF_all_1903.xml) - [View the Policy DDF file for Windows 10, version 1809](http://download.microsoft.com/download/7/3/5/735B8537-82F4-4CD1-B059-93984F9FAAC5/Policy_DDF_all_1809.xml) @@ -25,9 +25,10 @@ You can click the following links to view the Policy DDF files for different Win - [View the Policy DDF file for Windows 10, version 1803 release C](http://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all_1809C_release.xml) - [View the Policy DDF file for Windows 10, version 1709](https://download.microsoft.com/download/8/C/4/8C43C116-62CB-470B-9B69-76A3E2BC32A8/PolicyDDF_all.xml) - [View the Policy DDF file for Windows 10, version 1703](https://download.microsoft.com/download/7/2/C/72C36C37-20F9-41BF-8E23-721F6FFC253E/PolicyDDF_all.xml) -- [Download the Policy DDF file for Windows 10, version 1607](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) +- [View the Policy DDF file for Windows 10, version 1607](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) - [View the Policy DDF file for Windows 10, version 1607 release 8C](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) -- [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download) + +To download DDF files for various CSPs, click [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). The XML below is the DDF for Windows 10, version 1903. From 2f43f8014d9d04eb8aba5d02b15d32d2b9e038d0 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 17 Jun 2019 17:58:02 -0700 Subject: [PATCH 251/303] minor update --- windows/client-management/mdm/policy-ddf-file.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 5eb7cc9fd5..b44dea845f 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -17,7 +17,7 @@ ms.date: 05/21/2019 This topic shows the OMA DM device description framework (DDF) for the **Policy** configuration service provider. DDF files are used only with OMA DM provisioning XML. -To view the Policy DDF files for different Windows 10 versions, click the respective links below: +You can view various Policy DDF files by clicking the following links: - [View the Policy DDF file for Windows 10, version 1903](http://download.microsoft.com/download/0/C/D/0CD61812-8B9C-4846-AC4A-1545BFD201EE/PolicyDDF_all_1903.xml) - [View the Policy DDF file for Windows 10, version 1809](http://download.microsoft.com/download/7/3/5/735B8537-82F4-4CD1-B059-93984F9FAAC5/Policy_DDF_all_1809.xml) @@ -28,7 +28,7 @@ To view the Policy DDF files for different Windows 10 versions, click the respec - [View the Policy DDF file for Windows 10, version 1607](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) - [View the Policy DDF file for Windows 10, version 1607 release 8C](https://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) -To download DDF files for various CSPs, click [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). +You can download DDF files for various CSPs from [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). The XML below is the DDF for Windows 10, version 1903. From d7baf46f5471611377a5ddb110ef552469aee456 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Mon, 17 Jun 2019 18:24:54 -0700 Subject: [PATCH 252/303] Round 2 of more changes --- devices/surface-hub/TOC.md | 1 + devices/surface-hub/surface-hub-2s-account.md | 15 ++++----------- .../surface-hub-2s-manage-passwords.md | 19 +++++++++++++++++++ .../surface-hub/surface-hub-2s-whats-new.md | 4 ++-- 4 files changed, 26 insertions(+), 13 deletions(-) create mode 100644 devices/surface-hub/surface-hub-2s-manage-passwords.md diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 361a36b075..1bdfb1af29 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -32,6 +32,7 @@ ## Manage ### [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) ### [Local management for Surface Hub 2S settings](local-management-surface-hub-settings.md) +### [Manage device account password rotation](surface-hub-2s-manage-passwords.md) ### [Servicing and updating for Surface Hub 2S](surface-hub-2s-service-update.md) ### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) ### [Save your BitLocker key](save-bitlocker-key-surface-hub.md) diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index 1303152bbf..e73534facf 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -23,7 +23,7 @@ Complete advanced configuration tasks using Windows PowerShell. For example: - You need to configure calendar processing for every Surface Hub device account using PowerShell. - If you want Surface Hub 2S to send a custom auto reply in response to scheduling requests, you need to configure that using Exchange Online PowerShell. -For more information, see [Configure Surface Hub 2S accounts with PowerShell](surface-hub-2s-configure-with-powershell). +For more information, see [Configure Surface Hub 2S accounts with PowerShell](surface-hub-2s-configure-with-powershell.md). ## Create account using Office 365 portal @@ -40,20 +40,13 @@ For more information, see [Configure Surface Hub 2S accounts with PowerShell](su ![Set the password for the device account](images/sh2-account4.png) 4. Assign the room with an Office 365 license. It’s recommended to assign the Office 365 **Meeting Room** license, a new option that automatically enables the account for Skype for Business Online and Microsoft Teams. + ![Assign Office 365 license](images/sh2-account5.png) ## Finalize setup via PowerShell -- **Skype for Business:** For Skype for Business only (On premises or online), you can enable the Skype for Business object by running Enable-CsMeetingRoom to enable features such as Meeting room prompt for audio and Lobby hold. +- **Skype for Business:** For Skype for Business only (on-premises or online), you can enable the Skype for Business object by running **Enable-CsMeetingRoom** to enable features such as Meeting room prompt for audio and Lobby hold. - **Calling features:** Regardless of your Office 365 licensing configuration, run *Enable-CsMeetingRoom* to enable features such as **Meeting room prompt for audio** and **Lobby hold**. - **Calendar:** Set **Calendar Auto processing** for this account. -For more information, see [Configure Surface Hub 2S accounts via PowerShell.](devices\surface-hub\surface-hub-2s-configure-using-o365.md) - -## Room account password rotation - -You can configure Surface Hub 2S to automatically change a device account password without requiring you to manually update the device account information. - -If you turn on Password Rotation, Surface Hub 2S changes the password every 7 days. The automatically generated passwords contain 15-32 characters including a combination of uppercase and lowercase letters, numbers, and special characters. - -Passwords do not change during a meeting. If Surface Hub 2S is turned off, it attempts to change the password immediately when turned on or every 10 minutes until successful. +For more information, see [Create Surface Hub 2S using PowerShell](surface-hub-2s-configure-with-powershell.md). diff --git a/devices/surface-hub/surface-hub-2s-manage-passwords.md b/devices/surface-hub/surface-hub-2s-manage-passwords.md new file mode 100644 index 0000000000..e251dab019 --- /dev/null +++ b/devices/surface-hub/surface-hub-2s-manage-passwords.md @@ -0,0 +1,19 @@ +--- +title: "Manage device account password rotation" +description: "Learn how to configure Surface Hub 2S on-premises accounts with PowerShell" +keywords: separate values with commas +ms.prod: surface-hub +ms.sitesec: library +author: robmazz +ms.author: robmazz +audience: Admin +ms.topic: article +ms.localizationpriority: Normal +--- +# Manage device account password rotation + +You can configure Surface Hub 2S to automatically change a device account password without requiring you to manually update the device account information. + +If you turn on Password Rotation, Surface Hub 2S changes the password every 7 days. The automatically generated passwords contain 15-32 characters including a combination of uppercase and lowercase letters, numbers, and special characters. + +Passwords do not change during a meeting. If Surface Hub 2S is turned off, it attempts to change the password immediately when turned on or every 10 minutes until successful. diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 01d79cea18..5d24886732 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -17,7 +17,7 @@ Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork |**Capability**|**Summary**|**Learn more**| |:-------|:------|:----| -|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | +|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](https://docs.microsoft.com/en-us/surface/surface-enterprise-management-mode) | |**Cloud and on-premises coexistence**| Supports on-premises, hybrid, or online. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | |**Reset and recovery**| Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | |**Microsoft Whiteboard**| Ofice 365 integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers, Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | @@ -60,6 +60,6 @@ The following table details the differences between Surface Hub and Surface Hub |**Software**| Windows 10 + Office (Word, PowerPoint, Excel) | Windows 10 + Office (Word, PowerPoint, Excel) | Windows 10 + Office (Word, PowerPoint, Excel) | > [!NOTE] -> The NFC reader available in Surface Hub is discontinued in Surface Hub 2S and is no longer available. +> The NFC reader available in the original Surface Hub is discontinued in Surface Hub 2S and is no longer available. To learn more about what’s new in Surface Hub 2S, see [Behind the design: Surface Hub 2S](https://techcommunity.microsoft.com/t5/Surface-IT-Pro-Blog/Behind-the-design-Surface-Hub-2S/ba-p/464099). From df5df10ca005b51f90b78c30a463f5b1d496c82e Mon Sep 17 00:00:00 2001 From: illfated Date: Tue, 18 Jun 2019 03:20:59 +0200 Subject: [PATCH 253/303] Windows/Security: show asterisks in wildcard table Description: Asterisks are not showing up in this table due to HTML conversion. Proposed changes: - replace unwanted `` and `` tags with actual asterisk (`*`) - remove ```` formatting from path names for readability - simplify "matching to" => 'matching' (2 occurrences in this table) Closes #4068 --- ...e-exclusions-windows-defender-antivirus.md | 34 +++++++++---------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index f18faca295..a780487207 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -185,34 +185,34 @@ The following table describes how the wildcards can be used and provides some ex - + - + - + - + @@ -227,7 +227,7 @@ The following table describes how the wildcards can be used and provides some ex @@ -255,7 +255,7 @@ The following table describes how the wildcards can be used and provides some ex From 8eb6cb9a7a4aba12310006ec9f0585e2a6b2df77 Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Mon, 17 Jun 2019 23:33:14 -0500 Subject: [PATCH 254/303] Update windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../hello-for-business/hello-hybrid-cert-trust-devreg.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md index 2f9a34b9d6..8a74c77ed5 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md @@ -283,7 +283,7 @@ The definition helps you to verify whether the values are present or if you need **`http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid`** - This claim must contain the Uniform Resource Identifier (URI) of any of the verified domain names that connect with the on-premises federation service (AD FS or 3rd party) issuing the token. In AD FS, you can add issuance transform rules that look like the ones below in that specific order after the ones above. Please note that one rule to explicitly issue the rule for users is necessary. In the rules below, a first rule identifying user vs. computer authentication is added. - @RuleName = "Issue account type with the value User when its not a computer" + @RuleName = "Issue account type with the value User when it is not a computer" NOT EXISTS( [ From cf559c4522158e2cc8f0fe62170e54b8b5d4e639 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Tue, 18 Jun 2019 02:04:33 -0400 Subject: [PATCH 255/303] chore: Add MS Docs Authoring extension Suggests install of the MS Docs Authoring extension for editors using vs code --- .vscode/extensions.json | 5 +++++ 1 file changed, 5 insertions(+) create mode 100644 .vscode/extensions.json diff --git a/.vscode/extensions.json b/.vscode/extensions.json new file mode 100644 index 0000000000..af02986a5a --- /dev/null +++ b/.vscode/extensions.json @@ -0,0 +1,5 @@ +{ + "recommendations": [ + "docsmsft.docs-authoring-pack" + ] +} \ No newline at end of file From 2335bcb7f0bb5c0498f948964a319e3de6f8c77f Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Tue, 18 Jun 2019 02:17:07 -0400 Subject: [PATCH 256/303] typo: Cortona -> Cortana --- browsers/edge/emie-to-improve-compatibility.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/emie-to-improve-compatibility.md b/browsers/edge/emie-to-improve-compatibility.md index 94765b11fb..afd92b1690 100644 --- a/browsers/edge/emie-to-improve-compatibility.md +++ b/browsers/edge/emie-to-improve-compatibility.md @@ -41,7 +41,7 @@ If you're having trouble deciding whether Microsoft Edge is right for your organ |Microsoft Edge |IE11 | |---------|---------| -|Microsoft Edge takes you beyond just browsing to actively engaging with the web through features like Web Note, Reading View, and Cortana.
          • **Web Note.** Microsoft Edge lets you annotate, highlight, and call things out directly on web pages.
          • **Reading view.** Microsoft Edge lets you enjoy and print online articles in a distraction-free layout optimized for your screen size. While in reading view, you can also save web pages or PDF files to your reading list, for later viewing.
          • **Cortana.** Enabled by default in Microsoft Edge, Cortona lets you highlight words for more info and gives you one-click access to things like restaurant reservations and reviews, without leaving the webpage.
          • **Compatibility and security.** Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or that are included on your Enterprise Mode Site List. You must use IE11 to run older, less secure technology, such as ActiveX controls.
          |IE11 offers enterprises additional security, manageability, performance, backward compatibility, and modern standards support.
          • **Backward compatibility.** IE11 supports 9 document modes that include high-fidelity emulations for older versions of IE.
          • **Modern web standards.** IE11 supports modern web technologies like HTML5, CSS3, and WebGL, which help to ensure today's modern websites and apps work just as well as your old, legacy websites and apps.
          • **More secure.** IE11 was designed with security in mind and is more secure than older versions. Using security features like SmartScreen and Enhanced Protected Mode can help IE11 reduce your risk.
          • **Faster.** IE11 is significantly faster than previous versions of Internet Explorer, taking advantage of network optimization and hardware-accelerated text, graphics, and JavaScript rendering.
          • **Easier migration to Windows 10.** IE11 is the only version of IE that runs on Windows 7, Windows 8.1, and Windows 10. Upgrading to IE11 on Windows 7 can also help your organization support the next generation of software, services, and devices.
          • **Administration.** IE11 can use the Internet Explorer Administration Kit (IEAK) 11 or MSIs for deployment and includes more than 1,600 Group Policies and preferences for granular control.
          | +|Microsoft Edge takes you beyond just browsing to actively engaging with the web through features like Web Note, Reading View, and Cortana.
          • **Web Note.** Microsoft Edge lets you annotate, highlight, and call things out directly on web pages.
          • **Reading view.** Microsoft Edge lets you enjoy and print online articles in a distraction-free layout optimized for your screen size. While in reading view, you can also save web pages or PDF files to your reading list, for later viewing.
          • **Cortana.** Enabled by default in Microsoft Edge, Cortana lets you highlight words for more info and gives you one-click access to things like restaurant reservations and reviews, without leaving the webpage.
          • **Compatibility and security.** Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or that are included on your Enterprise Mode Site List. You must use IE11 to run older, less secure technology, such as ActiveX controls.
          |IE11 offers enterprises additional security, manageability, performance, backward compatibility, and modern standards support.
          • **Backward compatibility.** IE11 supports 9 document modes that include high-fidelity emulations for older versions of IE.
          • **Modern web standards.** IE11 supports modern web technologies like HTML5, CSS3, and WebGL, which help to ensure today's modern websites and apps work just as well as your old, legacy websites and apps.
          • **More secure.** IE11 was designed with security in mind and is more secure than older versions. Using security features like SmartScreen and Enhanced Protected Mode can help IE11 reduce your risk.
          • **Faster.** IE11 is significantly faster than previous versions of Internet Explorer, taking advantage of network optimization and hardware-accelerated text, graphics, and JavaScript rendering.
          • **Easier migration to Windows 10.** IE11 is the only version of IE that runs on Windows 7, Windows 8.1, and Windows 10. Upgrading to IE11 on Windows 7 can also help your organization support the next generation of software, services, and devices.
          • **Administration.** IE11 can use the Internet Explorer Administration Kit (IEAK) 11 or MSIs for deployment and includes more than 1,600 Group Policies and preferences for granular control.
          | ## Configure the Enterprise Mode Site List From 9c62f0c5c27142d8311e50879175c816ad34909a Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 18 Jun 2019 14:14:45 +0200 Subject: [PATCH 257/303] Update add-profile-to-devices.md Typo line 24 --- store-for-business/add-profile-to-devices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index c3ff428416..de500f83cb 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -21,7 +21,7 @@ ms.localizationpriority: medium Windows Autopilot simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot). -Watch this video to learn more about Windows Autopilot in Micrsoft Store for Business.
          +Watch this video to learn more about Windows Autopilot in Microsoft Store for Business.
          > [!video https://www.microsoft.com/en-us/videoplayer/embed/3b30f2c2-a3e2-4778-aa92-f65dbc3ecf54?autoplay=false] From faf3d0006e074b5311b717b2a7e4dd113147f8e4 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Tue, 18 Jun 2019 15:11:48 +0200 Subject: [PATCH 258/303] Update how-to-deploy-the-app-v-client-gb18030.md Removed table formatting and added L2 headings, fixes https://github.com/MicrosoftDocs/windows-itpro-docs/issues/2036 --- .../how-to-deploy-the-app-v-client-gb18030.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md index 930cf3c6f7..3197e02c38 100644 --- a/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md +++ b/mdop/appv-v5/how-to-deploy-the-app-v-client-gb18030.md @@ -43,17 +43,17 @@ Use the following procedure to install the Microsoft Application Virtualization 3. Review the locations for client registry, log, and troubleshooting information: +#### Client registry information +
          • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

            HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

          • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

            C:\ProgramData\App-V

            However, you can reconfigure this location with the following registry key:

            HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

          - | | | - |-------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| - | Client registry information |
          • By default, after you install the App-V 5.0 client, the client information is stored in the registry in the following registry key:

            HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\APPV\CLIENT

          • When you deploy a virtualized package to a computer that is running the App-V client, the associated package data is stored in the following location:

            C:\ProgramData\App-V

            However, you can reconfigure this location with the following registry key:

            HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\SOFTWARE\MICROSOFT\APPV\CLIENT\STREAMING\PACKAGEINSTALLATIONROOT

          | - | Client log files |
          • For log file information that is associated with the App-V 5.0 Client, search in the following log:

            Event logs/Applications and Services Logs/Microsoft/AppV

          • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

            Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

            For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

          • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

            C:\ProgramData\App-V\<package id>\<version id>

          | - | Client installation troubleshooting information | See the error log in the **%temp%** folder. To review the log files, click **Start**, type **%temp%**, and then look for the **appv_ log**. | +#### Client log files +
          • For log file information that is associated with the App-V 5.0 Client, search in the following log:

            Event logs/Applications and Services Logs/Microsoft/AppV

          • In App-V 5.0 SP3, some logs have been consolidated and moved to the following location:

            Event logs/Applications and Services Logs/Microsoft/AppV/ServiceLog

            For a list of the moved logs, see [About App-V 5.0 SP3](about-app-v-50-sp3.md#bkmk-event-logs-moved).

          • Packages that are currently stored on computers that run the App-V 5.0 Client are saved to the following location:

            C:\ProgramData\App-V\<package id>\<version id>

          - --- +#### Client installation troubleshooting information +- See the error log in the **%temp%** folder. +- To review the log files, click **Start**, type **%temp%**, and then look for the **appv_ log**. - -**To install the App-V 5.0 Client** +## To install the App-V 5.0 Client 1. Copy the App-V 5.0 client installation file to the computer on which it will be installed.

          Choose from the following client types: @@ -83,7 +83,7 @@ Use the following procedure to install the Microsoft Application Virtualization >After the installation, only the .exe file can be uninstalled. -**To install the App-V 5.0 client using a script** +## To install the App-V 5.0 client using a script 1. Install all of the required prerequisite software on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If you install the client by using an .msi file, the installation will fail if any prerequisites are missing. @@ -127,7 +127,7 @@ Use the following procedure to install the Microsoft Application Virtualization --- -**To install the App-V 5.0 client by using the Windows Installer (.msi) file** +## To install the App-V 5.0 client by using the Windows Installer (.msi) file 1. Install the required prerequisites on the target computers. See [What to do before you start](#bkmk-clt-install-prereqs). If any prerequisites are not met, the installation will fail. From e8c6752b3d9fc8f1335265057dd8cb7587496f76 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 07:21:18 -0700 Subject: [PATCH 259/303] tweaking links with errors --- devices/surface-hub/surface-hub-2s-account.md | 2 -- devices/surface-hub/surface-hub-2s-whats-new.md | 6 +++--- 2 files changed, 3 insertions(+), 5 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index e73534facf..9597d7284e 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -48,5 +48,3 @@ For more information, see [Configure Surface Hub 2S accounts with PowerShell](su - **Skype for Business:** For Skype for Business only (on-premises or online), you can enable the Skype for Business object by running **Enable-CsMeetingRoom** to enable features such as Meeting room prompt for audio and Lobby hold. - **Calling features:** Regardless of your Office 365 licensing configuration, run *Enable-CsMeetingRoom* to enable features such as **Meeting room prompt for audio** and **Lobby hold**. - **Calendar:** Set **Calendar Auto processing** for this account. - -For more information, see [Create Surface Hub 2S using PowerShell](surface-hub-2s-configure-with-powershell.md). diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 5d24886732..3b46fffc8f 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -17,11 +17,11 @@ Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork |**Capability**|**Summary**|**Learn more**| |:-------|:------|:----| -|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)



          [Surface Enterprise Management Mode](https://docs.microsoft.com/en-us/surface/surface-enterprise-management-mode) | +|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

          Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)

          [Surface Enterprise Management Mode](https://docs.microsoft.com/surface/surface-enterprise-management-mode) | |**Cloud and on-premises coexistence**| Supports on-premises, hybrid, or online. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | |**Reset and recovery**| Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | |**Microsoft Whiteboard**| Ofice 365 integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers, Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | -|**Microsoft Teams Meeting Room License**| Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/en-us/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | +|**Microsoft Teams Meeting Room License**| Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | |**On-screen display**| Adjust volume, brightness, and input control directly on the display. | | |**Sensor-activated Connected Standby**| Doppler sensor activates Connected Standby after 1 minute of inactivity.

          Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | |**Surface Hub pen**| Ergonomically redesigned and easily attachable on the sides of the device. | | @@ -30,7 +30,7 @@ Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork For more information about what’s new in Surface Hub 2S, see: -- [Surface Hub 2S product site](https://www.microsoft.com/en-us/p/surface-hub-2S/8P62MW6BN9G4?activetab=pivot:overviewtab) +- [Surface Hub 2S product site](https://www.microsoft.com/p/surface-hub-2S/8P62MW6BN9G4?activetab=pivot:overviewtab) - [Behind the Design Surface Hub 2S](https://techcommunity.microsoft.com/t5/Surface-IT-Pro-Blog/Behind-the-design-Surface-Hub-2S/ba-p/464099) ## Surface Hub 2S compared with Surface Hub From b5f80d03908d729ae76123366ef5e0d42178b976 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 18 Jun 2019 07:44:59 -0700 Subject: [PATCH 260/303] Update surface-hub-2s-site-planning.md --- .../surface-hub/surface-hub-2s-site-planning.md | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index cd710d4b16..61dcdfd90b 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -19,14 +19,15 @@ Designed for team collaboration, Surface Hub 2S can transform the way you work ## Room considerations -Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beaming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity table to determine if you need to plan for additional peripherals. - -|**Proximity**|**Additional peripherals**| -|:--------|:------| -| 1–2 meters | None | -| Up to 2.3 meters | None | -| Up to 4 meters | Peripherals optional| -| More than 4 meters | Peripherals recommended | +Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beam-forming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity guidance to determine if you need to plan for peripherals. + + +| **Room size** | **Participants** | **Proximity** | **Additional peripherals** | +| ------------- | ------------ | -------------------- | -------------------------- | +| Huddle | 1-3 | 1–2 meters | None | +| Small meeting | 3-5 | Up to 2.3 meters | None | +| Larger meting | 5 + | More than 2.3 meters | Peripherals recommended | + As a general guideline, install Surface Hub 2S in a space that meets the following criteria: From 5bf284f574f102583e974eb187539b04f06cf530 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 08:16:42 -0700 Subject: [PATCH 261/303] testing updates to test hub page --- devices/surface/index-new2.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 8a5972efe7..11b2ab3b64 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -96,7 +96,6 @@ description: Learn about Microsoft Surface and Surface Hub devices.

          • - -
          • From 3a10bbb70f6014772a38eb1d7ef4c42a60961547 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 08:17:52 -0700 Subject: [PATCH 262/303] tweaking cards for test hub --- devices/surface/index-new2.md | 9 --------- 1 file changed, 9 deletions(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 11b2ab3b64..6b146c5d25 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -38,9 +38,6 @@ description: Learn about Microsoft Surface and Surface Hub devices. @@ -60,9 +57,6 @@ description: Learn about Microsoft Surface and Surface Hub devices.

            Card name

            Description

            -

            Link name

            -

            Link name

            -

            Link name

            @@ -82,9 +76,6 @@ description: Learn about Microsoft Surface and Surface Hub devices.

            Card name

            Description

            -

            Link name

            -

            Link name

            -

            Link name

            From c8b0687adef6787dcbf5bdf929cd2eb22d6c781c Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 08:46:32 -0700 Subject: [PATCH 263/303] More tweaks to test hub page --- devices/surface/index-new2.md | 30 +++++++++++++++--------------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 6b146c5d25..9bd3f1e1ca 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -15,8 +15,8 @@ description: Learn about Microsoft Surface and Surface Hub devices. ---
            -

            Product name

            -

            Log a MAX ART bug to request card images.

            +

            Microsoft Surface

            +

            Learn how to plan, deploy, and manage Microsoft Surface and Surface Hub devices.

            • @@ -36,8 +36,8 @@ description: Learn about Microsoft Surface and Surface Hub devices.
            -

            Card name

            -

            Description

            +

            Surface Devices

            +

            Harness the power of Surface, Windows, and Office connected together through the cloud. Find tools, step-by-step guides, and other resources to help you plan, deploy, and manage Surface devices in your organization.

            @@ -55,8 +55,8 @@ description: Learn about Microsoft Surface and Surface Hub devices.
            -

            Card name

            -

            Description

            +

            Surface Hub

            +

            Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, collaboration, and presentations. Learn how to plan, deploy, manage, and support your Surface Hub devices.

            @@ -74,8 +74,8 @@ description: Learn about Microsoft Surface and Surface Hub devices.
            -

            Card name

            -

            Description

            +

            Surface for Business

            +

            Learn about Surface devices for the modern workplace.

            @@ -85,7 +85,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.


          • -
              + From 11ca0364d385a9abb62e5b937be5e39e7c9625d8 Mon Sep 17 00:00:00 2001 From: Joyce Y <47188252+mypil@users.noreply.github.com> Date: Wed, 19 Jun 2019 00:01:47 +0800 Subject: [PATCH 264/303] Corrected spelling error from "iwth" to "with" Wrong spelling "iwth" Closes issue #4088 --- windows/deployment/vda-subscription-activation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/vda-subscription-activation.md b/windows/deployment/vda-subscription-activation.md index 07ff40a76b..6cfb92963a 100644 --- a/windows/deployment/vda-subscription-activation.md +++ b/windows/deployment/vda-subscription-activation.md @@ -42,7 +42,7 @@ Deployment instructions are provided for the following scenarios: ### Scenario 2 - The Hyper-V host and the VM are both running Windows 10, version 1803 or later. - [Inherited Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation#inherited-activation) is enabled. All VMs created by a user with a Windows 10 E3 or E5 license are automatically activated independent of whether a user signs in iwth a local account or using an Azure Active Directory account. + [Inherited Activation](https://docs.microsoft.com/windows/deployment/windows-10-subscription-activation#inherited-activation) is enabled. All VMs created by a user with a Windows 10 E3 or E5 license are automatically activated independent of whether a user signs in with a local account or using an Azure Active Directory account. ### Scenario 3 - The VM is running Windows 10, version 1703 or 1709, or the hoster is not an authorized [QMTH](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx) partner. From fd4643a18a57b997e3bccd3c6001ace0e84ed038 Mon Sep 17 00:00:00 2001 From: Alwin V Date: Tue, 18 Jun 2019 09:15:08 -0700 Subject: [PATCH 265/303] Update manage-windows-1809-endpoints.md We'd like to include references to the Device authentication and Microsoft account endpoints, which must also be enabled for Windows Update to offer OS updates and App updates successfully. Without these additional endpoints enabled, Windows Update will fail to offer the updates targeted for those devices. --- windows/privacy/manage-windows-1809-endpoints.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/privacy/manage-windows-1809-endpoints.md b/windows/privacy/manage-windows-1809-endpoints.md index d148047f46..3fad7e54b2 100644 --- a/windows/privacy/manage-windows-1809-endpoints.md +++ b/windows/privacy/manage-windows-1809-endpoints.md @@ -457,6 +457,10 @@ If you [turn off traffic for these endpoints](manage-connections-from-windows-op | svchost | HTTPS | *.update.microsoft.com | | svchost | HTTPS | *.delivery.mp.microsoft.com | +These are dependent on enabling: +- [Device authentication](manage-windows-1809-endpoints.md#device-authentication) +- [Microsoft account](manage-windows-1809-endpoints.md#microsoft-account) + The following endpoint is used for content regulation. If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all. From 368dada94d37c36ae256f19715c21aaf72aee375 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 09:18:28 -0700 Subject: [PATCH 266/303] More updates for test hub --- devices/surface/index-new2.md | 21 ++++++++++----------- 1 file changed, 10 insertions(+), 11 deletions(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 9bd3f1e1ca..dc85bcb9cf 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -16,7 +16,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.

              Microsoft Surface

              -

              Learn how to plan, deploy, and manage Microsoft Surface and Surface Hub devices.

              +

              Learn how to plan, deploy, and manage Microsoft Surface and Surface Hub devices.

              • @@ -30,8 +30,8 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                @@ -45,13 +45,13 @@ description: Learn about Microsoft Surface and Surface Hub devices.
              • - +
              • - +
                - Office admins + Surface for Business
                @@ -92,7 +92,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                - Get started + Communities
                @@ -128,7 +127,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                - User account + Need help?
                From d1e94645db49c2036d99cdb54792e4e8b9de7a7a Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 18 Jun 2019 09:37:11 -0700 Subject: [PATCH 267/303] latest changes --- devices/surface-hub/images/sh2-add-group.png | Bin 0 -> 14265 bytes devices/surface-hub/images/sh2-apps-assign.png | Bin 0 -> 20953 bytes .../surface-hub-2s-deploy-apps-intune.md | 5 ++++- devices/surface-hub/surface-hub-2s-deploy.md | 6 ++---- .../surface-hub/surface-hub-2s-recover-reset.md | 10 ++++++++++ .../surface-hub/surface-hub-2s-site-planning.md | 4 ++-- 6 files changed, 18 insertions(+), 7 deletions(-) create mode 100644 devices/surface-hub/images/sh2-add-group.png create mode 100644 devices/surface-hub/images/sh2-apps-assign.png diff --git a/devices/surface-hub/images/sh2-add-group.png b/devices/surface-hub/images/sh2-add-group.png new file mode 100644 index 0000000000000000000000000000000000000000..eb44ad8cf9db67c0d09e1b1120c19d9f8fac55d5 GIT binary patch literal 14265 zcmb`u1yoy6yDf@qfdIuyAq00Q6ewPxc%eWk?iBap7A$yiFRsO*3N`}1MUO*g2R;@TOLzNIzPJ0nqqk3`ZWn^yRab&{%gYTj2FoR7yo?rDpdMa~ zyyiv0T_C8y?bqg)%k9HM{{9%C!1oNF9~AyeZf}kT1c#IwdDk@^Y!s+o}I*t0wo2;o+AtKyEGDpmt`6igKs0TK-#PEikz=L zepiknd8>B^7ihN{6}#K-sThS^i$0uBb?%X{X%x(pO3Kxz@|Z<5UM+dkp{qa~`o2<_ zAHo{L7qXhJTQ6pG&Hwx`E6UC7q^9Jz<@UZhRBG0S#6BZr@NXp%OF%!l>*WF)KaGCl z8=}5_34&l%B3(*fzbEba0E4krwMNn%) z{IFjX@}};;K3R8;ii+Yt7|)eDXiQE{HYmhfpV4)|JEh~oZ%Mw_ZLqIvJl340t3saV z+9||~$Jm;1m)Ih9`GYdgu^!Chvf!Ar2>C4(icdADl*YrLX=vzR$dudMEId0sO=6iD zW%{k?TJ(A)NYq}3koro7RP`P8YL(xEjiUjs4vUrkyI6hXJ{v(GBNzbsO*o6eZ8O8} z-PYJB_(rqzy3uaR%9RqUgpbCJ*J5;-!>~=H!D^}q26b8|!Zw2Ud|=Pzj+>at$q1@j zrwybD)KHk`*3s3qdl8lxsikea_MM{<$`8?J`*hzm&uGeGM^`X2-o->u(!qVAXg5l5 zW-RP}SXW! zl{fq5>x1|9c&jS$0zFRT&G@PDNM z)ydU-(&z9`=eOgL3V9~ak7L!?%EJ`Wi=Dzft3pb!l8lqOjHBDb%wVUtsCs5?Z114{ z6hC|;-+ZpMeIt7Ha&oUx)M>gKW-D2m+337Q3T;yDK<|^3BTq{^OPHR6rhn>@LVF(> zQ2vFsec07Xf{nqB+{;ySD}|qdu)UhZq6Fwy=OKaR>I>xzBxeA>iT%*?o5WjkV0mCT zBiq&@UDVs{^9#=v&yjC@mq+(EXG)5Siq*Ji_DggzA|{p4wFqiYMS04;{1`FoZ|Ug= zBpaCA-}SFV@S%InZU;XeI$(^0og%bb)m`JMN5b0sfv0{E+v1U zPWjrcUUf?C_KQt(C-ji#CVmZ9TC$-J=nW5dSLrpT{a?ap{jZHViSih6$&%0r1i7@T zJ6`ki>mV~g=%v8W;%|p`Ao4LT763ICu)O>=BnF^npr(5;!s7_6>7tLR5_!5m z>ogSD&6%J|P#7ySpb&%Ml4nc8Axsh(f zC)O{iznKWTHwLiA@Gt4eOEtA?o6qdQQ?3K>M~EbLRA=kxJOXYN7Zu_)r72yb3~sJwYN^2`2J?>vfl_!{r7jgV!+O-WZW5C~-p z?Q);dwjddPGQ-vZvp7zF(oCzfnI%=f59ad8U4gav-VGyC!hub}a*e61`CU+bZdBn9 z+dn+s{<;pWb(&_e`vCKkRbklNT-AbBe7CIX z(nO@A{b8X!O%~|;8kGao3L2d5^;r(VqvR1Rdfxv04PqURAX4LAjtQZVFTSM5YA~7C zE9!#VfM7EIe$12Ws1d+q3YJY5c2we4#WbW8ZJX>R= z+|&u(bP5>a*y*|GvvI0(!nZ=x&)$o+(d6H6tz=^b&X+D!E*dWyX2hfujl1UBQlKVA z%|bcN)|(DfeDLEn#*a4n1|9pQia5G%OXD6bU9w$(=WhncrCY0Bd$e&4MN%58+^el2 zz_f-m`xovaB3lMJe_0Qg3uI7CPDRDUpEKPYOyb9jPPcDjdGj=t{aCvqgEzDuNV&V@ zeS|j&BA9FQZRViV^Lw~}|FOuft8yaFqn3|xV?uZJU8h{eIt3qjFGmiC3o+<>dwbJh z7(VQ32HiS9S3^*2w1b>FJQOHmL{8;8UBAlO*p#`}fnGo>`%l&)xs-piB?h_CETa;L z0KWd=Xn?74E2|D{RZ357j5V*jUjDJ@eDHS$H{8X8E^M7nE`R8!wkJRKA0Gp>_}^z^!pp=?1SUSfz#`dB(S{e1@+ zwSX>B8M@U9_3jM|G`{*xJW2yjWd#-?I~z2TnfQ=%w<8K07ej!jM`f0YvxY|FD|GGF ziHe1cw2Eczl5vNtk9F|C^)9$6uihbV1e1W8Jyi^#h!;p8fx8#eLNFA1BSfg=6a~63 zX4*e%-2X8Y_-fX-1F8sAiQecn{LPlPHD#*0nO8ZQ3ag2ZHga%a07u7(>&p+K_aNu# z>}LmSsTAIuGGp{So6(%K!qjq0ZNRl*E7xX^Ki2MlyxAGle}q~g8KI~tR@O@EuY2!=ICI{8?Ge42+C{>_TDaWffy$%6E3=&WUAEt_pN zdzNvxn8BYC8r}8yz=v)g>K`>g6n{*=!iPCtb^-C*K+#5Hdx5N!1d;80>at=LZLf0f zWL0mo2}WDwXShkhUe#L~p*4~>mZ*7k+hdci?$Z18RU&7hN8uUW*G9JTp2b2Z-WS~o z<^B=_G}eWIB7QI5^dz5z5{M@&0O`Ltr@je84|SA#K_!GO(7NZ)6!tcr5>qdnR*qnOnUr6=6fQ)yIMDQoxzJ0apXu56ez}}-!PTi719tNOU6o{%% zhOJ;5=l+1zbZN;PBuP_NODm1%R&&>zC=InOkQsP%9xjl?^@tZ$|5*H@Wbh{HhukYM z)qt0BJL=OJ!17kIVMksgBWSQD4xrPJN__FF?~~nG@WF+JC84EpM;(@NlZk)|xi)43;j(&QDZPbt2_pU*cYsy}5o*NCLlGegdyG z(Tu~67R1$~HX9DNV`Cs(U3IR4-pBINQ#s`+O&IB9G3u9oZ}pg2A$BNO_J7DWFs9F( z0UyJO!^S^uKE`=D>GwXkvXCAQ79Us-#83jg4HTtueYB`J$=Rq%ab0B_Tb*)$7@f#G zbO+vX&UW?imRHG3hQ%#?Bw54Myt*L9U?6I17vFq$_8@Puur52*mwNKukCx})jtclq zyxq4)qGH$@L@sAK;9rA3pH)VK>LqMf>r8;pm0*Sq zdcUJQ`K@B`WefevBnJZ+!qUZmIT&LNFoB9;LTepc0VNn4615wM^r(^QW;dZB0YB*? zWgd4wXJGX}zGYQyya)`n*Q{AK0TssGw6}3Q=oRR1x2}=)uknoF_&lZ>^_VRH&)7` zH5OzbABXlc0~(*4{N~a7`--(n9#8@QK<%}0z9+hik2>_aCun@R7T&W~F2gP-I^j-B2BtvRNG>>MP&R8u#E?rymrKlBbPg z!v~FLzAM|I{UbwuLWy$Mkd$RgOHQFE??CJlGalj2y6?ibgh||DV#jD_TwBlZsGZ~1 zL(ayS<*(m*%WhJ8gMP(|HntWDc$yJ770SO*jy#VVj#zg3IL{f~{&Md%LECxApBwl@ z;F;DMXOdK=@3MsCVC23xV}Twbj3&(UQM!IwS;Nl1rC$B7LuV@2R^puX{^mP9zO0)) z2Nz2QsGwujX8|MwQ`{tc8xqoQ3X{8;&u?2H**HVryP1Ly{GxEG%uesj7OPbXYX#ZM z)%A*55|%f(wl?bygD81etz{v5gH1=S%P#b!4N4Y_-zj+no5pcCH z$2|n&zyNb@jG&C_<(a6&z(sy&$U~-TZb`g9a5~v%ZWLp+BY&rGR*o2c{#Rsb#cBms=2xGNKV}bM!(9g#1vIf8bd5OjkA&a)FyMD zyxQ&K$4#A9YvnwDRbIOSxmX%)HTOndW-I!M!`DJ;1IM8g8uTryhEgAQ(t)%A0L351 zZF6E1)rdJYyL21r?RYO2nn;!B8sEek4ED#w4T;B8kE_UcisMk_DWn8BP2GJ3&8TJv zDCf%)d9ib5kg{;4k+dT>ZXB|`8(XZLAq#o7-@K>y46St^w-rw*cz~7Bfui$E#20Ud zmSipP=G*yaL-?f8Zcg2!g`H^@Srpo3Xns*YRVKhS+phZ^ZxpbE%IXG2|Y9|Ndrr4-b?NxZK*aor0FnLIu+?OF%1(jPZ}z>-A-ej;gI`7cqX$`Uc*6qGv$A(}f;8Da$h5 zz4c&C<}Iz&NW;Uex!e5rlDCv0wOu0%5B4$6h5J(ncviMHL9X$yw;4eNBA)-8m&9Qi21&^l_DCo_4C9^%*Wlk+gmAvCV0O zJ6ojvx{&hD=oc}1MF?pglH-J2OMSX`F`HUx7-E-B z*Wnj*t8CpCKIIEKz7T+4@wWpz=h17LOTy<^3%kp$)Sk9he!{PTgZCfkgjnH+$q7p# zVqdOMuSi4=iRuMD!TB~PzCnc&&e3OoKJJ-$5%B!t|3n7{FomfL>VHf`SFMm)9l`+! zi*z$JQ&+R~kh~J13$<|)zs%$-m9UgwF2-rlJmcyXf1NFK0ez@gTnfnwtixQTygPaH zO>La%tbZf&tOAwp?KV~kMk!C}kl^>10s=8!%RZY&>-xrc<-!HQ9$oW_y4UBNxK0Gd zc9so=nEo! zSs5HWhEoQdtr3<6|JJY1l5V_mf&@Q(S=h~*&FysLU}dM+q5NcVV>Jr=ZAOp}b~|;P zMWPJ9NhB5{5_zdL?muVN+Zs#`bD2`=%xAuiUssH(&<;Bf;1WjxtlWreeY!s7(*9AP z8B>|VX`9()?hVakRy?BW<>z7{vvO$MOnwI{gsAENG4YjHW`JpsTME|)@CtGnhJwxd?Csf;tSX`6dmN$h+dZe(8R0m?C zsMLGfKxi{9O0^m{8FQu1oPiNkDRm);EjV4xo|7u#*9M2OU5(ruhTP|o>T5?k#l5}k z@>&v3z7w+(^#x`9#l)WP=JGBTo7atL%Xx45X%0G42Lff|!3u`-1*!f&91Td-$CWYa zMcp=@6=c$tNQKlDCBa87uYATmFCIujCmDrpel`rNIkW zpc2WU|67#bf1ii@7s65gQ#e8_SQt)yWy&)iziWK7)LK+oIeKMWEDs+^wz6n z`{Q$X1>3V5@aj@IzZ$VP#cRPlj0TtrmK>2|_j*{~+=W85%Z}Pl@WbtoS#^bFnHXxj zFO3;#Z=6gvF>_)HXu*KCkPwWinHh6Td|3pw@Ina$xmL)0)fgQe4U40b{nG4yH2Nv9 zLbn0_;>8PE8*3YzAqvw#)FWrmP2Qxuj<4Mrd<6Z7l9Ezt&)&`sZ}PQ(z=8`i?n<3r z%DufP2M33QcDzAK#aS+wy|4T&DL?5XzCPJt!WS1|SJBDQ>dW=k+7F|9momN~%pX$d z%;bSCzD*;>%eXBmCo!xamK23DQogu&ceg3tHq}zB=bu3@Wc6hqp+2gnmFLaBC9#1mcHii>t{Y%IiqmQtbuH4qZ zy%8jr02S)C?9&^|V+y%;rAKF2gM;Dm<4R|c=;^kb>~zdgjQ{BbaAc-JH^_a~z}rrK z`Qy2C+Xus^+u4J}PvojwKjlix5VWiB`Pe908T6WH1!E!-WQ_VE1z&)uZM!g@ez{mR zKXCTo-~jz7xIo~?-R5gnuC{$8C8c^pz%BPXq*%=L(0VDP4c}J1r$3{;L_<2_ zYCWIKyO7sEB)2Z>QHtSeP^RP)t8Ouh3Jd1E$!AB!l1=sKsiTtgcM8}js*Z3ffwh4SLMw}6fB_q1DHj^Df5^_X8AATf1 z15{L$zCSMfJ@ZV=$VcV+biJMIk(l&n79!rhAS0||#qW`G7`OYa^S%A&ymzOJnROF$q$PJW^fQ zr@HECgQx|JtER*6!mH6XO=6jvDHQd^G~2%{79BeEqj2{^@3gmjLGGuE`V;K+%m9Am zN=>1~y~AC1SXWGQ@d_s#>MHNqh!)A_RVP~hSiN^R2jOsodKT&r>}93YM6u55AGm5B zbZdBDSP);dez}7eO)s-N%(reuaLj#*uSO^EfH#^_Q5F6CIfW23mcLR7^WR12OBf|} z)Ui(ob6~Ke-hb!hkJBIN=n4uZ-jqprL_f3V`FVV-joL=+0e-y{_ScBmu48m)C6${3DgnCzP%+|?4usiu=`*#x5JDoVQM59szH z!ZynD*6L35cM+BCbAj z!6IR>ucExfG6^}}IHeQ3K0wcu0S`-eDZg?d02QdK;hO8PD;s3w7>{zXOLBk(0^@A3 zLGmk7qyJte#ARTE_z36(i6!Nz|2uWXe_Dy{TybAIWV>>yT3jWJXhzZVzq%dW|wVEUE1;i&MWeEro|rhQsv9M+Gv2;abr0&$NHvC*GjjR?oU zSj)rZLMPvErWqmwMZs$RID+JLMBo*!=xlhH<@JbH&R0atfu~D8XCv|bXvr)^D4%^8 z-=_lff~1-Bz&D!`i`S9$a?Rs1${>JR#&4Lx0X`1Y2_*TYBeN$8uYrt{6(1T8{ndLg z{kHg)*vaA!H;h+L>pr-+cRJWpO`^F268pKpV0feqzn6kMqd44B(silvC zhMY{nE{X^F06%*Veyqyq(1B>B+-l*yQ-H7Q(JalQ@OhRIq7bmD1T_UGv1!h`#J9nG z8G10)YVIBBY*I8k1fjmED=F#vdTOny$hqBJ{-m@80Um>r;cfv#$a+T5tRDcAjNVx0 zmCA0fq+YTpk-Q-OAxU&S{TesE?Vsm(rnDDpK(x_jQz@+Q@A$-i{X#27#s z*dlKEWI|Y=2dUDrnxjthYA^+pDfg8_69Xkb|c>g?xAyU7B1^Szmh%lociT)P~9wSY)b&(qJk7(Ia1`~uEI zJYzJ#j7?Q5KeXPcGw>WEqM$DpBsE;5lIK4lQ&DVXgUgAi5)Eyi24Pf>mwlf?Rz|Z#7usYzSZXC^8754|LoW7aF}HMebZ&oZ zsFAM*NF-x`5-JtYq=6~KB6Kg<;Kgcf<62JUGk``1q> z1wS;Tq_!ZL5JI|A?9?K+G)rPNv=TeIFtbMt@auMo}^q6bd!vmbI; zzi3^&vH#6d_pgidpBm(U7(9N^!Q=Pz^vQw@7B)l5(5KHvYJ~0e-AOwLuiHC`|8gY% z>0I*gUWZ@p1`gD|$60~ScUNuZV|Vy{NT#at$J+N^4?4@CS-+7!8Q-+tPb&Z1YqX=V zls||KaU_aoD3!c_^z38*dGc%KSuFzH*$Rlps?=qkx;^1{{c&j|9}!RTKC$b`wXc_=ESo^V1Toktw3)PhI+nXL8Pqfx_OkPR3^$D;Iu`qqNR5 z+s?SBJ8thTl(x{DfZGd)WZ42oZO#KlDQ-|xX1f`?_*ZlVq{TQVsG9ojKU=ZIojb{J zM%Rn_mC7943WV*p9eEGC!qKgCflXWh8N$f8UGos;0VM)LN|*WZ6;U*NS|Ua*P5`Su zK7OrXHUa96-f9SQ=fNz>i^~s4zHzU&7n+zf=IirDD#vNLU`s_d4z;Es=hfv5;=76b zbo#JVLbVF@sOz*A>Cp7sA8eKQqX)jO4HS22CjrN4Ew0Wvz8?avf88fz;ZD+J!@F3f z0^R+r9e%FSyydR_q*0#PwPBT_JHh8^LtsK=-uTNEtAN!0991K|a)AVxMu2AnJS8Qz z{R(22$OLK_{JmG564sM$B`mh>iuM-m*Bs^iDVG>L!#NMq|Z z5MRs2WaL{*YG~u#H)a7L766}?*NfV^DpMJ(>)s|l^NnIJ-b-M=nYl>mp%!^z0DL!0MEoH|WTrB5&x1Ztn!tTLOFeJg zn|XL;KAGL5-A6s%k-2L%{N8XFuNuqLVqynA-L~ zEuBRYXY z#?#L^^#y}t07NnMNKJ2M zjCbTgT&^GWZ18{q@;MavXcQ+{UA5TMVf8mxsX5X3wEwC9g9FS$evgXCW(9elC9a<# zoN{XNKWKeI5azIw=h{SKe+_i%f#ulQB^W1n@Y$mD&_hGD=Kevwfo1rMZdeGnxe+pc@CbHEgL^uhb1mQJ2%JH zRB4jF#Yi$8WRexHJiS%Fr?DsFj^rl?z2BAP7K~bzkHZ(#Mzdj~ejKIAaCAqqfNo(I7+!7jkkls}bBpZ-JPuBez ziWeoYmMHy%jGVs;G2K+9=TdJ>zx~?9UQzu;_Up?}$B*Z{GS9IzUaigJsP>BoFwbVi zS{K1JynAuj1rAMF0gSCYky5%D-=MO3G~9rkC9x3aq|pJPZ{F86(l6VWM-*&(>1fvpHo zPg1N-P7$?h=g1+a*mk3ECceORq7zVC&ZDA&Vc6~=n_~>EEFD_8b>Bmkc+YqwX7A+` zA{b}xE}r34|A#Db0nu=xcz_&MI7-bG zs|4$sX2~d_q}=oWpUD5O<-liye>9nhe(~yghWA0;?7ru6C%F+jE4El9!a{i~c3yx{ zj5Fl0HJWLTApidZSeuW0GecOldB+i6r;1nwk#;q~qn5Mxy1MDwH73Dn2<9*bR*mzw zu|J*GWq9r8U+az?G%VZiC7lz9 z9Q*r5xgl9af@8j@z;~z1g1ms<`>*cE4)Zc(zX>0;{FJ5K8cri_F{rhS6TE``N0>ev z6L-L;68b!)C=7d*$iK(`3jvhGzyHNkKa(opU~o9CX;@cbZEgLd%4tQU!$y#6X)+X=>wRBit^eIlPvug@$}Wyfx;U7`HiDR(Dr2G5 zyMaO+>|?Z<+Tx0!e5rYz)_PVlh8@DC!_Ei3ONb#SPeutWk++0?`d;zF=_KzW`h8=($w0v?S(;Qz zBo2dU-FqOK?#QCvkv)`#dM-#(8d}N!4&2ZZM~T&@Z!OIK4&8O>4sDGzeDm|OujtUq zwSV>@D*be)^}c@t@4mjiz+Qr3Oi94SAOrls(Ezm!T_aXYUM|K*_3isCuicUrR`^BF zS|HZo%NHFlzx_LQ!>3%pWMSkzSfqatl83F|ntxL9U6I5h4^v4%@h|bX>Q}E@$$2I7 z$ay}8r3tx~{;9LkH18`eWfxCqpK#xwBMif|ANM?ile|Z03T{Cco?7Z}XpEdVUzXEo z8Li=158=#EpvhM@Zsyo#ekkWZ(6FA>>M#ipi)8OfZQ0v{yOO!MEPws6F>Vf>r_C{u z&hsf)tTql(3gWpSS7=g0JU8Z|_h}|sKBoxSMws{qA?RA6;qCuI^Igb%!U>~fmlqY7 z)BIc~U|W|4SpL)E`SWH_vrWwjxra-}&D}k{vXZmRH3$>o3-_j^1_oScDX-E&dh$6s zYV}u2oxSe@!Am0>*}(`XO)iIa7&Ny+V$X{UaNi@U@puX&l-48j!KSNhgU`vC9Hs>W)>2Wbc9`l-xIpBe@IoPl0!ernTuC!A-e#-VQfHAt}f7b-6M;Ot;?dc z_teJ9s)m4N@Rj%F{;0#UOR>857N&m(VS@@i3DO>DIkD6y5v@bcSVFK$V#ow z8LXJh&f*B_wI)i@SQ-jA=fs-b$eJ}v^?AX9TBW~&(%<;~Rwv_v(Up`~=r?AA);t3z zbOC>n>sNlKw>;gfD@7``YzoEg;N_>TASt*~C--;r10Di4N=y###V(%oI_l+f_gAW!O$Tp%-?cVBs z#zD#pcC*x^Fx41@(GS89U0y8Ej;!-}T%yfiF`}w3A(mY=$r+4-V#}#p&khyrwU#XS zyfLv_N|RiOf;d38Y&#dO1+sqvH{wud7x{Pi zeQNCiO1iqbF^{|8JbQgvbzv9E#l3+T)Ge1Z@{jUCv+_fX^m~v8OF;y2Yja}k^!efT z;^i~7gnz*A#{cAG5gcm)JQq>$f;|7zZ4LX@T;g7mVVdNokK&8QLqMRLdmv&<9+JGY L^1Dh&qrm?G&vvp) literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-apps-assign.png b/devices/surface-hub/images/sh2-apps-assign.png new file mode 100644 index 0000000000000000000000000000000000000000..f6a91864c8db6ee56fd8270c7dc4d3eba2197d77 GIT binary patch literal 20953 zcmd43c{JN=xHcSZRZCml8`V;DccK(+O*QMFT8bJ&B0^Qov?b<*jyj=(p+!){9H}9O zAc~e&YMx3EQw)g+i6DY}Kl{Azf8Y16bJn}Qbz*!AVx(w9WE+(o%xTCTW|XGW+7Erw{NGPyLUA2 zicd{G_uRwVBA>qOzk_<+@_k$9qkYZvYrUhfw=T59S+gDNp&H86n#!sHzq4kxgoo1a zd>qj+7Qw&|jCnAb&OVHCGn=bN4*}=)Dy8@?TI%eW00=by8KU_7mM<6tdUxrG3^1zy zC&r3jQ1G5qyhwA!2nw<>x`*w<36CiZl2aeNKx>wB^fHun;EWdiq#-IMfEo#^(TIvWPs_`ORTuu}_lx9i%N|MnFy>Q;C`a)XB zSlGmJt6YHBFbI_CfEBo1|JdqGKm?gwwoajk12G7bEFsVe3+M4U(sVkUAI@bm z$W>J*e_7>PW~2-1=bpC`bl(sev zV4>wk*Kzt0tIx7c;wvk9`Vg2S=zu65S=n3?_;y}abl#Yee8tH>+!ih3`z=1Sfdd^P zMFG#bEC2Gi*XgeP*nPppWSTxR%yRXEWzMO#%R5^!UiGg=-Q^UTJ^#`A|uJNx<()I{(L`Sj3}E32z7&X^@VW1`k- zT`5GQ>nH(175LdRI4F6)Jw<}JNmY$$;PV7vUoK0c_Q=C9@PlhEOv_&m73N_1wj97(?r3eQ{N+xwv zGB*11nv#htm`9-Hu4|%+Pd|*-h9uA08J&(fB-6GH&MbE)B`pL9UeVO=oM}%jSH~Mr zbh3?R-oQ8SPCSwt^5a^Y#Xr%g-xmx5%^3_JIFCgmPxu@t2u`+7&n1)^@P<0?^Py{r ze6rASZ|&|;TkmBnaFXD~BQC!)3=MhkD{lyCzR`gg(09lKgVoab*p1C*x$OrNm)JAy z(uui{Pxm}M^W&^{gQ6{7w$9nsnibt_Zj9S?1hM=1`0x!64NVt3umW%v!mY7@cpAB}Nr37O?J))`UlvwbwM?R}G$p$P zvqoI2w`2b$q-bfty_apg3j~5?4#U8ly?O`Zhf4hm$^NyBiYwo}ORea!1dRG#6MeJN`Ebm&U?A*Eapq8u4YFoYc~j#lIJQL z9&}9^qJ4V$g|vTu_+X---k?*Uc|SbNU*V6{S_0(0`XPCy|2aXGU~tl|)MIM*?_o8h z^okpe2_j}IpCOUz7PByBIQYmn1%=^CKd9zbZmPfH@24#@z}KrjEf!m!z$Bfb?gwrK zb0S8rL_5~IGq2DD8{%|syt^pn1);P!qOeEp>%t){tTxy^KB8;fMewZD$86{~#BAc| zXO2<>OUdzFR&BL9Y=g&ZmN(@7YFd#v?UmcgKp$IZb8C;( z58Z@0O05)^D9i2y?7p(zK2?SIGqJm^GqXXhi^JCM*oz?zx{*sy<&NWi08c_WY2*_S z4?!RQ{TF?-5eS?&rT%{yhwn)&eu& zArR>F|Af)+(W&RPv*{5Z@;?HBA^3_4@Cg2>5Z5OwlQNS2v+3hMQcT4Qlc=`xE^ zVUT?vJAglh=MP#`bL-VvIuchyPo_z4FLOnjj;ZR&-A_nA$e&4*Z@okYfn1Is`{>g8 zB<hGoI2lv+(dS_plHQDUZ2U1L7T-=aVNWWx8xL>GCk59Q#o)u&@ z=3}0_7Z8SRdrDn^j04UH^9v1c8&Wp2@j|W^493hltKiR@19>wkZjbJfxqRuuBY~=y zbvL&Ydz-V4;R-IVkyJ%vGW5Al>ufQP*k3oagBKh=U36>7Pd1?2$B4=u0>W(sG(|VD zMmpa~5w7c*y1jwpZ&Vj2hv#qW)QA>Yw6b_T9mw3D=31lTiv)T}T!~GE1y=X%^q2Qj z(UzwM=1MWcYu9-lt#QnBi{if#={Qss#eCm8L)wLwPZ#dg3sKY)JNx``Mw)~@aj_<8w*F=C2g=qc zPoNDKnPT8>O_ZNWV6-Ukf8-3Hh#Oc`fY5+g@cJH_K3jt$wRy?)W^V4b;dXBfT(Q?^@8??Y5s3P`P5~%Csx=JBkK7D==NMQK6gW1qP@ulzL zbDJy6QNo@2{HtMY*DN#sl3maHHNgTm{2}}X9~RPi)Ncny+#3a+RdP2?Q0evtv8CB;u74(Mi z&l@7inDQ#zZg{Xh%kAFSa^}FLX)IK-A%nj;8%Qsjb2!Ro|9}~9r;W1{Ll%DPstlAh zi2DU*tZuDQC`+2sK7I#-w+Gc4Y}a653ip?dD}Nd6e~xb$uP?p5G4YY=B^-p>_+$87 z5+1G{;&{+@J5@ec{WE>IZsK5oLg#G5o$WV)OXH2j91~@OVMhv(-rSj-@F{7ELm+=C z*F3e2)SjZD1kE5Gg|9bBwq>-o=XpCD2F=~6lr^uKq3{-KRqLqA0ly4*>#c^e{ta8J z3xU+`o{csz@o)cn&Onp;U2h_ungE72VDbic62(FwwpU10$4CK|cnjgpj(Pvo^ft93 zEWy6}@u?CX0QfL}yvlH+JHBn+8@(-p;}-V6Nu=z0E$v_JY6~Ny zGIzgcx%R4ObhBuhrN|RZ5X@E3r~^sou4@7s>T+6FmI6x(FtORKZjkd;}-DZ_}e3tboaluli-g>|va;LD7C4}Ic; z9kOKx<cl*J%j5c?ypg~43wV3LcN}s0V`s(Xg3SVDZ?j2q&Y{)8t zQ0?gI4_&^96(EDT)Z~~iU%o5^^rK-D!t55 zc#xCriTkV$-NZQkLZPVhoTzv$KapT!6z%tg`L_e7`F(1g9&SPE_IXnHMZHIb^;)0j z$DMv--?)aPtUU)D}I^#(o=d*m^sJF)UF++@PhfFCaIRb~72mUCzPA z4BU65(rxVPHa9ShaJ8yL$miCb6CVaw7THi$%Ij%dKGMgt-kVz@o_LG*sxuzqc6T`U z;pkwtXX?O)46Z`8#rvG)19_flvGKQ%hkX&}e?l#Ro70UfJQC(5DRYV)CxlP>;%wa7 z{#0dYue0hD)NOn)v6ft+thi3e>nQNq7J+M=sTEN|Z4IP$h{p3b z=TmmcWIt|W+yi@ZM&gQ}76d?S*WQ1g1?R^w1S)MMcc=c(!jFWAG21Wuw&Bb1y;#xJR_2g!cHkw1k4~r z6yV#hZK&smaf(Q=_XO!4RzLAi|0Cyb;0os4voE@;PixnIk#h}T=D48uwqE4VkTy3i zo7+J?n~r{lJrLIVgZX z?xS(*)$EN`cWb1rH+N9*?URc>{Y61eea0B8HQ!BGVbFpVVS61+x=4WHmH&iY>KjC_ z%$2L&n+hCTPf;t^{kp(WRSC6&J&xO4=dSW2-yO=Ak{cI7c+H+CoHCP_Vmu?B>n#!Q zBeJaw%F&`X zSy!?e@xoj}{&U)x)-CcCJ9^d3LN&B!_Kg4guOG8%#ee&_-l;FdU*is%Me)wM6@g>t zzv_^ra~#aA!Xm{8hkh1D8Frix7HC2pcV^^_zDm`eK--XTscH z4?@*X*vTKF;9aqxht9sx`Db6a_*g|hn~V}7*?80eh^h8IVUtLrC!Dhzp%LF^JrAr_ z-r|QkdrTJdQ8v%^c9?Db#>N1z`gy_JQO6*?e9VEuC_f*5*n`$*b@n}`tyjgE*Mt>W zaRI0Y6|2dHTfK(ZaHqaCAl4TE(UYCV)WptaWs?*BMex-`m&x>q#R8p9kBs!Ou2cV% zM6r#tQMZ?b;`L<=miXH+m{*#H*X0p)`sYG+J6gADaTAdetfSFv?|sE+b{?et9>se? zf$r+Ekc3A*BwJ@d6!8zE9~G45Wax0LN#(mLK9uD6_}Q60Pic^cd=|*bMm~j_atv{% zqjq5p88)iviO+*eDGpvU14GN-_UcOs>P*cihX{Q0fqu0KD0YjF3Z3}T*4bS6qv96_ zK|+*g=_+5)JZq{Ix23rcl#_{U>@ZV(erM{F%vNy6src9j+sbTS)#?dkc@e+K_zh!k$dO#txse z_2Rk2cN7A9+NQIAb3G=!U5Adz*{g8snH+z;RfC@Zl#Zp9+kHzP$}Q4YKkq_^%kl5T zS7i)tV(Iv=XOTR-9i{zC17px>D&{~-r{}9$lg$X9tWIdj%dPMt1a=+%7iUyC#YB}S zXt%`}q(U_|ReLwoCl{ruoha=AzIT8X5nJqSTpGjv(Qv;|Z$4R{G4UbA5Qo}QZQOv% zRw_mCeaeY?VK5_OZnxW!N%&9v<|oqzkc?A^(%jQ8? zUA%arF}oE(AN1gsaW{kDlEg!i2FPviExbP;xje6^jD_=Jw=SKJepQ5R>{$7w`s|#l z0UQ;@%1HmU3vKF*oSD&$A=E->5kjzUy2&P5JlPg_*oH$L@0gSC<)}?;jHFv&xe4Hiy{|2#Hfkcx zno+s>Z}r}F8Mc~mdoAA=`7S?YDpH~HzFTo`dg1~Y_L9$8ZlaJ1v05A)J-s5fR%w9W z#RZv>+gK$HSX2Uky#}1f%J%r}pg*H8XF^{gYvX*(yvRY==8)34nk$;h%%K~`y~QZT zTGVSPYlA*e?f z-DJ%62Malr2R+9<%}0ZRTw-e-7re%T`{!FF=9WcQK~>(HqBT_guNULdbCdRG1kY_x zJTmP}AI#Z=rgMzy|HT=CM)U!!l4|yNQ~JghKz5dIc4?!17itU@Q=?YjKFNfzV50nr zpu}GpBO2|=HuAcphzFePn2mn+I~)C&vu`)|#?qAhYr22Iuq=}&D9evhYdG-Q|QR1 z3jO0{>9bV=pDqu}E_g0<=;m&#>v4XwC1xXf1!tdi*3-ewh7pXRi2@tdBseS4E;%M- zvs^?Z*)B7%{ds51o7~FPk`mL&m}>(?-4_*BS4JT7Ibw!{28opf=Litm;-xodNnVd) zeW$Od%OcFu&0ot$+v?3NXRRdKElX^b&be@foPvt@Y4dXXmMs4hf;z$}#qO=1~GzPZreOb`aaL|rq{&B(!TAEK+0>^lokRsLt0T_`}os25|Yq=!B-9w;aKhjR@n=$}|g2 zNM4DHk2{!$4@Oe04EmqnO-O0XHM=}ZMbj-zx+`F*h(&rQ;cAXKozCcnRW(X;Da9Kad4P6sdH)zbauanjH?9aP-n z0+Xij^3KOvjUV)Hkay$dD#_M5mTXuA_|j_>x_dYZ6uBL zpQhe1Ds-V&cLHEoqvjS+eN?nRh}t$zqu|@BMg~> zX5lFccPheIkYL{w=H5d06sByiW|@kXCE1E+rROjxy3oI!7iq6#Ru}8zH*Z^2yqX+p zRM7*jnY_}2XFW~Dj~4U5FwX&uu*;<4zuepdq`*)8wUOQj&(V>k;zU-jT60&Rhq~Q7 z;m77M97QZ3{{~oXvaPJ1%x$RtzA^=K^dI$>FTJp9o^pc6g(Ll(-h;g$Rb2)JE@+P$ z0nhJ0B;g~K;i(WsM2UN=!euUczVmq^E~4a%k@3`{zLacr0(C7YNTRr?$HFQzTgg5X zn(u=hD!B&oOs>@5S0NQ!`Z=OQZDPWsbKkX2b74_^eQmu*iiWG!(Q0dHlI8B=<3Y_& z4Upy4DcibSbzex(g@L{gQ_MN*9#X?VRr-ADfCgLeJ!D`&jeR?~b+k zp9hHlPr)H>v5q8*zwjfsQ-7CZK_DZapvd0K)oo%8^=vaP2xYgT%)@?3xCqW>Z4EbUB zYfq%lUOe!sL-0Aw`irSM1l;pBAyNu=x7 zZVnL;^tPy0tbsA?OyZ19a&ks61-X_8^;?M=xy?)+nwoFJVZ>DPik2Xdyhv2>ui=yw z&KkfplqtDJX)LgrgFb9tg`c*PNu5DwUJ>^-t+Ans(7)L}5IbWtv~_8DwJlqHQpdgq zdjN$r=nR7?B*lEP?Ce=%JL)_{`F*b2sM7OE#X8ko@*O2;@bsLcx`T?8A|w!2e+XNf zZ81IVrRn?n;28b)dpK@ zcu&W~=Gk8Z=s`i|ng)EkZt4oQm0%IV-YwRWkon^C24`jEz}o8SjEdydqXrMgjaJvb zeKXR;&8hKfha*!oFJE>*1w_Rta%1!8$T|zG8NivFBwk?;saw+H*i*gpbh@;LzN#|T zggvwgsaodTrL(v_6wQY14pMerSg|wS$?3jXQ8%G`mY6=Z@hZ7p$z#*N`3AiV;jr=W z7@O9Z+*$dtzjlnQvrsysE$&?uls2hh zW{sCZNuDhG5w=WMERy?>vkuw9Y)nXMJoVOo=gw(znmeasxYA z{Cnx$r6t3qf<|odS#`bpvp?UT0v1#xBBv;oNF;s*w3mgg*Ahx){HdZ^Q#RvI>8X{q zwPa|VdVGL!;ow+(1j)=3-5MuD+8(R)Bj=-5W2LoTZ1L7Ik~YvGW1p30+1YF98UEnM z_Gi1pBMl0dxx-&wul=bCfOG4q4L?7eF>CsAEvBphVuA3Y_VB2rmFG?o@&k&F6meA$Wv|3GJa#hi<^(A37YR= zu~JHy*m|&YMLYc*)JYZKT07CWxxj3O5ASJ@wb=*AvG!F4nG{6{or=vvhIn(wHmK&9 zEr{|X)Y$!&@%5=I7&n-5>k&}956%C)%mL>b&;8UHF#0_97{z({RnBmv&c3;vet$^D zp|VO8;>z?fDXBJ#vx(~$&2+kE1wFzzcTPJy%NJaDRMst^>%XzKxgSnCS6%w?xnM!R zZBgoHHIF2|{Z=u&ftafzA*dCc1=c>l)U&~2*)ejC_5Nzwr7ZWyE2Aeu0{FBYtfU5GrdJ) zADvE3UKt3NfVKa?o=ZGbqEkaPuX-9(|Fp(VlBf!o7o*xWULE^&T|TlsoAG753GPZW zZ8*Z|i*3sucpVCzv0C~P38g1f&FQ2fwSM<{`4bHAz{wnUyZd-&hfI$t`Qk{V%Vs9%aem}6Poo`6=|8x zpe8ME(|E4EG{Vhs%`A;?>TW|AxSESlLPKyTeXyw)dOqZA6g)q)q|;px(VBdV`=<7q zUCh7=?qfo~2Yv&5%q|!)`}{p4udJ2hE`JkorY}2vOLZ(+!yG}a{ac#4`xu4c)(68} zB9GsbTN%ibxRUv#Vnz%nt&Z+L#bvqQK^CU_Sa~(rJ8v1xH6$N7;5eSk z8H5-n#vxWm&*@Zpk|prtyYhEZfQ6Ax*t&o8ZlOa7Q1_Lp0L2d8<8o8>IV7xLBlo`U z9lG!>lK7S<1V5i%GB;U!npJW&Q4V$n>WnyCJb+tFWpS*x{feKJH;+L@mY*$c0G>;D{RYdIv2*o`p)7Ybik z|4VbaRHda3Wbydblf!cRs@@Rac<-luCx9wC`>fC1&PCDll!9UPWc0cG_!I^LBLd)$ zr4wCJ-wloO{G$_~&ci=Ydo0^mvHpMU24(IWbpU3fBdsON{eOz4_}{B*V&`3E#~Yu1 zu~mGI)(uJ5^y^5|9ts+&@Un3LF#fZVRGM-v?GfP3Fvs>*zUemvfyC^38$04;bgu>k z1pFZ)b#<*I9lyFj_y#Kgh*2ZO8xR=Z zKoB`Noa#u}Ec#%cSO|Hpo)Go+$+-xw%0J5VymR9$(w`tRIGcy|$NUsN3*dzEBd6;DBS<2$cm9QN}4*JP+?H7h%rQNtXOdh!sc@KfZl2y6w)1Vmk4R_{Pw8m+}E!q zN!8Gs%Ay9M!qpaOm#xzMfy-ZeOCeaBAJr$8|)vnSaK zt98Vwz`cEM3@@qj6Ya;~b8rH2m$cwb#ei;^5Wq@Q`{Jn#Uff|YhAH)`)(&DkdS`$$ z-TL!;Sbnh32T0&~T-X(}qw|^~CACG?q}$4q_Fufuzq{z|^@`+)wH6*1FMjqu^GDUq zACZS0d^Uo?$q3v-CEcC-sqm+JzooL^@+&*}8-j;9m7w3LTB^EMGQrYn}Ni82)DkTyW$tT2>oWV2tml8Q`!y8%GPXQOn9Xd2sE0h ze&*SP&Ej{!dGhXc0p{<{7QnXQb?OhG*5CTSA5(wN2!ev%>`*uyQT~$XM9plvQo{w} z?Nm+W9c5yOpX?m&^$CE5pJp2VJ(K3nMe!}(B#?$W(#`gUGZSGMYlkDYZ1NX@a|;f#c(8LjkV zM>>&q>z>St^J~K$!(+nt!8qs9(!bCBImQ-f^Bx$k3G^`Q9r=$C=eJk^c-~%E7lz#KaEBkFyV|n!CqEfOLU!=klZJpP>b^AepR-Iy7RBpz5goKO=l-!515z{7(i* z9sJ&Lb>X0~je)8-E=*_i8^p*ugbkMKY%A2Q5T6b%L*x~>ccgl`qH_=jmm4T{ zRHLckcNO4Ga9Jv65guLygpZ@v%X*fAGS(7T9dV=A*O50uc=&dgTB=DR{2Y9>OhpV+ z@Q6E4^xc5YD~(>3yGRc&4`b8XL)IL%7pTxG-})BTXE4fau6jmZk6kB$I($j9ajYf>$O+TfFP~U$ib~CflGcvcK3b9s7tCieX1Y4w6(QWBmYhrT6wQ` zg*B=MX$2~kHqy+&7d<*veq{R&uvJ1$6n~qgXG#)MZ_CIa0>(ir`MZLy(we?Ma|_H& z+!eF*$aSu#L3g_H*C6qv^l-$Vn;D#Th+rk^> zZf`hzqY~-os1#2T^$i~ju4Z@Wl6X(ruwhVRcUD-rf0Z{clj4kDGy`27Kz1+ImXttO zQXc#`I!5G}z+EH_5>wu7LdnV%@#gs?(}Ew3Q<7%~w>GWZP?kpcSHXl`9sW z;n8IlEvZ@oDh-2;{1)ke;~Me14hvq$t*X*GZitHP)6*%KJDn@$epI_=e)=vGadNEO z!?K-g{mq^3M2rjzZfdhxsmc3@|7;kw?d5i7Ge{62jEXck59;MBMgSo!cc@OM+go2T zd#dR`9MRQYKVqz@WQ^`yLVG-&UXT4 zNyRApf&+y@WXVVwymgv09@!P}^v=}IBuGMA9JuMs3&?xUuVl_r*C=7@+@+YoG>RS6 zX!m*aQ3uQqpwf(nl@LUm5D`jqE9-&h>CzfPx8Ttx&=Gq*AxmCZJG;*o&f^ zVt1WSyojr7v&`O|YA3ID|Mz7^U_*9ins)hJDWVxJ(UvJ(fmcRqx$m4f4zhLzgcb?z zBdBfFsgHN*S2`yDad0_FBFJRWP>`(9(;QWcwINt*1))Kc8H$|d^D{hXzmuxDL zX0_fa?4PAJgxYWsWS*+84{9-D?(;$vegQ!nEQLOz*OZ_T62(UZqNo82U@`0~IQVYqQc={A^_?Bs_rA|w!lj`u08=S zDELr)fuf~0Zi#Rib$ginmNm7zCLCgKD<5{n85?E?avk-HT@dQuYpUc>%J32Jt>?Mm zk^8?XsXLoIwbk9ZA}!yV*?a35qIxp^d^EgcpnA?SF4=N{$9K6A_Fzd4NiAi~Qnshs zB;nYef?C`RWixw;8O2ERt&7WB%iuCZn#r27szTv%+abNf!wmP);3<_qR$A|4kDVj1 zs)~ZqC)k8+@jVI$rI}faS>Y{T)XCzSfZeLei^#b#dNCcMJ9$w@iZo4;PQ@h+{3Y^< zwRchxhZ^}v>w_ShZo-O4zorkKRLwe)oyAR7f$4bHeP9xcZy+XHhZH&sr5U>TvS`eE z3ZNiw)CwiuaIX4D(c~;X&FvxX$t;)GMnKV_lb8q8GamPu{cWd$?}Enz`OUbB63@4t zKN{8^m{fIDlxSNFwx zUE~jt%H`9>4KMQtWYKd$h!U~;BV}&B;{_J^537tYwbemQeZPofawK-hxI*T#o84QM zRRQlh$?I*LIXHc5zm4*4O>_66SuGEBTz@LOfd-|QE}rc#kYi>Y*_$yNPN?(sy*-Au zl*-Q58=92@ITwXS41?&VSeNuRkI~zx+qU|V=yL}}?oR2J`1)Gu^IVj9e@BDo_T-7d z@)WviCO^Orys*DBRqMC%H-08^c}<1psWspppjYn3S$f~u(DMWlc95>O>cE4f-G^O1 z!-ES19;w??M^hyik9xNK|APG{x2AdKN9S)<{g!D&gzZcZi zyzJQco4+29BekrEck3P5ga5dA+j|W=JBXTTr6x%uEQegEBD}c!qYi6+pWY+fhV&Gx zqA1=O)iaw*uY6R0q8#pA38;-K%vO?>6aam42$GCL**+*%=;Dq?@o&{AnKj;d0E31j zXh%3jC6}wRVUAS{{m%#OHHAI5d*OO1f_ejOm^FrQknMoz+dZE*_CK-M%AcN&D;5Mr z|3wfpQ`RMvF|X4*U=4;Fdj;`x(|B4?)*1QSk9-*)XUP)o?|AYDA|&9hRPn+&P*0Iq zUsiU^GjDQ{bdgQtA)v^Nj_YO2R#8w9t1dTXcS)7$HmyV!C(O^!R@E_^is`0gXG=oE zN{<=Y`7WUp1aiA75JxDNs;RwXEWB&Q^gRR@$qi-m;ZyNuijzqPsjfk?YVxJQYArM$_rM1h5J5B z$K6wXs~WENEZr}c&(S-tuX*?Ua`isodTpY!g&x1w-)GxtT_)KgslUgzQ?u91Qg2YR z&xX-@a&BS>xXTwqnDuKf0#NK!*X79{L)T92_wUJO6uH=w9dH&W0WAEsV8?Y0=7Zr# z!~o-BH#%~Lx>U2<@LEn=vCimE4-atSPDCqmqI-e)C8Pd=%5E8} zF^R7Q=VzllFNlm+#P0aWd=Dfc9D_{(XT8Ox;H+QSV)0MnEV{zIVS@`p<;_b=4;+B9 z+eC=~y}iP!dQHp+YQbCC7rq_sIx2&J&o@2xFFNc$8hGhEw{Q9U&6}~iD(RJ5r$;su zTgyIR9ZFA%1ZnK6w*hMMW5Fj~e*F&))UDhYU1WGhd!D8lFd;LNZCMw5w=_*^#*Tr}gxSnw+OXPZPwDP(k> zADV(wqfE}zNla<{0@)jcEqmK7f>+hhE{JsBMXkKJQbi6K0y8ieKQZBm&I`miGKE8tY!T{j_C*CT1YveVQly^6huQ(?K>PKd zJzjn=6Ra<&(o?R>Zyw#X0&+*c)e0DMLg7AgVztIDd&>%*5O#TM;S2EiavJf6wspeD zuckY6nZGT3SDoeWMm;IKA%6xs%c7FX#mv&PI`s`T-L^Nmj?rLsn7j@;Etcgf@M#-7 z^ac{5-agZR%bIRg)BMvx8iNrlvG{~?Hn)Lkn38|bO)pw5r2v?kxDbHu+Nw)zDP901 zk^=`0Bv7ETqB1(R+qZlDc#2=Ya{8eBeg#z`ssf(B{r1W2hC`&hnO*}Afn1ug0O~ep zlKy*D7wPOpxeVYw7!_pw<^LOQ;`1N>WURs)9$wnKBAG~TD|Yd4s#tjT{={{85%l3= z=t&~$pj9C1c*R^HSxC?|$BRVB9q#YLaps>vm5~&8@v7g`vF0pgSlCwg!%UCJ`uXem zM!%Ecob!N?BVv|xzMwwS4v+-u^`7q9{~u@*3!qJ*f6*rUM(~0u2To@Re|Vky{QaU{ z1lRtO$OYx~-%3$d^>cv?xulZSK*M%gSk~CFm#=_S6bA{(%?PVf zV>F^IUUXV97HuUnEr{UEV8=Fa8ma?2_sEJR9zIq!W^t=Nf_lrB)x`$i@JB-I=G~R` z2mJ0|u{<^PE_&H?3ZZ@zFNR{X0-KW}EMD-r-+CujDO{>=?3?ZBQ0{jkU-W*0kPyEc zEUOf?%`i+KdcTRFEf#UL_zIgmxURf3ZfbtZ1I24vs*G(VJsykUk5*I$M>tlERs&$( z{2sX37`&}>CFZ@@J?D@F3j@>U7WFyPy7Y$%?V8U4@(uSOC7|9a`DNZmJG~pNA&B)$ zeMs2KtYfcH^yI}2oFKPA0s(aHcSw%*}xg`YNVk<;Eb1lpk z<_RwVV>WQlTl~3o`4-4Ecg*tDVf$gY#F97_cI6#T(#(uwR}k0qGkB)M__jJ)?^gkt z_FYW%xss~3S_IBswp6TkR|ZcGg+Um*MXGGq$LJC?a?ztT8MQVc10MWl`VHjjVpWJc#!MI#hH+mJ%G>}Q!B$bnsM3n;NpN=Kw5|4PAZ!vZ8oIxiiD6GKv+WhROF~)vB^_Kzou+`}?lx8Nux(J-^&4G*b$E;eK zT_cm2PrYlbA2EnfehYa5;DHGIai-zu z0c>UqKr5f|Zs$%iVSU~H#iX&&`>nKzQyEbhK{`un0BCw##b0hGJTP5t*fnOc)$(`z z8_y@Br8eT<6fWCT#Ufr+e8is(x(fq!9e}wgjC;*uXUFXLR6v&hGk#A{jXz~bRFUqr zxz2Vt+-E^hD;Ncgc)ZVY$x#13efOt{stdX)2)EHH*Bb+|?(F=LZDbL0GKJkNUs8X9 z=Xyo3-q?`WqX_#K=6uhpeE>Ki+>9T02=RHAZ7@gS7fBEZ`yzUi>A)sDX!k&kB(3y^i}kv=TME2$MrR(8(LZfVb{=&=3kS~u z9AZ$Kzah|iKrR=$#yZ^fZuGC*SvSmWOTz{#Qu00wJiHp-vxP}^9$x*sH&zgIR806m zA38Clb^dzJ2_u|%0jDiFV6X%>RLQ)a>E<~EAh2Vjf<=o5Mm2^C$nR>=kkA*h=2P>t znm0^fVDI+wQiyl|eBaJ_|FZ+v&W)lm7mpK^@@zspzm%^WIPd3ypF8hdSMB!L;so%4 zAd%6}*&n}HJfV$sy(!h3N`}zYHBHENs(xU>GV}uB(jHw%Yrv@;~9YfJ`#;`?HuS#+r)&U~D1DQ?{La(7Rm? z1UlLvbtqVT4&VeY{_9Qw6v}7KF`^;GCpG`q|o1MXJ6k9D+-#QtvOkm%(Mtv$OR6TuRSq&E=_24k%@4Dno%@w7~~j zNswTm`|7jw&$(%=SBeSD2_TVN=X)?U^MCe}3C&G6B@;2d0G>s>=g!xLFb@H=-WP!8 z1l(=6+nNE)Mq<;V>a~QO5`@e=_}g0&fb~H&vDM}q9-#Al3A>Dxvm@6_^r>IcA6_vH z?9MW#s*86yBJ&R@R+*=2_}I74?*d(LHUHHy8!LVE=$+FSM#yBS#kHulwY7ND^1M8c zP{7#}@%%kvn6g1Re)&OWnmrs&@tQx1ESbL%#al}f#pHp1p7W?%^zOCYi_u6cC)SmH zcmJsrpLEVNFf<2+M1JoD{6H6fXq!{QOY9}k6jkK?Q4ZoO;Qu4&+Et$o^) zl%Z{-;WPuFJ+>de5EA?^~BQD`h4oS}_V>U2YB$kluWMTWILK0&F}- z4prFcc>lu^cm~JuBl`>OTmhFq2=v#>oqYlF+I`OdWRdKpMpBb;-cKL1ldSX$@LpUN zbtoeChm|b5?QZ0;m4-3EOS|d4%)0Uq2&B+8_en#Lh%s|3NIGP)b>V32^JTVo z+H1M;$-JTUBN;-ehUwsWDJae|ujdoG`mL$1Z23p6^qbTb(vNxGyuHc86rw>S%+?I( zjDMSZIWH&5B6h^@S)1>I6~0t2*1G5&q!nn1Z%qPRX@Wq1El^zBOUY&X7X}LgzUfT; zeZj)(a^e*pVO|d|0E-2_6Es1;{%uwLFW18VA^z^Pm6m%L1ImrMPj!1d)?49^S4b}4 zj)Oek@!I{THYNDaY+Uf4_)OO$ElOly_1aiOZPwkL4HFDB^hN|7fm16uDkUYH3`d2n z)4&Z}DW?eE^UXpsrwf%k%?-un^clQy@vX zDyX7q|Bg8j8ta}Z_HXRejYa&gSG7Uc{`Y%9W|?B4nn!>=17d)lwtvhJ#kEtqi zqB{pDaSt>%HxJQ)0&QYxqM70B_u1l`&R=<^0#9~5zu`AjcILSDqtinhfTH_I*T)E} z_Vnpf*B`GXsGUd7J6xDh05z(pfT%+G-i!yW~E&*-tahU;-<<*s11GpPrDY z>~Xv=CJ9^3yUA`Pfrk%;!Cb;%*5SH*ol*qA4>sgv{yZzP`!8W z-liUmSzvFeSS2Fn`TOV-Z*%_NqU7(Y3ldaU=2*RBv^cpTDoPVJYM^K`wn1a4*f{!y zQEj{+=?Oxqx#7REz3S`hhk~}S?{!)@g?VVo~z0-!rMpbIwmZr^@K`M{_jxKcfxFODMb1W!G@le6ZH zw#szX^!;-fFn=Z2lS|!9lH!;rcUlR}x#jN4q8o6go7PyU8~5Xm<}Hu_&tT>14P3kO zvJ*!$kzbkb&5JJ->VHGUrBqwE^Hv$I~0;O$84{n z+kpH~7y$zw7!VPIn(Vu>8^010uYebbwO5t@{*Q3m7~P(iBp~fj^l=&RiAuMDv80y9 z7bvY00pZFaDH51@LvT?{V%3F4WWnyuA#9+nif}$Tq3L7@$vBoFIfYN?X!;VMH-AOj>2di;U#^fw=PMwNXe|VhZQCr zS6M(c=kqx0jKUSHGdovl>$04^$u^ZO2r^O@pIxecdEDFGif(i2X@HMwNT3}p35Zec zy;CQ34DRQV3+UHjwwwcVf`Ewb(_7SNnsAVJeLs*8g0yz%SfetX)xJO=gq2N41{Xr)ZlF}=su z!U4}vo{Z2+4<+S(LY(1|X=EomPGgz1Os^#SODDeA>E#J4-~8_NFin5}B|nvs*%t(o zl9g3y0AlBz^f3x0133Wf+_D4nkh!~eGV+dLN7J0Wva*sO`luh+?IkJMMhCAVl!+8q znB&dG3zmCyb`0b(tB{prWk$6l%%?|0}D%?x82&Bf}js1#*5r-O^%P8 zJ~ecyEp-RxnnBsTx`PJ}+~Y0_Bw!{6MKgI78vjoxR~pZDn#V(@la@ix!Bl9+jz!RP z%A}$k?OJ?Mx~-zn;yWZv-Ka_E6UK29uu@n zUS9kIeYK-A-x?R8pF{Qe8$O+CcB)tFBUOEfluUVi(9$wvtupT=a#e0L0;p0FJt!CO zif$pv%=yyJCQOiND9qcOtcv&{)c}=S9?eV9eLC$qnl4@_*n3Rd9^^ctWWzaY-1D!S zg;`7)S2kCA!W^x}p#D=Jr%k7iVeM~QG}9=*kKd}Bf>7zzU)nqg755?j5*)9>0v;oSLJzvU9_I9egyjNy*+0pY%lzX5j7UK-v&#&8H z;SSb4#Iwn#J>AXXeO(|Du4F;L;u!x-{N1rh0~APzK!L<{O_$&*X5g61wmXwk<|$tt z>DDm-O3X1vqocIfy??{fjO_{LiR#&-5P#>U6lF#1R8h5zI>>)p$DHF_>5lO8mp8u( zZypyj8&eJTP4Qay3=U#Ea%;0S(9xeNQru20?Eq=KUyxO9ZyYxR4Bh|VxB36~)d=}> z?W&ARZve-b{bIMLcc(QUF<7X^bEZT|LN!I3zTN{1ffMysJK}0grF?Pv0h{|7 z__Vz{B-kma(_Z(Tul@cLKx9{FMWyQ7ego#a#i=NuR%ig#VoFX^^$!4eXiWBmaB<|T zOA}xg5K)8X8>(a#U9OyWfi2ZZP%RcpHB^*EY=IhIw7M`VU~SA+wVSly?u5)}XIZxG z-c8HNpnYj(l_9=oMTy`>SM{?3oO&B#qn#+8Qj?*mY}?o<52*UrW<(jJpD_l~4mjYA z%hx1>?HPQi0UUuVpl63|nFirJ2WGdUadC0I^)UzWUlc!2(z4Szm3zc1Tm>tpksTgi z09hfk-cI+MohsOF?>#l?lMPmq(v@GpHPn}xyDn0y-2)c9Gv`V@oSaYZtTo>g9a|F9 zZ$~Nma{$LU(sn^{x4Z*+y2jK1jT!Htqe=q+B`2+Om&Q)i(cj2&FU_W@SFyXMbR=A1 z_+`_=67HHM9Z64xX*0Y2*L%0$zA1s)Ej{f>ZrjhTM~rq(Y&2s%FRvN4em!l< zHtb~@^_}3Rd~%W`b!RY?yAOe=y%0bT8>lW<#OQ3b?hja# zFPwe;t41FuBW!c<*}n-su8<>zHV6WiZf8qr(lBhf1$w-0bN?>4kT#cq2U3r0j1VZ` z9t<6KKl3`^{hMQPUUeX0ladqRBi02=3j+H-&40+bKy{!c2SN`*xOpNX1qNJA z&QS@(5!5Bp{F)a)7%Q=~iJa)b1c#GtI5_Jt=(<>ZTKGu)Auee%CGd^g0Za=T zhRR6ARqk4TQQr80*)oR$7$X8w%#IxVem(4DNc3QMOOT4Q-Xt)eg*J;_$rD3oarrl4x$vYT{y8m8f0#MTye&*&brKTc)0*r_DBh7iOdfXBwc|C zaGbod@J>;#d%>>}hnJw6vi9R{T_ZMd5l!3#cBa`Cyr6WjleVd6DB6GS*~| z<$Ks=I`I2)QCs?H;Yu1oeHY^Na>W}&ggueE@1e|Pcyt7$J4ho)5cKF|SsN`U)XQg0 zYTx?^Gdbygt=XIs1?yIU6sj*C_`VSGlga~g8NLaUAMdzdHAmHz<_U8LzJmf?M8YfsI+?STuh3OkO}ckR1@A_uD3hZfsBugqs$C^}aBR2<7J!I^S)H;+-h`W2@jA zX2iD+El#fgpuM)?Do1 z=VV7Z`o@f9=KmU`;DsqpEGn(U-onTM{|N23U`jzJXf$c?T0d2;jQN~z+MLhpzZ+dI zfx%+fu7(>d=f8U{DSzI{X&HHMw77$qxH?}sduP%elILUvo4K#dH+USHuyq!t^jX(h zQ$Zv1K56LxGJ%iusR$6fX%!tUj9hoj)kkiK1}p&o4j8k+??bvoE=Un5tLZog7R0>) zog!q)@ve<8>Bm1kHv0cVK^Jb(#wNrMunGm+nw6U~)DBCE$L<$`WgtHtKXt6)C^7Lb DtirGX literal 0 HcmV?d00001 diff --git a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md index 69620a076a..03473f2577 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md +++ b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md @@ -44,4 +44,7 @@ You can deploy Universal Windows Platform (UWP) apps to Surface Hub 2S using Int 5. After enabling Offline shopping, you can acquire offline licenses for apps that you can sync to Intune and deploy as Device licensing. 6. In **Intune** > **Client apps** > **Microsoft Store for Business**, select **Sync**. 7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Select **Assignments** > **Add group**. ![*Assigning apps to groups *](images/sh2-assign-group.png)
                -8. Under assignment type, choose **Required**. For the selected groups, choose **Device licensing** and then select **OK** and save the assignment. +8. Under assignment type, choose **Required**. +![*Assigning apps to groups *](images/sh2-add-group.png)
                +9. For the selected groups, choose **Device licensing** and then select **OK** and save the assignment. +![*Assigning apps to groups *](images/sh2-apps-assign.png)
                diff --git a/devices/surface-hub/surface-hub-2s-deploy.md b/devices/surface-hub/surface-hub-2s-deploy.md index 29193caf1f..9046d56858 100644 --- a/devices/surface-hub/surface-hub-2s-deploy.md +++ b/devices/surface-hub/surface-hub-2s-deploy.md @@ -1,5 +1,5 @@ --- -title: "Deploy Surface Hub 2S" +title: "Create provisioning packages for Surface Hub 2S" description: "This page describes how to deploy Surface Hub 2S using provisioning packages and other tools." keywords: separate values with commas ms.prod: surface-hub @@ -11,9 +11,7 @@ ms.topic: article ms.localizationpriority: Normal --- -# Deploy Surface Hub 2S - -## Deploy Surface Hub 2S with a provisioning package +# Create provisioning packages for Surface Hub 2S You can use Windows Configuration Designer (WCD) to create provisioning packages to automate the deployment process of Surface Hub 2S. Use provisioning packages to add certificates, configure proxies, set up device administrators and device accounts. You can also use provisioning packages along with a configuration file to deploy multiple Surface Hubs with a single USB thumb drive. diff --git a/devices/surface-hub/surface-hub-2s-recover-reset.md b/devices/surface-hub/surface-hub-2s-recover-reset.md index a5eb1d9e80..9974dcdb91 100644 --- a/devices/surface-hub/surface-hub-2s-recover-reset.md +++ b/devices/surface-hub/surface-hub-2s-recover-reset.md @@ -52,3 +52,13 @@ Surface Hub 2S lets you reinstall the device using a recovery image, which allow 4. In the language selection screen, select the display language for your Surface Hub 2S. 5. Choose **Recover from a drive** and **Fully clean the drive** and then select **Recover**. If prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S reboots several times and takes approximately 30 minutes to complete the recovery process. Remove the USB drive when the first time setup screen appears. + +## Recover a locked Surface Hub + +On rare occasions, Surface Hub 2S may encounter an error during cleanup of user and app data at the end of a session. If this occurs, the device will automatically reboot and resume data cleanup. But if this operation fails repeatedly, the device will be automatically locked to protect user data. + +**To unlock Surface Hub 2S:**
                +Reset or recover the device from Windows Recovery Environment (Windows RE). For more information, see [What is Windows RE?](https://technet.microsoft.com/library/cc765966.aspx) + +> [!NOTE] +> To enter recovery mode, you need to physically unplug and replug the power cord three times. \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index 61dcdfd90b..0986c0fe3d 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -25,8 +25,8 @@ Designed for interactive use in smaller conference rooms and huddle spaces, Surf | **Room size** | **Participants** | **Proximity** | **Additional peripherals** | | ------------- | ------------ | -------------------- | -------------------------- | | Huddle | 1-3 | 1–2 meters | None | -| Small meeting | 3-5 | Up to 2.3 meters | None | -| Larger meting | 5 + | More than 2.3 meters | Peripherals recommended | +| Small meeting | 4-6 | Up to 2.3 meters | None | +| Larger meting | 6 + | More than 2.3 meters | Peripherals recommended | As a general guideline, install Surface Hub 2S in a space that meets the following criteria: From e3b45aa3eed1a6f5182fc49033d5acf6cf007611 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 09:58:49 -0700 Subject: [PATCH 268/303] Trying new surface for business card icon --- devices/surface/index-new2.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index dc85bcb9cf..1fd73955ea 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -70,7 +70,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                - Surface for Business + Surface for Business
                From 651c338db4f3774c7a47f0ba54a07a3f0079333b Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 10:29:53 -0700 Subject: [PATCH 269/303] Tweaks on hub for link highlighting and Surface Hub description --- devices/surface/index-new2.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 1fd73955ea..57f2a6dd91 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -25,14 +25,13 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                • +
                  @@ -56,7 +55,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.

                  Surface Hub

                  -

                  Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, collaboration, and presentations. Learn how to plan, deploy, manage, and support your Surface Hub devices.

                  +

                  Surface Hub 2S is an all-in-one digital interactive whiteboard, meetings platform, and collaborative computing device that brings the power of Windows 10 to team collaboration. Learn how to plan, deploy, manage, and support your Surface Hub devices.

                  From c35ea8b8cb80834998b04ec2c5cdb27568102c04 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Jun 2019 10:35:33 -0700 Subject: [PATCH 270/303] fix link errors --- devices/surface/TOC.md | 4 ++-- windows/deployment/planning/act-technical-reference.md | 3 +-- 2 files changed, 3 insertions(+), 4 deletions(-) diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 3b0acc91f0..32c3ed62c5 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -29,10 +29,10 @@ ### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) ### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) ### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) -## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business-intro.md) +## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-for-business-intro.md) ### [Deploy Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) ### [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) ### [Run Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) ## [Surface Data Eraser](microsoft-surface-data-eraser.md) ## [Top support solutions for Surface devices](support-solutions-surface.md) -## [Change history for Surface documentation](change-history-for-surface.md) +## [Change history for Surface documentation](change-history-for-surface.md) \ No newline at end of file diff --git a/windows/deployment/planning/act-technical-reference.md b/windows/deployment/planning/act-technical-reference.md index 62bd2bb5ec..09b9613ecd 100644 --- a/windows/deployment/planning/act-technical-reference.md +++ b/windows/deployment/planning/act-technical-reference.md @@ -10,7 +10,6 @@ ms.mktglfcycl: plan ms.pagetype: appcompat ms.sitesec: library author: greg-lindsay -ms.date: 04/19/2017 ms.topic: article --- @@ -21,7 +20,7 @@ ms.topic: article - Windows 10, version 1607 >[!IMPORTANT] ->We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. +>We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](../update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. Microsoft developed Windows Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Windows Analytics was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10. From 976545ceb93362741cf8631aa3cdfebc7fc09a6c Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 18 Jun 2019 11:12:49 -0700 Subject: [PATCH 271/303] fixing a broken link --- devices/surface/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 3b0acc91f0..32e008d49c 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -29,7 +29,7 @@ ### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) ### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) ### [Use System Center Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) -## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business-intro.md) +## [Fix common Surface device issues using the Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-for-business-intro.md) ### [Deploy Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) ### [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md) ### [Run Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md) From 493fabce9f08d3f56c91cd0f781eb6c1c010619a Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 11:24:49 -0700 Subject: [PATCH 272/303] Image and text updates for draft hub --- .../images/Surface-Devices-400x140.svg | 1 + .../surface/images/Surface-Hub-400x140.svg | 59 +++++++++++++++++++ .../images/Surface-Workplace-400x140.svg | 33 +++++++++++ devices/surface/index-new2.md | 8 +-- 4 files changed, 97 insertions(+), 4 deletions(-) create mode 100644 devices/surface/images/Surface-Devices-400x140.svg create mode 100644 devices/surface/images/Surface-Hub-400x140.svg create mode 100644 devices/surface/images/Surface-Workplace-400x140.svg diff --git a/devices/surface/images/Surface-Devices-400x140.svg b/devices/surface/images/Surface-Devices-400x140.svg new file mode 100644 index 0000000000..9121e93531 --- /dev/null +++ b/devices/surface/images/Surface-Devices-400x140.svg @@ -0,0 +1 @@ +Surface-Devices-400x140 \ No newline at end of file diff --git a/devices/surface/images/Surface-Hub-400x140.svg b/devices/surface/images/Surface-Hub-400x140.svg new file mode 100644 index 0000000000..473fba1604 --- /dev/null +++ b/devices/surface/images/Surface-Hub-400x140.svg @@ -0,0 +1,59 @@ + + + + + + + + + win_it-pro-6 + + + + + + + + + + + + + + + DevicesLaptopTablet-blue + + + + + + + + + + + + + + + + + diff --git a/devices/surface/images/Surface-Workplace-400x140.svg b/devices/surface/images/Surface-Workplace-400x140.svg new file mode 100644 index 0000000000..9bb3779192 --- /dev/null +++ b/devices/surface/images/Surface-Workplace-400x140.svg @@ -0,0 +1,33 @@ + + + + +SharePoint_Doc_3_400x140 + + users_group + + + + + + + + + + + + + + diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 57f2a6dd91..409879b4cb 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -31,7 +31,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                  - Surface Devices + Surface Devices
                  @@ -50,7 +50,7 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                  - Surface Hub + Surface Hub
                  @@ -69,12 +69,12 @@ description: Learn about Microsoft Surface and Surface Hub devices.
                  - Surface for Business + Surface for Business

                  Surface for Business

                  -

                  Learn about Surface devices for the modern workplace.

                  +

                  Explore how Surface devices are transforming the modern workplace with people-centric design and flexible form factors, helping you get the most out of AI, big data, the cloud, and other foundational technologies.

                  From 4a853e122ecc8ec23648a6a52e520d0a927ad2ad Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Jun 2019 11:36:19 -0700 Subject: [PATCH 273/303] conflict? --- windows/deployment/windows-autopilot/enrollment-status.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/deployment/windows-autopilot/enrollment-status.md b/windows/deployment/windows-autopilot/enrollment-status.md index 273db71731..dd731fbc59 100644 --- a/windows/deployment/windows-autopilot/enrollment-status.md +++ b/windows/deployment/windows-autopilot/enrollment-status.md @@ -37,9 +37,8 @@ The Enrollment Status Page tracks a subset of the available MDM CSP policies tha - Certain types of app installations. - Enterprise modern apps (Appx/MSIX) installed by the [Enterprise Modern App Managment CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisemodernappmanagement-csp). - Enterprise desktop apps (single-file MSIs) installed by the [Enterprise Desktop App Management CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisedesktopappmanagement-csp). -- Certain device configuration policies. -The following types of policies and installations are not tracked: +- Certain device configuration policies. The following types of policies and installations are not tracked: - Intune Management Extensions PowerShell scripts - Office 365 ProPlus installations** From 85ce3adc9c546bfcab40ed810fe8fc57737ae896 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 18 Jun 2019 11:56:23 -0700 Subject: [PATCH 274/303] add new json and xml log examples --- windows/deployment/upgrade/setupdiag.md | 114 +++++++++++++++++++----- 1 file changed, 91 insertions(+), 23 deletions(-) diff --git a/windows/deployment/upgrade/setupdiag.md b/windows/deployment/upgrade/setupdiag.md index b6f9e9638f..a938d6cf16 100644 --- a/windows/deployment/upgrade/setupdiag.md +++ b/windows/deployment/upgrade/setupdiag.md @@ -406,45 +406,113 @@ Refer to https://docs.microsoft.com/windows/deployment/upgrade/upgrade-error-cod ``` - - 1.3.0.0 - DiskSpaceBlockInDownLevel - 6080AFAC-892E-4903-94EA-7A17E69E549E + + 1.5.0.0 + FindSPFatalError + A4028172-1B09-48F8-AD3B-86CDD7D55852 Offline - Microsoft Corporation - Virtual Machine - x64 + Gigabyte Technology Co., Ltd. + X470 AORUS ULTRA GAMING + 1033 UEFI - 20171012000000.000000+000 - Hyper-V UEFI Release v2.5 - Hyper-V UEFI Release v2.5 - 10.0.14393 - 14393.1794.amd64fre.rs1_release.171008-1615 - 10.0.16299.15 (rs3_release.170928-1534) - 1033 - Core - + 20180808000000.000000+000 + F3 + + 10.0.18908 + 18908.1000.amd64fre.rs_prerelease.190524-1658 + 10.0.18912.1001 (rs_prerelease.190601-1739) + + Professional + Windows Defender - 2017-12-21T12:56:22 + 2019-06-06T21:19:10 - 2017-12-21T13:22:46 + 2019-06-06T22:21:49 0001-01-01T00:00:00 0001-01-01T00:00:00 + 0001-01-01T00:00:00 + 0001-01-01T00:00:00 + Offline - 06600fcd-acc0-40e4-b7f8-bb984dc8d05a - 06600fcd-acc0-40e4-b7f8-bb984dc8d05a + MgUweCZk90KdwUiZ + F21F8FB6-00FD-4349-84FB-2AC75F389E73 + F21F8FB6-00FD-4349-84FB-2AC75F389E73 - Warning: Found Disk Space Hard Block. - You must free up at least "6603" MB of space on the System Drive, and try again. + 2019-06-06 21:47:11, Error SP Error converting install time 5/2/2019 to structure[gle=0x00000057] + +Error: SetupDiag reports Fatal Error. +Last Setup Phase = Downlevel +Last Setup Operation: Gather data, scope: EVERYTHING +Error: 0x00000057 + LogEntry: 2019-06-06 21:47:11, Error SP Error converting install time 5/2/2019 to structure[gle=0x00000057] + LogEntry: 2019-06-06 21:47:11, Error SP Error converting install time 5/2/2019 to structure[gle=0x00000057] + +Refer to "https://docs.microsoft.com/en-us/windows/desktop/Debug/system-error-codes" for error information. + Err = 0x00000057, LastOperation = Gather data, scope: EVERYTHING, LastPhase = Downlevel ``` ### JSON log sample ``` -{"Version":"1.3.0.0","ProfileName":"DiskSpaceBlockInDownLevel","ProfileGuid":"6080AFAC-892E-4903-94EA-7A17E69E549E","SystemInfo":{"BiosReleaseDate":"20171012000000.000000+000","BiosVendor":"Hyper-V UEFI Release v2.5","BiosVersion":"Hyper-V UEFI Release v2.5","CV":null,"CommercialId":"Offline","FilterDrivers":"","FirmwareType":"UEFI","HostOSArchitecture":"x64","HostOSBuildString":"14393.1794.amd64fre.rs1_release.171008-1615","HostOSEdition":"Core","HostOSLanguageId":"1033","HostOSVersion":"10.0.14393","MachineName":"Offline","Manufacturer":"Microsoft Corporation","Model":"Virtual Machine","RegisteredAV":"","ReportId":"06600fcd-acc0-40e4-b7f8-bb984dc8d05a","RollbackElapsedTime":"PT0S","RollbackEndTime":"\/Date(-62135568000000-0800)\/","RollbackStartTime":"\/Date(-62135568000000-0800)\/","SDMode":1,"SetupReportId":"06600fcd-acc0-40e4-b7f8-bb984dc8d05a","TargetOSArchitecture":null,"TargetOSBuildString":"10.0.16299.15 (rs3_release.170928-1534)","UpgradeElapsedTime":"PT26M24S","UpgradeEndTime":"\/Date(1513891366000-0800)\/","UpgradeStartTime":"\/Date(1513889782000-0800)\/"},"FailureData":["Warning: Found Disk Space Hard Block."],"DeviceDriverInfo":null,"Remediation":["You must free up at least \"6603\" MB of space on the System Drive, and try again."]} +{ + "Version":"1.5.0.0", + "ProfileName":"FindSPFatalError", + "ProfileGuid":"A4028172-1B09-48F8-AD3B-86CDD7D55852", + "SystemInfo":{ + "BiosReleaseDate":"20180808000000.000000+000", + "BiosVendor":"F3", + "BiosVersion":"F3", + "CV":"MgUweCZk90KdwUiZ", + "CommercialId":"Offline", + "FilterDrivers":"", + "FinalizeStartTime":"\/Date(-62135568000000-0800)\/", + "FirmwareType":"UEFI", + "HostOSArchitecture":"x64", + "HostOSBuildString":"18908.1000.amd64fre.rs_prerelease.190524-1658", + "HostOSEdition":"Professional", + "HostOSLanguageId":"", + "HostOSVersion":"", + "MachineName":"Offline", + "Manufacturer":"Gigabyte Technology Co., Ltd.", + "Model":"X470 AORUS ULTRA GAMING", + "PostOOBESuccessTime":"\/Date(-62135568000000-0800)\/", + "RegisteredAV":"Windows Defender", + "ReportId":"F21F8FB6-00FD-4349-84FB-2AC75F389E73", + "RollbackElapsedTime":"PT0S", + "RollbackEndTime":"\/Date(-62135568000000-0800)\/", + "RollbackStartTime":"\/Date(-62135568000000-0800)\/", + "SetupReportId":"F21F8FB6-00FD-4349-84FB-2AC75F389E73", + "TargetOSArchitecture":null, + "TargetOSBuildString":"10.0.18912.1001 (rs_prerelease.190601-1739)", + "TotalOfflineTime":"PT0S", + "UpgradeElapsedTime":"PT1H2M39S", + "UpgradeEndTime":"\/Date(1559884909000-0700)\/", + "UpgradeStartTime":"\/Date(1559881150000-0700)\/" + }, + "LogErrorLine":"2019-06-06 21:47:11, Error SP Error converting install time 5\/2\/2019 to structure[ + gle=0x00000057 + ]", + "FailureData":[ + "\u000aError: SetupDiag reports Fatal Error.\u000aLast Setup Phase = Downlevel\u000aLast Setup Operation: Gather data, scope: EVERYTHING\u000aError: 0x00000057", + "LogEntry: 2019-06-06 21:47:11, Error SP Error converting install time 5\/2\/2019 to structure[ + gle=0x00000057 + ]", + "LogEntry: 2019-06-06 21:47:11, Error SP Error converting install time 5\/2\/2019 to structure[ + gle=0x00000057 + ]", + "\u000aRefer to \"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/Debug\/system-error-codes\" for error information." + ], + "FailureDetails":"Err = 0x00000057, LastOperation = Gather data, scope: EVERYTHING, LastPhase = Downlevel", + "DeviceDriverInfo":null, + "Remediation":[ + + ], + "SetupPhaseInfo":null, + "SetupOperationInfo":null +} ``` ## Sample registry key From fa7209a732e88ada5e7ea9d11866f8df08986dfb Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 12:25:17 -0700 Subject: [PATCH 275/303] Updates to Surface Hub and Surface Device landing pages, update to hub description --- devices/surface-hub/index.md | 3 +- devices/surface/get-started.md | 31 ++------ devices/surface/index-new.md | 137 --------------------------------- 3 files changed, 6 insertions(+), 165 deletions(-) delete mode 100644 devices/surface/index-new.md diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index 2d2bad66e7..a99060c42a 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -28,7 +28,7 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming,

                  Overview

                  Behind the design: Surface Hub 2S

                  What's new in Surface Hub 2S

                  -

                  Operation system essentials

                  +

                  Operating system essentials

                  @@ -144,7 +144,6 @@ Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming,

                  Get ready for Surface Hub 2S

                  Ordering Surface Hub 2S

                  Prepare your environment for Surface Hub 2S

                  -

                  Unpacking Surface Hub 2S

                  Install & mount Surface Hub 2S

                diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index d520047515..038f421cd8 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -15,27 +15,6 @@ description: "Get started with Microsoft Surface devices" Harness the power of Surface, Windows, and Office connected together through the cloud. Find tools, step-by-step guides, and other resources to help you plan, deploy, and manage Surface devices in your organization. - -
                • @@ -95,6 +71,9 @@ Harness the power of Surface, Windows, and Office connected together through the
                • +
                + +
                diff --git a/devices/surface/index-new.md b/devices/surface/index-new.md deleted file mode 100644 index 480967a3f6..0000000000 --- a/devices/surface/index-new.md +++ /dev/null @@ -1,137 +0,0 @@ ---- -title: Microsoft Surface documentation and resources -layout: HubPage -hide_bc: true -description: Surface and Surface Hub documentation for admins & IT professionals -author: robmazz -ms.author: robmazz -manager: laurawi -ms.topic: hub-page -keywords: Microsoft Surface, Microsoft Surface Hub, Surface documentation -localization_priority: Normal -audience: ITPro -ms.prod: Surface -description: Learn about Microsoft Surface and Surface Hub devices. ---- - - ---- - - \ No newline at end of file From 9ff142cff159be239b2512a2ceb5cf7b3e642bfe Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 18 Jun 2019 12:43:29 -0700 Subject: [PATCH 276/303] More updates Tuesday --- .../surface-hub/images/sh2-pen-pressure.png | Bin 0 -> 160208 bytes .../surface-hub-2s-port-keypad-overview.md | 11 +++-------- .../surface-hub/surface-hub-2s-quick-start.md | 12 ++++++++---- 3 files changed, 11 insertions(+), 12 deletions(-) create mode 100644 devices/surface-hub/images/sh2-pen-pressure.png diff --git a/devices/surface-hub/images/sh2-pen-pressure.png b/devices/surface-hub/images/sh2-pen-pressure.png new file mode 100644 index 0000000000000000000000000000000000000000..67054ca9722f433f31a99c081e8e1d168917c010 GIT binary patch literal 160208 zcmV)-K!?AHP)6ibuRjM_YNnYGdXKU8VLmykPsOxKv)EW09`;Bo69rEB3*nzdT_z^Lj(~_6gC2c zjg143UwZX!6XNlfw?(^}e;bt9R|%Rn^t|9Kn6>QPQ5XcZaG~ ztE$%eYt^b%K^+kIP5MpxP5MpxP5MpxP5MnzQiZ@!^{I2wJN>kg&O_gN z*z#HJHd;+y7u{dYHtLr)(=#@n>-XsshG7@qS1OPCNh@t5mkcmnFM6k+a*D3G#*wd_ zvyCJD{r?@u(f?OeK5ewp_JK#gS?NThND%ic=S+E)rLW)qU~3~^8g0+o(rS*QGRn#%(;f~v=X(DC z@49GobcFv_^uo$^a??9S9nYj(Ec8$)G;i|tuk8=0Q* z9YgxFdYxR)m}vGH$EG$~jnt1q_NBwrMn1A`HRPQBY(L3X-y%6@>T?f=oHNz)*R6|O zvd31|!=;NTh0fYoUh+--3ZKJKI zQx)+Jmd;*w)>5X8P%t2h6nMYMRIeiNVXB)Ce{5}}x1-NEa`D!ce3hZ=W20M5di{!c z=R=e2c@rJJWw?0nTUQ&czYaO)D&NKDUzMCIqOYu+bB&{-@{69cCEtmlkDPlrby3Ac zlun?p0ChEPQ9i=5W@viGHmfvUGv%r0V=Jpn^6gB%Nk?{ihm`kqp8F~Xy^ci+)<=1{ z%F*d}wUMna=z(;ZW%qmn`ZS7sAjco6&6nMGlmZ_*; zy4py+rqjEUzOqs|XDZKE&cV<|u6K)Mt%;T*TFa(Du_)-W&7}zYk#i;#E_q-BZ2c&8Xk*5w{Y@Z3 z^2`SW+v;6r9I53M)omqhTKbuCgdKElM7R3oub)jP%<^df%`C5TVVsZS>p9u;r)IQC80Rv|mx1 zt8%WWESpmFp`qWTmhF;rY8%<;ch$|5pZ?rRbdfKAx-1AT!B)i7A|!3=7{18PRlW^b z6`?8LRD|4%%626i&s}_Rz2n1I*YiHJDc6jm=-GaSu8SVmJ)gV-!)($=(G(&2A~0d& zS5dz&LrYPazDiT=EB&;CD$rc@(XW~4Gu5r^7;=?cB*0zau_rVi~xYnghw@>#9t%jWC*-bx0h-Y4|Grm|e^gA#4jFKD%uYs=H6 z$ZWvI2LQV6`+|=$dFuI>$+zDzw9>R%Z6q{vc|U-7wc5x8^r4NRvU%#y7XhQy8b@V- zq|Z27$rv&{vyySN5;+H-T?{Kp!eG9V1oksPUFMgvj4u*AzSoOpjkY{jyF>SzY`j}Z z8|lyW!|S5tYr4~~l~pSJ(%G-#`c))X8?6>CuJ&=YQBl7$B~dWzx4q*-^TV0SjEmK7 zA6tE0ZKQuM+s7a7HhMV5k*}P?uc3`x&-NqdOq2G~0KrFjs)M~Ofn^$`sG|zYT2PS^ zF)_;YZc#l0ZJkX2xavo1aJIqPZ!!sCSN<-(x_DCtVCmO=c{%#sqw))zV@1(#!5ed_eLDc#1SFf+$r&iKNuJX#zRObFl+NkI` zy?*4pr@rT!Ecz%t-?SQSO^V$F%uLBfmya^F0Z`jJw)WA5c2O!L>`ZyPK(pEwzQEB2s7-uV%Qh(v zC%B=%7TR>)=6NIL4}!SU=YyoDqXn92+*V)H_mx^BT>ZjCOOfTlCiG46(5H=j#*nEk z_42H3fvZ3o&QC$L(i+I|Cyfm(M3fv#wP13Jx@B4sXgr>9n+k1R&IbVc3I&@$(SQ2_1((pa z34a%DMP-|KVG1p413s>HC>j@m<+_W`v~P98fdHLxkoP-78|d}b$G=M%mTA8tIj25f zl(!EJwsB-?Bhy67Bv*A%q1Um94ja8Lg;xZWTy^zLt~PR&-A^0oa>qosslS=p$V7)~ z(a~kFjou!B;M-0qF2AC zZ};*MDE%ZCc@Iancs%9Nuf zSAEsIixiX%85YevS4yjng1ZGJQtN^N4d^H}|L(L@*pq1h1t~n}QVKyJ6+-W9rC;H# z^T(EF**;h_LpFgmlS1(US1x*NGuyJsL{m{-Mg7`Ew@>{bmAvHu4igF84#X{(R9)*H(sYQdCwp`|!UkATi0hm9|ko`p}eC3&0dvbo74ZbW+qC zT=zHd5lkilty>vPgt}50;Ne1(wtK!x$R*r;g+)K$plEjC0&4nqk(r&;>$06!E7@j} z=>;kMJ0FpBzDs97A0C<7PVH|!b@!~J&JP`Ix$+Gx<~)52=mNgthmjVdJKgrWpG z6*E=DX50215Vm|>%+Y5dWl~W`v!XUpT(5qTsh(=xx;tX(wrJv|>R-|Io$@L04Y1YS z-d{8xl*A`iYlnwfU+?oK^j}6msd?(clg5s^7N}k?>PMzJxs-8PL1!BiE)b)?tJ7!t zZK_+>GeHUxQk)>~cdSa?8K6rp*<{jc0$x28@w%wb`6gHUyV|JiWW}c*MSaAUY}Nyl ztX?g-Xd5s37&X1OT4TtRpQ$}nnsgA?PaElSEim}asY&-I%0n&tHHOFrsz4&rLZT?@ z5~zA(2yJ~i41+umHL35(XM9t?0>O8t+;2xM>f{~aXGfB@d~Hdcad*FyKxF@M$(%>8 z^}wXmdI6X6yr#(ov>A2ReUZB&qKl5a_Dc2=j3oR~-+`=&5P6+)TJt=6cQ(lT-Q~OZ zne|`k2a&(0@xbuD>{~&076pwH`XFm#`MVgvxvgMD0KIJAwJ91~()&o!vwAt|y{`5P zI?Dp-vtd_#0DU?)5expp#2H>%61$qVv7;UWaccC7G?Ncoe^xKbK}yj}7l z<)0u`fIXJ~fWSs2BS+-k;2oOcG+!7h-6b3)jaeB&MX!=bWc$@Ke}pc~pz=w%tkBez zKc}<|k)$fU(~ouEi{8GJ{_fqOR!Z3kIYCwAc2ooS&LJ-Cf zqRP*NQ9Iq0AUdn1X|GJuHcXU*!esm9!_PcPaZNaEvpC=OF+FSJp-&s>{Y+K5rr);Y zGyApG#iq!*Cw=DKZZ>6V0~ID7n68-sg$ew+0Jw{%g_A#}9;Wuz^Rv~<28?X{F|{MK zeyP)^(y7y9bW+sOvfQgaI8;Zw9b<865%pRPl}ZJzR>H!Llzt)$?W&-L__goW@~r~I zaIYUPVZ$|*Hd8q{^EwE@voLdggby9+H5DPtd==W#FG;GP3ABZ2xoP7^8cm&?MPS}K z3ejmPb@m*D>Afx*O|)^R4D)+|#>38FOS<39pQCRY-I5!^9pj5At%M3dkP6y>gaTV% z6tX4qsjQMaoHWpQq4A;m?NqB(G#U-2hwc$Dpx+FzwG$kHZb9aoY|2R&1VzaP4vGX? zH~V@g8?L-0%hT41Q!vR*&;ly5@3r}vFi6s8W5L!1kpZ@j^&#L1jIsX+X$>kr)6@Cs z0zfY1uRpKn?b}AC*>^v6(wB|Pw6j`1`s}wpskDqYESLN8r)V6x4wJIwg@UjEMM-TV z(=vf?8`*#q4E6Qe=9naz-+>6xZZ)$lZUHJ$4Pj70tJ&hkiXh1vL!Hg%evlG81lo5? zCD3a&R5CTbQ!W{10SawB)_|-IUFGyxIP7MuE}lr?Xh8@jmDM%N7nzbquQel8Nc1Jh z&9$jMj(f`K9t7QOlJo>n3V3!GX4VUOJkgd9x}H@`_+gh(Kz@@ZcZW3lI>1G4L-n77*|WSjpsrSuk6AmOX6!u){xDk1zuq8C*)*3jewjfoA>aX1UZr ze+ewmbpi_VSv@b;EXt&8%Ouw0b7|`Y0D%blCTYg z%LqjTkyJD6*+3XXh~p@?SV?}Tj;?J6$+B44XR<=F@fRrA&pc}`;*&|>nr5r68J{hc zd0w{?6}3@W-fHrExqDTat% zUthXhy2#WnR+`lOTy5N;fvg<~AgZZg7y9!;`8NYF z1_5v4gXvs&6K`EYL*;4yj8LssX8y@#1E5<_*J?F1n@!Bk%`rG2pg^CVh?26t9!{Pn zCG6@$KC>oM+v$8T34c{syA+g3n5XY#z)^&}qk%WHkflb{QYRK!BhyL3leB!W25-O7rua-Zn}xD zEiEnOvmsyQ+i&UzRQ#%v58%*w+;4IX8rAeAP1n#u=yv&eILw^=f)t?GSJY2N(T5H0bRTWX_0^_cTtnZrzIKJ@0wgvSka8o#o|aeul&+L`qzVh|9pvuYa&ubx#oR5EqzcHBk~)Y7+jZ)Ave zyPblw%m<+pnKSHO$_mQu#qU>Hm;jcEA7#obY9kY$i`vL%lHvn$)aQzTxKG}$HZt8S z3+hZ@*Y&Ke58Lw9>)}%NMH4?$UPZu1&(ozlO!YS|G3ba!3S1Imbg$KFVc))eIQQIh zF*7rhEkT%>Wvh&9R;kZQTov#EBSnMKB|P)sLZ zBBJlKbXiA&7LsHM71U4_BM2%2NwA1^5~CFlA_#_%RAL0}2D>PvyBUIXSt^jwKu9xY z7abhr#8^o?>KUm?W1Q* z&#I}SKV(BTq->h4CTi^(5A2bV5xnkougCcK1UlQs+yKER6)Aidn(}!^?f9;IY;?Fl zf(u*}(dq&kw)f0+78w|bu(-H@haP$mwOSofRL$Ec$U-h7+eS!Ein*dnL>`4!b?{G% z61ge2!v}Tt*KKyUDa~%aqYJR`GjT>ITLI*@*d%j)M7BF4fz7-x%cMH7xmlUX`}7mN zzrfHh0%Zw9eMW*30tED(mJ_J#9XpQ0)mMKU_uqd%|E8HPJx73{s7$?lolcuDGYJoy zpwjc!lTBHyl?K z8Sc|YHlEm$P4?-0bk$S6uhVPm-=^|RZDi}qE~V^SZ`1px{$i?^{=6-QhpRv7{O|#Y zru_A1)oT^~CJfAHa~%00kmFB~nr=zJHJc60FU(+JVF4j|3tMDwky0%p+C?Kg8`K35 z^p5BYX3C}_@MEj1UI+beM>qhD<}z<&n3!0LW5*`(^Pk_2v9U3Xj*hS&N$!*vWV2yD zj3GcAq)wBOoN$qGR;0)vJ-;DNzh|b|boQ6z4u44;W>x@UjB^2P(0A&H%;_(CUZlW4 zf)fHSawi5yeazOL)BMc}pZcaOkCd>CHz0Qw*m!IMhw5+X2p1?@6`}P@Sx@;KEhEr( zNtet|E-g?#Hf3O^rt5Cx-HT5KW_^QhMcxzEOl z>{s3Aiiiv~*p7fMtFUc~S#K9#aA#Apx{r#_gu$gGO?5NLK_A7V=W7EPMfEMJk4~d0 zZ`U$7Jg z$fbvbK|(4t6OqOOz7q z%y)v)?uj5tX-Y}#>>S|194C3Xa0EG$L5WBy%iRNH(pQD7u5?wO1^qcF{vD(Ov{v^&vD{ZEW4J7KiumMQcf5co1lZlbG0YJmzO3OwBeBx0)EA7)$ry zh&Xe8war?3`BbJY^mlyQvP>J9o^i=6TXLN^YpRRsI~;um2AS&14;vVA^>rJ+i*$pp zT(?aQiYAuuXd@d>^|&Q2I&Huoj`q;&;!_SJK(Ha;TriT=K*Vek6xrG~Rfx=|aXaP# zFK0)#3aQMsDG?v#Z%bvAx=mRAza?1*P7H*V0C6+UEIiG8mYXWP)B?bPW#l@01_B6B zFz^f08G90h2!j}5c0ZQo$z2ASL!o3{5XtrhX@zKPGeih!snb;;3BI8ZA)w37R0EC4 z!x$K-V*kNCn3!0H+wQy6iola=64OtzfhQA9tJzi$m;7HX8q2nk%fe8W zrXCxcF@r!AoE?EI1!So0H}+w;{)~=nOi3u_A5%GH8rqeQFU`M-;GZijRFY`4C}I{5YYS# zW0ZtveKAGOBM=Y^&M_k3P+3BKpald=2%|VP7bi&;bjchmLxKYpD8SHv^k65FW}%th z)OU2H4}(QP#x)2sM?`4mVYMB~w698!o=-nXf8V97Ty*+a54xTUkUKWZB}=-#W%EXS z;j7o-G0(pYFMG|WaO3TEZ9B`OX0yE_8PRVl1L9oC#_yswGCk{(sir*iF<>gIY+Y7z-<5A! zIbN1F(=+-Q)Rl6XHd5d71!k^ESHHl-L{|vF*cnto$pVnf4Vg#09MBYYnazcX=nB}Q z3QSuEFEXLH8r>$u_4j-`jm?aurlMJ}dd*h84Z*vFn60k8_d5ZAcy%@GC@twsAgZ82&SRvAc^yAY*LCwHiy#YF6d_1bUj+`q zt(-%k(qKyL0}-Y^5Mix?7A-Gi&WQ>68pLa`v`|B>GJ&`m@sdN86noOWyFur-zC@r~ zuk>rs`mTD$h&pSbWdrF{CzlH(_#vx}$RZ}nJn1{-C3jQ6us2;UL74hOzk^<T(b=i)i&b%*S-b+dC&dWz57&*uNy%; zbp(eF9>hp6gtvY4YW&&X{1dSATr}edqTRybBL}f@<9c3>T5c?G-%3Mx_X0otj2K^Q zqOIO8tCTJI$U&QoGx6AzpY7Q)bh>CWjU!tsx^I$o`hC4FIvudIk=h6Pske)!9$o2} z#q0GmfeSVH(psb^ee111(_=wUnJWcfE_CB8{(f#!%>*0`c45xP#H=Dl*gBu>AR;IY zsK09(_-cFrSN-*R_#iu1+4^t2)7p@siBJ09Fbh|x9)=|pD*{JG43ga3$~(+O$k8t= z%>?81Aq2~9gpDRDvA__jXfzYFD>aBp70o1#br@F22c?=ZAdRS*0~FCsqs~8FX{W!_ z-hQupc8jwq9 zf<5iir88+Qqg@9oFi;h%1O^f)1WK54we9t7l4XQzV6c4n=HbfQ)c1UpSCQZ`D%0G= zpXOhwq~}pgP9DQ0uXriG__4R6x?v2{i^F)?i!R4EetIja6T7iy_sKZ@lyh;})qjqU ze)9hYmWT0zC!UULKJoz!j%>if{5+;-rm(O$gW=&iD%Eres#hR))91q%7f(!}$|UPt zZKU(j^qy&ZZP8?-Xi}rs(WK;j=y#<+vnJY?yHaE78=bZ-pxb5rFB3GRGX#5001BWNkl*Brm3cOSRD_b$&RSH4-hul;!Fu^Nq3MGN zReEh`TDRWVI-I>O-EES`sD}(Q8=}!_VW3uL%fe!F2@^X{z+JNm?rTczgm?a#$o^g(yT!ham-VYMJ0Il7aCY3AJ7_$<9h9`?28>w3e2zw6KW9 znMG7Yg3;jsh!)YrJUhpZj{}Eh_W`4WXom@wnlXE2%F`J0k8Hqp{q?*w{D+38QC+hlg{k0$CtTGkmr0nfk7YRukXg z*~d)6$CbAgcp9uQru_9}qEA&OY5Q|e%+ID69h*S2If==`cjASQJ{8w}?5(Je1=#!G z0$%yff5qijU5gKW_B+7h2ww5@C*i9fd>f+Ww7WIhi@c;TF)@Z?Q&Tv6O7wT$fX zsgq5(oA|aGWtM3pUCx!IqezMMlc%d*u6)XtW78G3`#ycyN52$-FFn70bdd=Fx&VqT zkFvTiKkixnbu+7j5rWKACnv1w9JRaRMS*E-m2fq*t&#O-eL9wj>86G*DtEO6f$Msa zQlTx5Sq&U{rxu?$Tfe8Jq2*Qs14E-gWf^;?rm_2+bI__*Fjp#VEh*o}h+rZ75Q$0_xbkt7RPnw!GCznDcV;?$~;SrJ4QRLRxlRDMbj zMqprec9y@>)?HFov;%~`%O!?gyLR#4yYIdmJ9qBnFv)bE-kX@1$dw!c1+qZU7Skf( zVguAB!Da*AMfKF%z~`QCe^#vzMYA$JspfKu&%uD9(ZoP)7;8d-1HZTxPkYRx@VRR) z!%N=q3H)N;GVZ!=0hry5=batn18;sAMz&V5aAX$8j!t82Y?$LI96B_M6Ly_|X0wHM zGcn4Ov|vrHK%N5Gy98q66%75_TAp5f!80!9;`6@kJs8@kNJ*FZZ7N&OXQlGe)bDKN z>a@EKM>0L{%6BEY$CR&W{I5n|Dk@jcN0k8#5Y*YKwbKOI>3K?KLUfMsm8bmqgAFqi zY=TsO$2UJ){(9#!4RHN?5h67WL|aGp?M!MOdKo(X-1+%2)#@W32>Ikqn(-$b>>$C= z@E~TUk72{WM%0EzuxHN!eDk^=Vr<85EKD^qR3E~I4I8j;?~kx<-6qUl|1H$SJf8Qg z-$G;IFoI+`UE?JmMmlMa4qS>7J~>jSQz-ET)PY*B4`6O)20M4G#qD?9jY{bUH&!^{aPZ(kR{W28 z)T8jym%aqI-F6#3{NWGcB`+sZD>|P9Baq)}nSTLyzfQ6J7lP1DW(7K`t6qI&`{h_tf`&<$lo^f`b>fvh{b$=%O-{g4JxJ zJd$D=pGacITH{}{egcR0KZLD2c4Eu!ldxxU8o}UN zOzt^|`9>8fAdGok7zNyjgf zse9eJ^&I_>EC=h?ufyXW_XPaGAG`wBUVAOR_r34qth3JKoeY;;@@jng)7Rjli(bgj z(lxL}BFO}vS-I+M*-!HAtFCLVS*R(WGP7V?8R~a6TBQskMHZM^Z4mL$0A?2FQHzJL zD;UAd{Zsfa=RY17K4}NWH#cx_ZU%dgE@9V(M{+Q)#@rmDN}YpsrGSr4bPN=5;FIL; zpYH9mwmP|lZ5hzz%EKmCYWYXcNE8eIy~luudZY|5wXJFaA_$HO&-iuB!T=_2&e zMy6+r%I=D!XnUCdn(__I@4}+k^xw8Ji zt5(s@ogSrf1=5YVX0WOQ>3mor zFpf(X&`+-`&&m4c&!ER~wWy7xm%2$7n0}l3gwAUiWM7ed(#!Il#k=xCiN2@TSr0g- z*U?6U3FzweTdgtV0!g;|73m_Ees-0i>JHm@G(9U*zQj=2*d$!@fu|58gWV{oTR&FU zRUua@5?VIJZK}BGx_aN#xTa2BX3)53DyoyIj``mp={Qt%l_w8O>YfDAGZ96@q{DGI zmPP8=7gZ{lotr^xc?lafZ9yfh;1w@@KECtq>+tapyd8(;XHkt>sD@)0tyl4qm)(X7 zp8agZjVV;)S;UknXsx$~B&;An1rf($>;(NmCLnc?$+R+^F=A1{{Ol6ej*a8Tx8H;p z{g(^z(;xo?&w2W3c-HeDf&F{$!|_{A!SeJ1PJZMjocFX-aQN_nED%obAP^!&B>F5~ zZxiWjKz;+{k3o)}^K%P0>7P<44INkXxZ{{ zfpz__s)WtrFV??pmcea?oYY`n42W&#U3VzqtxNv6Rg zw=;H4sI!efL{9 zc;B7)_$U7YVtx|mopTym?PVl!4MAK7!~haeM;jG1IS8}h5Xm76BKIJ%E3|{zhDU(I4Q! z2llW+hZb5n$bmsGLv>|MvsQXH1qlg69Ps-0X{VivOD_3CeEsYHjPHH#yBHX#;io_S z3Fk36Imu3o`}Xa_MHgL!?c2Ap{{i_hP(Iaao$u==H+@XF`jFm#Y=az%gR$#*Q_{zf zP3halk$O!p*EBxWqnuM;atJs@E{f&i+pP1#HRHe$#bFAL>N>tI=lhx#t=k2 zhI(ZUgS2L=k>@^WWQ4_a)oRv#wd^pl#-Al8Gj{ zThvCT_k5EsYx{Xu=ZTFLQyUd2WD^*$^>_WZO&6K!QC1h}dAoR1)IP3$P*iW{Sqxp3 z?o)~BdD`yT2A`?H%b-wb%r-Tq4cwSIpy|3#`DK&q9h1W75g1lD1bpLP{uNJo@{_S+^A;REGR@Hxg{T1S zD#9d0g{%~`#ZjcY0`!(q2cdKxliwSSWwb<$jhi+iX|{3m%|F4%{`_P3;dj4}=42B~ zN0xE$f&KWvdq0F%y!;PvYbpMt|j4&enad;#A0#y7GRfnp-i%ywpah6Dfj z&ge}2(xhC}&d7vNXhp_|@-mu~3jcxqdbo!3AimaZx_8~@7u^GT&vJ1VLI=&4cxzL~Mnh&}xoj5w2Qcoc*r+#KTD4mlW7YBz15ywsJKX3@m zr5Nvi&z1PCr<{lX^DTdh|Kq>D3ZMGpD{<)HQ9S#i7vbl3-ivB=5DD4{X=@`AgrbEA zNoGF)5{}&1dk~V2)XDTZFffQ_dl@tHGZ-Bo(dXoQP*W`#HG(fx8e@q!XI?j0aP_Wj~M(aun-;evgff@n713KuZT-``Xv=qaXbU z)oKmTc*gmdnVG`7-t{j0&ENbDF249;wjR9Uzr6vEf5H>+yTAJ~+;-coyaYi2gO(ul z^vuNxa3&iVagAfs3{1Uedq!7OY1d4bzX&97SZ#{8kyQAU(WF8lx*Dk0fL1f+ zu-_t)PO+IqAc)bG@+hyWNewPP#2#A9q}6I8Utp=f0|O1VS+ag#zpl5DFJD~!zMoXY z3zc4%rN9MXR i15R8Z0UmAS3eM(BpXvFYP|GS2MTahBZ)OeCzj8OBKNB+4pY^Gr zD^E2}z73W4i#FA=^}KBPmPOiKd;#)Lqe#k0Gf?XjK9@22d z=TIN4vooa13!T>{{;8hxw8S9KO_-UP#=ZC6htGcY?{Mp_w_x46wb;3HJHGLaYw_hT z|0CY~<~Or*;?bi=@vLV(3(tJ!v+$u0eh5d89_FLaPdWJ%1__iOStR-y3$7VvQSzB( z+4_!+27MN3`{+u(nhX{b#|hkN&)g7M)%b|Ml6W4G_56$dyMCzw~Fz0Ajt* z!4M|cCQD6qDFOhld$#eT)2HX>l0m+0RFtPMSdGf+tRh|HWkE8{aCjK)Sm4N!DMZx( zJC5Iu>0@)a_@yt!7r%Ht?t5SvPkQ`LJmm?G$B%ygb3P*}jzktxA>r5u966DqDF%bQ zTY_K$`>T*uL3(p%%2|&gP8N(-qm8IGh_MlY`Pq4luUm`bj@yC3Y89`%-S5Fm zfB*OK$VZ-reS7y|e0(jIm*-Fm>-l!ZBCsVCv$hP5M9T(bH6TmEjvdGGSpa99bq4OZ z;|`pA?z#Baf4vT8o%JYOfBg-3!V{jzmV-lw4&ha=dKG_ezU3!aZY(hkKmF-X*$H&V zjvY8~;D8l$+S)$nhZcRbsQ;MyP0_pZ9b11kDGw99uD-7eWnGw=XbiKUR|L4^k>N1` z2ihk?4zV05vx1l`XkoewMI=pxQR+_1C=4Qstkkj}*xYQ~4%2=Q`cfmWp`lTYsHSn}RNSPp_LzY1{I!jpHI+ zWTK@PRGR7Y(JQt->8huRCR0+&cb>(dI)5SCzLQ4bQ!A)$z3V2_gamDjE9wlU=U`xz zt3%t$F}Dd`Xs3Q_UmG+w_F{%krO$4H(fk;rm zq&6Vh2t*d@Hb@V_VPVZC;DmQ#(7oZo5iBk*VS45mqASy^&uhJsU=IK z%M5`?oneKL*0d}Px5ykh1Ch(ApyQ;_Q%9XP6Cd>UkOxmmdih`|{;h0#)aqJB&gsBf zJ|`_=s)^ZjV36e)BR^k?;b6KF01-)dj6 z>8T>%Z5www&rG_=MJpWbVgpC=dZp;W-h#Aea^>WQoS-pNuY?N(^wQF60dOT9o$2TD z+v;3Ihl!>#Nzb>423ukU6Qny%@*M;QFI%oB?qod5KvWBJ%5Dv`iIIDmQ(p_Qc0WI;MzLzqQzYzLY0&-Z)<`3aAmYGsiRGvCQ7 zDSSFArh&#IxvLn42 zCWLv+m4r{}OhIt^TF|3}g~56V1w^y;D-oFwOXiD{Bt7y+XtDcM;cTKm2qZWOl!+6% zCQmK}=8}=NT?O*Gx^$*54eMo^cw?f)M-H2SkLkWiR=bpYKXSB;4p8f)ziR`&I{js6 zvAt6?&P+hH3>|8Iw)S!5YmB65DWR*=3!w%A5zYg0P=aB$WI{=0nFIrqeL7+xZ&sLW zouo|p>Z>Ag3na-m8D@Cx+BG6!_PQA^8?9e0v3HRS~ z56(F4G|Vq7U}-50YfKZvHb={g3VEh}mnSxo4F>?IFPjKKt?DtS=IVrbovL>MGOpUC-0RTVGvN)Yn}! zo9bPZOn_Op9IaFr+1kMbj$!jbD5_Xqi4rq68Sd&(waPK2P^3FIAYzXNgYU>NuWmbtI5L%MDL|`qLRS zq+2l?`6-VC7I+zC&mP_ZLHFoAdHw<^6}=37K%3gbC8+fKKHqKq$aY;9)N23o8AoLR zj4;f?ZHiOpfly}l`r5qyTg`_6XdWv`bQG+uJn1uI`io3Ko4|poz191svjE0j2A$I!JE+`^W^4n+UW9#_!uFgAQJKoMDO^{ctC?)zr!2~}f(?!f z0Nx|s4w5cGnntPX7MfCEkb)!SHa$I!k+ zB@7H#k+j>{37!#RatNa};V@k_7Dq_UPH93}YH|(QqVi37nb4a4j88c> z8p+|06>lKJF4N3NZv9F_zLIZ&5Z%f)Kl48OkFJraer#-%l_EXA^Z4DEoSnm6_ur3^ zjhivE<2a0O*n+(e%^u9&^6*KG$kOxf=St|B>5)XME7W1J@GR-iovloY{ z%BM4QC%L~{5riRa3rm4Qy06qszO3Xz5N?g&$re>PC4Dh&M{^;z{aM;W((5-EPV zM#~CvnS+F^v5~AA)NcWu8(O$@r_%e@R zbk>^T(J;QVB2y=GA)lfdj!8M|%qdf@36R)8ik_FNE;jxJnUu|E(LuTejN3q@`^YOH z36BO^?KW!l8XC*Xsda(Z`qTIYNg#MzVI(3nmSYSK4k4^oc%T0ZU-&|7-?a;uzWP=8 z_v^ojd+)jjU;4Yx=EeF?001BWNkltS$HCE)cI-TO#V2j+q zU_IT@(p=^!jYJp4$dEoL6m699r-Pr`ahz{yjVdXKOp+GYDXNAUct{;?sqa_AS_-DK zejt@KvY9>6MtMm(DL+2fqf$l8yL&`_7E}%%gkS(gG)wCky-Pfk0Agxtig`fRFv^dd zerbmg)k#|AY#`UvS4@9xve4AWY|p9peP*?K{x%x*dg$X{r_HC1x-!)#2Bxv8CzCER zX`^50ITNoFEWl~(7v3jvj#k(jPadZa)%btWAt**cy{ z`0AZG2SmyYRTYXVc(RpmtUgj5p19D0xP(fws%QIbyK|27=)F;X)ahLLP=?Poewqye- zHgH^&^f6+q*GhGfO%K@e=|>mYWQ<-Hm4=E=oGv8t%4C3`2;u4P>H$*p?3XrY}30%V8>KuZ@#I(r8WH^-*cT#E!bg@ofIorTv){L=mOTd0%4Sh zK#GWXH$)dd^Yi-s+EgeGT5^_^1KWHnV$@?5lh@^}PMUEga8PIew(_A3dKEkbn%T8X za?MD5$B0iV8b`K%?Mmr!-W}_Us&L5PWT}5#mY9d6a=gY>AO_Cln>3gJ2Uq>7MA8QIx@h=-4Q#)rc)2WVIlGG(0?r;o%{U=1F0|Db;FqzCS#YIu{cksSe~k zOL-Akpx?AZiGCB{k-jt%z!vpQpGlre#`*R?pK<_y#cs-5A4f&>{wj5mo|pQZjV6~a zDk|GIbpeF3FBhdUM5}bz6t#^;-_8Y1kozWII`n&GI+&Vt^k>c^$N@vTz8hg_aRGxv z!>A9{kcc*x8cl52xDjh7)*;Cpu_#<^#Lk6+eH>G>TY7pP3A3XB(z;}7M1D}Dp3FtM`)6guhekp;1SGB z&mpM}AgO>)futpl7RO7dazsXmR(H7CLVytD%MlE8vfUC;9Jl0tdIC-AY+hO#B%kS? zT$k0)=jia?M2mfvqx&tWPH8r@Z?hznP3kz(flC+lj(hquw)bEW+Ch-VIqG^Y5&O7fs4rnE}^lsU*m5-KgHCqfEsEugGO^TELu3x_q_uO+AHgDd{ z0D=Be-bW|rv3>hi1`Gs7NYRs$C!llx{rBUv(;kU66YKH4?|%zhwrs)n?b}&Fw_7nQ zYoeFxOz+UUWTl|{R0h#a_o)1(#U-{15ZIuyUX-voX00EXTYUk)C}gG7AsQ zsN#ez2;}4lUXl>3p9kWQmj(ughA|&EQl(vsASg%?g;EY^yJN^Xl9QrH=6MN$&vm4g zgdk+g#`(W>9**0z1JeihqBfAA7DVZ(dtn=~pxF9Rw!=d4{`asT6=B?EYp}P14dlJ(Iz~@ zu+xT}ohJb+tJ#^ke6~vo7r*#o?BD+oJ1*|rxf8eE zdMj^5rS~3q-~r|{&5)(C{_&50j7LBE(fpl!8t6L#3R3>07$17*A?(|`mzOVg?%IKR zJ+%^0d1R6&TJE~*mt59^4?f6>n-ncsGP{d88i5AL}a zC!KUs3SL@Gp5;ej>f=I737a-;V(>usCnqQQI{_5>o-PrL@adsz)~>~_ohRUzcmABu z2%$Ws{G&ST+O><{Avy>ktY5!@|B^L?qIpsxKtz0!+jZ$W)iHHk4s!5nN@Wy|&$DGG zQ~ge^TzRWwy~t{7qT4l_H{CZS7f?5i$JGD?{m2`cx||eU2u37H7Y4{HBG3a4bknGQ z9a>|!8p?(^O^xHC-v&(7&f@|gg#gMxyQvO6UfvEwYU_|)aR4}cfZ!Me5ji!r1e)2s z*=CHN+3)GarE_ov9E7SUhqV17r%O z<=a>wOsc4$f+U<_$3hB^&`QXBU&H)z9Z6WjV6}qjV}~$4An>9~&%*X?>o7hxjDcVg zLDJ-4OSPnlL{!lT>PVt6J+&`qM5S|zGl z`D*I7?6Dr0w=IgKL!<78&}_Ey!9i=|G#eC_B|6)6Q~%KWhHd6z6Ev>biVqMsjU#<* zbpOs`bcE^pJn@C%W{@?2u94}T6#Tw@dpUeH?S47__}%PWNDhRQhK5Gi>6R2CDM~r} zUCT=JMC?DXhXL4z4V!uWes*>mTQ=|DHrc;_FXu5nKE{CXq?1nO8FjO@$U(op^re5q zOE3OC)V9>R0$))XC!V+)LqnrDa9}@@IL7`1``LvjJ=kjzhYuf04~gQ)pTq3jI5&3~ zqoZT2l&7brc*jJ#JV7Ah3^wsU^w1s#m((Z70|*2h5ZNj;iMB!!Q9+51Eor}f^}=xVR2~@>(;Jkz>_Y~jBpu;4jo{N z2mz$Y$s^2*)TuH_m;K_la~asj1n!z;+s3b|6m3?FenCT7#a&hx>DO0F7wK}qR`-?Y zB2$?zzIH)KS3{Wf6qH~roeIo)i7c~FyC0lk-0fM=`oMP_5boUJ}Gg{=mc9Dg3L2j(VI#rWJxzz z(b6QCj?it#zyQTJNO*UmJYpg9P#2kZb!shWv=%ws0iCa~v^0Z}Ai?M$Fte}^6C3IX zQR|$=L+^#@VLD-U0(IUt1r~%L>>i+iJb*_ALJCs<3?;UIDiD**f5YvV*GaBH+YxN4 z!w_w=V}FqJbSkEm6o%fed09ax9z>u-!ZRgRDA>k{DS(jLw_q9THsNj?cc$mN%1F{s z+i713*#g;WFY|$0+qP|GrI;%E_4wPr{V?vn>n?ovdq3!+>90QXDLnF#r{mO9PsQxy z41V~-A7W%=7`sn633vSRPQ2@#@5Wo-`c_tYfAYs~!*88;9?pIAV{rA=e~$mW@kYG& zJ@3Qr-6!EwpSl`bw{F8XzxhqJ4!rfPe~c@yd?&8B;vLxY;6r%Z+un+;Teq;Y;n?^D zzVel?umb+fXFh`~ue_3Jn4h1+cfRu-{OO-ufy*zy3}>Bn4*vPtuQ90j&Ue0tpWSvF zKJbALa6f!#-(KE@uwnCB+8Bo3Df4l|PU3WbO2kJQc z>~nbO;HzKx8h-!xe~*FlCqMNSjE#-s^{@LQ{KG%|9X|KD&*6g~{2)$0{Y-rJvwzLI zHZH#S#W-^KSdUzC^)XZ5ami(yJog0P)PzP5;o$^zC^maw6+jCJ&>E?_*I!`7iTHjKm= zsV`&a`a!H8jgTxaV31C8WJE&BGvZ@=gP_Jf2$8ZohU*27LCaRHG%y}*-y~rx*PUt0 z8_iUgms{+)P9{~Fk)|H(=Fp^e9wP%PLDzSAR)AE-Y1!!~b(mXXhl62V&o37`$s2YHq|Ie9F18l9S&#MZ4_@$M_% zi>axjc<`Znap2${%+5{XjyrydJ$oL+#P~W44G-}tn@dZ}tl0nI@Bbd}eee4)JT!tg zzVR|V;~Bq=Cp_*6c-On$jpKKnfVcl&Z^tJ;`3a`()?07Gd*1UNTz1)IY$3Sv%6H+v z|MxfI+0TA9p7yl!x!;h*f@bxL3-kOeB~thw``E|WQt<6>e;c>mdK<2~>MB;^pSb$t zd_4KffB)rp%(;)jDW{x@x4-=g21N_=i(F5#Kz#LoeiiS3|NC*-n=ZpGx7@Z{cN-+i$-eyLa!#D_{94oN&Skc=3x~j6eIc z_i;b`>%abM{>;zM@{$F|a6r`6KTL|=S9#m|nGMAH_Qx{Uq4i1GXHCGTOw#*#Q6By3 zN|Rh#Nm*rek?C2ZZO52dW_tG3y|x*>snY$LNy^Znr+z!FtqhX|z=Z;B!rexbsj~~& zCNyiUMi61Zrz{TC>Znz!Xf7^b?(ifQj~qjLZWi&vEZX#0oa_3;i}U&K*5VwR^D}77 zPh)X$8p}(wSXi9KQgaRqOS71pKZcn(`b=YbZW>byGnieR#r)zd78YhO*#!2Ziajmh z{-p$alPacaBWPBJfvC#<32d5A0)%mbYAZnyr}fC41GCw=t5c_8a?_7`#C6V>B+eo} zO4EPR(=I}b{8qNj^>z}<0a*M=lHAMPbShxk{Pn)jFP&wRZDym>V+TJ0BHsELGX@$M zsH0x5vOfsT{Ao@7rkifU(9j@nO(f?*x;Hku4$I4nnMEkUrVX2L<{4+AvD{=uP6uic zUx!DBv3vLNxZr{d@Z+ESm`~g!pM{_P^rs94Zn)ukb_l%m(o1=XVbi9~T;}NLIIr0s zciawMpO*lR90198;knPfkR1)*{N^{aQorrC+nE0EfB*YfSX{u(x7>oM=_$PFO>g3v z`J*0nHZM&O?Q7OdpxGjSpeCr=kAK_~as2To;c<_B0vgLLRH8a>*(8eso&E9EuYQ#s z3&}!3bvtliA3Hw&=tn=o#*JH;jSKS&_~tjh$#r<<1<&E-i*;*LhfZ2PBOivgxAHWq~Qm6I$I|lO5MHw$#-NToveK;x>D@-}QUOC5T*k=xL?E z!`5&<)(=w{Skr(i>f9!fA!lCvJBy4MNClLnAzzz~C0-|}*Q&g)JEkpJK_&e}^r>cl zD`?QQu!3fgeZuq;*Xn3hs{Cw|lzVM3eJ`vai7IGDA(|o3pdASmNv>99--7z`BF5qt z2HH*3DTa|IO(M(!AVuu|5VJo-b~toC*wbyCWjw5PK1=?qAC=dE7LifES2PxM z6R9ew)UeJRXgUnLmLv2&(79%g=2>KQvn3zlU@AvVwmw^w0%ciDo>M`2&}^30??*<5 zI9L%~JM+v(@lJui|NFng)-5}*WBU${Z9r*wcoc&JBk7^fAq5m_bKgn#@kgmaDiC8Y*@N1E{4MUi_g>})mHRut^EN|H z+3jobP?PJvp0CS-(XUmm-{jIoF3W=|3r%CVNEa3QAan{!58?^5bzwP&3xn>s;`;lp zGF+*wS*WNyUz1Cj=XEQI`ku)t(e%D=*&+)zBa?nKu5>`+wRnm?C(fosiS0wTBCunMvEiNwZnAJJ6SfG z6j&*#$P@Ybe-5@xLSD3?hmF=9UroI6LFBLuc)ee_0HAFaZ^~09vK~-0$;6`c4K;Gk za>~wXOgt!SbdF6XEI?{fA^vEFwBz!GM&}gO(kkZ1mapMLC(gH2EPLX1*)dsL*$4 zlO{Q3Qrfp~Kg$Bz3310Se}QJJ!Sp@<`7gi~SG<#-p{<>?Ttn?JJ~74)ie!b*WxB1u zsC{0S^(IACM#lF0u1z_bCY@#Ta_K`KeV~80Awm`s zbl(r)awY3LYa&<|@;0SETGb!!ay>EdeA_G7HVkoE`>A%ZOj%00v&Nme%BUSSo(&} z3q6XV4>&C=G}QNOGZy_`B7H-GKv|M2Doa>Ff{EUuvEmD!T<>+&Nm+_fdF`S>4HPBY zs#Z+{^^mfnz&~_Q*s)_r@zkfDhs!U&9ItuJYw)`-`(0ix`0LMn23xjlVCp zU$LJ7B@T@(5=@Lu@ODE2qNHeP8G)4X)1G!7p7We%;X@yOKR>^I<9giovs=@5D;126 zj_`M~0KD@Z@4&XL$MI~O*77N?0?oQ#@rsw@SX2Pkrjs@t2>z1{YlL z47~pJuVbqK&D;qLAQO=k0g@CiSuQFJI0PR1*vI1QU;jG4N7e@dJX8+RedNd?yz-To zV8@P>=4U+PX}IdD4`IiSUHGFvdIQco?Iz|@em2O9Tk|OOsXscm`cqSia$9Km;c1}W;U6^LY5fG7C zhytnLg6voYvOY-f$ZR)6NM7qff;gf`3T;$~j<8D50CY@KD-!H`(4j)+pC}4cf*|+u zg3cEx17l_V#J)8Njy~A+9`BN9qgtu4!z4MYk;(TXANdH+g5U9uckqmw*1c)nnH)>g zj@i3IrKjz+T@FQK%T~`K{@8c}4IsGkRjXj|mwEt~oK@yDOQj(5}-$*+L&+Oy|@>~JQ*vwqt8N4rWY)ha*7 z%Uy_Aky82V)~>Bj%OiD&5KFi3s?k9_1An3+vu3>@5l0CNlT+@=#*L_`WD zPCgFPGt=z9K)WHxk&-L{8#ipgwby=wmomuTfSe(zPUK@SI9SKP-~fk_CTqfA7PEl- z8^*`RcuVfyefxMf#F=NFg$MUMfTg7cUj87*%(Tua$RSWfWs?<hLAdsb_kp%*dER#7KShH|>< zgEW{>=T2y5R3M;k_!FX=UYVbI;D>4Jp{ee+PVG_#P&%{zyr~-r-Ypk!WPm_97$?pS zbXuxM>?_dDW~qTl+b!YuqHOD7!oZ+HqEi6XcD6$z-$0oC6UsQx$PQ}C*1E`ySs%ev zSV2QnFp$t$j!i^pqfRDwj`JKN6fq)(2W_4Owg_zSmOy0|9k>;~&KHyNa`9YGMb@Pv z0in`BbxP!J49J;xuXQBvU!t=WQ!m#vF7(5q|RW0K+48V8~IQ&dUt4W7-ORon4MWj{TRm9@YX~E z2c*Es&w{KRM~@!P4hKttaJ@dryAvo8Xk0r{M}45mu_8#3laIpm%q06Y&=yB>;+&qI zVbFBWIp?qiLxu&Pno7eull8E%+{WD80{7~==te+6qQ{Ba@29@3T$Qq$SRGdfNQ21y^W80*=iX&e~RRs%2OX*q{^F$ z=_a%W={FTMUJ=^U85tPXKTVA8d=FAxW>BemgNjVyWxu*sUunCelNr;6TAH-by|cz2_Q?zR&ulpz~jW zBDMiUpQI1^qP*1cV|&Ilj*0+1;8jC5$u_v0!IEdEk;fgo_Uki$mT;K#>mR4hG%@ zkXa;N{pwfe+f+%Bl4XJ3Cm$d3BOs7M*ZBO0YI>R^)r-vg=@|;CUkxocoPYlLTs~Px zs2p+@M0T7ty)OeZQN9%MlcFh7q(`EkEKEcfSqb=5$@&mGP7=RPKKW$6PQZY!5fGpq z8EJ&dVdeqxkMgIwP!vabXcIjzmquKD)VH1WcWesX1j23Q`SiPf$EgeKnv}VoO!rM= zQhwJbkuYbYMF0RG07*naRJwxKX;QE2lVtT;kxm8tqZ;e?p*ks=Kteysrs#b0v@xKJ zkm@`uG{vt!D7VJR$JGaWw{-f{r3hu4QV~LR<)u;_unz(>XT&tpVl|=j7dQxV8k7hf z9_0arknSj;9fPF6n>AW~kj9k^Tx6yMno)JNNszu%Yc?=UTP?$kwj@22i7icZ%yb?c zNv?NB2(uF%^}4&1lkcpg=>AIjx|ybOYm`L;+yy4f(q2~C>(BatTUXg4vwl!Mq{!(b z!(G!g@=qWWJO%iXM<4T%&($hh8))V$Lk3Hs8^`IkL{g;kJO#N6fXwysya#y}N9zC3 z#`3}2d+pk^D0VAP_C2+)3f5fU1g_*;!uBkmrX4nPal#jXbnT zp5H+AA{ywgEKmNmwOv1e)%Ltk9uLQuESeDb%5vBJqWYT3P%Y4=36Tj5m?orh%$Syh zd;yqGG6v)JVT^6|ZvzM>W#nKGUq1J%Ks)6H`AM6rm0aV&^xY){%YcM_6@^-s z4d}`p4bmrp6mOl6PEPpfaXQ%%d_*(N&@23$t`te>@zKlKX`EH|FF+0$==ng|&f1Ad z5pd{m*-z-Ybj<4<-n5j{NB0S=kdjxe9`w9C5s|A<3;8l&36To-`^? zo}_w6o-8+(*@uA2rR$t`cJLQ1In-+dOk)ZpTKvA`3%xI`5%eD2Cy*rhB%MV&JDvJV zKC;f$XLQS}t&gm<|M^%XeI^tx8f<#TW<8KQd(^yjC2!JoLb1LT)k&qnMZXVULsua_ ziQg1v(~(M?`mrTdDd-)@RaslPrR!4gUO&KQCCP*?d(B!}Nb4K~iA+Vy45)LZfojOY zki{zE-xTAJX8#G#@I~&A!6!-cxeUD@HVP!&*VAPSi7-S44I)&M^!Y^kt4Kcy8RQ7P zO9ZZtU(`k`nOT>4-=|L(C6k#FmL(M5vP>Yr_gxo%i$J<7Kehj=3XNv7^jpRyKsFOc zHZ!N|i4x>WDtoE?3FxL<7Sp`x9hx!At%vGNi^@wa7T}X3yG^RuPTlEQ${E~o#92$vUvPekli+n~NSx(jq zS-u1}QbEaj5r`-{sA)AOGAm6hp~Lj9K8{@Z7nNJ2n5CsaZNETsFqS*8^d$}n=1j-b z7tv;#tga*##z9bO&TH4&Md?>&WS$G9s+G{c`zD)NMQH0gx(|ZL=C<%;q~4%1Up?l% zO1lja+t6kgeU<}E@(!H^7DDD5LeG#N>cTCnvJyg1#pym=XL$>Mg;9r`84EDYvP; zd}bPIKQWokZF#u{o7sZU0X#)B6CIS8W)PxaxkZ1bh)$he7clbSfzS^RGnB2*kmQli z)oR$KbRl=pC<>L<^Xa&5TAPP9+X}K%I;$L411rK^r_c7eW(b4{y*Hk3D7Oc zRUY_d)xGz>|MK?NuV24zsip3gT9T2`f{>7m1d^;k*bd1cGnnznvg}}y*~WMR0wWoZ zAi}{iVL(P>!`Q&g0D+B!9ae({#*4sOER2M9q29Y+uW$d?dv8@vWM*Ym*16|oX5If6 zj+m7Gez&S}IeGHr*)sE_qRvk?`LkHPR#j)1_&N%;3`@UFxvf4;FE2mqHbQHEj(Ek* zk6n0dG#r;!nOszz(%4*{4RZH{%BUAqS zGNYjklrly7jWWs@V~fGPlt%@>?I*V$9ttHx@4A+mAlDAZiVNf4aRMVLon>Q(BPz z4eOzbk2F6dMMA=N_??#Hj#<(~=W|Ebj`5kGTgLMD7J3U~-NEdwe6zXMmY0@JRCo+G z^qy%KVbq+QDVjOn@Bqtfb+l0LLS*HYc4YNz{ z(VS3nx0wew&ozpqxfjMSq4_-^hK|kB*K|5*y{6Qn0fmrL{j>X?=fRL*%z-UdN31U`o`Zg9O(y_h+|3-e8mieKWvu&ojj_>kOBWti z7rKpQ;2J8NCjg6XvIcFU7w9mA9nQzlFb-F(V~H-*LZjs}lQ-13ArNsYQO^#CYcP`` zSNX_GUa&M0NuVdrQ!%7HE}zt=Rr)GUa1$qDV)qPqH#t?RTji$k z0wz99mlQAX(E`O(`}iE4KxuhMp&et^o%aqcDJKByLpdOCm)#vE7S^Ga5Vdp3^P8EJ zL@NcjQ%4R4p^Og4W4Y%8v5~B&wWvd$nE{(L554l^jpbIyQ9+p|qc@^ea1FfqXs#T0 zN@M47^GiXYSHXA@#wN7AuG%HBa9+5%e*gY-g*!W_OQjM3pxdNXX0kW2n zO6_2HojA~1Bn@Ra!|m5WVUskUu1~@@6?bdXdI#Yp!^?4))Q5#vq9}td%%-Udn9pXI zj3!oNoh@daw%NvgP>rLvY@#SEA8=g4CF!T{zGJXHoHLeS4a;&?fB21SR}yF`Tyu&i zEq@p~MY9ak$_xf}2^N}XRT_*X4tKFSW8RqD_QLr;8kP3g;(X>V)H0_M%sm8VcfMJZ zkKspBtim*mKk!N#=h@+YFW1{C6lgsr-qH?vQfyh37nd=(&?rLCv_8#RlS>BElI5&L zgD=JBX&bbEIo9iPnPmf%;|(c=n|ctavc;yxviHh>$!=)aok;0|ylJhQ=T4zi!P1m& zHpCib7{T&XxZ&0ad9yFa{A)Z)Mp-aNc>SF&#;a!QTvY9e6cd2U9M6SSI9#++8$w%H z#vhWhJP3Y-QfpKFfmpTxVgnbJi-VEJ*jnOY;vjT{H4I_N2}*=>$Qb`eq);JKWofT^ zT^~=du{O3hF&azWT%l{Ohi;c7>>h$rmTm#=+2;XWrHq%uX|7@=3DO+qbQFm)+@bc+ zP{k7w#yUhPO?d?lqm*!C>i;#z^-Qp&TQA&(&wcK5c=x;C?SdiMI|Jsd!e|Zn!t<55 z3p|g{__bvJZaELfZ({E`9K@78imMphsXlA%y;pgP69OJV`B=_6c4~e}c%?AVa@;ow zzhVBEY~aQ&h9kSiZ>obDe{P}$zW>cwA0KB4LHi`PY{sUro0e(M3m&qCD)Uyi5Epc=#4O=q zW5n0X&7;&fNNq`qpK82R8|&-#W=6BbV3G;qWA0J-im&(z8}To^!(_S5zF_C^=sBdNJvXsq6}%U9X<4BTyqD5ieF$SC#5tw9 zk59Dg<*ad2=q_K6XDJ3vx`&|U`ZSN*7HAH+{v;HGS8*SN&(FETI~XZ^qH?Qx)%GB^ zn>eX)VdrGgE3bOqkAA)05LT^+7%luxDJ_}+URC>N6oqF!>)E(^^|HOQ$Xw!OuHiS4 zLaVwtu8YE6FJ9O?TCQPpYt7!pVPkKst=q_H=kMR(mxU>f$RauP5(ZS-hu^!SBZAupY>P$a`qoE+fw2E*yemH4l*Ea_X2jeP( z!nLt_J?>c5+GvbRPhG}jeToaWJ7VjHug9xvJT?NSkXdIHsQ=Glejb zxg;r)5*|66$LNVGNAsd)kjo?{zFk^CZg3wzzn9_aS*(ImWHx_sMolLGGa$(Hu1KB< zktVeyoPl0AQl>56J5r(W9*`6St$ALqlAe!%@Am31f=!-4chs?ekBRE-ALuLP)MDn7 zJPy$P$=V-3vJb2E9H{2n`zC+0k>6YvW=@Qln@G*k*7^J@c5IZ+)3(gT#~#7{-i~ee z^qHG*>f{;B<~w-k;Ro$q8)r_RwM)I%Z(PCd-i}=cK700*4c_(W#RqM`tmoZ*H}?1T z+GCIAM3C{y)r&qZ4(laqml!xjKvEp~@B7|^ur4lQ7B>Jf7{WGFOkPS(p)OhiHQ|Qs zC4|~<#Hryz1dN*vdJD@4G<=bQMKm|@Ie{iIcMd0%@lypQ$wd4yR2v7ueJe*L4z{ieczi<#nxwFb$! zMH#l>uIBP^ZBzVmibEE27L+0}^{kj>MT+8u6Byj3NHGOkqAd=OG2BUg=H7GlQatHwq-z-*={KzoM+2|kkVb>%h0yt>qR3_ z{06r=tTTkYTb2mR_uJ~+6dW(rjq*UP_n!GfhMLnG8Yo2G4&t~uz$f(fM6M9WUdQeNJUdnz~RL5t%QedyvuS}eZ z+MdceeflPR^rIie6Hh#X*Z;*gU}t*||L?E<3a(taVXx{o_js7}v5$QWpZLTlaPi`! z_>muZmp#__Tfg;w+;{)|cxCO$#q2Cy!%(q3!3hiBY*7e4#c z6ZrOj@S}M6OON88zU#;F#+SbkSN1h@S=oznj5o#V6;;_BNR+)IG5n{-nc^o$37~CD z->ATkwHs?oDkrtQ>i8)Vjy2U*_&p}PX+8!yc!`@u(A3@Y*qn#EYRuOqfCebX0IlN-qaj>{~c4 zbq4J$^DFn;UZ}Ocf#3VR58|Egd?%jutlRP0*S!w!d;f3XLm&DB+-|Z4ZQtt@KmC>~aJc9Gd)0Uh8n1}azMD&z=DJ2@ z6bH43-@Wf5{_wxw3tXx3o`3yc@C~neA;x-&1@@uU!fMM#b2qwzDpha1WBoj;i68T# zfMMi0aM9oN-&Mv)Rs@w(tc396M~R=g+h+Zl1fn&TkfnH`4 z6WTcfBBx(5r9P%?N$;d2^=H*IRG~SFc5;+-2sB3x##NIvMlmC1l`*1xEqqUnnYMoI z6sotq?QQnXjQ{qrkK^C}&hO%V@B26Q^V{C`R($lMAF+z?d*Azi;x(`NI(+F%U&257 zM?Z?M_=-P=SHAL9_=%tRN&MK4{qMNvo_~kgY!B~z*Sm53#x+~!%9U%_+&tcHPSnlu zNgrk$dU-xb@*|ackrbumD=Spzc;Oo0h+v47@nuQ63DBdvFvQj|)!azv5WKLKw^=W$ z>e5CLEKsp9=T5$%8eDFjvW2aKz%4;2X2X=L1t#mj{(K+f^-bWm=K;k&_GSwk?Z8H& zD;Dlm(Hxr`gzH}H;kyaONn z;0NuVn}7U|f5Kj4esHjdGiOfQ(+Lkf^bjsxddikJ%JUEZ@DJnK)$8`8k6BVMOBh9= zx-iYbT^y=e?%+~fe(EsyJjE7{; z1g$@TT~tmDDi-eUhURi58}3sz%L@bGJq%+?2}r5T&~jhSF=|Q+<@1g?N=c&kq4OwY z)I;F$?MQ++#kfOyG|a4jXTop`kHVFcmwP`1e~0x_(BFrxi%Z=2#L7rQI2_lZ-UEu$ zltOTrIXKiPkdo9#4iB7i;M+G#XE&WYi-#V*7f(O^gq1(j>6#VvTgSHSvf2w?@B+IB zVKH}+YUhgsEAY(`#=rA-z8%kh{`2uI-|{VZ`O9B!j{$$+1NY$DzU{B$7k=TN+45Dj zz-(@=^By&Ule#@S3cP$=6+h`{7(wMVnamUrznO??i&W#{>c}BN9UPV75~qkbsae~o zfcE}?!YBa?jOrPx`T)h+7_)kWy?up3k1;j@DzbM=)3!P|bBI2s#l@7NcsumjMBS<} zuQc{B$JxaVoWRWOG}_y?;g-$*0~=A%Y$(xd044@o&CQN{A9ER9%+ky)AF~dT$>g~* zIcvYt7)8g&lHHK7VsS<;&AHfIObLY?eC5u`lp-dL7lof%pd1b)Sh>8^iX1AO=@?7= zDuh|;FBLGkeUSRg@wym%Qh5p2L)w>=$5`UZr$c8wj8I zj60il{Y7NT#xXd3`V@Zg7k|+neRRClZ89|JvBw^_-h{Wm{cqy~ANXy2`qQ7r9e3P; zix(fq$3FIP{HOo)pYhmZkKvYEF7);s^frNtCr{$?NSb#&1tCgk+y)u1v7kQ?6aZdu z_lblen8Hz9COsS>t(tOLjoi7u@E-6Z!;mYAF)^9rYo+n(obg9Xp zvAer%y=5kft$SbMo_l@=FM07xaOk;?A9w3jfi9Ybv|5>hx&&R1fC zbr@x!aGM$n)hJ29O@!WoH6RL&P4uc?u8%Ria6*H_8O1dM0VoMEQ2I{bf5`ZCSNh8J z_#~~pbBVKtQZUg(%W`8wVaXYz6z)3OMRNy8(JK#TuEg+=>R&29*T@bXuD4ZiY4FTy*2P*dtRmU}FjKca2<7q5Qx*Www^c&7C}JomYGckh;#HQno1>76g}dBoXp+W_ z$|9d{L^~}dSC+}6RNt`792EMTGqBkfO4zOiZsc6%t=rrk;k!29$1nZ%2l4QOmvHv{ z&Dhbvcw$)C9MBtWz>HdZ3!01Fo~Ja$n0-!NOB1yHZ%{^~b^j|HD5>mrxX$M=XEW-p zsg2i-M-EV{Q5*EcFpEhsvR6U3Hx(~@RFUpZ3l*H{9s++X4P~O7)-Tc05QdS%V6(;% znwbxY=zS}mkcoL_a^O$Bm&)V_Vh+xRjM{q#=)R?+PC4Vn^=%bilaq2RQ^{+PO0jt~ zl(u66G^QL6RVKN#>KLt}P;&5a{3W*^P62X9c_(XYb}8WCU}lfg-+lLUn{e0)dwVlH z_4MOd-&n^hU-dP%+>PtzzJ@6-T)2Swe1_efImVMQ&YwST!;tUp?%4edW+NmQH^sxO z5Qcak?ga|V^g=CDjlW-^FtD0qhRcA^vZ3o4k;%td*_>q~GCp`$yc6=JjjE|p6()M3 z!c`Nydh0aQv73$fbekEA(gveYZN0j+pzV9IPas81Io4s0X5O2m@QgNe-I6i$?x)78 ztxW&Si480L-DaBR-mhkS&Bm97U0%>te|=gz0Ghs{RT8Lm6SKfqVX8i`4s9c4`Gye) z>4cXU@G90JKPS@t(!#oKjLAzh!O>r89??0JV-ZR?pm1_lXZPN>+eehn+%(E1u0K*f zino-Nh{#;!^5+Vh*fS@nhbRiE{B+E7>Y=oA)bogIkHQyI_6{>fw5}8#a`+3!&YVav z_avCT;N$VcDF}6CWzl3(+M|j_&~I*Sws(HyPR?Nu-6EV?lt29A_>dFes#o7Xk zQ|lN{H?aTo)7ag;YL_Eweb5UwVb+t|s#U*T3a2PEGE+jKOSy{q5uFO z07*naR8n74v?vJ*iJo&UV>*s0Yd0s+Ih2}5+`LT9DXyQf`7J3!IXL3xCxuhWN8ukL zuVOSoX*#83ad3Iq#^%_(l{Iy1pqc#%M);d#0vhe_?c2P@!)ti2`PW@srm(fOfvTRP zHk-yvW$!34HcvS!FrV*RL)HO;&Up2>73SU$n)7)JL&L$G+B>m>VZXMLVc_dlg2LiB%8`@mejlSu5@)3SBoGc4UlBK#B(`ao=(* z0HQ!$zYK|%a)clETgt=Je6w*^5I!-%B()*oOk)0AUM_L?qt+8w$0~{ph12u3a4rnB zl2iSX@R;LaKxEvxcakDR>0YA89RA78BMEQZ7)kx-`Yq*=a3{gPDt+Y4lehx9jGNe8 z=isDXZVnc{es@oT4ZOElxFBF<(OmO9wkOR@{GGBi=Gw>|FK@jMrM-gRcoxiWTc-)= zSGvvTCTBS=o#GI=5s-&^FT*q^7tBV)n{L~}Vx&<|)}ZZ*i$)c!nmCwwcw#9w`D2VHB@~^4 zqno`0OkShh=%Trt%E_s^{a0hGN*7XE%}|-W7Bgl0XHG7dh>M2mY9Fq-g|}{Rk@N3U zN94kHK1v=EV@4B4JK?0|gc$?|m%_WmY*;0cd0uMIdJ%MR!(RL-qh#&nBo3d5oZ{f{ z?#GD}*z}oNZ=Axywb{Kh`+;1f&QK}I5nK}fQi?b37<8ufC1FQECsZm``FiGO1+Y#O;Ejr(ebMLl=7SymeRb&d6z!v1cB zks3pd3VZBPTSX!qSKUUW^w+C$eO?}qv>P&q(T22?((DhDR#5_%;isy-UYZ|a--ieq zIU3?GLbqg1`QN1PIdw|&NC$hMWY~3Zvm`&CLFQ3gR~_#AYm5P1w|t-9BrU^F;R{oN zK=bk%ElWIFGXWUT6BJZCmjs5y+&S$wrd{)}>gJ4fz<2=67IPCV2x};@h63{n*n`GN z6U9pH1M3BzeCoQbVKUyb`xbmqpcrCTNt$sL(*AJTw7tnIq6ykDw7V$#aN8vo)D{O9 z*0yl|_ePcbUSHs8V!`N(@>0s+@*uxaa3!j;tbunetJ z5zBUnbwl&#D0eX!xiRR&B1B0N+Da)qxq^UN!NcYaUsnvKkVeCIp(i5MCWV)?Vp4sT z<`9^9UF0n8J~#o=X=U>?UGh zQQ9;AHe7UVwjvfb4#1ibc;+sG$p|}Fc1)l}jC2`T;Vm{AxBc>9N&<`GQ5pm;aX3m1 zINI;cWGc`;n?O+evwb`Vz-?O_z^K5D8x#=gLFHth4;bn9nD`nnGRf zp(+kg8V5vGqSPdYmg*}BQXg^^rLdk{CMl((VkATBVKsWCvb_gG+6)!%oU|&Fmc}Sm zF7@rG7&A!URuLo=HYpv39)`e>OOLCJ(NQU2x!$*NIC z{_ZLO_lK6}=io4vdbc_H%IJOUTE}82HUy*N1fMgJIj@7nWO4_hP$foYlZUymNNMa( z6y_u2G^lV43X>-6Fv=;e-k4#(1{S3XVjwK{mxCb%52ppL;x3ch={9_I8mW6{kI<+R zQ)SfylxF$lz*IKH)APb035(G-7PthZ_M!9ys@`fmCbYf2rYpIrQWkkGW6yEvaTel` zbQrf~F6=Z=(oi^uC`%mfQ#i_fC$&l2N#Rr)*BI}}@z%v)<6xBF_;M*7T)VXGRJoyw zm!xRqBs$MmiB*xq_i5tjm9xZ;+RMPT$(5DpFh-*iZKr|u_+KvD$!FdBE%hn8%_c1^ zG0+aR-y+Z}f65`U16rDVT-$L5;Mdo?B>*mOSBFN?Sksoki>BAL+tjgUmLSRzFx|xC zk6*@OzqZFn0KYk;**V(wl`cKR6YYBlAN`#owysZpt*K~#`*6^HS;382;g$#t4n`%4 z+J)w(yJD2~V+fN?<)KXB zs2M^CGbh05JE@Ld-*ucu`t+azdhWwCByn?w3u~*$#=uo@Mf<=pZdw=h{Kb@|p&lhl z8>x9D1nDL=7e3G8y9?`PM;n8SqkH19^`2nVAA`{e;@?BF$T zek0ay*#d5qxO&Y6?ikg_uvVP0`wn)h9qg|ucgdAs-_oiHnprn75@aDj`xlNW{T|{b zOev-ZhN)2cTV-O>cEWMt`a|D0En|6|VOimDztQgT2$hl;OcXB^mJseC0)m4Ngt^fC z+;0v}3QtI@oNxh|17R5{#paRp%;llDl7t_ZBph*kPHLC7&($+zjB*r?Sf66`aP@`n za{4IIXi71lydb5VaIn%j#K|J5e_R_e+T!N6M9(c=;Fr(qU{6^HlZO}0F-UFscC61! zZ7?|W@7S9&WDN~+$mI-xVtH~WO)4ob@B4 zhHrlM1w8Nc7I1P6|Mkg+`-HD-kDQC`^Z)qcOpKm>FSjjS@~Ii-@r0oRWhZgUhAf8s|>jZvQ0 z72W$sf{VgH;p)K$hNy&^JJ)uTr*0sREkJMs{N)l1&T=NlE*qN{He%Jpt*={md}X2` zU^Fg($rPwZc>2;66#EBQFGuv4Y49W+UNiRe_KTPw_Wxky2`mhVa>#;1A1(`_i~_ zT=`Y{k%A-Dm!T<#@8s}})Hg}_Uj=T-NcS7mQ%ekB#z}&qC+Sier3&(O6FYtl^pMVT z6L*kc^;T}EBv=oES!6H~22Get6JptkKI5Ptxrjl)_!u5}^ieFfucH`Eg3E|BeE3|& zI$RnzkFe~Zi2FAO2QiCkNb>dU@9$$zk8v<7p{jjzVJL39=>%~7K5UdTY^_fLa}PtY zj(u}kh^{d%rlG^2g8{|T#0|$M#oTk!(0)qz4d2r!YaBeBq9V~>nl8yc1IQ5rbNiQ* zH~|di{m_)+4MSk|;}N=7a~X9?FeQ1|ia1atlHp;JByds!G1b4JV=Q@`xOpU5%oOjr z%3aL5UUiI)YJ4E@h8%&Ksx!x{aMVfSb0JTZ;9@b#PC%fI4bbkChufS8;(C_|hO-uO zCUqY2+-5=@tjoAbt?VTi_MS!?Mp!j*Y|P6244cy_$~AMmQDa{#%uIO`QLriNyb!g; zlwP{y-zf(6dxU|7gODTmQw&$s`n|Ux=)ZqoPNvwLuA7YsI9NP|SHI?NY+k6bbMZ5H zWLE(=LTWEdKuo>#16+j#|1b$8+n%u16z3b7PxOR|Ewx>GRcz>}-I#n+9~05XVZ9JK%f-%3^jr-wmw{4T+PxRr zLFjMs@NgK-dP~hQuSZzyje*%5-}KtA#vOP36MXKzi}>ohPvhDnk3dgKOpa~XfJzfR zMX5%O@_|<|=K=^HauM4qrq@ABT=ntUYcl zC4om_NWq^YCLx?aQNiH&=wb<*T+qvIv%qW^;eqA(0-E8nMUV}}0{y{g9l!UHhcGvh7R^2c?G&a0V|$E5shSAJaL)s835L(o z?_5S0pIo|y$6SP?nq?GU&)&fd2iw=7_cheKMzwtjue$RVeB0|@h`TOKF{=s`m5CKm zK&`K#G$%dGl?`UIre<48YWAFx#Nh`5%}{*AaMpv5Il4yai`K#QfuqH+yu^&0@~XQ_ zS0YNKpVSndn6(g7vO?Hm<3rz3fe>Si9Fxfw=Gy(oUZloEfy-6kQVKQ4DR%{8weWXTEHGOf z*n7E6`~YPYkuI`ei{MBXa+y35Od(ZPdN!c1t(7=_;siD(>(JMCaP`WQcSAduZ{89OZU2si`FIVR$z+K-0!{UmK{{% zIce{HQ0Q(^jHeuHNy39PDW!a2-m;q8<&uL+Lsw%QA8+EAQaHOlw%_J^GmO@@phs)C zzO#q1Hg_|W(TOBkL$Um!6+<=kTslEO2cgA0q}5T%0F=Qk^I-cr_jSYK+4Vzit4o>MmIcWFKhfxZ2PzA_wBV6~3397-cO_!&tb!a}Q9 zQk)wll|Qb91qjKlulZeQg^{kUa-ht91m#XTY);15n_tG}&CkdBEqCInCmzHYm!U`6 zUG8M^ntL3^BPy zR!*XGGiB8dAbQ>$rwNJlM!zh-QtB=kDId7ch45442dV3JK zBr(`k6W7t9%7hFj(TJKi+N`VB8bww0vdjQnLxESn><+yC8(#(-Jcj+<5+C^BeOMch zv9moxT`Sa;wowVql7myx4BE=B1r@*TFjtdI4WLwao&r|5&6%pSS2^3`jMW0#ETb%d z*|@}k(iqno?CK~>psMD0Y=0l8 z0Ni==0Z`qC%Ol`JAN}u`Zf@Yz$@3`G1XZmuU0<_H6h>LlW_dz;1)+sb?AKu!@{kmp zWVN}{*+hfTb0~9JQvr-siK5c2SHyT)P`M?Og>mhwe$c5f4V~nN?LWupC<9ENBo1dogn7!smde<2jTRr)`SLO7IH9(Ihv_bG2rtbHz@)R$F^j+nv|&Ve?cYX6g+Vv0~NlA>h6`M+9o zffaNU?swU}#UVSUCB})fDQ{i-{it5uZ+CHpzc(N}mFSLrpgW?cjYVByqnhC&H17P` z7vt1jw*c3lz?1iW(YhCOqXf)nGwdJip)$fX=(qnzH5X}gL6g$NLGcwM99mAA;8DiV z-X{^n|F<|%sEZ1PSqC-?CT5%q=OxK?q2(rdf*?@*bbB`en9E7Rq{-SG^>z(qQnYW} zd){*b8*f3-I#H?&=ErA<;3%V{+k6 zc`hl=xw)svl0=M`anD0>CMgLqLBowvtbJ|{#f*W}oH~kmrx>pk*SDN8lKPzz%Bg;6 zvP7DLBig^*n=xs>X@DcI6KKy%8d*r|i19P2J$92Kr&YN&JBh2C_y-!DOCzR<v6s zT;wof`d;EODFcVgE6vFm1D58yPn^Op3C>*J!Qp`RnVTQ9?U)h6;U-ssli;K8auh_a zkFl|i(NJs-gk!3 z@!qQyMWcE8-7P)qw+W@qwITI~jxn7`{kr)+w(qt4%@cnPP37V)r%$nWL4&Myyh`Hw zl-uWAC1+?IvG-g(DS8bR0?KSPu@of%C-E%~S1H~j3E0E%svJCW?Q%jaM^NUDQH~Jj z<{H;mIzALuX)Z`(l%gB1Jf{$FDOVQ7#wdI@WDcbaWtw6%;^j@h8od
          WildcardUse in file and file extension exclusionsUse in file name and file extension exclusions Use in folder exclusions Example useExample matches>Example matches
          (asterisk)* (asterisk) Replaces any number of characters.
          Only applies to files in the last folder defined in the argument.
          Replaces a single folder.
          Use multiple with folder slashes \ to indicate multiple, nested folders.
          After matching to the number of wilcarded and named folders, all subfolders will also be included.
          Replaces a single folder.
          Use multiple * with folder slashes \ to indicate multiple, nested folders.
          After matching the number of wilcarded and named folders, all subfolders will also be included.
            -
          1. C:\MyData\.txt
          2. -
          3. C:\somepath\\Data
          4. -
          5. C:\Serv\\\Backup +
          6. C:\MyData\*.txt
          7. +
          8. C:\somepath\*\Data
          9. +
          10. C:\Serv\*\*\Backup
            -
          1. C:\MyData\notes.txt
          2. +
          3. C:\MyData\notes.txt
          4. Any file in:
              -
            • C:\somepath\Archives\Data and its subfolders
            • -
            • C:\somepath\Authorized\Data and its subfolders
            • +
            • C:\somepath\Archives\Data and its subfolders
            • +
            • C:\somepath\Authorized\Data and its subfolders
          5. Any file in:
              -
            • C:\Serv\Primary\Denied\Backup and its subfolders
            • -
            • C:\Serv\Secondary\Allowed\Backup and its subfolders
            • +
            • C:\Serv\Primary\Denied\Backup and its subfolders
            • +
            • C:\Serv\Secondary\Allowed\Backup and its subfolders
          Replaces a single character in a folder name.
          - After matching to the number of wilcarded and named folders, all subfolders will also be included. + After matching the number of wilcarded and named folders, all subfolders will also be included.
            @@ -238,9 +238,9 @@ The following table describes how the wildcards can be used and provides some ex
            -
          1. C:\MyData\my1.zip
          2. -
          3. Any file in C:\somepath\P\Data and its subfolders
          4. -
          5. Any file in C:\somepath\test01\Data and its subfolders
          6. +
          7. C:\MyData\my1.zip
          8. +
          9. Any file in C:\somepath\P\Data and its subfolders
          10. +
          11. Any file in C:\somepath\test01\Data and its subfolders
            -
          1. C:\ProgramData\CustomLogFiles\Folder1\file1.txt
          2. +
          3. C:\ProgramData\CustomLogFiles\Folder1\file1.txt
          VwLj7DH4 zB`pM2+%@09yHRt28d5GsG;xB`fwQDj5*AgB&2oaeQkd`T;>|C;6EC~@nK*lDjO*9t zm~OhGkyqjOLT-Z08R^mbClc$RWIoOFfCE z8P@}ShU(rG$}Jub*)_>^(kGQz8%bFvl6%Mf)Xg!(8twJPlQBlq5k~b4i>rH>?-#h~ z%oMx(3ydb_IONQF3#v-npi0&?uSQLj!lID^b>tL-wl^jM%S6J#9qXHfvsB8_rn#i` z@KHVNL`?N>)o+JsbLIL}-`hsvSIT?d5K+Gev=^jRy>lGXq6)@g#wgbA5Je{B5ku*F z)j724Jc7`lRV>I{1z^=N8iE&zXNBW(DBkmDI7Ts9gn?s(Oq!%^u1sHwG0(lIPI{Bm zZH`hIyhRkhv+?LtmJ2$fB`$Y9D5LCoKYR3XZ&n)>0Fz0L>(`&exR{uQdW_7yM)jgm zD9pyl35rHJ=ybQbtJ^37np}|FtmEs(%d+gg&vT*Wq*c5CXz|7~Fn*yV4*yYDtvM-| zJ|GCboIb@|rYk^v$T2#)lwuq`s8_H$kf4uLIbW8x9WxwORf=-cmxGQ|^FN2r9VW%* z5N(UIeupZ9|9={z*c@6#0ppBY&Xblhq5&laOOh0F>Lm=ni3$QYIkoNs>DSyk>WbSoc=3*W|TNSEU%9~=0T)vnG z%BN63rUV=qnhO9ALUG%NrOR&IdR-Z6l2Q02xP~S#V7Yq28(nif4IESE1ikOGslF(6 zv!AD%*D(c;WBOF#q44F-q3}7?=hXb7xXT$U$*{@sXyuF%6-Gmarc__9A}V==QteB8 zE``(F`XSIwPX1h3#Fe4>q%kaPsQb$C5N6Y%QmW-GPCgazfs$-syo3VH@c{aq9Vn>* zqj&pUQ{^Dx76KCc7ET5#c!t#FVKo0U7d;mK9$pQUBWLk17IPfz&oJLV0GbmDt_vz~ z*;MXNHOCo){S1!DOE>$;OEVIlj!M(@DaA2j}hA{7;?P?wOV$i;n#BU#}b{HZ>CIrtoh=Nw#f_2$wb$Q;U%MI7(t3|~%(b4TY@Ggp+AJGJf~{ic0T z&2`Tl479H~bhqR|I1HhNLY*Rmc7{VFwaVys?we$dw*#n56hSA~{lb8|tg*Hc5{<%8 zsu7Ap+w-K0+6}^}@Tl>KuNyDPyfJ_4W?w(eUpl(R^OmOsoGQBMV!F{1A{*ix|O$f8vH6jmy~ zI&Wj$1dMC&OTO~}E?o;W82>&+ml%2lv=rkxzL|&)82!Drj#Fh-~B^AUj`Q%1OXl#9EVaN+O~vn~f)s$J}J5w;wqjms}t zl@vw}-dqL!C=}Df()SSMW2oRAigyanDuOtto?N(A9iJh6kn+$uMCsB9|H@n#D0pto z_oe+f!8PclQ3at_QM0x|$H}?R+y96Sg#;TT#MmTH z2{i6md714*RHGy`M>kFIBl8FMu6EZJ*@c5HenAib$toJ*o`WWzsvEC_ZoCXV{cX_1 z8=7(_M2^+d;w;m}IwWbmEZ{JZDW%|!mHBcg9;?Dc83=u!YR8w0xfu_mIEL-T1kFlx z&?<_aH{{XfVdl@O3_mxm0^4eHh!5wxiZUR<6T?Gl4&{2|q`G72upWn1$0#f({f_m6 zD)L1m@cmeZ-W1iG2K4QgWr?b)u~;nJ)c|F=WDtbo)`Fx(d!419Sf2~7&~gW(XpAy@ ziLvA`Y-u74O1eW>a|J<%JLiw-*R2EXO9c~Bw>uaDaP20^?R&o?01oJI~A(of+#lJHOff4w|lVIwY&1M*n#~6)DyIFoT9$C+{YA)1U zEM{0#i`KhPRSTP!dLP<;G<)cBykt2z>V;a4bry}wemNU|ghn%KEXZJ7DZ&fepwCOl z(%t^;FGGo)tUIp8pvd1G8*`dvOQ7D|WzZ5?d2Q?*R(N9(4-AXXm_2Lk1X zA4h6gr0dL^L;hX3MyZ!Yy7>O`>1TEp!_h|yZu7VTqLcaE^*lopPD zV#m>9_@f352P@ZZ>>Y($q6z;kJW88`6GhzAlpnA{h<}Kw{f_au z*cefKOGkur__8TGpU*L!PB9vdu)Dj9wY4?-&hWqWjWz7=@7pr-YGE%2+*n_Cp6|NC zVo_l6L3w8gVBt+U?XU%T^4?pi4wXk;-Z8s&UDL10)e2 zH}U&0c-I2gHtz;bF~M*H3RgbFiw>^sOfg7K2y^{S!N=i4f>*+y1Q*CS(eE7NK;tEF z0wdpw;>Oe08BSo1j&jB*{GNLyYnZg==0qR1Sl?n}9`==+Lz0pf8=F4t%VWgRLTXOL z=A~{G_U>wQKNpH(Sz%DZg-)7WearQidzJ)!YTg2Iz90!%u8r7S<;Ix9D<=?h`2Z)( zIe|~x<%DX;mt!!+l$IF2hbkFdeYE}DF{1fmyoZ)|7Jt=x42-8>b92)^KlDpc8-!HtsJ4FW0x!*dDe|G5V1h=BjOmb#VB|751t3Qk!VKE6#mt z+@W0CoUn^A=a^vOo~8a%VZiZ?Rp$@)Z;qmt`##oI3P##qj)D>s`dl43e3JH`j^C>D zEY%Jo_>0k*)PJKa84rQ~Gs1j*eI3`XUBkh_0rvLxY+V;GUbNr7_@`gMV~;(CXWaHo zoIQJ!ofn_~+!yfl)0Z(GPjK65A2pO1U_RDFs9N z<W3++LPv9OwmmVsN8-YhCd-Ok79Wx z>vbp`Lxe6>fN~O5s#3}&M~AU7jP;ol$g8B-7{%s|gsT+3jo>z30{`cqjmNa>3zwjmaS9u20-p z9Y)}Cupd@gS;d;=#%RbKqVIC8v!(X@O|ZI~i#hcwX77WPpQ|&a%u8*CWrpBAw45m% zl2H@3Db1slF|&$c#nFFExTl0S#nURd=TeGpV|7boC-JkCp%lXb{buOa{233z#>NKL z*EjG>zw|Hh;DZn15C8DPxc~n9@DKjM591ZDcm;01{aJYLd;b~!@DKk0Kl3v`hYJ@j z;O@Kc##g`WmH5=B{}{L4dI9sre5uVoUyyh zF|imE;mWd`XIySb@d+prC5wtnIhI_mLX@lR=in@5-AN2$s34-{Q*ENzY(v-0dU+dy zk0}!zJ>^d9n1U0dQyDKB+=VF;UZ~)aXf0%1Aq}PG6onyo4yEc3VM!^ay0@O&hdu09 zN_fU_87q_8=*ZQ{DFi7T(_335KC)Df6-xc1peq?~k+GBci+1lcRWZvM9_Kz3#b( z0Eo*P0NHIGPAra4QW|xRmK_s-98%i+x@h7RBabqGf2!B~qdkuCQhuYCaqbzvq(#E?i%;_0rkE0e!wXr5V1Ctnogd+(T zsq)--$m7^BlqNn#$lxWIB)GU|ZeGQN8D)ksJV-D}{pDcc>h6E5tuV1sO9^hIO^Ohh z*ihw_)=A$<%2xwZ@?>+&Q~B@!P)b+i>R08T`!8{tV``d3%b1w%_(K!sk-5D10~KDqsucj>L*7 zhrx$Qv^FCaVfe1L_h97pN@7S|eQ}{JGn~96X~nrhi^EauyZ=pZ_FDyBrZwSrpl3Cg zXPP6Us2x+*s@tL4T`d|P_oGN(jyh?|WqOhzmS~e3Q(9k6eo28!D@tJV>85_eY!#Ew zC+Wx@4G@(>n^JgRNl{)-%HG~;qN)1UwN}mYD*6_8uXuCxnc)STpl^Q{b$9!0P_1r) zxk#2S%lA+RI*o6?k@uQE((8=o!uOyB#C{hprt^k2hdp=i5KpI)qQfmGdEzWsH=N)?J{Zs_ln~b8zn5O}KRFG8WYw=g;4aKl-CTvfs?I z!b1-|i2LrnAK&-Ae-D58FZ~tkN%+~H{W-kxjo*Nu`l+A7XFmHW{MP&5hi~|Xzl4K> zS!oJP&7>3+!<1^}t}b;qStx5r*+9C|Ou8_m7tI&*oqM z=hu#F8+BE?Ks2UJ3xm6)&B9~Op0j@tVGM;w4<7hDrrz$a)Hl;SX_o$(av@I5m>T!G`7<#9!f)Z95qRGE zrhg%SPbnUn9Ea`TUGB&781?&9SIwAK%Vk3P@!!0XV){CnOt80mfE(9$Fe<0`;ur44 z_KgDz(`+`!pZv+EapL%K?C4tCmroW2MfBuVj_OtKASN{2z;1B-mA7XQJ zqZd`tw-M44r--KJC6`8FB@)wjT4SDjNV1lx)sd58Fo7^>&ayg88e%!-2#cZ2JxsCw z(r<_DcUZr4*SSwQzlw38>3VoMT_%@Xoyot&@3^S-{uIId*{Z}$Egp?hYZe~Bj<3)jT5Kj zP&_Ijz5*A*+U0L9%4wFn&?r0RSrz=zve+0f+%VAn^AtVc9T8<;+Sl-xs1Pq4jrv!H@rTRf9q?EL~Oojg?8f@MJ8o@!b5K{A+9b&7b)qz@@c3aC_GN4zN3hQo!|tlSdL= zNXmfJKG%1ufSCU8?(RUtDN2UkpL*&Eyzqrzffv2#MfTn9?hUBogf)P^`J4VH>p3+_ z!C&|bUyE=2#=q>0rFxFN>AwB#y#}4q<4=vFa+tU5 zT}i=}f;Cn?M=0hhuBq{-4BA@!WznpUYiw?9w)yIMVPn)Q#_b*xED|g+D{>W~DGBnN z`6uxTNw~&fjNIwe|2&6C_Y z)WHB;zrKgftu2%zWfkP@?He{Y(s(k$q*;cks~S5yH`>t2CT_yL_x`C>piP;bogF;y zc`v}$)|OSK{eBJe+j!ZG=cz185he-0oubhxH={5U)v$UKyQ|K1qK)0$g<6(&j6#?Y zl7LBR&Yb2*J1QX|tTTrJhUNT?T1r@&;Ft!t6PN3k)Mq*lbTV;5J2rWxK6CG53{b?U z(j-=z;e#?u~KLU><#-MhF%>7sYEE~Yr;;w1bX7EuUq0j2FU@66FpRW;wbTiPVpVuB|8 z9b0>)bP}^NQqM6wE%6Yoo8zmsyQHaf`%8>9^`$R;2|xYQKW&+wVVF4QhSbKZAssJ``n!wDgK{2t->u6(RMgKF44u%{z}S( zhbw$%XxxNYHUj+AsnfV}<+A;5qAMDDUt62n{SF3xdas4~?KgCqcV<7w%{SkSM;>{^ zhHo~W1be5$+8VB1JHT{0YGqZJa(F+*MejDpm;h2fP}0(1#W#+m0HV)BClb{Zxg=?V z(u9zhUy6`oaHskc8$3ETVP8UGmk3#69AW(-E^-+PKfz)`XL-UJ1>vCBg;97X3x#W! zFJpVHKzYk^u(w@dvMB6P#|m?d$7|T1Z)368$6C4GGrE_o5DLDP$Na{|l+}_$Bi$JI zZ?p_EKB~F@z4`4o9nnM;Z;qB@@WuL+ntN0rg|vn!9mM#6Mo}uvXH~--*YNhYzuhVa zh6#oj(QtE@d*+ojS@BEZE?0OQCh2D5AcwP<5azz8^2gE;MPevUI3<94NBNOrZt{rYtqSn2rjlpTSH6DEEKAgXBD^Ratez1>nJd$aHMt*Cb)02G_ zfsj+Cuh4}NJ^T6u9Y4uZ;grU(t(YRd3jDDYYpXX#$_qua8POc?G8WY-eDC*uFNz`> zw=EYEbjwR&>MO8AZVz2Pk&=3!3y)^XQTQ|iJD0dNC~T?rV*TOj=K3t*{eNWQ#ypn} zxbcuuj&fB8bGEkgz$~kof8G1^80qFjjsN!KlTSDW0=2ykdNE(H5e!yQB74UikzgX4 zJ?*GkfDbDaS4~6Pm8^D2BbOL-ZaOUU<=T&FvS8XAq6NqDMB!{U685HHh-*RF7>}nY zDurt|c5wc=cR`oy`0jWAEdJd+_uy6>$B%#K_uzm2n_r9F>NE}xZeV?Vin1!jP{ymI zRh5DzB~CZqfQ-m-L)r-Ym_viBDCV3OO7dFd(2!*DqwyS#n%(20QQ2HTW3I*Z476j0 z5)MY-#og!K{UYDa_5yrr^Ha#EZX|*i3I?0L6MmhW951Jse`^OeUCho z)EfgSFH@%pOqR0=cnK8>OLIbN-QloN)Tu`y<`L=M^U4`lHtd&b;yM;2;8D!*>?*65 zb+m?*y5LxS!5)TV?%ug$z4Q63_12na8#)YZZ9u>zKpkE4%PS>TX9#G2tc!aWZW=&K06qj2M`svJ-yfSW`^ z+KCC4n5SS+TP<_oKXRT5lewPHFo(vmQ(IUs*YV!}{4xC22R@7wn|}@u-v0%B=)Zl| zDhRinJBO>=S23HJ=yfHO9uf(mIXZ?oT@6Xx{9t)mkZ0&5O(_J@cyix3fjvagkm^l6 zbN%fHgZ~IRn%>@-~ zu5I0A%~Da2w_i{kZx=6vOD_5%6{Ib^Uf2eTSW8#ooG|bF(qRWM!U@{*_=O%WQ%}&Z z5LYxseJZ*MILOfvy7#?)dRW-NT+8DaJ{u*VC(oKbgjV-5{YS!Qi_vyFSVX(Or8D8rp5rTzxYuO|1ukLw2uX zb394dgTP(nk)@sa^2}uc-P7IST5xF28Nvi4b})`4TEFnZ3{00$)=cz750KLFf* zGqAh8gK}+ZV=^N zu}kn%R~~IgQpns(9q7n%(y9*XM|Vd;Py22*2->J~Ma$?7VPmua7A3ZK7ueg}#*U4s zT;bBC$1pj2C%*K^qj=<@$8h`k<51%XMw=tld+weFx+f+S#(nzp^L4qO5*{h-O2TuA zHdJRhiu1$sE!|nA%lms|p-h!lN{5^h5yDJ=#}s)^flbkLxapOH&%bxdKtmJ8n@}|& zm|L9I1jnI3?OTbVvJkfGV5wWd3af+$iiK5Ht45&{HUl^Cc`Lnc+ATuG$KB-9(Ti6V zmFfg^&wJrX#rLuM7eRm8@ov2Ve!e-LtO6lqm83wpn7m=0p0el1GiWbVI`ZW@&rdg54K4UFsDk$)9fYB(TRhjUPwrhE^rPcb{rRE0e_Q2+r~6)C z1X~Fxz!O{HeOzsM86N&LM~j1mt2b76 zEOB+NqQppWg=JzM2>RU}!-EsV(e}Ct=0e1(W=m_3Uw3P0+QhXt0Yr*1Muj>4a|0XW zO<-K&$8h8?@Q z?&d|3BvkJL9WZ0YmJ-G@_B|JVS_jRWq9NTJYvYs}pWidWcIS3gx8FKt&R?q5gUWdc z;O^~EJ_L8+{Z|yjTAlU&bUOttr5;u$#@}mu&`~luY3a?zIuHX%jt8Dtby>lg*DOTBRZIAT{HyLuFBz_9=cyzlqz1mn!nd9BISaPjcDq z7@iC5iq%kFpfrPTzMEhjxw_tB3BhUTw1lBq2-1sHcOU*u)NZ< zm|LwrIEQSb9R_WgO*O5P)lCW$cDI0WshM2}X31cJ+0%~$+XukeQ_xqgVt%lVgZU0H z9%1*!HH^+|px)b$%3j)s7`jrp97+cvxpv=|t#(?^5L)G|7w(ykZ|IHSzU8z}zonE= z3OoIm@4s$b%N?AK&**j&mbZd6^pfDIgCnEEg zze_pdJSrz~f`90JEx9S&AJWm?u)SQliHix+Q*_!Z@Q1gPQkd9CiecgQUBr6K^&s@> zZUlxSbFY2Zc4LY;@?mz5wi=_YzJ_0~l{)Bmb~=kJaN`NCu@J8CyTs@YJJ1|6UquO# zEIIm)mf@5pE*3;cFt!|uBo5oMf$P_;uobPwYZ<2Uw~$qK4??9EHiB5Ws4*TZ>|>5k zed=T8{2Oq53;Mo$ap$@7xc%HSfP)If<_OpK_OWHW2P$-pCbWPy@h-sj>k(~C)dM_g zl>Wpy806=E({DL>=$K0V2cE;k~IX&bmJf@2@#CcJ3R@&y0@AOJ~3K~!)jgpCS#PSFT)7s6$J zhxY=|arDozU~b|2*s>9)w9@i)OgVVM6!u#xn|c?cr^6(!u2h|L4uwg&8-$K2_g$Kg zTuRMtnhKhUb|NKsT1{SPxYck2B2?`$jmF()gu1F57g^JGUD#{5i)NdG^{(j104Nth zZ^?y|X*q`4HSK$DN-<|z=aBj-bD;3X`alIf2OrmGAI7J1B%~*TYLqk8tOuHLHJ$>$ zpTyj?V0Ujf8>q%+qv6Dy-95m@$xVFr{!in#fA2p6x4s-BbqaXue!T1z=kVOG+`yGf z7j1x@Np*m+xi4S&$c?(a%t_vL>~~eKre$+!7=6T-u6QdN$?>CgP(j4KkM&8ai-Sih z%h6v>ot_zn0+KRDFHETb*Fm&CS|${NVK5pBYY3ySi&HYfaK2odk{}3`lu-DiQ50wy zs&G*+NBB&Y4*%W5s>yZG^d0S|bft1QX411X&fJ*C(keon;_lBPts*lhZifnVZl1*i zz0`IJ=IGs_d7Vvc#$uHK(m*Z04s#!Qv&m`$#7I@C=(wF3l$tve|vSK?NCwHILVg)idNnF;>#x4g#IS4>Nc z4r-j3Y+_#5y$xL47%jt=PB8%;!|7oXohMWo%t=ETl%%*y%#I4t7*phEjcdp6*!KS# zVsrocyj?zDb~2t=rPXcBD%*>2Ou5j*5JqG4b%eL}`LbZV2y{HcZypxvc?&noh3)z> z{w7MZDbqyKLvV>tSPxYcB*RTL`#3!8{%G8EI<*)4XmVEpRWd?+_CQ8q6≧3QX; z*5(P(5u*!|V)iuHovQZy=ZFMbvU@w5oAsNGJmMhrkI!*~86ze{7%W9xtbd11lu7rK zZvP~hbh}|HZ3W8h#QVh&X)nLa>DgTOY(gxXwRR^+ z9i5NIPFQ-uW$G|x%29#IWNgd%_eSWNvPJ+KVd;giIVEG>nSeCroe4-|>hsqRyQPlG z*5$2cQ;&81SGE1~ZTNaz9i7r)>J5c`D1>#bTUWnn)0FeKRhsa)UU6_s0ky3w6y~82 z^}ow<)LxCfSX6et`)jgI8|LyW&jZ}MMZ4r>g6hTJOSJ0@Zh2tj@ucV4V zN(qqYDM#4lz{S-&G{uw(4rXayOE61)jqz|#BXntQNdKg~9@c`s;0N7F9Ubh@<%Dyr zb6!I=glN16Rke?znq#e=qSzfl?mX+uZMQ^xjviC zS3XKx2xDw~C_MJJxoAl9!9{xg)%YjjT6u?_kF+BblqdcXqe!^|odnnA`8{#=`>ko%wEe zF*Q8J5P%WfUKma$Q&fuzySv+%S95F~+p_uh5B4oPGkJ}0HW%oaQw&DwuyhL(FMr}L z`BJVuQ_jS`FGr=lh4R4Eff};|ckS-lblTobX#}vpVbAZM^+@Vdr|?#0>DfqN?V0jx4H$#n1Z2 z6pO`y#ryWo4NRwNF7n>|z<`mAD0-92aDIHP; zDmJHMw8`=Eq23FhKXy44$4@}!8&$68dsDWJlX&whz7pU1b$8>~d>`fB9q^X0{i11C?OX|J)}zOiius=3%kDQEQ?ce+sm zjNpT{zKswx-bpjo8pn=r*~@FLTz(q!`2nWuYgTwp%$}EOj`?hk&CN}$P24rPMhP(O z9nAKfk`1?i#wanjTsVgt+t+NpM);b#N0X7wXN+#6)VMWJZ50TkU>Jp9zL??4)k}8H zJo)q!s9*$th0V<=_7C>3x3^<2Dw{73tZ+70UHd+pf3ID?is^KM@u;+LnP_}FyEmXp zcU<`R@h#gY^X}kaW|a|xkLh#+JKHYIGZwJRuY+-MI7u(y{Fr7NZWnRsi zeiT+Q@Ye;$1f)cJnyiJ#=r=Wga=i{i6$(kfQe`GKzohzyCaUDnKdJs4C1{B8BYiJG zn2?B|#ykv}PfE~)OgY>jQ&$zn(=}9Ofh#wzpcuRLYO{7WpDm#D7^uxHenu&%QPc}e zbcIsbeXi6p!Q>Dh*Vh;Ugndt0O<^0HwGW2*_q4@?CA+Knfw=O`wezV1EaCy};F4P@B`ofR!pp-v5x(@wieO)dI?m!P{zWd%79u9lPl3>YNF75v5CuIvc-?~ z@gK14i5aS>aaKnRcCIWP|CEr=Rc1JxO3#KT?CXvZu{NIKj%Pmy?|ILA z@Qr`z4S3z_UxQ!%<$r;5H(kKht5>l$U9-!Q#)ZDSyJP8mXLlFJjvu$n1Le5D#?};z zYGy5KV;x_)dfDbXapEK{Uc6|R2+ZC3mo8nl!((obG)l&3G{*XL-F`Q2f1`vL*Su+W zV`JSa52lRCWAYw9ehl~De?Kl=x`gp~gz0o0`}@0?&G+qPImQEE{xyn$`FDT+0N1Wv z$8ERXhRuyl9L#2T^x{RUW7$%$YMdckUcE);Fy3VDNt9#&)xu;Jm?R9M(6dm~Kq) z@WT(gZ@uUQ%VRB#FQuIrZRF5V?=K(MTXkte1?%%-f{5m#{Z9%IM>Z-)3G?R4=&=Y5knqUxm4yBwG z>O@c7{F{c?A}!HB=}!{)IVomk<`Iq)_@d^Xs3O+J>V&M@qo%HKr!b;NSSHwvYEI@B z)>^bQP$}ryHa3q{_TGi3clUAT>;+rqr~j{C#r1=eSl@gOHm+X*9{v#i=3jX!UirK! z)+YzJdf71Ab(}hL9{c+m`wO5PZ!r4{G<$?GW`)p+MU}vz9u^xghuxt(tgh5Jy?7k#D8zqNJDu8lwV z$OG0Df9|GRaMRiIxcS_9Tzu>y8^`{pGv{%zKga&=ffbDAhR9>bj@duc#%;IViuLK1 zT?R0B>ECqIO?c>`hwy#h_kDQ$@yD&jeQfIl#-p)SK<@q0{kZ$NFTj&eK8Y`W@lP#` z)nb9^WCM$ZwpZ&u@9yW@B@J^Yzk%`O$x~RHY~ae3t5{z@hK-FaY;9~|V{-!+Zn+JY zE?u?xjdgB>_Jv!XVfPalMPXz8xMjyifjM>ZENZYA}&X581odJq^#7Tb4aRl)s#|Nxpzk)_qe)ZN;I8AIR>uuKGr5@tj5NO z4V1)YR!v;*&{48()eL{dv3OiC#?Y)YsMt)E(Nimc`5Cf&p(ST3WR4VtU1=SBP2 z93#{u{7SD(@{CO|aPA#>UzRo9oAM@$oA-bNUQ!-q^yo|H}LDf#3fW zrZ4>KC@(w@+wXr5zV#bli68vCe-YOYD%9IovDkMT&=%7IrP7$Lxs7Q4NTq9Si~3=rv!G2KzFwSf@Qf}OJ~S?1h6BMK4Ul;N{_Mp9OHGn`e9xFMj0>yb8T%M zzw#^pkF{uj=m&q;tnOpB?=~6!w~v3=TER|W0iXZ;=P@eBmXG}Y@BcndoZP~9e#hU% z@BQBI;=uovINo_~)oeBlfD z_HX}oeEj2ogwKBVv$*fRd-0BUd=JW^#_#;jZ{u^H{~TWM{1@Q0U;p*E=eK_cAOHBr z@!}V~7%zL-%kYKIe-Y1r{_}D2#3}rnfBSyib=RF%Vfl^U_%(d~^IyQ<`de?uZ~o@L z#+SbIr#O4|CcNoQZ^ni57x3W2588MkciwR~e(l$O60>Kdh4yX;@r7Y zc<{jo>{5y8&(Ht-&s%|i#~shc!;d_Kzxw94;KGGlvA?^A_rL$&;MK2wEk5~)|9}S` zxF6TAU$=GbZ13S;{)=C>O4?ITJ=GgKE>X)IJ-Y8(vbj7}`b|^VUJl*nDAX~ya?8;= zK=?iPeKkWeFVS{6?}-FQ&x4R-J@vGlP(#uEdJujKn1f;LPhWZ(w?Fev-2Lnq;8TC{ z$GG|2O;{U`vA0v9z@}Xb(>Snu6U=JEfz~)sYtY47>$(j@L)UKLZqG^7(&GjvM~jXj zxy1#7fBPPKh8Q~Qocjx5qY0iX@7rhbXv%VVJpZQ%(rZc?duYNs_ zDPa5Q2e2qLPMy6Kr%zu%HMgn}#^nNaHR~ye09x0m_p)%4G4vX63N58w3IDW?emQ0x zkSK<*czX|c zNvbM;{Clga^ULqeo0&J6ftevFQGuU|FbL*VG4tCstZM|>U|!e1{ubA?>Z<6P1pyHk zbxr7sq6i9%sDOka!!YsX*s;R>f6lp8)z#Ivs{6gcy?ln(U0qc--*e9Qq!+&M`B+$( z#l-kH?!5C(Z+@l@DtiV%m%fWm+!kIeh%k6>l{4z;Dh+npZh-92`b2SHxwPUdodF z?|0pXx4h+TIP%D&7=5_^{s-{RcfOldBlJ#Uq!#BFS(Wk2U;Z4|Uw=KOr>2q3=J*<^ zWvI=Bf?Rjqb<7x$EyLHo_BB@9KIutM#>Ds(Zo274WUT@&x#aVBe9wM7{@7#Kwd+=# zamE>pxcu>te^jc8q2WXXGdj0XPY2!FL}a~pTjFc48#FX+&2?J4DQOtq>ztod^oe5X0U?MzejKE31~yesfTQ2E7W=#ii!5>XX{9+iN8N@{afIk8}Q~gpO5p-JPOtM z1IStp7-kk#+eD>qaiC^ue?!`Eb()sId!Y**Tl_a&6u&g+O;<$BI5bjAi+7DqvW`n% zIw&wsfIAW4w03qHn{H46nV_BvervHiibOjk!#Er700dizkTmyt1xIOgbM*>+*Wh7I`UH?PEzTX$g3OKe9a_WOLuXz06$f z+<7+s_HX|VuX@$__}Irkitm2!JD8iB#RV6<9j|!BtMJ7y{wEXPZ-4vSxa+RFaOIU( zvFh}md+))+4?m25_=kVO#*Lfs;DZma>fwFwdq1{q+s0~@z_qi~)59t`VrmG{IRE_r zi%Tx~9403x@ZR^n7mq&r2)^=_ui%%z{3W(;KbqA6AO7&gIPbjk@Y>hC79aokCvg1n zC$Ldu;5tc!e(Tn)jEc~2ANtV0vf<+EUiW%jamAH<&)&WJF)+}N%Pzl^RTfkS{r%`i zKgu2@uR8ygn4X@}uCKH;r@J1N?zMtbg6F_Wh+{WvU)P_cvq882gYWTp8EN;%+ZL@; z7g}4lpLBiI33&1M#Ov3MYkb_I_q5p{=p?9?2MvvtbW1wzcGnY?1Vs%fF$z7U9xRj> zuxaxuR5L}q<{#gM-`)Rv3=IxpNzB6#H3-{7u3A8@J_N(=g-1Tle%edHL_jFwNLIx{ zB~y_RYxcmHPJ~U2pY(nFv}$0ZY#rXU2Wr?g7_qDwxo>|ox`LJ8{Z?+_o`82sE1n*wF^bUOHv!6vzX@ETwh*(=@ zjy+m(*#h#p62FsU4vKnVf->PC60a`ObHEKHmD)w_hXWBM*xX#+|k8VO;`_hmFba`lYYM)MuTh1Y@ z8;>L=BQ6;Qj6%bGu=u!AKR?m9Yvlvw%BS`Ak^Pm5GRxeOp#F*TA>&>|9t~>F- z1NX79CaD9+7?KJ-ON`S|M;*m|IQH0Mv3BiRW?rZqwRIcrx%)2s>Gs?3tLtyT-0Te3 zPxcUmIQ-xTKg6CrkMlTFe@GxBRDqZrYRBtd_Zoh8p-^I%QnFbf24wyE^*HIIlh}TN z+D(YdUntK}xE_KMS9x_JYH8=@N*M8O)_)qh&+ZYnW*ChY9OvEkk`Gr3i9-y85g}I9Y8`n?qAaUew{|_M z8&1ZLzx-3&bn6{B?d0Qe^p?$Nlo#PH)`2WATYVhTXfUTO4L=YL%aaC73C;oN1?e{h zd_*BIs*Dp!BSZ+gu~i5pc0?9HXa`{^W}`VtvF8xUb)HaFkO-;0-tIZ{=JjA6{8Y6q zH?=YsX^SRc3<4WK(Yz9{0WhSckOe_$n}y1mAzW1LI{JG0II+_F#D1(^wFVFFIe_ik z*W!z4Kx>CA~Bo_Xe(%HO_T zXGt$9gl*bh?554#-jjqbq+LrxC*o31^f^{N39wH;>Cj2KEiWzM%rnpCvH18WKF&se zWG6rjz^h;V*K92K^Pm5mjpm4Go_+S&tg76yWizWQ*j>`|*q-2NPkSa??*Hq*UW{G4 ze$PbnoO8~_{{4^h{o9V(fr*JjD3ywgGLSLj;^HEn^PFd6W_DTy9FhW;Uw%0gN-{9q zdG=10z7HJO&+3SiPd+=#)!0lecK@4{EV`W0M%{Vy0@Qbw zsInj1Mn+JXnnR9Y(=7Rk6N6BKA#;FmU}u-qd^lEUSJ9l4bU)&@aXAdD|2QlsLK_4X zkuM0ZTP*Z2VffUiKE=jsANtUTcwZ5-K(1&}UA=CjcO&WR+69etb2wv=rhd_7E{sc5 z0fRtHT&+=I!GT=%RPF$9o`vDz(V*p!(qXBcjP=Ny0KQ6ZYH|X-efuiwb`li?vD5yu>T9EWM1o|?qi*aklYah;=UW^*~VW1v0^4Gpo; z;J3c@ZG7{am;0!Lz@bC?v2NW4X7p~mZ5Ov`+qNAXp^%U?I@8MKDvmmGI~Eq_*>;LN z0?5XKifI^(Vyqk6fTeO7((~9m#pw+I03ZNKL_t)okeCkgVrVpM+<*UWY}v8}{r!XC z7%wd?@cJMIfz}YYRMK|){d>m;^HjIA9oeC=*p#$L z+)}ouI}Z9L!- zB@R@#V%?LUi$+aga^lZGc`x4o?ziEBmmQ1hl8u~G!`8k*$chCoE8toN4A-A0in_>Z z1rKnuj9h6mH^w|J+I|*##wa?!@${-`>WARj=JSZGtDwHt{Sn{5Ne5#$DutwjG)+B~ zba-?+IO2OhdT>SWjgK1EgZHtEA_(#8D`+{17`5#ma@%AN#- z0+1UYJxk04ogsC*ilO0QMiq*M5+i2SS{*|}!FuO?}IJl3W8yFm5 zBSd1(XrGL%8p7hz9M?x}p}NWSl6CM>*&9#@;(Q^GJMQ=s8yu1=CG~lFW}MqYNI;`e z$EHmiaLcVXG4UpyKH2FIv8EtRROgXL9f^s_L;Rg||I^ds%v?Bj4O3H-7+E#U9$W_w z?&UR1Oc9|d#H6SIPt!b>MBph3BL{J^8>mzkF*9qTP|LH5gF;jj^L6mxKAsD5siYVP zG`6HdAe#+pBOwH?*FddaVHZ zATE{bRC>C4b=Nx;9Wx?j;65%Ag~*oF=)S=-BB{c|`Xv(k5^uZi?9=t3%?2Spkm2A5 zP_wB)9m?ALYI>Y~OqN$=G%FD-|+ zkD%!436nUryb$r=21b}mQ+b0>x-1?`saPSGl}0oUeUL^8o|&WIv2cY8D`&tptEiYB zjy!4yHmu%=Ywno9g%@9ggNqxGJK`*i+X4$S6Idhm<7@x+TD<*bC!oCKaHKe4)OmhA zw~VZz3?2!c05VD@7d3cBBVvrG+fdzk9waeeD=G1{BO_~}QyW%Nf6@UJM%NQrX`^XTiRz)E=zgRBx!sSwgsH?@rz3?6Gw zavR9ogT}B{Z(z;XTJ-kzFw>*l9rLVGAoaw^su3(MEiq$2%+ZDo>zNTLmzS79B6m}h zgU(2v3mR_~c*$wmU(vOaUi|YkV&E-()f4)>^R`A>-0nvA_G`n}cI-19$sA)V6w z*V?XTJJi2e`!vxcWsFt?ZA@xwVmqSGLi*vY_4~NF&(vO{fMUVEBL*%=EEYHd=px*v z(VR}jir$>WaYz}syCuQ#?Irl#^AJK=L8q&<5c4?{`qw}#&Z1baU~aMoIXZxkz2jw= z&)E3=mwtwK{Ntyv>(+Ddp|_liqmSAK=iz-A^lGRK^<#ojIvjSfDIuFEZqtO9u7et1gj+!=Vi3nGjcA7P)!kdE6_k&5gPvy1L-yDmgzN#phIq;5f267Nw(jhdOSv10F&%J*$q=& zvvV%Hl2XcTR^!Mlq-&}KOfrkCRfi!RINlOW!$ohQ7f!{5mj#O1UR?UK8}QZ-d>qA9 z=b-P17hz^;2AH@5BjP@M{?l*6OHSB|+4%R!>3-7yX76S1_r z@sjqA;9A_OIo_9~67*3gS#%@S#rqKtvrga1NUvNeV|?Nus{%5a9HR;J`}EYTZ;U4y zN~a`4nXCa(^Zd-O1`|3WfQ5XCBPWiMjmtw1aOA;!VLKKV=h^6Pc5c>BR8-(R1A!E# z+$S55f|4nLiJ|M|895-=LyCGx_EKaEFf%v9jL7KdYIboXRDqy(3i32GJjfmxD&dl{ zgHULx%ZSLPjhmPeay>W9l(=@y8uaz{VR5kx=^A{U;)Mhuq}3Rk%peeBQK>GeD2t^W z6aP|a2s5*@9A6}ec1Z4uq&6UeziQP83Wa=_aZ=@kkQf>sU?zsH&CSlSks>iobgmHt zv9K`DZKiuDG9xiIrqLwoYC?l!Px?r00&$W0uYvR%U5CN>1kL%_V)LtceG6(GB#P@m z@0x7^+!jPH(#H7SkG~_j-=b<-v?H|IHbfC?DVo<3RHH=no8j#}xSrrO1y);GJcgv6 zB5##U*5dP$);cFX?7}uE`dg5iJbK-VKA?kLS`UjZMxcF2!qljUx44A$o7aot6)#NV!2i|>E*8vNIl*JIDEcj5~ldNEGkc`B-lRm_d=Lr>1YP`(dy zOH~vz1Dq*vLDaBhx+r8Vz8g#&ImUt%ig5CG zPq{^@H!-RZ^wZER5vCP>e1_<+BJz9lZ;VUPEO_Z9L&S0TyybgDO&{!aPpGyTJ}U18 zu_b)36e*Rfl*i_vg6$<-SMs5qEjp;p%@CY}fl>id*x2*f-6-{pV$JY2eEr*3;P3vw zFQVtzzryI|XX4=p?gj4t4K|;+5kL6qCvg0ziJARnl=|{;`&1TA#Z5+tb~rJiYDV>r6IX7=-u)$i1bWqXcA>k(6SHNQyEmjF$Jug`D;}TIqk##ufxY zX!M8S&3-VXc<16pceuq1bMth~T|y<_gF2;pHAgY*)iE=(54lw(eB~8q;whuU_{zUs zhCkf*5MKP&FW@C_n!!b{KNCl8*@UU-3Ap>~SUi(4GAh(>oL0_Vah1_YZq8W*E1`J}+5qKwpyEgbJdyMjTX zJQWwc`dnrXYKO`&r>9U^6v(Wzc;S--N3g0IGhzgMCO||9xnyq%g%+4$T#29`91=V> zc1e&qpl7Dy_oYeBdS=at<%IBAmt}hyVMEC;4EI7xBAa2~SB^;-r!Bs3#<+6Ef z+O*Zb-{rkVM6bVZh`$rGPR4??<0-nQ3{+|U-1X-Qd@mXA4f!xU-AC(`+Cm|sO+TzS zwTo;QR<9Z3c5`sJUQ5{+8EXF7-eUb=*nUF=6Y$E zxdC%72Z!6$-!~YU70D&-z}0!xeYsO8AmCW|};La}?8ID1|roHzxeG&iPl+KaC?15Kkt zgEj9mh_Nr4ECegeNk=Z)Q&G2!WBBG41Ay@V+Cy8!?{6=PTW&W>j1xaTjJzNewYtw0 ztqYWp1kdMEgY9g1)sS;#j+G8O7buunl=|1ATsJURu3>Ow45gktim>qh4}B8<@x>pZ zc;*EdUUMYwy=NCN{RqxDZ96W0!*g)VSPAp{9!4%#LTGqaG5GQ(wbPI`fQ zM<{QA7|R)&PDJ|*f0OA5nQpVjnc-eX5XGeTCY2Th0TJl3O&`g=?xJmpOaEXtL;}njjmi|L8OS;y z15{8!M%w7-SO7L^Mix$^idAdZpt5)f6Z;;;%TIk0)_!#dUi!`7Vfym_#=SS*hktzF zAa1_)k9gnfUx4FJ-h#f$0_K*=DCDv*MU^{MURXrYTCE}^7#_EeH;5&eQ#Q?DNsWtvV3zrx|a?L}q6FL*VB}A_}ZFH!NYgl2zSr@xZuK<;zMsf8yRB}(|hkj-nL=(^kX5Dg*iF^X*XaZ>oW&l$oRlF ziWEwbT}m)jLR)DunW<&t!T=gyt%@~46)wYzoc7_#_zMQB10O_2VD^Ic5shXU zAD3V(vc3u<`did^H26)~i$%S1ppldH^Ph+wJki8GD%~7rJxS+7v?T4#!|hi$s9ww7 z@z)K_7ljL_Fx|vh=aECTR%V+Pb__^(XE(x2w6xeDbk*VbgmeI7cp)-TYEA%wdWL5q zW4bDQu5CirOURIMp*4xRvxL!A!;ZJwpi<6GqhTmOqCO*Hp7vK8i7cpDS;Agko zk3atLLA>Ej&&TUu{xqx^U5oL#Lzo^vh=HCll*~c6jXI314Pm%S%GSWF9Qlvf2-k=C zq#{fPsBc45`j6g`P<+%wH=#{f zx2aMIm=w=vh+Lm|SyHJ+nsAs(gd{x0fOtZ}F|)8;7kN5RJ+f@}*q7XvWVp4Fb+Ny? z_Yqw4)GN1TlQr#}mMtAyQu`WdXrNATviydD?7=}h#};$Eu3>FMQcol7-| za&8tPXF%4-_>t5#ZrC>!146Y}F#`r0NyxxJDu^u+A1XGoY<0Vfj#bj!q#X>MHgD{S z0C4G8lG@YFVIf4i%3`Glgl@c&-nAUWr1@SIt{rR(P{Y#V5)*8){(sSnUW5})I0=nL zt&L$0)@T&|ZDl~3jI&Pa(=mWa44VF$+Osmomp1#>uF8qNBPzAG-qQq}rLSs;hHZ~C z5J8C>l*Lh#cw3^3NgP>-kB5k$hWfHHBAhhFx}sw=TCcTo2#3ocblZ-W=SXd9_*5cn zPGG|jX>+hH6VxxAgp&B42Qze8Tye!WIlvV&l&0VarR3Q&&_4ht#YSm4<6uPxL8KUP z1q_7rx`#)Fh=BL(Gauv_=g^59^l-c=-N1 zFtT!)qQmn;8vCv? zieHEwFtQyz2ne_?gmpM%O5xa?1E09J#7>By9E!3_Kg_gx&h%|090RbW3+4SOI4KLi z(^Jnf@8c*~pUf}Fqd_(#8@@QM4NFiE78^bNl;LhQ9-W%T=YRAQeCe}Sq2di<{b_%P z-k~u(R-VE9pMQkBH;&JL<-K_AX(wTJ(#Fhu9YekSXm~TIn+}k((N9gTdT(L^NqcmKc* znEOyY9ji0W=;+2&=lLOG0)^n9YhK{D$7e+|w~3*BuZ*bxS_!z{K16;GZB<&^9cM72 zpW|~CXDXrwt?_vgG4)OOTgV_Z39)P{AGPa3H|E_I9Rrd6e575=An-}+G(K1Haf?6C z!xKH{6PTt}`;17tWxG+iww?rrmW*pDo(3`5d`%k2S~-q{sZ?G1xlUq8bc`)@ZjOl( zi4RQ&$(j&Iya5xSIec5*72S-4BKU(#mh-MbhkaJL*?A^%nLHeutmP%_A~0h0B3qxv z{Zseh>~$yOcb|R_uKwBY@xd?NhAIYd`@TG0alw!9iZgD)d*Ap19J_r7$`gAbjSL4& zBCF3Va&TM^4U%Lb(V!@5GSKM(rVkU6ff2WzHop(O3(-Jc*pOZY!cm?J41SXlqoF6$)W(2&}AWE_|l3{E`h3L5m3@am643Q<)ygx7;5C%+BF$e)O=c>#V?AJpi z-t;{x2;y~pCMQEEiVHL(MX2OV6>uq2qv@c~@L)>;rzFrfunyIRhp+$SM*PR6|Al+* zxC@07pMygGaj4~nF!|_1s2|*gO>27b<@dY?&pz!W9B6pRxE_k70?Ndwm_>M^j*K8z zFN$knGB_ZG?<&M+mBEYwA9liQag_@D%iV1~n49abiHt-gG2Qys9T4$#94|?SSCf$o zPyUGBDfv)Ot2_Q%HwSN;wBM=di0ewwgJg+Ly{}$(IM5Hl-qP3G(`P~t=+J9tpuj3G zsXL5=nBX1S7iV%h&7;15qPYX5?VoGrB^1-S=oa znoJkckYGFlNXgt=-EMG&OQhTBa$qSvDV zlZZ}{OK^}SnOtRS)jEV3Fmj#W7cE+voo1w%w!jak@Whkb5D`{WP@W~^9os)kRXE@p zNf#vxjRplgDq^6g7mKyW&?ovKs}lWU9{>2lr()>DwfLuh|8FebJdFlU#+Bc@4?p|k zH}RkEeG$$(^T{X~i>NpHv2S7mS+kBla-niP_T%T=QKkXYQo23YX|Q!Q%c``|4A1xd z_x=CK>N!BV+3r9YH*%C|Go$95pNV=P2tUq2^uP%gQNW4D##RJ;rr{efMty&MMkJ8_ zfo7ttz$?K(6Xo$^2so5OLz=KiA4yCD+Z`Befo+)vTf;h(@4!_0^BQrW!b6rK8)pt+ zuy`DnJc$Pm%;FPY{wBWvgB!3|I0kt7yI}WNaK@)ledHGyJ@QF->ziMXH#~nER*&@J z(Y^DqayCq}iaPmvvq1y7Z4EP zhG-^9$-09jbx%md>D6Hsos^i=?oLE0ZC@wVlQvG>Fe|!ya=C0sqyyb*5I~7^?{R}U z^`YIkj*neWpO~x@kx5%4orq`J9O&MwWeVXz-#kBqs;2JvyL2d1H>DGk&`GLYPU$p; z%S9o&XK?f-?f%1kcUt?K3_?2NqGR%+_XH}U!0v?pR;pDFAeayKRpfnXYrGR}w}OX~ z7X0Bd2l|cSAHJT?ee=e*6{64g=TNPZu?59R$e>&y!<_XnP=rg7_!cKIpFePB;Tww;YA3sU;kkTENyLMlds7 zg>WTuS;2nT#Ep^fC~;v$8enprk^ym2o0!50lNy9Qp@_RMg-T&9Y?YUQ8H1+5W1vYF zzIq|fXNKbug&h%a5F(5}5RCvLWRR37AYRci^%NrDDl~+FK#n>sRL~*ULCtM2L*sag z5u<=a^t~<>u`O^qWfxhpE*_z}~>^1gVxo^a-T8ExuTy6%=q(81iC zn?Z=sT3>fxS{pps>a*U>;h)sMv^CL*U?dUh=$PwJ5q$~HfaLLC4wI%UI^xjjooQpy zNm}i+mZBxTUOGLO#+>QeleUICt-bDwqHAsKY`Tc0zCYeRnV_Z$yk-K=6k?Joeh49O zjJ#@ugyojRTnuS1j32Nf;@uEG*mR4I|GK`umU5O0g&uHxK&A&0mdL}E4Ten2JQ46w zNU?-^y@BDuJd8>M^AFz**|!$&e8H)(dk69B@BI$H+jS56*Byg9_s!v@Z~ia5?0FC2 z#HSvO7e4o?IC|3<9^NyLzMec5Y#Vi1!$1#3TFWSlV<};~5{6qx0X0Y~1II97%Pee^ z;D{m0-7!pmQ9Auf8!si@RySUlLk;*tOg z4fJFjHgcqhU&2!XrzlOc5ERBW3y+vC*YU$z`;1UD`d|d&Y~cnXuw8Re`piMXzDql( zbrN2D&FV_hp(i80^eZi$4%Z|^LD$c?0MPB>*R7Dy&B2p)5J!J&TGGcEy>?Wmd2mYK z>fUQ>a}vQ=&Ha3N#E08<)rUv1iTwWtD8Ezc_yh1-OTGs z=O_tD@N4m1up`$Z5}*Mi45=LF0;P=4nb%@et}Ai%Xz(}V$M^|6TN;fDpXt#mqw6KT zPx{hgq^KLLbQq!um#BNvVa%|hA-pbHLSzQFvLAsYHy(=(2`Q>6&VZnBQ47o=#3a&z`dK?-l zk19tWG}$wQDY79WY5@t?@S@?2)HwN_HYwRr015fg%2>V^mNMM*!)z*Wz;{oQ!GiQc zqbbg?7$KYVMq<1i-}0Jl4>FlN%8LtZW01=zCZWfou*Now;Vk-u$~<@Ty??-ue{wy( zfAgbw;I10h9QQN~JZT7X9C((;$VJY~z_g`mJ259hW$Pp4i1}?9aNVsTSs7|=3$D^`cMuv;#V#iuWZg<& zN$bBGg1Zt7P&6|D03ZNKL_t)JJ-UhGn>&pmiN7P>zqA7}PNdV&i#P+KV@~3dPV}CD z_y@lQ3_-l#@ph_nqLqyw};AuA7pmV$hW&OU>TzVdH}0d9f6O%{26$`Q#aze zn;*vI-@F;#>NTjZekQKjwFf`=^SAKSBd*13&OI7$dd&*~%TaO8D^(mgbO^#SF)%m? zj|``r0?cd?PMvHPY~(FMHNY{hrAtI#0+iZVc&Jm{Yr{lFD7`-sKTkGOf(SoRvOs_< zdOk5E{lDQG3oC;`HBM5gGdPvCU_Wd2rU=#}O+G(wv26tX!1)x&t`N$`fWCN^!Dd~q zX(B637_I}i(clDDxl$fI#R7-wq}==u9(oK{TyqC*xcxrdKUv1y-dSMP8OWTm1Fk9I zmM4MnThU+NhnJkc6YqHa3vk@}QS3W7g&C)gVL@@_voMBw;o5b;t-`YfBM2EQ2h%f9 z7j;%K5Gv%L&V8^bzXLM|Zs@w$%9#g}q#0RX&2-r6LU#~j(kAJ2sH8K=2?t?YHR*|v z;&sP~ZT!BZekC0sx>T|8cP;k-?Q{^Q2^s*KKxDrG5thDjU3?CrzsZmp_ATurLIt0R z;XTbd<8fS)##dM3*(r5|Ith*Hv{qsx*oKsZ&qfGOQXOebZhSp-A`acIgZSs=5TR}e zRJV+Kw{>({2Wj<0$GLqxga2vnh0yHZz$Pp}MWdpen>v5-HUuT^dBe=D8!+4YaZK8? z@j8Rj7AOhOa3*Mm<&7SgGH~nSKuHL>rf3PiwCh%|Nzy4H%*2s-aRUQ%Y*#@&RWE z=_i!(C(zfkbM8b*#9hKBNy#!Hv!p(7V7kONWZ+WF0v<$*<#Eq3VB{2W%`bXzGY-sb z9hKPw80lSu-c@5<$K!kVW42Ml*MIO|xaOz7#-z6%uCW8?dmiwV^)T%PIOBI?a{NK` z_E+$Uk86Ec#pnc0=jMGM0%#HqTS-a?A)7 zDUq!bI09whl+g4>@MIG~@Uizoy$v-IrE3yCmr_+ODLe zP4PX56oRKCB=LOsX?>D0{byV%)e%r#3GWH?vt-cgGkrqn$ELM?Di=s#yca;VGJse~ zjb(^1IFhb!NfL4NH{IMsQHdxs6a0%ZU%EQtW78Z9v&G{nday^|t6LjM%wv4cbOf@~ z9K}o0{?YX>X|Ht8H0etkag6sNPF&OasoLg+F)l)b@8DfV&}XmZT;afSf%}?o3lp|P z_$r0~NsiD)5k`Xb{C5WkaXZ~qZr&sVCLgUGZa}=LF2HKOR@yKZDEuPBPNN0~C0;q4P(xUL zJ{MD8*jp{-H+olKfE1}O-P{F2aLTD7+DW^ zIbiP;aMMrV8dJ!R8943#ti@md^-J)EQ&)px+|8A%7%29^sg+5Qfqb@zA<9}uNQ0+h z+*4v1!&C;HWZw})|B6HnXLbvR3@|i+U20{h=y}mq~jcB-ZIxi@ISCIBrL_!lMNscR# zbafIXB4er}*3o;?u61)@cN*&?2Ctivc3+aD*{RRVZ9`f~YD4sUCuTXRZ6bCUb<;1! zLzsSEo8Z}IkR+~O3O~cIk8~l3ouKRv=uG!0u1mt&k1~vLLjOdJVK={NZ4g#kbewJ? z=aN!oTVs7LkDzvPO>``vVM)&ALoSlSsl#?_81$6?zExg=HA(l`m@L-eWpz-u zhqpbvH5aIBbVMzbRYm(D9GAQh+jMD?&=XZUp%Y2%SZUkRPzv35-SaCsm~`!xzJ6Uv zO=?f;LLbLVT%sny*z?_aDYP3=YbJ5)I%||udpJ=}xpVV-HPzqFX zkrP#94O<}#jscIt^D;DDMA0!})5dpl@JNy<_CwkxyhaVhIxr|by!o6{aQZX1<7uxr z6_TZUpONsZu|PJ|0p zuAlT@Lsa4B9sceb8F;pWxCoUf7F`UJRNlw}*&dZYp5nasijYgq34v>G`4z7F@ei>u zGmYQgF^9+IHUeWifMeeP(YKZjE}gyiLr(q@s80f-fw#TtOuY4Zr{b7nk6<-Lqc(@V z6Z_fgfTAAuc>Nfq%yzUJ%m!-00A*6>BRd09gE$@=Mykkm3Jo!0ao^P($Cp>KgwVdQ zgY~0NQWf~b>o#2{N#rlb7<6a!7XO|`gpv;TqyskTd#Cn938?N_UBA*Kyf7l7|2axj zbdr+pT!)?0r)e-@oM^T>g{mFf&em`Ky5=PlDZl0Jw|02$8X<^b57faQ%`;}ioN~F^yN_+q^u1zkPE0px+D4C+&5 z)N(c+s|bAU2RGn`-`|W%J&UP@GM46QKxr$Cbx%U+sCB640B7nk$cL_jV@_jrwu0Bb z>{Pt;h38SaBpk7NGx~a5xa0d#x0hh&fUHgV=~tn@n1w}NB{c&T>7kl6U{GjJPhvp` zkQL2LHj|K4u>ZlhOu(J;VWJ(ggUn6y`P2W7l(@$YE| zX(u9+MC^1$&oszppqSWslB8ycGb2IW(F98LnIg-v?Mp^^29atjX)L;t=)37-HzkRg zN}5l^<~I1Qo3~DkO41qJ4fD7hg8f96<)S6spb5G@`d?DtAE#TKtq;u4knevNQzj-CW%{Z#v7$u#GOEs zwmJh2jr2F3fsB`jfgEf)B%B;imt#6;WIWE5;D{PBxeP~ZoXJXKL5a0dUcd@wtMm%)iI3PzMwj2-7D&djJG#;rmaK~*2aow%g zK-RyCzM&zU`>dTf@r12dI}BuG8NzU|e#0h=t{z3f$O9<)tICP2E(cz13AIL@k%(Nw zP;e-vrzWU0Q=ssLk%0i}u0%r!%q>*0cVaJUllxJV5=*YYO?U3bZ+1U|y?duHzu;og z90A->z*-9oZh{zF1ymQ{EgnL7@4Z0dA*@>`u=$u_9DnT7aN#STi*>8Wz;FSkH;uaY z80Kat;A9H0jDF-@52Gg8Sd>xmJS+$YPA&)2$iQ$-SdN8$3ezllfGio8)_sE;KL$f= zqMP$7Vt<>zClUN66YGBta#P4AB&b{ZXjYp^Z zI?cy&(1Nu2iML(XmnWQgUQvm{|LJq|M9f3m`yvO?%9M4 z__k6MwU+3RMNF+!=qjOGHpPGmtkDvUj3deCy56Eft0Gwm)7zG;Nrs*YejUO;0DJ_d z{pF%&7y7$v74cg83kQaJanU>yaG&*ed~ppWe*73 zrocy(X4T>J&Q_xW)2YERCF%_u3lk>nd?G8*s~mRs8BV zH)C%1K4AR`z~~k<`nKV*!YM$u4r6`~{`~#h(SP+V=o3q5G^S9oJREz>CLDj<4y+#@ z!Pwvc`b)j&@9XEpOJrA7%;!p`Y!{TBci;UG5hdOhPt%6_c`<;Cc0$`8!$>AvD)o3q!A$np@YDhcLf>xGpu@BxOS^ zXR{=s8@l(kL`-QZowKDz_fe<1;`g@iq0U|n-4dfDsW%PTfaYA0J~|kTPusZ=6ENcS z2B<+m^obE58v{ZN)~p%h>x+x?n4FyC6u3bO8sNm>7@K5qMJ5HGQr+K zSCR;0(*3$~If*GqV}QD49=d6N`+L3MOEamSYz80Ftw}FTm>2p&HTxXc7Q_Slh4fVT zaD4>HHq^bI*F?MmWK{adD52*TyWo4M+jZD5&{OKg!qPmfY!+EFgIc2sm^sB(5V~bI zIO?J6s9<<1#da{)&H5pOJT;MP+7kRGTC#!a&Wf}-im$hpI0$@ENZ;+ONvvB4b;PQY z2(%~KE6^Q0`bCJu4#$auavUKGfE;X-^p6fQ(uRpTXKeH`wo;3G7F+ZiZU$zZtV|nl z`fOx{g?yKLD$N1udqWS)H^>-@Tdm|nz zx_$(kQ0NSJJE#|QV-r6tmy1Tk8I5>p7b0{Ay1wqMS(`e> z5t{kbje)K%-8cwMaH&p=s%|{m>fy%%fz=CXpmK>0+7hJtmi`&yAc!%e)>ktctMGIE zsI?dLO*8{=afL=R*9*C&`|0obTrm_TKpAq$!mJ@Zm|08x?s_mifsB^4TzW@cUnWbS@1-#IsC9I{Xj$NpC>H1 zWSiia9H6Md$reoxHB8}&3Ni~(DR8a@o1lBC(1czx>}%MNwJLfj+_G>W8U{)tkLj6d zIC%$8JE8|?9kG*pzf=eQ?(uQVOdP~lue}pD+`bE*BT%*TSTZSclTa#!d=D_v1B|U! zpHbuZ1-6ml#aH3rMj2kmM07neh_T4%vH^GvHY>o^B4FiIY#>^s4f5yAC}wPa5_srd zEMXC-&p?XdT^1n@R18zd!Nt5y1)V zAGk4TC#^(n4iE`~lgs7t+u!~ck3RY+F1qL>C;!#p2uys^um0l!|D0wq_o}Pb(VBv!yp*jw~h}YFA|sNQJ7kxszWLXZpyj%%%B_)bRpp8gH zH@*lD?`{J61hEZ*dx!6yZ%N-83z8tJB_5&V_T zk&cP$7Ts9Ro=IXl(&|iWbEm$xzBAMZv`QI3B$$!W{9QCdatDFAR7g&rq2gyu#efJE zvO9$I;c#F#wWd6#JM6x0NZ92icC#-KO%W1H^9$%L^`bA|$11MDHJefDEh#2d0@G7V z`1P%Sz~xtb8`Bfx_}phdg`#t2xL(*P`^gF0KcuXq?o457 zf+B0xn0TA4xgfn*26K*!d{0pYnW8c?$q!9 zjgmA+IwGs~mh+Bo5fc9i{oWNyjTw(h7~UIQm!9&xQ&AK}Xe`K#0;v@Ym0_0h z0nt6I+M+DCu2g~GNUhSS!K&FPW^yQ+MN}FR3(`fVw}6qM0W38nesjwmn3|fy*Dt#i zzx>J1F}7(FPCeyh4na>+TsEKO*a#lwsWEh8CVh`TwAtn@x2%NmO!Z=D4K~xvFAz*h zK*%Lzi)})DV%i(k)Gr|dr6{BTVbn(HGbGZF!NBzkm6S-iizsSj_#6cDjRu>?!4)1$ zwVZREp(7J;q{^276~>ud4;{`;V4_CZ94Vo+RX~GsAQv-myqbz~_k4hL*% zph#+mIUD8L0?a}WN>&cFY6FeB!(hOvYX@-prsHwJvyb!p**?_LXA=Zkc}An<4wwJm zU;^!;(kP=kS4E+|1XEC;f+fJIqgu!_B9TRwtTbSlIhYn%29PdRz_U!0DBL6&cDa;B zyO#%^jAd+7RjRT-kW$#?5YbAh?6!aLdb_DV4X*EmG_9n+N$pRoC%!+Dn9k_EX~;mF$w+ETH>h8?rTH$+ zxOu+)obOE}L_l8sNWexjIxB^}S8Lhe^POzf)cT}|1(wSFV%V&jX38Qm@F-k91vWAz zgp)_k8-!!pnDZ*A!iLP6*tBX4^;!*I|NeKdYxebE>w;nsVIktXpLlA^Y zBoyQ-j6#3u3oE!D*3|5*jNKUBup+QnS1JUKXF&v;3`dwi`KhBV{}7`qKI%lUcaB3@ zDI*qYGubY1WJbDTDhZi5J6-PINT9$?RnF^%sLge%8|LRDf>=GRB!E|h<$OPd#S%U6eo(Qu3SAC>JMiv{lNJ*X- z1~Vpkav^jq^jaQr-W=*i5th{l%j$sM*+~{x) zkK_%ZhrK($Pgl|oMQDES=AB9Hh@x`wl19{4(l2O;Q&j4V*VoM)g>^=xpg{2Gwrx6u zGO$M=l>(=1kEjW{nZG2)uN%S#v>vS8psKn$()zlb_ODbmp{q9u)kXW!B zixnFa6Vq(iZIW%7;|s81TcgZ#`ua>7&p5%4{$0+Qs$~$ghmZ_%5H^#P1d@Gou=Sj; zu5nCWf-^$~T#(T42$2QD&jduMX(!=ACHo102{xVZ0whBC1}M^(#r^L>y-WDmjquwb z4G}a$Su#i^#Z&f1W>8IvlxV;-axh50WGdT-qE&)t7?|@K3{+(e3z@8BI|a)zkT)z? zredhFGQ;hxvo1e?Uj6>E1fLBhchj|05Grbx<-yHoU}y5Y7(s0jCffqgKbiNF9hnkn zIJ^;fEJ(8QOvN1WI2*oQgUT8i7yuzypR`yb$dNy*iXmhV-~c^R?GIY6lIg@2bS%n8 zxCUfo{KJ~{YbXwhCLIz<2T3Q%S69*w$KX9_$&{4tGyUL2@_w>E+lpyJ`0Hg94`38tSy5I^w$Q~sN zwB++;001BWNklL&$meowJWmR3 z)5@^ToZG_8`u20-cn4k;$pV7vEMdNmf8I9JO~;>E7BjDB5M;!K1R?Pv!YMStkeVSX zJC{@rJJd*a_p&C@3Km)G?@{=&sS1e{51}iJ@IzWeZwMfErRr$HJOta5n+iumv@F&~ zxxW6>GbMAR8N=jvlksEGuqZ(U>-1S&;gP3>!Hh@NA>FCpZ$Hx^sXi!;vosXyAr!R0 zV87?WgD~a)qw!h`x1mrxaPthC$-Lxx-V8rX` zRHDQ~H%D>enN&|Fg1wxgleFV~O+$f#G1LV}ijUn&+Pe}deI<-X^x5b;bn}xmE=XFR znvx`0raj+jEYj9ww@k+JN>f4+sRfUV;C)_ErGvaKe$t;?=J@5%0M0)fin} zg2)4N2j?*L*u%*6N|dsBnAskItS*~-aZ8Y(b`X)@<$S8L4ikq#;6dC1vh6lj2Q zJ1!EMU}cf9EZ7ug(@-h|GVG&;*J}%8>YmRZN={>~%qkS&cl}OEzx@UqijpDb5@&Yg zfFFk9HzoT_*4V~CNJ|+-8kFpbqCA?gMNy$9Ap(S!Nn7s0*{viF4Wa3V5$L9Vom8o- zJGiHt`;gH8Zk`Lid+fT`xlf{laacEFoV3mlhe?RPBZxhaR&<0zKSv>k5F$v+8K!H&ciN6O4bCgCHSHess%~7-sGM4{FSK@QjjkiYH`bfGr-aj3q z87-X{%}&Tg^SU~;gY1ZwFnJ%cIk;(X+yTQ61y8n97KcS9dn*qa)M2kqf$nqU7ASAXI&u(lkDSG@Ms*xb7vfB%}7Vr+dL zcpO-qYhcz|M5e!vtXYLoB{en0ydmRp4?a-M`EUe#=mcBC3q$Tl`;<1PE2X1J&xv@T zq^Ja^B+NjXf1)_MWcWAE87D0!ousM$b}voFucdRtK7-^#QV6AdCFye}Mz-Cv!gkS{ z7fhSyH)CdzmwrrmntckS!GU4~viw42L>YJi5K&R_grtww2H3rQ+sdWnc7mBC0mti)->+l1xUQj}nOA&YJ{4`8uRBb8SGmAYHY&K4$m^iYs$R1lTi;!NC&g0R9MUDmswiz&N)#2oXfSOT;JXoNLeK z= zL{JRy47)cHPb|rZhLVH`3#M#@x~#N?ayavo^jrLJia(boRp^ikg*-)NtDmpShDAVLNAH~!;t91-h%@F{Qe8^$oUwRgf+B%5A-Yn`19>%MWqv}p0+nWU}6GknMf|-Tc$e_<0LCvb8!TEZ8!CQEd zK!kpOMX+Xr{&%LpZR-kw%6xfedD8x};x`1?0b7-eKvUDKTGPZ-j&ivTTduSw{rCvc zP`%5Q3UtK_ULKnSmks|!=uSfR2s|=mfapq;Twj9mEf@kf8^80z z(Q?!WBjCSe6XNAX?K3QFEJ%L3P_UUxY^yNXRK=nA4amZ99psEUOfTYpo{&@v2?yul z9+*1GS67k{pCpE^lLVM_eYtBaesAzsPfSFZ%VfFZrb7lgl_Y}J-QHJo-|fTW3HQ{<<3u9z43bwcaD-I_fG9!?p_LR zZ)uJUrM^g8f*;b`Zulx%LTn8(Jd`dhlCB+xg*B7a3@+ErF%8Il+-|UYxS1(&I{u;2 zRT!_#;Espy#b^HG8~E>QZ$nPxv1P*`Uj3qH<6RfMl|L7AIW#7Kxh24)wEP7M^KZg6 zD5`G`j>w~$H&Dsek+Wx!bqzE`ki@My&dS&<5IDOYKFwGLgPDBxbUQ!M_q8GjehY1a zstt#B8AluR(^aH$GtmQEH;K_}@wnZHEK1pBRJGP;S~LE1Is}q7UZgh>m*g(rh7VS#Te2X_dY z;~HLbad{paFw%F6-8vl=@ry77w&L}WW%NLHR2d~n-RXMpPQsLyHeyPURTmy?Ph-^t#=)hvD^|q7x7>TrbGm&Xgp-H|C<-0cFl*v zK1t<;V1yyN`B&Jk2ZO@LH*DlG78=zG2QuP-NHqtp^w8U1LZw>g#7br^i@uRzKwRC7pYBRrVIfl+V>X2v}T?Pd!q650(AuRPx1c*ElN#XE_%O=q+iP^K+x z9k<_p*g<91LNjPZ%K;o=0RxHL2**!wl*K0IBH#u&EW*H20vU!63^k&Xa)$r^?7a!N zE=N@^{8o2=g5M7R{;@_!6`;SkT?-0BZGthLdXvoeh^JaNDLu? zKo~9}0)j>e3SJcykx3KgjGRno9`^VRJ=FhHbys(FeKqyBcYOZm`ETXfIeT|kSFM`X zde^F|wbFcRf#g?mGX5saLorCVD@YzAk!>X8vml_{4@41BoIhgM78yuslVRm`ocU28 zEu)66>t~Z-l0kw=AjwHLDNSQ*o2)uhx=nccSVC-?l8H{aY%5S9Rp7JYOD(wCs#OEZ z*vPcVfsK5|$R=z|wCVao2Qq47!rgO+MeO{nb_mi2>Qy>*!j}q59HEjRvR`r4(XOMz z6C;fFWhhxcFmml!7tIOn%thi5$bk$CP|Kh0^o@AxX>wL_Tewt+N3LQ(`X zA+mUY!A6S3sCtF01sL=yF%) z^R7$FtJPYyMZ@Q8^GoDYZZQz<7-DyF05M@2F(Y~wF^za!159q~LEK^>1|rl+Xc9>3 zce=c~2HAvwFFLQ6Nhd(<#JA$kzL?|{@T-3(P&2I@3Q1q{u1g_87w7r-O$G)m81v+3 z3sUh}v9w4&Y{J?i{EL&UxL;fNa;Oumpi+HO`_85v%9B(lFilLwCZu)co92y6BeIok zD?=v?P36c!t^S@UD84?ST8XtXJg}@^ z^HK^+Dfj_wTJp1kPoxRjQ3vbC4|6NQ?&XuQvAM>#ewjX&F#BpqFxPKmwL`EtGmnH4 zTygzJ@Y%ol0{;1{H(|Us!1JE}Vx03kXXEkz{WL80J2-HhIZ?_GF_-o%ynYlQYvmWn z83Qp7Cq9pm=wfO^0vUIzj5$lC(Vf=aohQuydCoCy;L=?hy*%^u-1 zPBwl5z5m}3Bn!|(%-!@3imQ%HQ&p?Yl_ZrJ)(My>-hgC$ldpgQCK;xQmI;~(q-d5> zesQcyZUd<=Ms2wodBN%Ce-yz)B$SwEN%M=2lIu+>P$vfkxrUmFZ>azfw045Eq{-3; zrao*kMmBAHt4YT&T};tNpHH&2{r+mFDK(+pC2ZAv+mX~doA$L2y=uAQU!jH9>)x6d zMH_uh1*L0U`3mB#_NfX?rd>z6a@C~cDK&4ZoQ+ihm1=T@RKZ-r!tq)rxn>h!o1Y;l z+mv75jz?oG?OewC#u{$9^@liVc{i_T6pwkH#T_T(;OaX1oj%_C(a+$jYd?TH4<13A zba4I!Z^bX2^#nZdu~!KJ#Az2&@y@xHEVVLXx5%j?qbD z1Zh^7)Ae!Nbrnyupr%PKEzcL3)ds-B10E{H+^asRqUwh${;BLlGPf)Ux5LV{W{wT{ z0obtI=O%@hMOv6IvLdJ!73MrDY*6O0vw?)BX__*cFl!$mVq;pS_d0Xy|5uW0jyFwB zfszgAy9B$Bg-8{cK48IW{h>9a?e+aM)~0D_oc3E^tAwizpL{-b>XN*^CchQ+7SEYE zoCX?ww+h?LufCQRr+WF!C4ByGnmap6bK%Ua2dz#Er=NN%x)H&Fd-q}Kqz7Pe#~$2y z+qdyg|9LwuzT`^myX6j?_TxW>bAJEjc;!pZ!9%+II2Y)M;*KM$=%i!xf>ExM^DE`K z6FYwGjQLhzTM6tyA`b*K=HP&zb0`i<=23==>*Z`~gA|SqnntoSq^f_Lk5Q9xo!DYv z``f)>6J6$?n#4u)MCRQulicbSq|s{dbabilXBhx@|qZ70s_|*5sI~ zTFJDhx#hgm%$aHG@=5BPCSo78!J_qTPt!4SSyP}HAJeu{Q^6?%&S~g2jkAwQv`I1v zOP}oqTWV_Yv2EjQ#~9rosWEsc@A=dGe1Qn5%iZS(sJzpO5Ap~{8HlR;D_Tmj9;SJjh25D~^)D{q^sm zM>rTrNQ@MH7E+>cKCC%}KxOAAdT(ATlkj!6;bK0f2Hs!Ri^|AVvHIDty4EX)2t(t6+ore zW+gCLZp1SgSc-4udMCyj1vsX(IzVhFTmIdrkGH~8)UxG+x2~-Q6F6{H~cr3MEL4pIk-}W2X!nm$x;|WBBr$31Qem6osHk#`UsxkRTlmxHYwv#f5^Na8159 zw}>6>KECT!O#*=WpQdfBbix@zh_y8(wuGe)m^?8b5Z@PNeG;Yj++(8m(e} zv4yA~akun?^$~&~Lo4WUXG;O8;y!eHZSM1i3;ZxG?)EV`5EMK%$Z!0y+X{>iGjEPr zt~gN593w=Eb>kR6Ef1vCwZ@9qyT?c6U8ZrJ@Pm-i2m{(H4k*f65#f6(s4*X*rBQ9hUbH%6@#nM zS%7RJB7c>%7fg}T@-U;IhYF?&eS1xRyM(3b0GP^vOw3OeSUL-n?!77~)Vg(o$>xIA zB(!Y;&n9?_Qk@9CMk^`y(NU*c_l=xvg4m>Kn&_9Gn?RsCMnt+@ViNeecWPa#CpZ%y zFgb;q>=*T{@ML?b;lQJ<|DlYti4GsIL^OwdZAr)Xe8$L>OrWUzh7=}DA>3pOAd$8! zDFICLR=Tpt59o=lf-?4v*gD907NKELKIH-!Bo9W{q6z3|#Dm>Y7FUM7>h_TJ+K6d_ zv;~ZkA@=OtiSB%aJMTS=ORu{g|McZ=;64G3{&f`~pZcsAjd+CVw4Mhm$R)Pmp%D+%8Y zkq)JmoWf{*7J#X^@sKHVnMYJ6)y_5a=LOYyqt08EUx>V#SPU7z<|y`u^41DqfYQgj zDs+4%rM3e+v`@8xrZUt#Hf_n32 zNJpEg98+85w(8c9TAm8Z)no#2;$Nz0L@t4?qf`Dy2CSSpduZ0W_Upbef!%46Zf-Rh zZ{50bjnR~ZO8fqP1Cse>l zQsUgbTLCSd*I*%+X>qf|Hk(X}kUVxW&np2!^)TNzp_vFXobvMr%xpr5CBmP95ZeMZ zGgy0>u4EEsGD@-u3>~AKmX@MGBSLhQ*HozL7>LP~*(ABNHWMATJhrx~%ySw5+LZbF zly9P=KA-%BQdzEi21WVCMVF4It*$5A7|C0NzF=ORtMWMe&Pmf87c`ahFxrB^I1Va3 zK6N(v#-~0TQ1hMZTjg^;^vc40lHX`qOC=TAYqGmD#VzXyN+wVQCsrSHL^JMYE=e&(lf_EUZe z7oPiU?4IodtLunwU&XLHhgQ%+&|`6MA_QTKR?tS4=B~N(IaIOhG^;EgkUjNItkp{3 z`>i`vo_JkjBnf=oGRXl!p*VV+JFtOL-MlM3DRM#?e&eSyT@4v;sb14jL)~7KJ>fjv4I;~(g_`P zjI`Rifi7J;Z1YaFF4SMTK_4OJE5d4i-{(HGn)29$m1}!Z~Y$3#wRd0yMc&w5ruQevMx5q6lpNW-7J%A zh={qYr$W|O)>^S;ATLzm|As&SQc|-Js$(H~gBKkHHEc1>d?U51^^p7@6h0A@EBZdN z$do3w7;-;=45=lBc|6M9?+BmKkoLVqr<8|J>W%i%(rrmMaa{{e*CD27rexEWO?2Cs zZBuQo33Ko%%cg1Ak`L&iis{wVH`_Hvrg`P6*ChN*z)fY`I>BP5aiV28yH)P&Pv%jc z_-uuF9yU|^!c>V7!po!X8{ct-GPmWnWmMQ(?UqX4bu8EA!+)A26EN_t z$9If;lPu8Gb5P|wVI8NHpx5>vnOr{^gb6<=trJY`{i)C5W7mHi|MIV2$7yGridVnm4{`2u&cY+kJPq0ECJx^{0A1*T zraf%V0AcGG+Q|yiL4@HTL#ww0j2F3Els7LVHcFWV^qK0*DZK~9No zox%?SGBCc`6*Gz%%tHROkbkZ0ARO@0_KX8sTof<4O* zz}h&$M?d`qeDp6qi7$QSYv}go@UmCF4A1`cU&2p4;=u@q>$vZ}edwWuRy#(JbTOND zL1-82>yN>hCTMpk&>JIW?(}>6(4i5Mq+0|ILv@?1us%^t%8I;sx?3f*^zY!CoU%x< z2vDPSNJR3{CwYv0V;y0_f*{H*K8RBum0Yp0rkc?xr z+AXyDeJn2QK#~&t+jsB6^?&}Cxc-BmK-itf;~xL>cGMy|^Q|$}_3KI|^Mev}~olkzFAuA4$ z)US<^^3a9P0#Hq8DnqfEI&IHP->QF`fPu;oWS}COhShrH_7G(soG6EdboI%CNiEmZ zW?R3iN%elEr&;g&X-a1*PZMbPzuZk@>V6u;$s%g`2e zPU!kj{I15_FwGN{Zrw8-?|@_dnab3C;{uKo^zuXK`60ZFv-jc_h}eTKgDO!T*MPe| z&hp;_8kENEyv)KoB9~IBblWOGnxtsABan6n!{G?SVTw)^Vy4%{>gE95eitMnIC1Pa zdYxHBtq$hr=JCDTZo}Vx?#p<`yWWlUB*M@B?33~QXPt%TJ?m%C2C(mz1K7RPMn>1L zwm!gOem>pUL>sU8;YU9ewE#@&7$LbYvTA0i7EgK%&m%Dp5`^-@1l?e=E z(ovF_T#(SpS=HP!86YC4c%5-d>qM@NILpVaSV`gCKY{%&it3NmzwzndtJ)`Xu(oXJRm zXI%ZJCUxv=sVR6oafhQaX!^E+n{L_@T))6iWQ@hFRNMlnj(kY=lBkv{tEHYjGm z?nMUN?J*Az$pYddr8{zf6U0T--Q1S|RhB9(w0{MTPTcDAkwq@KoJxp5001BWNklWnSOyJc{t7M`M>VQD~thR+916poD z2>ICpA$(~OyCC;10JI1&*PFqJL^yHqC%> z-^SHfUX6eK@>ejoyc;ii!%J}PvwsDTe!$5%dSVr~99cuqZeg~+ga~bnhY1&Cov?#3 z9UyK2-EIqE%0k^!(BT*)BWRO+yPWxKN`n9?36T=E1u+Jpqte?fRc_{$f>g2v@@EF6 z!ZfBj<;2Bzpjfcv^;r8>Z1EdQtJ7hsPkmSOq}YTJPAkankK|fpHUVU!+l;vN=->8z z(_}IY=`=STjix?uwNuWk_UZjSmeVlHt$?AX+L>?N<$DM<%%0@!$Z0{G{P(o&@%_$a zJ@G3jFDnR$cKby)zjeunH<|iJJ#*3&$onSOTHfx|bc`nQ5aGnAh#0GJy(T+t<697A zECs@S2Z&n@++s%ZgSg3v#ZG9W+v;Mm-$ph!gHb#}#-9TZdGL?phj$&o+u!|BeB>h^ z#nMa<&-mrD@v>LH96$MxT^PnG4y+6iWEqyb9ng3L(1ReY2%F$n954>rAfq<=W9Hy! zh?s4OlN4b@`LVhYYZF5UG`EHXEU*(DAtfmfB2aFrmj?|eWk!yXXmLJoGWp1&T6a4v zb~a^jyOWL%jVDEOgQh{-y7JTstmd6|k=o3yF7#&mcDon#c52>Rp`j@)Hm#(ohHWZe zr%9T?tJ)Tq1<5xxF%fQ0DnO=T-uWaSv*9%5n%0pCoSFcOKy<&>(RNrF)v|2mH~o97 zbEQdMlXYXe=ap`ZTmnhFsm>Kl_BB6yz=1?zEg-pT->lg84x=bPr-0lYeT#vJAjB|9 zF*`ep&9zk^9;4TvMR%r$efQpjzxm1!aq(NP#C`W3z!QG%f8urL{Vsm-@sGv9afSoO zHnF4A0+J!p@hYNrh<1zcxCuy7%yjxlQ?_Ri^ZK)5&z_KW-XIn`AxroT3W~6DRD=|1 zkQLh`5$fJ%rTu*=mHnXcb7GSrYHGqGU2~+i9!tkber20@op?TR20=%(NlTXB6U_l7 zH9s|&Dt%F}E|2OZP*;Xd)3?=UVjik_(g)y}gr1sT-qNrMUlW}^Rt3}8>b_GMSX1O{ z%cGX3n>Q|@ubY2R#zjhaZgP2gwEDQQNGAc zkFCv+yvWJ#e1xNJ9qV~bAcaHMTls8dtHGgM>&O?F%4NEg4x2J#%kM*v%E!uiTgF%* z(iVe8p`(R=fS?dY>?{elakFs90Y-6*7Bk7e4jr&th(IFaG$gZ^lbs_)HwQ?_S(~a6gthU351#0L-G(3qZmS=s3eL zj1Yzi0tO6*;I|e+!o%2svgZL0EW{7^u`Bxw0FX2-O!1UEJK{DF_MBT2M2v*W#Xfh4 zWR8+Q!E1cMxr>*&fCiDy=!iV|VP9$M&QiZxu8rQ>Ee0Fmgqx32g>cE#lvK*nA@zchI_C=MlOnsuxci)AsE6Y@-Z&^)&EPu~`B|O3% z&E4-??`7*ixo*AG`y|b8YRi#U4dtTY{PdakE`H<^Af|k}^{EPaS6%k`BL7`z)^ZTO zJk~ri=Fb4Fe5)wUKvK#DNyrc9rd&8v#0Xje##xM&^>ysr(?gb~*gU+7hdk)PNJkrZ z*L&ZOt3UKP+Ph{&fY!e6;@5+df%!huO zB5D^t{tb1wfWItwO*FdlID23UYu0x2pL%)K6+NABkxnz_W_&8Xp*+kyGvzafM;Q`~ zMk6dNEaAxUHOwsT!N%q$7Fr?pJm{hLs~bO$i{9~WeE-&cSp4rlgLmC<5nlMXN1_)+ zSY0`coyc(V10RMHYsay+xsHCnk0hpuqLkkb$|EeMNZC1opl~9@X)Pj)N(U^7xPF+o z0zlo1St-AiA=Hnlp91AOANr_3Ykm1z7Q{F5Eg_*er^_P zYpeV`Ley^K_3XjKXpCcc*(mFM0;@d3w|4yT>Khz!VJ-PgtfI5kgSK^LJM)S zf=)otZnr?Qlsi$Pg=fPk3JZ%s9`q>>4~?8QnoE0~Rme8aedqdC#zLlJtICiMzuS&^ zGhsn!N-$B(s49`R=PqI9D^Oker|m4YY+p^Xsow#;{t*n)TQcT)rDWCLqOH`EfFG}e_@MTsT>X4AfO1E52X z^1r71>LhY8>HjJQ<}*gqfDoU2(~Ob&Y}zr>%{|>%lw+#6KvhqJlVVX#E`}I`Mj?iD13}nEAG3(Z zBVLDCCCo~crWw*KDXz$tjvhH_Atrabb-Z9J<6|2K(>l`CV;VzUIl6cv<-8|Kn>C89 ziFOm8lfS72Yx=KBO$JJRKkc`047v*?ZnbV#UiGhE1^@9M-^arr`&hi^;@9Gdk9jDNW;k(pANN?;n`H+ON9eGCNkNPt zokfrh5JzhO?Qo$l=uMJ@{~iSS0bhPDP6SlSND)yuzg1xas=gY!i{EaA&*{cR{gxKn zD5mew0IUzA;$d7 z4j#i{eSHn{b33v3jJ-IrvWa)R=L%f=fe&MCV~h*m{06-Acb|pRXFIs<-XCH%8(^`s z10?NXV+{zqbJ)NJ+G)xUJ7!UUFwJSrLqUrcus~160mQ;3G71<-C2NAXks!C%)R#KI zrRzJ}7})w+$Dee{pNX$=`T~(pOOBHCpix_{V_O?0SIaskSOS5dZgQ*|XYU+c`MybI z2Ie3+lXTlqHnoJlbS*s87MGu8!8Bo;YRA4>wpx}=yYngEMU#nkb^LVCY-n6J-oE1l zM|*8!GfI)Dq!ZRIbXA^UcWVtM9vJbfa(v5y zZR2Mtf{5^Ed<`;3LOl3bhB(QusrGwa49Ba;*f@6D*n8?;eCN*n_~W;|3m^Z)U*XIL zKLppj=gm0lDgOh*(JGFwZDPK=2N6Q-KY9qe7e<&N1cSH*iZ1tj*dhr?mLMew0{&lE znb=8j=#-CjSZ^OU98jdy?vi$VI^N-1-{kn2X^?|8p@@4S0&dx4 zio9lQb8G@2n26UhSAo_G8f{vZidanx)K#}mxT<+ohN8;{$0BwKePS_%+61C0`7jh$ z89x0<6vsHaF%s{m9V2)!vnI^b2MpNCbP0VO$nz3*-j;-%8LJT|Re_+s)77DS-gJy? z77|^4Ys);XcGbiB^Lj))^ZHhSfXe*pZ6g!$0({%%BlKOog(?<9S9x0jd+_8PDt+a* zC_)4mTMOJL06&CC3PD`-e@2n8{r@CID{N!7KZljILr9|`X6Ki%qjwU%_|04Kf)~9U z2kyQbfAEUekC>HT(02A}eLgoiA!eE`6;n!oLxIw^FXp{RQ2^ zlS+|KHNC2InV##$kqQe=6DKWO;6rMk`2e12>T!V$(>JF63n&#=(fE}?o{z;Z2y=^Z z%-j^G8EC>h6}Hgr_R&Uw(Z&#?IK!!XAB>eG#qVEy2|n|gFJNvUOLM4}uobbcBo!5ws}6 zAVe6o5Yjdmz{f`?FwRn(dB%fq+dZpz&LcYp=S zyC8&(j#LlSw%=bo*#+Ef<@tb;QsHpWKntKpAWSTiG}=J6iAL)g1fRrns-vSRPu1q8 zNxBX<2|S+#sxt|h`oPChU>aaoo0|#)6Mb7PLnIYNZnfN|W$DIfnxreoM4M|7o9NKa zZCd|c-D2=fYTYu(-YzSFt{plMr>?nr`x<}*lAEq+?UCI|;+j8Np~>`NV)seE9U#-x zer$oyHAyZ$=V~V{9858AK(ltfh0UjFj3|uI>9jB!4ls&`h{r>A0Rg*D*@G<2aKk@+ z9hd&;b@Yw8OCSYM( zPih|q;-OQ>D)%i(vDZN$e4g6{wcHsl-|IG$m?_EMFh)ELYMMsCZx_RMY1XEGk^9$1 zgKHZ@{+5l8%iKH77|C^sF>*~-*BI$&F_kCJ3pKB;UraQr%xB_Ti<@PYZYudAagC8! zLoQ%5?K+a{v&|bD=rWgG^rt61>N=(#=X#itIkUuJ(AA*|6%$A@jggMe+4^68?>j~| zMaxyrJX>8B%#x_INC zUW;FO+Ou)XU3cM)mt2S|u6P6Dc!1S=Z%4Xv5DVE1W=Icd93u-;1Y{M2vT)4=ZQ2FN z+Q`y?pFxP&350Bn6k}{g2?kMsAZzDW7fVy9)ibk&Tgr-W>R{5N%JfA$x z<%#4V$q@cP$8&TbOQzBLkRpS2S*Fvb%-V)-GW#%FU0F8zRCFl+P92AZT-FWQ{ArqG zCXLsGP@D9NF8P$_`qrjh`;L*^r!GxgH%2;|NpU8_rp21(gpR%@W1y?c)CbPQ%CsB7rRVJ^+ZJD8eaF>SL5-IJ`J1k zanSK`v}Pl;+shb_LyU^^3%yo?j0Q#Q1cHndkq2qWf0(nSG!Pemg5scLerS@GuAY@Z zL)oNth^BV!-Nffi~e)0ZlhSsJWTY-Np;U_0+l|rx#?3i9KGOG>w(9jmgzS!AhkXl$hFa;mZMwaw*FD; z<@pM}Av7IzZt9YWx9E6RP`mA*Z=Z>Qs=u4^o3t=fAL`0-fmhSKmh-7)=;*4CQDL?( z=46xv2%>Hd)`C@}VS*7IVuRgQX!md;9^=eCC*z*A0lxH~cj8m;ejh&fw||ePopmVcj}DCyj|TZxh5|0jRt3dMDYg-WX}sQS zAGu<80@rk$Y~Ki8qEkv>;juP8XIe)AF>^ZyoKdj z{62HCX&-MTx#-aefNAGIQ_!Q%JD)ntNeZj$v87@Ih-!V@S4--s-P58qP1|hX>i$l; zF`5uo87(x<08z>W-55~|$buN-bQ58RIV9@f)_V`(ArCwg5sC1RH+~IodCS{D(g1II z>t#6aMbE(Qd4jtR-;7?ngLu%#%5Vk!`P~RZ=4CNOmL}Y{LD&kkw|b;bnzRNq0I??i z&}4k386%&0;8I$e$Rah>!D%yot1C;_o@M|+lYG#>j+iFpy1sRlr#4oq}6cCy7Fj&1e4oTx^Za24@k{oW4G2=%hAl0ChN!tXf#o5Y-JK@ zYtA+|*}*`Do+vGRAjBC)=@7I>kwq!SET%!Lk5371}ebBVeL~tQTlhBaquxUd!t->^T zI{HjB`GNqo-*oMFff_XM8fPm@r)`<~#HNku#)l|p8K4;>TR*9FnHHvw9$R^)HmL2G zd|&v4FF->6zTVHeaWc_k0!6A|^#QzUJ8g4I{Z2PuWWb`*sAYueVP->23*DSB(Ktbq z66Bc_C#;+D72kEFCfzzw$H+$j+B99Yuhelc0XGrDK;(_u%pp+=Sr`NC7Gu!D`Z&g} z*_}ANLGkvt{V}e;`f5D-#~+LLe()MR`k~7>e0)Df!!?8?LOVJIqqxf*7qPNigmTM4 zK(pL=5g|@@*EU%o=TZMQ@fIC#x2+))4K|*qqfb|^nx>IOxU_Q*l7vMB0)Arm)YjO!tpZcarO~%ATyX~0^ zWt-}^(Iwv5ZqYPJHs(^&9?+W0Usaek0Sm6wbgeW=K0w&Sgw<58BN0VV=?51u)Xo38 za1{Tmmv2fYAhI2Oww-HEmt2a3%!B#a3?`tE@xVu;WP~hgBZ`1D$iVy>qSeRl-fn#N zzI*ZZH(rW=zTvZY@)MqdKf3H~c<@7(ao>?6NC$_}@6DmbVkivzNNI>D8iCLecqt^{ z9>)1Fa39D)9*f!FO5BIf>HfC$iSC&%Aa7EaE$Qgj0cV#i@^z%QmA075ZsbYPchTAi z)oBR6L^tUuxop!RMVIDfn!HW42wnarAVQ_dHJMDp)P}}Qn$tAk%!QzJ?XoQr7qVC9 zliEIYY<-!L`p(v#$$pZ39#qKQ7ciRo(4--4=NQ?5ukRSy=Adm1)bC;Fdt3h$IjX;@ zeY|!3Xj-4TdF2|TX%rrHjBNZ0nst<0ttM$snG5BV@-rGC_e&5kXNFkc+(gvsg0yGR zjTZ2&AKr)aUw%Grx#@O1@7XWKWp6zXy&YZLanAwFg`1e4UE(2`M=>xO5BMAp*;U10 zjErQ34NAEittPsCWswe4BZX z!L+nMS}R3BJmXw9m1p|f)Gi(Hql$$>1yZ{DwmL@E@hM#`R}o-U-vaXYs@rc}yQpM_ zEx#B2V^~A#jTU$c2%ouV0&h0pQ2)CK@1QxGv_A8AGn=$7F=G*8=IxV5YTz4}9^<`1qfF2si)R&3MUq=i}{fehKEf1b5zf zI~L|!h*|;0q=ksKxQ~M##^|(L+)}`O0$J_BX?PPgb?WvCOWskSGVqta~>d^YW^X;Nu#N~;b5yUOwHTT|U8 z#$oFFX~)Fpo2Gr{GoRFarZMsXIVNrE{v0DySti<=fMk)+C2(v4T+Qpdj%@R&`8r~X z6{%nI<2L)CJWnBe$}4OJJPdP=7b>vCs*B?h(k$cdk~{4-QWjPjz&K5@u{lO>aUP4E zMSSM-|A5P1^A@ZR*YK|QU4!5H)hA)83w-Chw_(S82T`z&@i4>8>@HqjrxSv-5`-k> zu9*=gNElE{TL5kIYl|TV2?=6;M!|gEL?;_uz+5-So5~cT*#bFJYBQe&+Q)LM{PGcswKKFJ0uY#r4^FqoKyujXkgPe-$j9@jT8FfgBi z_L<1K3F|Xybyfvk8%(sC=vT|t^?{G(pes|CPcFA9XqW^hnP=?wW=S`{e8Q7Up)K(^J&|kt|UVjbFdh+9N-x{$0z#1O5cL^ILz-W|Wro*ZkBTF*GS;!+nCj8t%3m!WGar2W*cY^!)|^eIO(Tm;b;GbG>-qe_x{mkS(zYB@ z^i9)f)4F^n&Bw$*TtdhOM0DkCB{f04rep&=+o9F@(B?wDCQxJ26kKDZzO%K{B}i=T z+0Op+O|EfM8Jn*_cC|+bigo3wW33w_Z*V{=h9%sQan=*RSTAYR+n?~p} z4r;zKJ2%_Q;n`{K9kKubRk1~#jQ$cl1l(sL>zh{4&9PiQD*yl>07*naR3kJp%fVoX z;a~&1_ADdl&f}WD`5Z1d_xCWr`xIRNvFq^kpL`^~b7&LG5kr~zjcU{2fLwr4(RE9<@q ze{#txc*vrOexh|}W5w+8YLkyFicFa&o)a?FK0{MMYXSti1*oFIX;Ed9e6IFP0|0D! zT=Y$Ygw?v5M$?mNb_rb5-%aakl23JytM!*I@@3#aT&;ahiZcK$zxrvltFE>mXo$|B)dKVjvvn^l^H6`9QO6 z4z|s}tsX?X4z|LxrUCZb4ftIe|5jvCk*l!AOqN4DLz?^7RZpb_!DU{fg`(>l)7aYj!bSt% z-xYyE3_!!iOl^6m(bUvX$~qxp5&%A9Wa?9UBGQkpJ(TYa=X=W(y0bjCxohexUE5W9 zO=BdNqnjJPb46En{;a6G{DvAMhpO}2CPa0&9jL^xOnsuO$COXkPAK!L$$Zx3ujMUW z5Ub^ZZ_n_TK~O}m%#hMyz6BAsc@U&F4Ur}>qHKUTTfyx79G2%##*dC1#UK9BCHTuf z|1_R?_HW>iF8Txf_$dq6ec!Onq$wtGc!}0gSF>W9YUdguFOm&aXFSbpTcMouGwEKYAcx znjWv&ING5wgOrSl9YgiJ;Wn|P7q?IlVbDuVW8jP z;NUxV-Hlhh_VxIOzyBs)@tW7+b?3hjJNv+o4y~XcP|UY`2r%Xm9r=yOAeZ_<*5XzG zjsw^>2C7T$c`7Uf6eU6^`;XtM$c%mJQr=uZK-Y)5Jf^vB%O^)Wbb$a}*|xe&>!|)W z<<8c)!zoH8ln7NR&w+QdL(;Z+UfW_&8|7jGc>@C;G!%65ppvf;atTS_1?!VXWgaTC zmqm^S(kj*fhyRkbX#US){yS~wDJ!gvQ~siXO@_)$_lk!kz~5X z?~$BIHG?=2v@}h)$xC5`w!?2W1ZbN;O(v5ok4=*>B_AehOHIH|lX83*R8zrdS`6Dg zMz;6cIYz$i-`W@zr;4SGcAdqAkcq8$FM4zqBOR@7&1CyhBS29Lime&WcQbLGgCakR$+j5s z1BJ{nQmfO!FwU?Z4{+M-k06X=EcALv z#sl=Ckk^)^DVUo@cEFIGGvGcAxECaXIGlt6GC=fMcQ!!_g`c^ey9BigWOd`?yNh4=^!l zuDbUw?ZdP{e1x1X`7%=*2s72?o8NaVeZJH6vo4tyxmv$zjBEgEnlaLTPlbuE5`^+P znM}0UtF0e4^67)7Nylu}a+}P18-1>n2MwxxA58S4r-e^^FK=zqqEA&an`n489--E+ z%i}vn`gJ6%kwCSvpL^uwS|rW)rJ0WhW)usf+#kUx8Kd3nV>He%7_Ni12nPq>zx8%J z_nepDmRk1Ol26I}KB8(jhvAY0?&&3SRZS4Yiue zQ|ZvvW9wIwKsBYN{k;|R+;og=Aiy+6KEOaXM!t-`R+i)!KmRkR<>MM){-y|htgm0! z7Sr#hHtE`DVz9bC^BEgc8S323UkN|*lWw40->dn=@63Ww zc$elbl*Lg4A_D*sV%uRUnYK@1SgW?OZGw0!YsmJE4?R9*DJ7S3*UgG_TR(pF>DI)A z1p%54CB>CSk*~^I9W0{Ko}vx)Hvt5u2FZ)b#>91#VERFt1PyZi&`d~bIhWvrcx`>9 zLxZ+Gc3a=O+HMn2re~zs8-_G*Oy9W}fiImZy{Zs|W{g~YrYl>0r!pNXS=HnsT=eV4 zNY%#FcInoD3vl{qUOKweHK*$vFMuK4WY8rYKVm;(8=>Sml=8C&CYqS?l4j<4tM)CF zHEWvpE+L>>_qy@Xl_x+Yk7K|rEaeT4ps={4$Y{#@E(#;0af&QU(CPHh>Gp8vzPm9y zzlevOehU8gH-CT^yySe`cgF!-{ei3S_$NITE9(^T`Z^ZFA=<44jQF+1AV0T2#|7PC zd4?v-qbTsYnMEPY5kL-LG%(CH_e}k#cRW4KMqgQq|-2@;io+RF49BTDPndzy@o>z%1h z6SQfxd~q+Cnb1vwl&_~K-%Dh-90+%fn@umX8H*O1OJv1js`CI%K*$YMx5tEvZi*=e)(*xKkLtmM2>j`9Y3ey*V6SrY-KsuB>e z>w( zyRX8zzy4J0Ke3L(M~-26zJrj?A&xVoEU;KPcOz~cV1R=}`FR7e%l`Fy53K?T9$=w*_lOTu3}fA+V5khhg%WG@wn6qRE-7`XU~EtPGSd;{cGR=q`H0$4NaK$@1oktt(Qlmh}jec1VfBt^T^1`Puo zK6V^I)WPX{=J3t$+=AbG@oRDSt#{$W@4o`S^}MIx=y-^k)+T!M8SXiF8+I(5f?jtX z0RscvHb5$NDB@SJ|7En;u*tU;GAdaP8uG4b`J5^UeL=G8x$V74fiivXYJ-~B1ej!= zXya8T-brEJWbkRH`nNU~gKpwxDLcSYSqy-D4~!=HiP{`$+7J5a8f2J>Hrhj$)WYd6bi_!MC?pvP_(58AOvfNK&8d_{Ch;P~NaU2(d zlcL>jbI_o!t)`&c1OiOLrdc8)_+r^^wVcUu$Uoo~+Jdh#OIn6;enx=l`V1KIn;H~@ z;U;J_gOm0y<7?mkKF)gX%dmRz1g^Q}k2yFvc7(-DSVf#1=1~_<*}E56vWQXILP*x~ zGXz;7Np7qQ$mHF{_*cZtMN#2S|PRkep0w+%?uNfa^<-Z4K$lpyfBD@K@}g zd=xgd9cr2Y2!fHxS`IT`wZh!gK_N2(lJAd{rz-t4{%Mn`^QT33vXG&YCrE$il@02e zBA=;T+xJZt2pp3G2Epd)Z&eF)eP*#4} zIddhKurl`3gyl<`zsBz<-%{Yd7QMo3tzr@ zAI|-)^KkT@6^n07eZga%76#xUxTsP(Q0n(_oD|5zMm?ru5`-H1y zoyn2|%HsF>g05mPglvzHn*AR5qD((+(yWa)O(k8*-E|Y4E=Fmi+eEvm9log5hd!Og zXky;FI!t+d+Uo=4Y>Cop`$zRJ;HqCuK7F>8`Be$E;x2iyKE!@`6(=CH>_PjrMMpC{ zm?bphDd#b1Ii|8*R+su*FaAgMrcjmtuzq4z0`{DN0`_me-!FL;;m(56Nswllb86eS z3cy`TNS%ZthK+Sx1^i8OFNthhHww`TXOYAiJBWZ`oFa)6EbZKd+5SBK^X5D8(%*R{ zZoBn9eDag;#jiZ$XYtK%-GLu_;4Y-;I)b3X4{Q$EZG~t7A?YK{#(b}u7QkBu2Mkv5 z^AG%d3~I34)fY{9g-$ryv~ru$X?t#44?eW2-?^*?K6B5suIgpl&uI}Unxl^kMPDl; zT+tjwr!wZ2Br%U8&K4zGv}{r4`+zO9qE>mDSk-iNi`6FFmvkp0KoK2{GR`vl`d7tgz&8QJ=;PU4u|~rrKKIX>#lvgFV8&l zO#Yl%5{PoMiYQwQy1A`;=QGE2YgE^ErLuaEyNQ0U+}Df5EC=~?Vjw8X52ldDcuiSJK9(Z~mS$99OVFV;? z0BycKk;OfJ=q-qn+=NYQK9i-$kvT}AVvmFd)pbV89I*?ttyv6Q$tE{^>TI%(T8bX`akLa z-$`ct8FxGr25q!j8~h3x^KjSe^-8T+?4wi3YA3*gD!AYPai(u<48R5yRZD>SOnt8l zlw>PUSXKBr4Vf9zTyqUVrj(>uTVLZKfhiyd5ADa!ojWlzGlO=!i>0L{96NRl<1w=; z%ulqLSu+F6_J*#XR6wTNzL5LF1d?t2UdG#?RJP+6F1M@eu|b&so~HS=Lv~{!3IlZe z9ey@pdCwj!c3b%JP2a=syxPkqwQ;2SsX!%sf!G^}s#10ByHq%6o1 zMV2sYLCs-;=boDe1`(F)&C0yeISN+F}E1;#p+MOr)zt`9UFq(Qt%*FGaW8 z(ffm+rZ`_|!#d`c7x?)HyH z19UoFjN=5|?hIN{2jBeWH}JHdeS0oVx`0RU%)epEhyHAiT)zpp$bZ+i7}Q3J z!DVJW#?%;-V~lNebrl;M8~EfWKgr(-w54OzCI+S(5Z!k+0i+5awG(tS*z)PVQFmYMRGXx7>Dhk*UIi9jbfy z!ynGq60^uLaIm?#$*pkgcXgXWUBo(?MRN6-51^W+?Yc76-)s5uH#LDMQWyr@YQXw~ z3Fi5^dCbku;}2f-N}PAz%eckh!V53N;~w`oTzTb{xZr|UBWi`3vqSm+I5;za0v`}= z>myx1=*KAE+oviZf}l|qw)yr`6y#e9l(zFcJmx}#EF{>uXD`0;-J9|IFZx5=v+oeD zzVi)kb?sA?ooUvS3qVwVOLRd6y9G~1R=BqeCQzP9 zp6Ga%Tz{k%A~#z8do&uB8qY8M!Y|r595#3ghZv}@vZYco7jhfuILJ(%T!zHvU*e2Q}?mUvM^ID%| z67;@+7nU-bq$b~(Xp`xf29WyDUcX7`rqKp+T;&+AIm%3t2>@mqWfNvN+C;b4K@_$) zlVk7L0iyA^h#yW1f8CT;!A6Q^)rmyKE{LeFeyY3bRPoNNxm5LJl9L*dr}{>0o0z`` zRDTYzbhdmTM3_zkklMkdI+GETB|{mZjmq0FMTtaz>s1ADHlZj?-8J;7o!11_{?=p} z6W`H#cZt~k>ht=yg*H_<-IB{xHE#89Q3vE%MCpW9Guc;@?WI za??69w==$i0$4HdboJF&HXHLeq@AwhUdHySL+f8@j zLm#~gXaDlg;ovdmKx!RHvd;a~^g2CkY_1~=BLrcedq}LJETLM9xvNH9uUXq#t!w+- z@|hc38HXm{`dU0p&wSRA53p$>v`M~CsXbF*N&+0$<)3~F!v{=h4=EDGB+VvWr`tuE z#Tbucexo55C>b}AwptN453;-=iTL58l9Q;zbgPfTUWnmYue&kzR1Aw;GPwgdDccEv2g=4ga0rF@^AC3byJSPooX z0evhSrgx@iIv}Qdr`DsZ&-DFddve#l3A^q|E3nA>pvAQ24Rksk?AWmbKl;&+c%QJo zJm;Kq@PxD6PhJ3JZeTr%eEuHjkK> z3R~g)GT@GJkrq5D3POHBb2E-Hzp#K~D~FM_2~J-+4d1=vPCWb9Uy3_!J%H;!as__- zIZwyezJ36EPwOE}kE7d}$8a>{ecI}@IiO0?F}D^<*t%jlRUZP9b%lTHrD%r zDEz9r$)kcFmuBqS&#q(}M_c_mI&5=BB%PI01)e&KoVs>QifHw_aAyrqkWh`P5BPD7 zkv3S9+Q^IpfdNR6KVwXdZ7VROJ2Tryk`{m=%e4bi_*kzC!?N_ET={QW)9lK+*>#^Z zEABgkU;QC8D8WO$r7CmH%i!NY^8Q#(Vz#fB7LF*SV#Jp<6lNb8N-ND?X{P$CG{|}R zIbca8R9{#TNLGe-#e_vgpZFdl`;JcDy|#i2Ntjna%Q7iN{#4NhGodvRO_?TBH7&=e z>Z8KH26q&bmGgs^Rw=btQU5m3Yp6walGnI;dqh)YPzn`5DdkmQL)4iw`;>t^-Y2<7 zJT}JNZkwBXnUfk}MrT_LI&fgq&P~jzi6*ZrLoVO;tK(^1=O>2_9m3+` zB6jau#tUC`E}sAVbMUQieFGo<@Q3i2$2=BSTyZ%rxZnarEPxa0XAR`?sA8E?pWBj6 zDA?Mm6Lk790Rnpv3P;BsSq183|x6F<23KK$A_FURe--ir@k zdnulC_A~K~|2Tw)J!~E%Sw$Rokz^FD)(qk#KWD(e0rQ2(bPewEma%&wZTRmp51_TN z&;di8wN>RSss%y!PFKFJ|6EBok422heCE0=S4`plP2alS(Zb>;_=^nMVCg3l zzlAgoCX0pK7f^#W$sH~lEEmFrGxvwk$^9V+{|G2RgE*7GB8;)Wa}#T6GtWD+(6I9F zWN&lzfoAWSj|F~^Yh$x?EF*has}Ito879Ah!Ix&uK}~*cVzVeuAYl2hP!VrkaoWN` zN?Kec5vO`-aabi|H-^*F(ji+m_h0jhxhfcFk1nW1E(&8;d66qWew%n6ZD^!7Cyio+}xlB%EYsz=Z$gxrD00 ztUPh`i!p^XO`+0iVp2l51SAI(ap3O)FaQ7`07*naQ~_exb8%{%og$ZM62gw(pXOd6 z<1%t(RR_>!?p;a9^U3Emf-tCEXHw5hu=VtAq%=v2+}l3^Q)yr5qc)1 zoIzmnC=4g+l=BOp6*a*}^D(M`OeLJvE2$K|f|8HcK$!|^#kPXV zD0CWuy3kGe)MP5lIgc79okrr5sM3A`;JMW>qkQ}2@ZrPgb^EyT%B%3=7rzKkd)m|Z z^~TN34LtFQKb-@xGy__7I)sOQe_`!`Ch;9T1cdGNI9t?bGwO{ zolgk~+EEKD$p~}39XLM7@ak8;1^@W>|AK4(>{`6=cboHC`sS7$j2AXy-7%-)+ zSIossYO~n#t6TK+`(?WEC$)9GUCC9JZSKl{`zBRR*uaX79vx5@$rd(#JClz7i8>{} z8oK1_I~jCLgnQOy6bqPbEATCaWQ>di+#don1G3Y^On|e)SB&{F%}9JhN=-g20flI! zINdG&70*cN$3EYu<)^&kq}0AAHTy|`!^#<_po6tzety2ZeGwFHqAAzB z!`$RAX?8NRrx}Y*m6o&!fFxqo6C!ULR02XaA?s zixHauu`RFdxyd>qCmo5{dLXH6i;TlzhW0e`A+9ATkDg+bzo7KUhMjknGn48?@=4Wu^=wYrE ziu^L55sqf$fe^x0Flk1|@#DvF&pr2WYXqY`F7`Uv;juK0xnN~K%mZF|?T7`bk^;g6 zh0sbQ;2?kpqeG57C+HEhh`(jelR|JXYYBVK02h14{uSOTdexdGq%7h5G^ zP4lyAiJJ9bqMs^eJ{1t@^2$l=ZyhZ=7ddns!5%XzVk<3<4u!p4XA5XH-0wSbadMC>H5)Dx2rs7(rhuv zGQ*bCIwt^v4he~Udj<>`Kwy)TEtgi*=BJJK?%i7oYGJw`31S zknr;RGd=DE<OX8LHgLWHgS zu;q>&OXzkx+%>Kkz$)fMe*LJ`W-fEPoGCFuCcux-nuQRPL6Iylgy0v?7+vCrZGVV5 z888v$iL!M2Tmppg`_ruMuo6u2k1DKlfn4Mbss$*60U`9u$)W)PGC-5_sI<%F%l!lm zfDlQh1*i+(s@*7^43+bM(Z&D)i)+KY(XnYxNx3be0vvTAslV&`QTLq=gsBWfp7$>1 zq65{Yq%t#=DVa3orsd1!nZS{=EFo^CY@%P7OKN77M4^x{H_KODbrqib+~?vIuXrUt zrN4LY1Mu~){Rfs77bjv}K;FKPqRgt}VN15W;*m|*$o)n6mz%shR9^2(yGpB$P7@%o(Wa}T zsQ^|%sruY!zD`zRuE&;id1?|zWgId?9*@R6v}n7XqjjczudT0gK{gtV`9j{cYbOT~ zOjDnko#FfS;_#wiisH__7=%zq+j7C~quM8!DE!xU}1+%y?2Kb%td>4Ov!{4IcpXH~Qp=`;B z_Q?Q400>r`V33UA@+}kPps5VPWb?i#8^v>8KFx0vP+FPM*|%&=1rQKtK}3JEYp?7p z_PZDxF^|eRr1o=Ki@oEd0FZKA0#aCh1nrPOQ2rB?<%rY&0;n)x$!KRlAT73d#6ich z?bCwt237|Zd=P`RM=skGiq^HTr`0r?d}9MfP}*str(*V%*}wF?Q;yd$|>@ zRh(0L-~%7X!9KGPEiEo#V`Bxob}#ZVXFy%dNjV9fpGez4zFMI^31nagmG!?1x5QZ= zB%48$^wCYaXvYCCia}Z#NH<18*Ks^pM{j8-Qrf{=uech2e%*EWZ;$*5y!JKE!=7c} z-h)RGw&TL?A8^Y6pYt@%x6#s~oi&$@#TF%XoxPbp=>(AufKH5$A^_E~QP+(6oh|8T zvVCg;=X!vsr`gt4xt?h)AzMxA8ud-JS)(E$BANdg?i`JWe33Gg|ISM({TX&?L8$8f{n+<-lMPT^)TCgiy@k>Q{eT;hk(Hy93hdCcL;!s0x4LUQoX zL0op(J8@wDz4)`MuEbq;--WsPIW9=pd4#Wj{p+~yy6d8nJogRtQCQNR$ai=Gn5{iOTZ}VUzz(oOp;?-PJVN=F z75kU{O|TUqF_~12-4{goCSQ$L{!zE0Ou!!oMrdQ|x^^|SAP9|~C^Y8VZ?}lxAZr5&0Zj;E8X{p9yO7Pr7)cOg5GGja&*SiDfcJg+?{MvvAHd@7 zWqj}>SK)!D?!v8i--b?W%nrE#DT~iA17zLe-XsgWl=9meR5|4?`l9+ZQ0R1<&Q0&A zvK2!V^L0}#U-zS1qtmQg9Wd7c4>__bBpIlJ0Nt8zvX0c$v^`D>hqA?>128@y4mL+g za^*r}?e^MOTifK$kZ!u^JGkhgH{ubGcqIP%uRnt;uDAjxj-9~sp7$F(xX8mE`iMec zu5yii=g!@{O!hYu01FF?r8Oc>23&A$Y;N#-&8O}?gM$usZr}}Xcmo!f7IDfcdwJfI zPTq@+jWrBM1MVoL-OjfWR##WBv9XRc3%KAMY>cqDxWwyW-XEE7ny?jM*PdN?>|-Cz z%V1jU?w!jBf);ix?LxoTN2lGz%*-r$-PyeJ5ORjKynDI0c>!!}u5f|M01Mj!`QjJ9 zfM5RQvyi3(%+D|IA10_a2OFHuj5{jHZ#pm`$D&~NdVO9N6YQOCzURKUxD!b-!s^;8 z+U&N5Ak8qEbY>$yyR+umx4mWrky4^mfS)`Sf;}{G!F*mnRK0k5d7zaZP ze6e@^{tUO$tEJyb93_?Xt8#$t{=nBohNYzE}}kW723Ho|88w0r@QgWWLg8H{ykM4Wl`KuHBre``DU4Y2vnXV37+jV^b zWla^#t8SH&fStUp2~?L=_^rI4-nY8;sQgO>U=wyH9U~A|1=rU%_?0+zSZ{WA29J8w zqxgROZ~o^0OWc=$*-=#c|El|Lvu~NnWFwFS5_V+~WeuV%vac?PAc`W$;sT0_h=70# z0#AG*g73NGQy$Of@|vdb=E zjhKl0_rL!=9DewrxbVXF;io_SIi7v?8D`KVOsrkI2DjgS8{hZnV}HVd2OP+iBu_s1 z1e|*6Nm#%BRrK`^;IB_UiQ`W=7H6J$1`~?~gA4cok%mq}#h?HDCmetLad`jx-iLMT zHln?)lcnfVsmj&>GSgl7{)=(UF-NlnVgLOPM0a;DTR$$i;5~Trn~&le^n-&7@YlaS zfh(@~2;Or1(RkvC$5}Y|```b@=~vfWa}7TI=})1rZvgk-|DQPIkT>AM3opdxO*>A&Xr=QGgzJC3Be$LZR|DET5 z=9#B6lPAj$pJwMtlb`$~PC4Zyem5ixEnK*iHMJvGAA$4UeGXd%i1|`= zxQ~DQV_3cVP~3F$^%xvn$Zn>5ei928EXGq${T=6>_by(yv(J7zo_+RN3=9n7-g|$5 zH@)eNxbn&?(Azy9-?-~8yzz}k@Ho4>dRSQe@P{wQvBw^bM;`ej@0Xiyx)Dbnc?9mf z^I!3YKRk?o`Ip^4AN)O5uRa_XU3?+> z`xoHb-~JB1e&?N-*Eb)oOBL}lA>Kih3A2&b9Hl9keZ*-zNiFKo+JrNTY1_m*?wY86 zX49h9ra22i^cseL*9llN$4l-69k?rFnaa5I(o68W-~A5HJo600F2Dc%7qDHNR5xKRE)KI(T<*lTt?N&7O+!eIx2N1Y@4IkRoe2<$eE zsT+44c71#dOzkFhpH)gdsjiUy?&^5Iy^yd7jK0C;;6TB`0h!lzAR=WjjErn!iGSh3 z1$_PYzV|&04h}LTDn%Ys=D@eU^(~hEzy0lR<9pxx4jy{wAvWnBbkIS#Ww)3@YOhA|ARO-;D7$-0bF<8_4v?-K7@OJa4&xJA3wxbzxuDZ`R1E( z-g)QZ$}6vAx532tIC^_}v2E)%{_d7rZo!4`{{TALI#_!oX8qg${T(JI^0?}%k7M#J%_4iwzq#;0s^)B6i(%H;hk= z@N+J@=pr0;*kL&Dyz}tg?|vH(Km0Jh{`IfpkV6i^wby=z*N6fTDF%WBBTChJ=;4QO z+pV|awXc0GuhX4(-ih&vaa?=twfOnZf5urA_y5*<^`OouO5fT0CUmwREcih3Bk+4E0Sr$~_ zV(XS+UhiN1@>e+EfCHG|ZrHF9_ucnn{OVV~#E*acV|?w-ui@x7AA?VQ@@mYRH-M`@ z{Ymup_28Oou4Tc8groTb{pygpcQb~ixRb8{_>YR&yRleqqzI- zyYSqz&*RHqzLg34V~;(?dw?{?d+xc1HAedT@y8#>efQmmGtM{zYu3Ds#~*)!-5#&L zx)BdQ{73HhXFvNHmM>eu@8{khejg7!@BrUS$a^3A*cCYP$klkwYhJ^pgEwv3q^uF8 zI>KY`^SKa!D8jM5gxKyY&V-rN;!K}OV@ooVHtJ(GTDp)o%;;aIInqxOILYO<`|hjo zp7*?mF%SrD`P5TS#k=11E}V1DIc#Cvym>P#6?HZNt%K(Iz$OKjn*q_9FbWJQACBz<1%Ny29iS?mKYyhOXg%9cu0QigAX|f z%a^aj>tBB`dU|^B_rL$04>|b^=}?o&dbizH;m|`5WoAmgbDG+VFRo#YZ`raHG7p;F z2NO8%xZ|*D)k++G_>p+w#WmQpd5D7x>Dd&-NY7uhW(~Ft53`m`i#mV)d=^CJ4-R6N zWy_dZ69Jk(e?SJlxdHY+U|%d>zAIL*ej{tjB=8X7q2H-b5(>zqPJNL(WzRkKVRs85 zy!G_d*hsQ&gHVS*Is)aa@lrfPQU%_Zx{`Z1e-nf z+zY3l_EroJ596q#j>388osT!Y>1e$5t#89OzHv9+@P>n#ypZc;)v8s@^l3~NT<|`; z{`H68hU;%;bN^+ReGtbSeJtK|)SIwk`AQsi*b$gFZys9=#>U2YtOPhSw0S6u4WRcy zaT+@<-5DpJdvA0YhBx5IBagyi zhaHYvZ@U$aBXicF0u5KMJ`$@|?T&Z7>pZMpy&9kU-1S(oVg*h<`BW4NMP~XZo^&D$ z61}~BTrPa!!iBsxguB1{?t5bC(xtWcHh%$UmUMP@u&aeE4&9wH!kvmAtv>RN>?--@ zJ>O*J@#K?#V`i~#-Foc2^D@kv*Ux@z%Ce#NLu(PG?aY-SG;7vurjMu=M_}hN-exrB zq_M>@f!XvG3Ohu2LKj2L?+#|tlEw_SJVU_D}h)c*39M=+TmNB=+{e(?Q! z@tyB{2dABO8Vgj!I7$1Z^&<;Ip*Y3kn#vcj+sfTokRW*4&dzpb?gIk@d@T`J5)^K` z{Z5v}|6*I$o`$zklj-~Jpgp>_&a z^fdPg35_J!fny2AdHv|!KKkgRAh~hfx^*1GaNvOl;NE+Gh}XV$Uo6>a3CF5Xe8R1_ z-inPIH{y&l&SHV#?z`{i_uzQ}XUXV&plM-yX9u#m6o!U2qqVgI{rv;%j@WPiees_6 zz8jl1y^7s-+l|fBlx@TD5^jnyETWoC{F-S|_smwyw_DQl1Iyn#+vhdgnkA$&Oz=(3 z*I+J=2r)RIj0$-Lx<=MW3iO@IPouxTpZ5j1u(YX^+z^*udMOLLv|sASWyC!sjwQOy zWo=D&gX7d(5~*~S6_&uE46O?CrD=Gn9NIb;BI{=G)vw%x?|kJhoc^v0@$oCq!lo?~ z$Pl_|sx0FU$^w-#{Y}_2ROiN*F$avwSXIJEs%bEt9kE~HG|@)dd!z4c!6T_9F}Ng` zgWdP`S&Wj~Y|c^a7=plvX;H#~pCCvWu{UP_4WAP;#?XS06K(O&eLeC6E(pq&fcTSHEIr zLJXE7=E2N#Z3vh{*%K7#*WK04Wu+;jpjr($opO&o_QJX6zMIX`Bt+z=@@ygC`tg7I zBYyb9A7Rs`A$Ac^)H6Ms;tgmO|MHhdQJ5|wlWxI-5B?F4KKcYR5)vW?2KsT*NvAM# zB`u${8l8zjD1G!d2`R*wN$V!9dau3q!gs&>UA|`By0y6Pz8~S-bI;|!iP@cS!tq$V zcpkr_VyYj5jj!C~df zRqRTkph5}`ed?*FxG!Sz+qMnkHLuwZ?|%3Bci-M{)K$&%up1-h|t4{}&FheDj-+ z#{KvI1mFGc_qk89>QJL>7Me3P3Z^92)`}IoVa1AF@W2228+`b~SD>rA3x9j+ulUD{ z|G?AF{tYj^`~p%bhYQzKyb234v(b1OeP(*_dvSEUG z$s%BWeO0{@s+4Z)W;sltQksOD6KL!1!az2IuiW|XxZ<+U z;PnR`j<0_1QjmjnVsZ+;Glc-tD3zzUuT;84mTdOHt_nCMz$pWwqAH|OT6e19{F-G@ zar+La*P?BP9v3$d*IyjZNn&Ji^NX`^C7p+;JsEeO-R8RQlfFk(ze+I=zxQh{tf=|x zJs9KHl@5ceCG}G~LrrI}@+G@-kNLx;vIH zTaKQddF=mw_~D1}-uIr*E`y~@cgDv)b`>*I3SN8g!3S~p;fJ%Psr|&$g$Z1G*$46B zn&kqhAB%Ut`#hX}`l)#Dd*8z*Nn-vaT~T%$5s@GM z@P~NITaLwHhaQ4UFS(RAFbN=+Uw%1jub=$Hr|=*D@gtmd)|ptcWD)k+XD?=gH{N(7 zF8|P_IQf+0(bAelTYC%V6c5awCl{ZLe-)3@Eh(Csh}8!^a3RMn(EX>Kb_y=O_+p%U z?s+)+=wq>U>n64ykjeYg*L(_(Kk*n&J?%u!e(37x!a)CgUe6WFSFmM+$^nzxs4j_gY+Z(fe`M zTTjDx8NK1d>tpBaw496 z?(bNAopjO(`1J$7#%uO@ z4c5N&GXDF&euh1E-y6f*Mv=|5aJr|4$c`&bn?x||Ghs8yD8`xO&PZb3Ng9xeI%yy5 zsAtb4Aki&~nAmf&8AQ}PqQ+9Yr`}F)_D3na!y{W5Z-p#o5~VbSLNSkbyyG2s-}~N= zQ%^k&pZ)ChOee_oSSU<#TCk{#!gj(UYW6#8v!W&zAG~al%(U5)JyeN zs-6TYqzo{jFj~r0RN#A$;b_FJsk#2jQ!C-hz(y4m|nye_*G96mr=> z)r65CUozf+=Ascsy}FnKGbl08E*1m(ppigipM$u4V>7ix#%A?zkHZX_i#juQpHX`< zN^ohkf6XzN0%hEMqRwG6))IRSY9!cvbWW9pT%a$!;pFH`d@4D+Q){trAtbg?t_U*5IWi3)}8j}-K7#y6>_hhpfOpH(P8s%DA zcnpQ<0$UQuv`v-`X?gH5GB$#tO{8V-iPqK@);`J2K=YJv(P@4b2^PDqScyut%+`|5 z&TiJO$&x^3YSNe~J(Eo2O)!(VCKmMC;Yv-No8BSq>;@lRld+$f}m5a)GPcl?r9N z^zutswQ3JG$C4?NgcS0}Qw+q0jjv#IY?QU;WxMQ(@$nIC-ZX?IOP25$KYGQL_|~_- zg}*%d2=?A{Uu3gsc7Kqs^ZDnWLuXezr;^fHp3LXjVxkMoP!_W9?ZWl$Z8U7)~Hvi|J0+pZWM9${ZFLu^+obq8d& zOam6NwENM`uAFJNI0hegUDC7c@h1r*al(rItf)CgjiK2&n9rj#r5ctnYEjZutcmjnEO=^ef}D_h>C+^X&mXUEPC4J zbD-gIZ+##B^oOVMv;X`y4n1%gUfno>Y-$>TD9S#O;kcVX5qvcw8GB%BkTD=gv)N-| zS1|%?qkd*1fC>YgtyzJ&nP)bdXVU#~8g$Yb*%7UocVu5f|A==G6u`p|{{eU1btk9O z(|KvhwbfOJO5M&BQ^lwJ80&E~q3+B^UXilAl>uc_d&X9f3@Tn;4>w zA)wDG(2fZDqD4#alb_trDN7W@N73iRgb7KI7&tKoVqoiDS%<-aL5z)0V9AojoPjV^ z%Co7sqpLmC0+%h@nF+$w)C7;0um{LDN51Cvwss8cvk!m2ZFmdUbtspMsFW$1f12?U zXrW2qp@2odA`2(^W22n9M+b3ws>Dn&mu+JSj$Q;qG5gX)K3&MO3436EKWjSOyV2V&19l`DuS}Ps!N3MXWsc8Ui9|O zV?kzkcpJ}UpS}0txegDH@>-DlVEM9L-~|M_RFs>NYRwZ!6ahcEF8b&7a~~x5k$^z+ zqdB+aIUZgK#j&uf&ejha%E8PCp}9F2Fv&ws=q-&h9qcFfAlvAJv;Bb zOPz*8@14G<`*ndZ!i}IkMs0X_EAJx`#wdW5?jgJe0#-`03PiPLgn_t27eo}Pijv@G zDHj`mIlLZSFVsQRq{)~PuSg;7+``&l?oLqhN zH8}X-gBkxqLzlabS??ttvCdqFX69MDCQwp9iXsT1%XhNNDjAf|GJF zJx+VE6K+Q@N=^!dfbfw|U5#J;_P4n9oZ))zg@R=kWM2#U%5Qr0^ZHU?v zjfA17>*D%ohSnst?Ga3p1i&adVYa$zj!|X?vvXql!~}@Q*R;1{2z4t7btX)K)I^a8 zIb{aW{gacgvTvUr^}`?DiwiIO01iI*5NzD|DhC`1uE`+5geZV8o5_YKeq?$lEtj4{ z6%UE=(s<~5lCnuNAuI**;cLGn1>H$VVFgR44`! z08;difR*UIrkpgU$x_jg;n)QFjOIzg$cZPO$Z*vpBu!5hSUaS7P=A!6l4i;$A*yxi zCpE6F$*7QNq*BDlvlt%T%4?HKNvl<$f=YFoqOOgh_Z|rYdA4x4VWx(z0&1?Uy`Q5@ zefB}InQD@TWj4D2l5NV2BN#S=k7Mj{ge;06&DJWA^nIKlG@B-b!N^3dZ~8}IUPK4h zzVb4@dH27euXi4QMndP)&peGy8#l8;@%!KZj?;ZJ%9`Y+Tw|@I;9&|2QR8i-QAILZ zEz^h^sv;MjVp69})`WiI5?)LSLADhIk;nL?hn{(haorvF;Ok$w9cO*yqj=BdXCq&# z!mCVRes3$bju!wf+w4G8MJ+f@D8F(j90+C6aA&w18qK4b@0+!JCEeeM`8PYxB+FMb z7KS)s$-bu9J<<%rH=i3t2kiMYnu{%Dne;%&PHWdD1gka@2BKOD5kxSq5rHP68>sTh zy7mDvY?+o+4kdc(k3Q4HS~vP`%a+YJ`Q#Hh#g6V>yY?kn;&o(%`z6g!WBLaQVwil9 zG+eJL7bugGgn`h-DBX|Da&!+x(lb(DAeb>}Qx?@&r?>&Sk4-Q%=fFW>x`a$R7ixO~ zzREq7zC1UT=16$2O2w&U6uf3c8Y@j=(F`iXNP`tdXbhBDoKY#WvL1x%az!D2 z(G1I+mS||@Qi0tmp676Jl}uK;793)t=`?4BPzqwXRK=02kLG_g;D0>-EV_GoSnD32 z7-eQm7M*;)$OKEKsyaxgT5#+!$75n@oY%r*>x9b+5?N^&?;`Lyi-7Kz^)JetK|)#+ zne|&+U4BbK`3pNEC(bEkr0*Ppw_Yy4x|-|_5@TpWSR#F0#vq_K$m2mue{Ia zlG>8+(RHCPW@&)hoJQB^y{E6Edvu_yt_jlY;c4c(M)%l+$aFhI5uCvCt;P|;xo9J^ zCD>8Sb4O`IJWpnLQ9)a>40$fo$~YJO1O2MzM+xVicMe)}ZFv6q7qD{WN@GqI=yHZ6uawcz+KXwjsL$fBOLJ*^q*!CacnsH2!}Ggi9UG?N}gDGEt~)%LDs=wfK3k-!M*(9BQ| znlx{z-DzxpNw77-88dVxSP*le&k4w=T&*(GmA>UprVgY*!y+2QaEQ?m^XCA;YFSlW z^jT94RA7!|5>*E4C%kGXMCoQ0ehTYxRAhh+y$>2InTx4rKJ5iwR|Cda7jDv-G;5 zTPO?WfCFB~F#v}hwi-9zd?R+>eRtmX{R0CL>k>cTX4h?IrxL$`1Hr;t20o986nVil zO$umfZQ;FJDtXwrX+3t`dlkm26B3~-!A-Z2 zbdHoOgBxeG(5(O|tnfpFFo@08vbRS_h>M|#5`3GnP((4+*^aT9_Z4L|h!V8zb!x<9 z?K2o>o%sK8j)ZAt*uj0X7~Bj2lph4L)U&83V$3{LP>#cayna}j(1be`3IdWCP?cQ< zGT4VIKMrl#%o-|bl0ksF02UHBNTVgwKRts9zcPyp1-dR@7@%QKnK1~cie>?%;vDcl z8XtYek-{$5LJQ|b+Pc(UWh2JL{!OU+9EoT}_mR*d!t@>q@2czEt7L3W|Ks~yu4*KW zgpN?(10K^GVyYy_xbW$BDh*3D7~rr^Q>c=~u5ejnYRR>PE)WW4q%o8zz?14Z^z@;< zqa7ooqr67hTq~waWn|l3_$Z<{Jq5p9!9ec-(quVd0ZO`OQW@z=VHXbh>sct08d1vC z<*w6ABq?Z+TrN}jDfIRADtrbnJVa5r-iSC@by{gyl3B3jLKkw+5}N4 zZf14Mz%unWV_rA^HEL0kzNzI#nM|YZu?bw#S&h2i{66Y)^ZRD$K%8Zx`4)s{R-?nw zd!ctrF(?#NN)X<~!W6r&e({U{VFhA%WC*|e-EY~o^uPnZ=6y1MU_J}PGsYXlugl!V zE)&p$psF$o+_27pq=)2AE3>d%Efv`v(9zP4#mjfbhyZT*!guk+0}tVn^WTBD9CrZ9 zlX-NuX3*8zftGYD(oUA?3<=-0atY=;!;BgbwXfr?B(t&lG;2wY61Hq+I@=alQTO(q zkD?>?-!@$_=iaO^pLC9zwVX6MNA?^WwKye5pC6UR5a~`cpF5X#6p5s0{$6kX^V!4} zh}wXq8<8vnJ_`pd(GpX3H0-GH@~GlpS{C?m(^R>!3^yg%_e@Z_RlkDno(>r;>>C>d zI>1YfL63u&Il(@&6knBiGl9}e9eWCg&J4#p}!suqDmPhPxH6rPpVLn&_C!&$ zBq&TOfE%sVM@iILmiXw!K1c#_~NfHu}z(nlzsXzDeu^V$^22vZ=XFME}q9v30QS{C0#-`1i zIChCL7APILuXjFU2e;uk;1k|hf{t(J?@z+Q`*!99);H%mzC<{X;zQ=G{lC@>MK z4umh5*%wMBu2(~f!gS!Hw=IWX{NJDO-Fv=)V~#rlpS$)FY}>jOTgJDc+R}!S=fW%a z2+CEqR#IPHPz}@CLhAr23XUxLriUlLmljXq#P7Gb`9{t$ff+_=&r!m5v(}oVvBmBA zBuzaqY7Uqd?x;NwCwN4i+h)dX3nOvLM5D76*(fNMgJ8Wd#=t}%<#VJ{Z)j-c zJ*lN&y$n0`Bv!f#H;b}zX{A|x$UlSnmw~D@pZmf`hWz$km4nMD0FBVn$X`y;`y8YL zWlj@n;h{U%e;W@lDqPLj%#d2VL&P|!-6;hxDIaP0bYEyfpfp+CmzJXp0%SM24w}fJ z?s|mJt^FOS11=CdcR^u#iZKeZ*#T@=w;mm-aSZg$gX4Ob&Tm8aKp(b^OkjF?3X2C9U}AWJ z-3pYRRq?0QddgI;KwC$AKh&H|t=wkFW{W!rb#VcKNlf%Xn3)L>MX+EHB9j5r-x>lu zO32VeB`!W8N_#h-V`e9q*Vxb0O<3^4fn{-t(t7OqHpBFieve8oiz6gS>l`&dd#+LA zx0#QgyU&q+DNc=*6-4_nK0bltk3SwSz4Q{^`OdTXy8ixo_~IA8#JD2)sqxU2h47vG zq1iPKhS*+%MstCp1H_2Ql}8EzY5ZjI^s63nEh*%yC5(@aU~u6QjE_xY`I0_7Gc<-T zUwtD6QUN}9^(P>z0Vc+V(9zw6vL`sD*io)hve@}4fRL3*f2kKhm4$T1elltC>;+(( zdB+KYu+Bo%SvK7gjrMBXSP-+{o1Ke2*0}4E`iz^i`B|JrBkH`{eK!)~>pOrd<*kEa z8(Tc}KC$1eNvoP|GtwOG$<-~4Znp{wTmuTmq~J$piqd*Ou7GmMLw@YwLusYS#BH#Q2$vBj9FcR*IU7IvQ47J@Oj&MWISVDCNm#7LopuKtBsH(kO- zmwpV-Jn;?(3%M_ZrUR}uz9dGreSvo~ z=zPq(k7N3A7MHlsXVdI68km;HS-#_D1r7VYW?Pc5F&m*Ru4&#GH8v5t8MLK+<~-)I zN5VA6M$LSHP^RbbUZX4}vvm=A7j#CB=DK>g>>40+G2cyv1X8Ca)>cy8EVOo|H=em! z^#aruVuog**sp2Q5lLU8BsPk0R-e}g{|FRQDMn-y z8bn+8Vd+*5dURw!BsdD6#Yt2J#SWwxr@&(nqE>zqNAU*|*{xEQLIt@63Z-fON$!AB zse-^wqot<@-R)UC{lZho4-aGSReRuXPdtTHEBBTe3%-YJn~Z_5o2FOVV!%L1N@KS3 z{Y|EAub;5Y>xejzrj{P3<(sYr7=nvt*4oNp_OD$KNhN`k8r`GgAvjP~Wl7L8wRUP+ z3iR(fmLgEWly<%`SPs2 zTxU^B)Ea|OkdLzd#O)t6*blSWD{=Sk$m^r5B-=BVX4VG{)?qH^Xtn~*Y@ZkP{JGp0 zS`eblj8PAZxa2OgqpIq{w;cPzi+v8E2q0Vj%+!g$y0wK*gwLF0qu2YC?|;T=GJ<2oy8*^$UWG zKL}I-4z>*N7)S_^fGZlI-dBE97p@GbB*8)+}SR*0jPh6Q1>OJY)g0ij>$}#5rYsl5#6-r zBR_M(vZhke7vaXX6>wtcp&4ImY<{3(7ktHhC{3^`rF4ZU9hyz}F`l8Y*UbFki*jdb zs4R550=@&3Nn7KzM}ZVQ%aPqxiJ?2HKaYZq0;IG+6Sw%Pb79zWxG%?3dC~RSb6~(% z$jk{ve5h($SpuE-VPJ{Gc$ZpwmDfh5JxVJ?m8Gw$Bv2Hfsn?c_3tTT=VL!MIO63w< z&%wNTz3>(f!tLn7{ZBlNyT1MdJoLv$u>XN?z?mnm#s^M%BgTeD5tOFcHQ{FIStZE; z>(*3+rAB=S+^E32P=rlJmBP1R|;p!~E@jGM+q!hlBe zB*tShaTun3&9F?tAxV4C))LL!sb2=-w%eQcBObZut zbHbu-o$Xy*Vb(nV_4^H>RWFh$1~qV*sC`<~YM6LP_bM0t5`2EEodYpMS-ZmnBa_9pn$~w%ivWn4$7}?JIwVEF@Xaepl>>ep7^d^)dJn(ky}G{K-nj(jF$(4Nqk=YdKs40H&G zp1jHw@O(Jc3bHf_CL#`xff%VPlMdM2L1Xv)pe6zciI9fcC-QmWGRR0}4qQ?zmr{Po zz^~<|3YE>kWrFB)tz~P5#MuH4YY)=dp`-V~QL8N7aBM`NqNZgurR(UYLdIA44htES zjp3vnq)7P4rpecU^@MG|^G4nG9R7$9gpAs->*v&?k!kCQwq}?co|&mH z!JUZl5EE%{Z?6k(Od6AE&4|haH?I#=@FOubinOPH8WNj?5<<|_#m5-wlkm+aCmB}z zh$D`u1KHAe5HN^^tyxEDHc>)MGg?<8ZOm@5+D!w(7A>GCIn$BnL86CNRbeKHno2cX z2nLji8c3Pfk)RiaQWaH4ISZ>e&}9yHv1t-P8EZZyvX8emAN?ku4Z* zDks5`_hYWMm(+gGnOJ3o*hG|`7wjVP!+H?%E zBS>TY!t?+DAOJ~3K~!$~n-~f)aLS(1zuT6JxPxOpU(Y)#z0q_*1cs}DYEe*~3@so~ ztb_)fGKpUFd}p>K4L<6<#1V$sFpy?Gx1V44IpjN&bCvEX(>0^-qjyGYL#ecj;S?8k6a1+zLHkN4DK3^-{>Gv=bEyHC^(0p+MRR? z!bzj0cL15TES`MsMST8-o3Uu1A2)pRTIBO3jBMG0r8~{%dN8h&MXs|Ir9x5aFq{gl z0gyDCmpCo8<&|oHRMH~WT+vpWDbGezoNEg#i%nE(X1^tkHEw@L2?Mrp((D>EbA}p? zbuQ;2B6~M$=unT@*RzwxONTDYqfcb+Mn`lKp!Az(7;be0dFZ&ps*n(HqJ;xRcQFTe)L%A9#S4$wR zIqLn|nt++=sF^8cx}a10r~aqi z3Z~Ytzthag433Rrx^exR=6|zaVcI)By9D;oDxnu!-7GvG|iPp+gsZ)Z{7fxjeqAm-^q~dT%Q9zj(f|oe3rN- zhg(Z?B)1|5_Bw9F$n3#HoFm3q(Q7S2cP9k^OW&@5Xh#}Y@v{Zwo+%I(C7sO0919s=#3dCjf}{!?>dtv5hN`EftZl!dAo`cHzF>x zZ!|7Sha#cKQG|ZOt6MQTK8{kk!Z8D*6Qd|GXi9)`*<*`Jg#{a*gPDkUW&IR1Mg(gW z3Qe-AOt%!vK{?fANoYk1YqxI3rmTn*1Kr`)H_7=N$DYzIOT(*7&j88JJ+rb~7eionp z#PxW?F=ye3BVLD*En`^J+rn5R<%-9`AyucPf^tM|2w+UoyqZE~r*|7^V6$KAS-jV| zSd`3nXP=pW=2#nzYc9`763%yo5Ea+r&QYCEB5E-RP4*gjZCs31QmadItQoL`dWZ(Z zQ6?}ai&Uls(}hX6X(}*MM5Qo=mi|^o4I{`ssXV*kK@~#DAR>%^=luRQKZjH$K*g&f zosmqUOvQDwSwN&&14wDj&yzR?96lgC!t+yO((+9ZafpKOCz+{9gdoR75hV;82#OVlkPyur_?c@3uFaBjTxHEvXN$MAFinHqD+CNP!MHyH}8)N)Ui!vQ38Z5 zfS61_j!@Y1tcL@inbH|G7X2(cEi~#`<};(#Den5DHrM;(gs>>{a-3;bsDNE4V#nB= zZVf_PS_K1a9@@x-ny&izr}^6Neec^i_~64ZfByWiudm&C2M#*uAoTR~%333eiR*%0 zjyC;S!$_KMI0qdd9a{aB70a(GO9hQrNJJwyfRjmMs8qsDx8I6gmhO%_ZoU?sExizJ zWfZ5zxaeBd7nqosLQ6KsKudy=SRIMD8m5jb;Xqq0*_v4k3~uHf#aX`^X~MJ7lH>X` z1@>l{@@!f&j4kfDar2w2z--b)yU#}V+2cxjXEn$C%=u^@tF3ZDV8joKnP(jqJ!)qC zBZ@WEQVBzoG8ZiZa@7o4L>tQRP?)Z;>Ax6ckeQf7E~v7WuMrT1s!&)PgIWYNnG({N zqQE-8ic~qpOn2+HVQd>2!`f{VSoi9y(sw*n!pP_ZBaQ_gL7C>*Hy@}V!9X!_k8uqY zd@)U)YAaCmy6};r2x*Z*S-2<#0rKS{rb`7(m5Zo&0m`0(3YpVER*?+SB8QxlMu`Lh z{c?o%Ri@PkUX3|32mzTijnAMWAcZn@a$2W?S$0I2dEn==Kz~N&KU2Empvxx5fYo>M zKV*PZD+^78Ye4YM1kK9Nq^gxr=1B@@Bx{JL(=1!%{e=l2L&%B~m=+#HwH=kw^&Gev z5D{z?^>>`C#aaF zew%Qa2#P^W%B9(dDFA3@l=OV_dFI^A@6ErH=4%URXh4)25x&`402;MswNCYyR6N+# zBC#a2rKz*C8;ch$#>R~suxytszWL36=aTSmdCLjt>S{;1T;Vkv+Oi2}oN+oAXLDVr z4q90#B-Fq>i^-$2{&s8bD@TTaX=3gBjta0&bLG{dE70E6f}cM8NBs2O|H0+&zZ9?C zcLlbrokTf3f{t{KX(!RjbSlGf(xfB=iq6)uq$RE3x-Fq~qn^+=YR$a!xqO$na+ZJ` z^{m+n-i@BuX#XdT#TIB9wWM+F=ra^G-slUOyskli&Ag*{Bt_wb%$+1&KS;xEYe%L% zg%5q?R{ZaSk7HnPDQmfIFp8`*%}kqp^E&FC4itm+K*jpYIt8hqf(>pjwxoKH;~+Z+ z9t8kaeHH{NWlzGHaug3S!7jyM$uyT$F*~Xzf}5`S5@m{m9<-{AsDhDv?KVhD4V#ev zGBSezX=$eCvd3%@@K8+^nE?yJXiyaj-Kq=>^i}pjK$Z?wuYsRe&O-ti1X5rSM&P6) zg$Tice_F8cW$F}J0!Wx3->D9=^krcfmIQ(lgkM5XrGiTo9GR93(k~cs2{M+0|DwQ4 zXPU1A`%89Zwl!M2bi*l|@BVP)Y~bRvE*! zpZOdH7p=l2=f4;JI8{~6!|ifWEoTr=U6hninOPMM$o4|lfwmZU2GE*zEkv7&>&DgK z3?wnpr0-|bc0?a>^GW&~F?)Y5&q-2nqS|b%Byq}Bqj87VM<5E<(HH*Ttn|6#TAhF( zP%EsUEde?kf&Q$hv-axNactT$jj6PUa%CHe)d3*0E8r2A@l=5kWtt-`H#FVVK#d_P zK&FCe8bZaBW^i&ZR4USRo^Ay)tw2i-pmaS-rA$@eWXXDvmKwF2L6AzrCu@b9;Q~UO znZOwlDR{1fTp-X^6(|YLHkKeuD(JBcX>H&b2+feFlrt(^ZIWTmg1lnbQj_q4GM8jc zQ#Awy=?Tub>@e_3KpH(;8ze>qci^VN zKuzJL*?JMUB?Q?5kS1oU<1U00B$S1tRz@NXpIj1!N%&4L;O5{4BhnjDDIyRB!0kXO z$f4v+!Ao^O1QgOpE+3!mDPB;|)T0=96caYJblptQAoI|Oi0Y5J-=x|gHls9wn&Jqj z&B)`*+D2It%x1e6>}IZ$-JdBWXbXZljyOha{~jkqCG}$y)F?rt5z~q4%f2^OumM8l zA%yK#L7o(YKn0pSufo5Rn}Fo~fBDL-Y$c$8zOk_}1VJ00W2$I6IDY}xZ;_c0keDmN z4ER*pPS!gT3ZzZdX0I{hKnvV5Ybo%n%G#k3IWrJW1?en+Obd3(bm5{KzJ#@pJ&jL( zOCn>yUJgnh^$~g#KE5k~Jpl%nJ?06UdA`xqbY)H1uYz zGf~&p2?&8Yv@$SJ1?bQrO_9&6grMS~Q0%~!mz;@n-gzuUCW}h3fO4^_tn6im{`JF! z^BF5$x&rmVlmAnme$I1H4k{Eui0V`o8%Ogfy6qVA(wHbX*g9Ipma$=sO&3wD(zx>Q z#wThfeP5Z{$xKP?wl*#tMpy{z*RN-61S;G_ zcoGX1EMTiacXu}jF%IO_1BsYa>(M4}pD>fE3 zVJh##o1VaZ|NS72I`Ra3@}nQX$k-_6Eow!6dWuuQ!*d_ZWID}SUK+ilqzz@-SgNTyf zHhr|epD7r}(}5^}(q2l5cMGvO!_#sIP?`U1r=kk3~zIaS1DsfdzSfmbe|TAY^YZvnX> z${fSM{Fc%s{XpTDC}?H{EW(Uf!yAj5A%g<(pehDZHUZYk8@P21!4@#xU?D2#W78-hrDcqeR*X zF?%NmxLE>BkggKXkuDJySSUR*gG}I{?Dq4@%NPf@R-4{Yf=!@at+GaVxim^*7`>te z)vkq@z_1jKiqmMxk07Y_qEg79JT(QU4{)gLv(tiNxs7of(&-wQQ6?*KC@SR|WU(2Y zuaOl^bV3sZ2-e}(+OtlD)C}7uTv3F~WaMTpy>5Ceu-qG_8-!X_VfovKIIvs^Q3px? zjEZ%zpC4FtA?*H}(KhTuZWFpjE$*5);%Ey?_88)X1p8gtjrRxK5a39@hYC77x|yL* zOiXapzfkbY9UUDg7D~uwTQEIUz`VYG79dh-7b{lmrqYSEMbNZ%MXy`pT8SV;c-5H@ zL_IPhiZ=7jr#FNuMR1qqy&&xMl708ft8u zvJf@DxvZtW$12vOG8UBC!dy6Jphy#J5r!wmQAQC3$3-TUMO(3ilviTlq(C771}cb; zG8zJFlQO)hlfpO|=iLA~*F!ezA|(P;iepGuJaqaV`qO|rFO4uM*y#rRUb#qQ<0Fk< z^MmPWxqzv(G|dwObivsRW$me#xK4atqeK~@Jo)svbf9jaR3vhNR0;E;h>3h2l}cIt zT}7494IK)C1d3@!RFKGQ;VTsiInp$1ON2;@9$de^iuGfYnD$+4-Im8w&#%E&N_Rv7 zlT+hJSIII_Mc|bfkSbkGp@Q|CHNko0AwLY*y1>Pn=sS)fAdip3W>Hl0$X2V^Hqrz1 zE{98iQ`I7-D2KdI!PZSKMz&M{zX(yDgs4y%-FA3YhcO_uIaGsTF*J6BmTqcpXr~5XHLRbM}vdjh#=Y;lC3=n3)jKCFRHJkF-8en_1Y>pyT?%$1z}i( z$a+vLl#xzlSy(6*3%LEZuV9Zo_P|+Zy%lY3?RfFUHTdjjKZNV9yB1DLNL&_WEkGX5Nu`ZIUo*YsGQ%i0dawh@I=6 zZnWR$@?9f_8h3_ZtVg5yB>ioVUGHg=KR3nejq1ut!dTqg%xfaD7!+PX=qwBvSr4Ke zu1GP4fzLs8DMt6B(!f4xx}1jROVmYe)}zCwU_hZ^nJJ^dBdwD#%!$tmc*Qa%iypFp zhgJ&y^U|oYUA+po;&X7nV70%9s$Y`W3zR10NLW&yoQ7X6Pb)tpS5yE+ER-{x7#W&q zq^9BX_#K8dm31Ci6Be=S*|At;I{R zLqbK%?{tO-1vt7+2Ky|}qO7q}JfKoK7?nT*1v$Ql6t5>`G*qNe5wySyQnF?|TS7hc z?vw?HYDsu99h9qT`Yy)O06k}wf$qXP>d>)6tZdV+)|G{|v zA3Gu6J^{B>MNq1sMd5w$=7i)aK2l*rs$nxJVQC4Ifd;n(Pj zW_<$FjS$Uj>X8d!2?QqIf)qg9u(*<0WJ#vmxvK61>VyvSz?k?3HX}68k~udm^bqQw zF4ANQOG%n`v&}yENm@}Hv7e0ZzyTw%cyU(xpqWV8I}6y6Hx|``zzGS7$e;3QpyxRBCn2b-^7Tj zUIpcHL7_KRQLYp*HC^R*RVm8~q4GKPzH!?DpF+M*GATzN2D&>@nM#bt54l?s>4z zaWjI1Js*3X&90X%gvHI(ewKYr5D}jQ>x{*XGq8)P8P@0^s1LX`pQn{yz5ngun(qY- z_LBL2>MRI>PDkWUe3fG7Fg^flgeu)f1Qlc*9}fBd9ghKsC|aKH5-QygG9Ex@2lyKK zj~S(4DBsCImUbp{ceW+NmI-2PmGYG2OO#PiDZ;5%Wg#d>F!OFrrQuS*pf9VbRXtV2 z2~f2n5Hb+b1iY+YhneCDnU_qckQCsj;{p{veYsGSFvTJTn^LgN~LlL_iPFX_JJ|yp|2zBhqkQPLWPE&rX~dy zpM&n^&6^hrFi|Z@Lx~zw)c0}3$P{o8LF5`S`6z~Bu9YolL@^Di9m!%`=Cdg%(M{#? z%DR_u&)wf-^hAn9cJ8Uc% zHF`(T0zzH>cOZbeTE{|}-DSE@l>`F{Cgd{7vI?0{fLvalx!kLuFfefoig?Y#{rj+Y5ksx3e^0`pWce0LTQyM3|-WOOQWJM>XTnNTu>+YS<;UKM< z%I#1k6gY?K0mwp5>{@UgOnW{TbfMryH=9Kew6Zlo3T9FV6mLJ`I80qIhOgXu55(XqR0^-+xFZh2zK3+6Fg1d<_I~(Y79vB1w|oR{3s;ns z(^Rn~L7f^ugHdU>g8tnGJ<^9lGgV;(^N}{Kn`W$9R?tsit&=TBLb{zqH1pHXCqaZW z2wVqk={9t>cgk@%wZL2xEmDqucDeI2n+$R@V-)n>BP&9d->0n0KtcnJu^DE82;z+h z!lRoB1Qm6Elm=*D6ZL&uf3OH^{OaiIf;tz2bjM_nYsq42Y7)nva6Ec@`nV$JbI(18 zU019KEirA&+ZeLAwY814d#bIXJJ+!}3XW{XIt41$N=T5Bdd5W{%4AA(9i&KMp|ew} zpslR~!;{<4nsxEZ-#>+|o3`P+Ggsp^`}AP*hGDd4+W0(H1EN`FuF!}IVWp&Mu8Ss2 z)aE+I34yWe8pCYtew!JKy-(tpQxua%!k)DIHpi7D%-a1&jX&<%xaY_1-Kf2vB!o2* zXc~>l7M$up;3CR<&$wUJC<>M0pvKeeXV^kc+#KsH2s0O31tF;T0p9HVP>=BdgoXk2 zDe|5eRz@NWMoh(3ix}oIs4=+Yx2GpjKmr{iUz*){s;*20B)kBw;Fyv;AF4KlZ$y}f z1W>Q3s0E>^C4s0469Qg+>Z^3jnPaY0e3V3>%*L5;+?A?VFHC9eL#VgpJH~VEw}`qb zbLtm3DL*u`f`u)qm6Fq;g{%Wq61X7CQxj zwgtH6f^%_TC$M&;i2V*a6Z`G9lJm)@OFmLmQIZ9g0;f1ukz*W$P}s0j!K~kd1cXB* zY*H;4m<5`2e1NXzXbPYlijwu^Zhpf z03ZNKL_t*b0wLim6sOVC+rv9zd~6cgY%7Z83fkJ|q3F5z)>prRMT0$f@A>EB`4=X! zOTUXrvO*Op0jY(vl)MU+^3H`Y&5amE)H!L?nh`SM`fFrGu&HX3KtyG$BO zGu8vU@3`-pwaPU6oJQv;=}adzp%FR5Y@ixwce5>NEh5T22a2s|W+!V51gZjCprZ1H zuNiYnWj=T_I=2@}mNu18qIAEbG&!A8AXA@YnPYusYgGgh7LGzlSPV0E_#nfhXqXRc zQ4qDCLPWnn;V5a$*OA@wdj?{HP+E_#kRG+>ff;@uJ;*@8r}DEj-&W6egw!5Ag>ytU zku()r@~d3SfwW~`1WGt^*hL|XjELI$swES(xoWs<)}*tY7}-36uHFpZa@v_FN?S*hgxgmgY!8!PN8wr!>-@efsIA@wx*K!ey6TifgX97W?hD zKMMORj~5X8J6b%d*9XEQGz?9k}AQ zJMhGlPvN5<{0Mei-j31DV<=QTxFQRmYQ|*A@;C5w}rls z=C>Nb6ZOnk6Ep_+(T9qH_{v5};u*u#!>JuYf=vpf*`LkDWQ_1+aHO2D!FUvd_f`6m z%#zUBp3$pkXbc*zSXo;9zywRFXR0y%#>1Y; zB#Dj9@b!CmcG(ZjFv~{!C+hEJ&fQ$BRZ;zz*EDiLG?0m9auIQcd)vmacOleU&;KlaCt?%nAEp zE!as(6M5C=;y_#sQm2nuaRIEohvSsb_f@o}(1DW%GYJB-YFuFDJI85RH9Z*&uBZd* zRPa(DF&_M&c8#MLhK@<7kKIt81wy4K>iN`Hn5zd7QvLa=f+Us0_JE8Qjwm3DV=HEA zn{^Dtd}j)Dl0dFnTO`m+F+YNo?;@9Kg@+sySSQGFCJ1#ygx5haoL{)<5`0#6Yh(sA ztp{eG^@MO{x|;5{mMt@L95pT7c&|d@LU@5yU`d#3rw`%GphW%l?D=c^16#*T;ZGIk z()XIdPCvLdmbI4?}vOnWlN!FO!ptSxI)ZpaVOq=HCr!y%o z##E{l8IGJHu=?IIBX^ea)UBTNs=< zZYZX&+{lIyGUH#2Qq|17?N*1RSQ{u5!_x}CLd=uub!ftuiybH-yqLoB(d1^5bDhuT*Z9EjAG) zkV9)vy{aNqbR^YY$mXhO>1szXJ&Ea}hql&M_+ANRLNes_Ey49taA;i#j{<=~(Chn- zJD`mO16ZhUQEOu3Cq(sQA3(F!unKB>LTiUnxVvFrYQxw3c{72Nbc;%3f)ehe#mh^C zVuq1ZzN1={Fcro0XG`E`+oH^{_WP1?Ca$cvpe!t&C)a{Z`XeJF47)rqFo@GnKb?y< z>5LDyyipZLC&gJQt*z}df@ke!D+7U!sgX6^SvYnbSAjK6AlH`Wnk>R~(cjaBC!b%B zd+z)?_TT>qoN(N6*fu_evEdEadC_8-KC57HogkyEjui=^jv7Ah%=gp$!Zyp;n(4=E zb1}Qe2`W*)H`^L18_igScEsLp<_txBm$Wv`j4ev|K}eH~=Nat3W;HN*OLPoEobVqt z2D8nGL8uW+*N_p^;DOK$P`klVnGDjR5JK9L@7$9X0bdnRAst*wK0aq5aGewdaH3Pe z2s)LjIto#fj=}&WZPHiTW!=FuGKm5uR0xA9*E2DMrsWy)5C220DrI06nTe7J&DR*; zq8VO2P>wD$%L0!|#;WzMxm~oiCI}(~k#OInP@#B{Qkj9DL@GeJT2YCuLZ!5(xtb+Z z5UOp-v4t*J8`~~m6labz!B$LW64j?Um8e4)b?`W_QPf_Ss5c?aJcOjhd)l1mu)9ls z?Wh=x`gjSO0m`336-=p_&ZE{MPE&}QfAsq`UTwnKi3oRreXreTXcdXbn~!4nQO}PX zXZW2jbA#nx0Sg5hMKY5~hwhg}ix%Sd|Mw6!ZP<*yd3{*3W=-g>(P)`FE!hc~jE`!i z8VVU<-adOk{TXMaeom+Xn+Yi>ko7>gDYWF;F+92+>9#g5dvf289>#`EYjMTLuEef` zofw*!LT7gmswkmQDj}0`k2qbC|ckU{-8qSh4&`z30flipF(JGb{<)O(E6 z(Bp(+yC3^LdwfxQB#99>tBf?W7wylI_OOTn53|Q*j}bBFE6FMmCjd!H8`M8XhEAF8 zw3(xV5$G1XHqGoi#JL!vI*ePOAPDLhv%bfKj@1l~1MYljUZp@JlKu%ChtShVYoOoh zr)HYEh0H`7G#b2gbA0x9aU0^F-QpNPoa7kS{5g)Dg8w9RY*ixrWm91ef6f1IYgx@% zT@bOc?eFY$k0W-C`k6~h>YL{zQ0IdV#~50ZRDmiLKxqp@wOrQvs+3XMMbbXqp4RM{ zNZM~vXCrRkHlxu+&Cw5Z3TQAxJMxS*CIrHvEkh_w6)`e8f}j5Mr=0Fc|H!&PE{IjD zR)uiYrce`v)}v@woCYxyp;gn9@aU}QxX7imDCWnw?t`E1#EU}{xaSA|ih~b20mr@h zD2x|@YB4}}cN&x9!$`R~m4oie+BFL8Mdo7%hIKI6Y#sG3?DdNil4sKz2_4(hl4ves z_FWXCpDQogp0*>_Bu?m$6O0v9-@e_cvyk$T z)HEf&#`76Nf#|&!dQAc*uM3cJQ!;R|LD}Z0u{E>58!`JR4Pmx@MhS3H*F+Vrih4%; z9;n5BIHJ}UDG!0dhnScc$0;YD%Ge-;etFtyXK>a6)j{d*?&a%8M~4}alW2#2rjG9* zur0dQrb~bp1_j6SFb-NEiLi8c2o$C#G3DhUGTm6*+lw1+yaB_b)42Hk$70vT?Raj@ zRL zEtP&Q7B@?y9%dvrxcR1k0^)ChF%LBVQ_Ofet8QKsBzFA~TUHeifNq2h!Pg ztlv6@AK(8I?6qHX^>X8Nit>!nbE zJ)UNGn%QQkkAY#Piycy3w0V6rrCsyh9F!&igty<*)5HJ9#>V&>v-)1m=h9d@Y@~rk zZMJ3>DM~U+lI)W-=D>RXoas8SHzNYQg@CIfpecIzQf6ivyadWm0VWWeV zoJXFF_pXHlZ53c3Cc^?i`&1U%ab!TP5aE4@D6dPOQ+)?>KIWN-62@jjP-oksgcS4l zxOb3r{^zn^X3iDL(&B}ALt5CP_=G90mRdziODo41P+bO6CdiFIE(O}Rue|aKHf-3y zzf&Nibf0;3>m69Q^>t&Bk5x4rJXz(HinghHy5Lbf{dQy= zVB3~)q*GPo$17}EBJ7YV=Vf~gI}fMAFzAwSJ9TkT<~r)2sW^=}s@d;nu8hXKH)>DL zhKa2?rmc+N&D1VL4P&3bqYjJDc2o@=hH`pk*QDbWwQ#P&x z_9qhZUn;GLWTj4;Hwh|zM~z|)a@kf)PZv@Cf6ToHxMfv&H~!oEwAC?cRh zKtNCgYc!}}R78aj(P%JW#6>#VcZ-uv7c|IdHTbLX71%j)axr72_L({nlmtrpd?S^}N*6ydb90IzE! z`F`*3VYC<2w^57My}y01ldddhT;|-`)O689aiAp)uC_YoS|s~P?@b+lfsEY})kC?& ze~o&BIatd4Nbj1Vki#%YTxvCe!4d?@yjdZuzT-r4vzHcPk#nGckW`3hE=OpjC`o=HKFwLk`C4-uNQy zoNZ!a0_dxi(P}PnHdc_=g32i)(Bzmfn8|J7rH>PlZkbTy?_lofI-f^{O zBWWMO?|ZM;;_H{oBdC{g=MfUig}-^{D6@}AYy)2(g7hOuulWc+cyN)gk7al^gbT?A zh8W6R4AS?JB{2clK>3?DTkXVn2nsn7AwY+D?b@~2v113dszp?Z=d+in)^(OCSP3-Erbvqn7TB*+f_rCNU zSl2weh%?vRyXMs1H#Ts0^}+YuwZ`^7>8vAAktm_^uB7i$5UVI^@R|(|k8(uAE3UW< zzxmCr_{1mv0fPgB>{3{7)N#^@$7AzBn^3FPWF%147E5;6_Au($lS!gT}X1 z5;YY>jp1WwK(l0iM5kAc>-@W5jSHFB>*C9d%^ES08-m$W^~4BDE)*+0XP{wWotL># z-A{WAW#lY`Js^9ciDQxozR6*G34l`iViM0%Xks!jq7D%tC2ozltNy-WeDafjgX4}n z4zGRfYZ>5@u@ODTb+sZ6bxMQ>xjm97kDlSY4G25>k=0+{n9Q-{0Y2Bl6`3Db$=mQ| zyY@kM^(k+RuJ?-0k85ncI*~J?c#_Q=7=}CPgK?xoBr8HwM`{!?>Ww8P z0*F{3@0op5(`>okKTu`c7$O#EFAEYqQ?|`oKjs(ac>mIStrigpee9-7e)#o9ljH6a zaXJ=)xmhN@4iE4WtimZ_j;k(+fpUZm2 z2S02iU1a~{5wos3T;tAq$9InM_GVTc_I=myJRIPw&nC1x+7LmqkF@kDFr)yi$l~w= z`aO}Uel4<2`g&--lvhj8U>i)6o(^=wgKT=d}dQs@2_7lq$z$wunSSEKme>s)W$Zx0o&5RW#-jG{KH zw}{gx%l4t+A>4NRZTOqN`CDwV{%N@4iYsv9i6`P& z&w3V~ef$adgJX}w-0Tb*^|p$cVseAAk~W$N&`cSvOkYnazllH?80=@Hy|7T{yeQRj zmGSy7esd=tx$Rc`={x@vlWSH%EX|-+2@tCEqUB1!nMTQNSh{WpEHU6rw90{#g0lsI z9bP=my4P#TBMyqLy^UB+rY~=ueO^yR+snFU-s=@!*zfq}r)Vic9Q2A)Y+R7{o(=nK zoR`!eWYPoP_KVDMhXeuW<_2t0jEh1d05~@{EA#2cF?R3TjkC{w9VR9wn0u<%8@TSe z&$FvivsuT)_)3(^6--X9#ZP{61A8uQvq1V@DD z;NTFe!xk5ouzi~(JSoHCjvZUEckfRcl2D8kUdAo}}jOwj%Em%qXyRjlB1(z7#K zS1~d&ihuw2>sWMHuP>q5Y~j&IA7f69yc}czpAx5q7RrE$`}_Wc1ur5+D1um*(~e!Y>z;j%gkgiwOIt;x11?2OStT^%khOTd=8)a>}T+euV05>{QPG)>#SGv`^_fh1_-1(5y|ty z0PSY9-y(6>g!q81Zw|7qXI*o(Z&S#5&-=!fDSmXlDmp&8+Z1^YG}*-_Zi*5K=2-HK z6z%t5xGb2Osc@}rxc_%Ku_|KRiomerBU;O-+c>eQWpqdTw*0;V5 z=b!&(yz`wGW8J#{#Old4*zmMXEFn1Wyf-m&`PHv}jaR+uOy&lOkT~OvSK^Cb{1VPQ z^VRs*f4v5$opvgo{`A9{8?IEyc(KVkYu66;0f}CKWf5ZE#gX{Vf)5_JU`AGdlWQ7L zt3@=Em1&!isi|pf-1szX*swwNC5YHAL~Th_%KgkpkV)azt&d{$DQVwr>_;-yoWzgpYmlvv|R&&&KQi_)M;IsMf~R zbc~^i0SGdhR>rP@GH4K-)icd}Ya;$2Fb!tWkr6bj_>i}K7P98rw?-~l=v=Fe`dr0V zuWMgtjm@?9>}w{&nzi5a=Aa03>8sZ_r+Fm{7x{3D{d{1lf{HK$KD_4|r@r2i?l})Y znW<`Fi1UVq23bu&fR9c=tJT23z##6u_dfjm=fA`ym;5EBruN|U(_ere|M*AzE*|$w3ET_0;10BFd#Yi>WC{7pbyH-#tDt zigqjJsC-1o{?AQ6!*73kC#xUsy6Y~y;uWvJi(mXwTyn{~ShRif%{Swsi!Q>!2Oom3 zeeLVmvu8IBKl~Xu>#SGd-h1!nCcpjd@8PVo&cxW*ICk#Zj#i7jbcR{i?u!7G$LSyk z0T<;S?RQ;!D(f5-IYZ9=Ceo7_I!CL%A1kr@it!2T**(Ps!f$T-H7>d25|&a@>SZ!0 zCHtj|FTR-FN=XVN-A8541F{Donj>vndQ}PSqDmes97F#tu_v90?oVyl`=kMb;<_L1!@?%Q=_(d;ab5WHD|<&Wc^9t4*^MJxBKZ*kcF`Nqg3s<((rR zv1WcIF(;Bojg98$b1%54L&acs*3~&PdYrr;U~y@YjS$C1S9Uy4I@!Ly8XkM>QEc9P z5XU{xu@LA$lZdd{q*w^;B&iA+G?K`d3?4}*O#b8SO4e+5#8+@hF?_KQ@Gwttal_OX@#rq zzz|6Zrm<<`LAdNAm*c+s?#BZUJjC#W=9-ud3bjmg7{aLAU;2&+?Q#7pQaRe`9k zq;W!Js12-yYA{qA4p-0EP1$$F;<)!8ez=A+uPs8m-U z4tOzro0nO)i?DP_HuC1GS3rF5QAl!Y=UHD(;osX3(C-B+Nei|=);R~^A*Dmav-p7b)+qS3hw5L4{Z+zn$ z5w%-*{_{`8`R8ANtFAg0C!Y8mJpAwj7#$my#C1v?sKl(@7wejVphM+a<~h?gVeFcl<*e<2+6%q5Rpk7-#^Yje?E5~V!NryL0!y;S zRTPfyFJ3ti=Qj&K2*oXRJ`;F7yzDx&h$Cn>M;~$ETDU-kp`}lv=I7^Tapsw4vZeNe z4?cv)AAbV#^9y*(Ti%R?g;^YR)RFj$zxYescH3Klbd|g@J)St}9Kb6-zIJfW)tDDfnlJBbzc|cytV{IL6+Y z89ejIXX1gayK%!0Z^X(K6S(Ld=V758F(J8o&r@heF^0+QI&MRdlp_dKf+wBv(;Z|= zWEhM3&arQ8v-Z6GejY5#TR+$RymMcq%{=&Q*6Hhm-It<>-tL3FKE2?Dtg}~SEWT@Y zU-QP3)@AlnBvD@NzUI~Iy4Mv+(Oh&}+-W|iIeJnrJpJ&)@!=0$u0q+C@rz&l97h~+ zB-X84%URi8_Oh4bRj)dW0r8*x*@f7Z+kl* z>|MKdBzYQEu3Xs>+dFHb?a9u%mUZ8?fq$RWzVE=et}TZuZD(j=d^LpyB^X8KC+k2I zExl0wX1jXd(*7hufe3`7jyj6}$VHLWSyOv(+;PXVpZ)z0+=Wu9f)9WAGDhxCZGRHC z-*Gcmtz3=IeeMfv!A|@9{s(@C?K_{ubDw((9)J8XY~S$|p0<87Zv4rOJg3ij&MDZo z?MbXyv62lTDd-pZ%(P(U)pQV@;WLrS- zP@Z_=3B3L7f64?HF(=P?&dGTH``^!^)HSOo*#oM+)MVQZQUIzzRlgUpEtDp_NZmj> z0p$uwF0Qp2ML}FdwLE~fa*w?JM?b{RzxQKY`muk)sue?6n4Uu%*HIa$At+Z+pPh#& zM+hrQ#brn(R1$ip-Z!iC!U^Xg6}w~+An>%kTzF-_Yu9b|Jr8#E3Tv~*Q}q2TDMpb# z+wb|LCayMmC3MVw!&1?uH}l`K+xL~S?`6BwwrEHH=A<^Q2#@W2l#LB3oa}~;>(FR4 zImY>;k3Nbwyx|SZvC+Z3^2#e&B0#Q5V`HOiXFw6`bT&t_S0Gn2dWPaC5HQzq^g}Ct zyWMBkV3&hTT_ualG8Z|Et8*<*7A5N2H2XUq6O`$i4wT{|YYy@_SC^E*^`5Iu-!=WN zR!xzLf%cRRt4va@$;nC78;jVvb33~zQe1x8e~&!&AXZGQ!0uf;v0}v}2LRi(dmD#U zrWxz+8$h*O!|pvhFg8AnyY9LhfAQ|WGE~%tws3?) z&6~3WQCw|i?c3$_!_V$o zkK@!+pNFkmpTg|?3?^4iVt8m&&1;Ec9#F-^bX2PqmKc;uf%Iw!0`&C_;E8Pypnqr# z8#ivjgWGoC%U}H_HXe33&V1=H7z%(T@|vjBAgbf&9~eeyUZAaoAHoF6dha3|GF!z( zJlS*g`&^?U#JmsbXSHW?%{H?1jmbrv9>|i{-{q8E*2g!ezWYUxcq$FB@A-2#`0$j8 zi|l(H1OluDGq3qJMzh&qL&Aan0nTjp@WT(`po2E^A>X-c2R0wH5&!mYUzV1`VSv8= z0Zi|cqQRkoA?B=h?%c_02Kpr6N?e0Q@;}{$oKs#t8$c$5B_aRqI$WF8`M4u3!P zOP&Z+@FUFf-qi4`2J zl|nP0amLFz2wSC6%9~?7yBbwSnl|JQr7*G5_S>;DIwAO-1#INu6}h%5M0!p3ovWZAcdIK zosC3<ZD$(-^^6r2n;G z{i#x$a)6|SdNgW}10zXD4wvtmzs@nL_f%heoTU(HU>iLy?ZLo5LXp%JI3mz>%r}MC z)w$8tJ2JCk%*nq9*>i4?S`~Zt?nblGV3$WC9HO=ipG%@@LOA4uPl?5bhlbhZk)#hg zd*I^I0@p!a5wVbAod<>n*mGz1?rAg{Ev#R^9(}cb<&hI%aG)QpW<)eYl30c9;CXru zlpM!BFS^)kWCMyKd)g-+^<7Wuv4*In2Whs=3g^FATv+7r)MWfg!PF?=6uF@4a{cw+ z$BSS55;hQ};8)dJ8HFf=g2aDxmK$?ijjLzeSQZIr7OEX~Yfar<_B=!z?G z=yP6(m!AH7u6?*a#vbnMrOPiAAanTAh-siE6@nrH7FtiR!^?RzJ1e7-IHE0LtKdakFh#yE6G?Url;mWHQte|VoenbrSJL?sP$e%2sWYtdv$|fL0$QsVvOF2gzPgBnyyBvEU6bgW zOc&>5FNo{eqJ2!psy2jKV_Jvdd%%b-;_cO_gb=iuRiKvyt|`Jmdvg=S3)Rg^EWaD5 z+2G$L$@Q$Ojv@fO2vB#GJg&?s zT~NuIIMb#fjg;r4#8Mf`pgBFW4^M7=5(gi=g>4DQo{1!k6bIq@AAFzddi=4+*)D-# z2Ehg*@JQ@Wu!rDBBwD;ibe|*#0lPW|KqUYrlK*s<8#nxw$O?eP^~sm z3PP004x!m*Nmf+uLmV~LzV~y{_Vui@oi%s9HChfgU4(NspKM`{tq7e*55M z-Z)(ExHxkdW9?<{`(S+D^Lb^t=g(?QjWvz(-AmtGYvhz5_=*cTYjG<9TjHV!nQM_D z0b?Q-WR|;r#Z5_d0TBs0RWylh>ANNXOmUVexyUNZ5l^`gch&?JEiS-OWMkzWqGU6B zM4J45`Y>-2iXESb=N0k~q_}{AH1qDU=F($?s_vLX-@+siI{U?Hhz^}V(r^b+5Co-; zyItcaHH&KeBiikp>VUdlyv7(mjqW+zDZk z&ppYgdA^9fr|5gt5{K4}$n`cXaXU-(I(L&Y{Z(syD3hdtY!70A3SFxZqKYMPz?^6- zQ?x=RC{nS96XQ4E{;{ckTN;%G zA|zovfAni^9a84y9&1y0c(8junjrjaG|1a*l z=V6?B(jVf5$F0TA-7}~Rg=oYLl*;|6(phM>P^AQMd|u*2Wz`E;?~~O0|6z^xXKn5N zIElfG=k03;qCa_(Ss&x)l28;Wz2cnTZwV5quid(D&TYcW-d9c=1XuBiO6bq#?1fT4 z5cf|6gpOsPB?EMz^)+prL=?YmfJk-FJGzZR$kV!Jm%PO*x>2);fFkvoK%y6_w6mT- zC7oCG1*zc*S5=atc#7mV)D$Q|itrinBP9^D7%NtKdo9jitb}Nll$Jo_Y=ho#^*8RI zU##`;jEN)>W{7$n<6d(Ac6waZU(wVu4~V&76+wwIa1P+x z-~KjBDe3R+Z@&<)dCjYF_0?CQ(Oi-QUnC_4nmC{}Yd6~*Ub|eCaa(Aui8vS>9>Y`& zeDixhL?tTYf^%O3(h8M=KD5OwINcL_K7>pN(j2$i5z3{I*Yy7@;Gc!)aDdk+uMfVq ziZX6KDMK%H*>&diI}e`b&F^wc)|~Z1*rgKV{IN=~Ejo!jL?0rZvU2(|0Wy(Behg5JuZLXh7&AQtZBE9fV$~M3XwsqfD1eIWCKO z4wT`aGG5^<^rR9{$R`p~2g{b*l?qyw2rWez$Q1S3DnRi>3X#TIFATw+59NgJ3w5*H zUJT&?_CQ&P&Penfh`;k$q22sAn2oO8Smz*43@HJr8i6*P6iB2BUG*A9WReI<+o$;X zAIAf*HWVhRBqDm98WKJdUZAEnofQ!@S>85w3qf{aK%@PQ9@Ja_u(r?UisLS0j^BvMb36jD#1Hh3f^gyK@gh|q4- z5yvHz`bRM~G>Wf%=X?0sPkxQ#k3R-4dBL+VGan(w6rxs$ayWu0R)lJqfpGlL|XWA=g0=Ek+eK-(y2Vj=Kkex&cjp=IT{ zwkOXf9u8EoC&)Jkd7HD>82VWhwd){uJVQSHC5d2!wr&#=Ig_})ty0~RFfu$xI zwK4>WTM0O;WHvE#?kTkyCP-h(6)J6sOofVTqi+jV2BZ=3WM@?!2HlWy?|PDqpGptS z;cD6SPjJd!0qp~)EGh$$v>9qVDpE1E*>*BLoe_D=O%1CMqTPcug zpEz!H9Z;9((>$+PoYHa#Ru`fv!ig0D9C!T~Oj(7%6dG5(d#UKrs$>xbAMGS`s?zFMgSdhu&f(mMbqu4eV z<3Io7M`%s&!=GOCHbk`wc2DiXK(K`I>L{ALfn-bu8HXl9DG+GKGG|N>bRz)YJR$>j z+H>f;mo?8>aL2CO?vssxeSOUuM_!*{Atn2|uv9HYqzhU7Fx$x^PKunPi#V~LDS}YV-{w2MI`R&MIk7(K zSAW_fU)RPiLe=}`m9CdrcTIGGG&~GSnhTYQIwJDH4+LuE8iG=UT3BWGtahBR?Mfxv zx#qFa2jXy}vV1<)08ykdVq8%cWj|99tm?7qmr5TU>a~dz1YZ(mLyAFtij~f{A^|e_ z1d_}mATBOuWE}GKko&AtlmvPl9aCraGfY$&o$C*k=)_*5fRRHGD%DJEtP87JWC&%Z z(L%`;S4bU3DvY*3sZztt(mZP9E=gAPaTBFVm7O(&jv5$3i-U4G4I61^o!2bDRD_uA zo}g!dv3#bzx@L|@ANZp z(jOd&`Ff0%V>Ptr=Fy1j2!a~#6(T4QM~H%05;eM?FweD;bfMHScGp>V&5!S_XCW1{ zZgZ`DaL$E@?KN^C)~vl{Kj*63W(rL>naAP#V6Cg~u4l6DyXHQNcyZ0C?+n>v@|{y3 zapd|fgujncvJSZi`Aq3K&tD@L5(BfJW;>aY6z%KwVC{`;Pfn5gdMV~6%PVHvCNYvX zR(KA9@0}vlukR4}?)!^K|A;tHwtIm>E^Wyka~j*A-9RkbSgJSJ7NJzFDrte#uL_}g zVJm12lvbS72ntar>iv%4SwKzW%^>VhG01VHl(96*lP|EkgTw++Ri@<)nDTl@!8={23%DR`#I|&PPEukSnFy4|B zLFd9mLdTPk?Gegslb=1$vB2EIJo*Oum|`KLNb-CLg!0FSl2*hr-UEvSJ?rkwNi;fRE_5pK%e_MfPv!Gs;CQC>h=hfxeSORwcE}=;%1l&E(`Nv|4SJAdt%=#YP~B zkPe>NS?$J4ArR{QoXYu1&8~NwqBC|LnDZ&FtvH(TaAblKr9<}Ex zF5r~c2b8#MUZ(GhiR{i zE!D|dBOig7CE2i_E4t^3z&Tg@_Ir7KcGZ{FR?)h$>d9I&8ziQ=oKdT z)+n(-Fe~Kr@(##OKDec!<?MU)PfmuygLTq@FM-+49bF554; zDk%yOik2)u;+lw}ZDtWRzRB^mV^35sz}D3--#dkXhsnMxF*b=mnF|vUi$TfyTdHun_Dx^1qXb=QL^|QHjwp;+4G_`&xF2muV?UO9 z2ssu8)QoN81dnTkMCho77W#rFVmS7RUTfpUKm|f>i!`uNYFnpWLuK0~ROr_sg*q0xyA*#iisC6TW&}``Uc2Yi=BE z+t25{m$a`oiBv^(66lR)lf9oB%{r=;L45hkU&h45I6nXRYdY%s+0Smmd*AzBTyn`J zc;+*og+^-;g65IbG=vaiNjEPv=cObp?!!W(iAq)At6%>=IP|b*;GDBxgbG=?ka4vD zS`DDxq&OG-5K+vzG+1&JM7*VR|8wLU%=S%f*u>$8tg za+RV;xEF$?Xvtd(U;TOK$c4x9@L7@b*X!8q`g>U)Z>VJ-Qq9|lMLM}Z#YO4)+SH5g z0;aGwavpVClJ0EBx3C%WgrX&@JoF%3kr*SU6D*XKqa+7R)r5Q{P9-n8 z#0K?|7;-4?HKy@3fM{0W8b5d6{lCNb#0c9hoOII3_{c{-!XcL_ z{sF6{gf!fhwTCLkN{F$EN!&ZN3#T1)2rhZ=M=-OmjuTHf1_uuU+otDGi5sYdH7qs2 zDlJlF5iu&Gghpw;3?YMJi9i^+KmvoVbQ>GyF(O%W>0AGzl1fVhzw= zfoOyh;WP3#5vVYswfxj-3lW$SR-_UCw6B_Dog=09V3Aj>04<~%fN&>qW+b5~_e(=P z4(D9v`=lCSeLNXp2HK^J`8=tbAmW0e+R^o}3Q-agDHD+pOH3V*0i!k~OAXAvjr#LNkIOB>5?`9dXPxaL%JY~7zm!jT(S)fqOFv7&q^9=n!={agu>Aq0Paq<^~*&2mCF!Ep|xTQx^vr9enz^r)>>W5KG3xEf*WzG6_oPxN#qRSQY!9Ld13j4Nj=T#)_maiP{iR83FoK-P&cKCA(fy2w6IQO8bOR1!~en ziQ%ch-X5Zo*k0%o2C0&zyOh0=%o4u?9SK^~S&Veb(ljEhNFoC=(2~60Mu`mc*p@^Q zE==u7cS@nX9Mt-7yoK29LEu74$toEJPUbsVXW4ugj{R?+BOg-AI>Qo}l@#&TX*Aqw zQU=To{Cjw41b5tV2X^kljw(vs#!8<+CTN

          dvZu}Yu=j2j zapyW)aGVccGQli@(RE(()-9P|WutBPEo=VsaFKb<8*15w_+0mjh>wa;WUdWiwwFab zxHzFA8_f3o%|qO-y6k@1ZQH+>cknvyN{&UO2$S^dZPLNEWAYe8JrGzVt9ZgYOAUmJ zvk=vNKxkWIOSyL739OM_I&=+b--3$rwun{yf`AS8zyz6&6&`bBI<^H6RYdis3OUe# zC^aD}C7?Z^j4kR?A`q95xSIu$G!CTTc_2vwiJ6xG(Z^N}Kucvz)H#*g?3*DdMIRQ8 zNtKvgk&B+u2Htx@bHj=#O6UdJS2Q}3e$WYH8LA7ic=q0*u_A5|p{YbmdqIEhOk`!D}^3`wTZ(6R5A#~tUr z<6FC<8(2OdHdUBI(_Z+I@YXnW%NwB zyQ}^r|7Q~iD7f~{NQyRAi(CGmRY+Bg$BL6sS;!oCK-N z-UizBEN-=D@ zPHb4;hmU^rO8olQH{-V3Zo>&Do`921I*AiF4G#6Av3HS)hQUGUhFS@$DA9yRf)i#9 z^-Z9HDt>*#_i)p9zlS$p{HGWl9f7D%v9y8qYFkA~l!5@k%AYt65+IvM6Otu3aC295 zu8P*5$BFk+_6OGY+D9AC`=kp83K#YAZl0v0*ScNzvn1JBOuO@W<9|5zRj>2bQ#Qu~ zS$d&d?c$=WkuiAR{VeH0Q3^fp`f{HuR)<6_8o9)%ASzYZa$Y$%A#Ar1Hy2d^pmO?} z@##;VoRu@w;GVTHBKIv+oV&8l=lc~FpHsSAl!g(I|Nl~h;~B92y|n;QY9T095Jp3Y z;t{4ZqVhh~$u#7xps0%^CZVuU?EMf)LW5No)NCCAB}Jl(WZ)Pm!h#TS93mhiNZ(i! zWNZ2l7+l8 zU3aTsE{V!+*5EW&HDP+oK zA*w)FlLw=%96G9H>E=f955y8GQG;Xh$8lsJeo43p+VZ*MHSeeCu)E%1M4}@}r3OPp z6v#wc5fcJTpp>epYk>;|hvJ+J6(wCpXGCf`@=c9#KXN33|al~6&o1@O6Akv z*N0lI4>Qv&Of_PNjC!gstE#~g74=IZ+}Se-<@)n=QWP^30d>L8&bwWziCm&4c;eJ79G z%M(Sr?)NHz-Jh~Q(j>c&!ceL7vcI!%QPHwo34^PB`+AmCy6Bi-;v++jS)_k?#qMM1 ztHjkI7txR<@-Yv87QnLa+lV#`7?}o6S=@auRCQqJZcW0#XMnPt;+hlRIJ?G{#4iX` zs9!b-XR&oTTH<&IoS%V7OL8NurG$hMjhovlF#gguw1{2-$ROzW9R!_WWCA^=P+J_7 z5K|wj5rPV_&o$K69faWt%82+l#3+FE>mlg*>FtQ?G0GJROT2(EoCd-@ppf`MT!&~Z zA#T(D8$`$kivfbNGTg%eg;oOQcLTHA5zOpCyD@_}rc}-J><~vl&0j^olYyBcR)6px|8C29WZMGeWf4m|gIL9^mIj<<4g*ZYgAAI~?%I2H;3VH3aoy9I zQjr6+%r=Xhp)43+wqc(i7pG;v&oo~YVPs?kl%k$e38s@DQ$i< zPORBG`lF1yg5>!?iMZp`%~42qLpBKXq!YHoAa^`suA{xNg22+5D^Yu(V%3Y9ii_V+ z&z3ps7;svxtn?oz_+%tuL|F`es!aunP&-{aDVdtL5Fi;yp zz0#IaB=V3^u#D3}s{~qlZ>Q#nLE_yT7#>)G$4ex0CwU~b_B`jo2iLk~5h7U#)&6b5 zY!@7M!9O4T&uT~4<#JCKh7q|vM%x3<9IS!43mmqie}#^9`%2~(Y- zHcZY8RBjv7%SsrAwORA-yKav)Hy49z&{+-ST^Bi`BfFjD)a@FJi(AU8H}BBdea_o> zzRm2suLT80l{!F6;>RB#aZ{9>t~Pd4y6p}dfsRoctsKY_NS8iJbsSWb)SY54R8fus zv>*5#PJZ3#xbRQ@0@L^W7L~>VCJ#RhSAP9YeE&PYLsT8)?0J}a5al(8pNr zx)Fy+$12R+Ao7!tKgBrc@9$?75fK5Lv}t5C@p>2=8{>5GfQ*q4hXZJ}c%sn`8(0e3 z7{VAX|Ij~UXvIdHdeSqnan%5(_Y9%Aw1BWC&~CO624yuC8QPoONmcSQV-eEt=#C$e zwFX)1(aZHBgqW~I*!J&U`j*A$x%!Ybz9Pl9SM%m9YivHkDXScaHF6P+<}-mMt;?S` zEx}5+qM1!J(82PocM1+Uw-h!~EXw_M4bMpXS!AJlL9%wgind|CTLjn^>1QwP7OGz% zvSd?q`RAJb*J)@~5G8&?A+NyazPG<6w%q^J{FS6Xzx3O0vFjq55!&Supf-wq)g}CN z1i0=KU&fQ)`97}r*d;h=!vwxR`v8V!x1+Lg1!{u<+7I4_y&H}Nwmyl&%Tow8ZNx%* z5j$rZXzbX7@zNYN9q|lQ7I)y+KmIS2tLyNIkGu=_JiZ;D{@zcpGhPAotpVa084rTQ z`K^k_{vfLa$R(tlRDaM(mvtbO?l9Gzuj=QJh!2Y*<+MxwbCh?l7l3LbB3~OKg>K1= zO4yK&ivTMHL|Rx_K)c;ygG5p*wA)dV9(-|ek*|?KBbB~N6}#tWP$4gsa)o1BtiUQ< zf6v{x<*vtZ{0Yb6^=H2r(LxjL`aDE607@+mxJ8mR$&K1lj?N`r4r5>!AKdDi9|w{t z!j)&W>0@+?aMiuQ)n4|et6jUlKG^PRC*i0qse_O3&FhO@udBTxOsea;`JO51$eKHm z?2FzK0_GJTv!K6sxH;MnWfh+Y#hwUrvF+Gin!y3Yf%x8SOeeiY&1M__Bcg=6YF@XEja4;(UC!r5_@mdq6Qi{$eDm7B$CI<`@dvBhc*mtXF;icG(~jGWZ3_`Ddh0oO|J7eYSRO;r zKMpMHlajegmDLlS-24G3xx}T;(_rlx1YL;8#aa0FU$6Ty3yJ%P5VKEN@7neF`lJmy zW1)j(b#hcBF%TT|tHhsLQb1vtqqxQ4m+2l|r)T?zhp{rGh>CSAHkUBXVJ@op;%BbI z%&sN8^rEvk&q5^t<`?T2=pRNzaWW#xfLf91$CcHLW@bd(DJ{r?KSemzEQyW1K6ywi z>%MOf?2@`jL}|q*I0@K>m#BdP-;eDBi{eXt1z|eF1-HAkK&}G$~b7GhC_yDaNgTrhdb6D ziCDC7>0iGW?H$|j=Wlx(-uT)V;XQxyD!k;y7vib6{ShAd#SidwC6BAGlTxVGHPKNjaHkzWTH4y?drc!c{6lN-E3y3$o#tIFsrx-!TqhL z==0|Id_;^7LE81${m3gm8-zT<(?>}7qzS#QPu6&{h?6{`T^M$JKD=SPqzn;FP9ke< z{p?_`!~t9(;(V3pf%!USZ!90;>jfaW+IH2EHE^5b+TWr#oW1GtCVx5Y3qwaO3@-{( z!k|OIrqAkwqW?>;d1gp$1NA42zXCn%tcTJuFCh#T5tbd#noc8kLaM$z#K7GZ-c-bGGj2-*70WOL49lS)Ps)!>yL+M zQ#QpI?Q#imc?cb8{ngwhf4{Hd*cK@fXV2yGIkh6s_|9k%f+G*<6hUZ7dmYlSZbZ-} zc2#>_OAR#fM9G+#|BqV`aT6G=V&kDlt-ej_~-0-eu5>x}~>{xd<4TuZWCcKjb0 zeKKK=Q73!Wgh^eU^`&j3>#32eVJ+YBd}ureMZASw?VI}pu&)JO^O4l8zK4PNjCmA- z&Up%S`*vOCXL^iGPX%*+?Z0&U*?l#}1A9F7*wQ*WVSSL~k)!vCsMY;3_m~%d2ot8; z`!9W@7u@2)r#_;zOU0mnXHiJ52F-f1C_kGL?*)PT#7kLybW#3!z$}kbFrUxkuzZuB zHP%4c5rjJFk$qnSo-PEfH&kqR7I>Q}fRJ)1P7@aDph#hf(+?5nOaY5X|1X+#h}tNy z;voEXb`dWe0-m_%c6|McJ8}E>|1ZAt`d8sMxBd#Ha00Ko;Jv7=0UGfjYHPM2+C7g$ zHopw#y!!%t`y2m=_k8#hc=(Z>xatdE#)CKf7+5`tfwkl4JN#&jt*+tUfAJ{hwm*i_ z;q!>g<3M`}aoC4akcMN<4gj^xVoMRUWFSy;13LwF(Dhx2phKmU2A|SZx+Plnx!a#} zU>An|qZLb758!=7H_QIglQAfKSqpv!ER(lT3b_)YTHEiG4z>jZx z2%EP&3om=#37DPQhPW*-GC9t!v2A7iNnQ|?BE3`!*xn&5Q3l9}0XT_t+fhr##MFi) zB-LQuS=xOwbVd-QM#Sd*j`1erM2A!;P z52>h{&ZaOL;&H|*;0|;+bdmBGNgsuZx+;uu2T69*WX+Hsg#ZqiXwO&I+y&Bg+vp3> z315X#nGSG;z!26Ys#bGJ;LXP}qaD$5bmuYHLU6G1{oSBfRvzS2yJ(6*G z4+bRD->I!~C@Wz%$B+%ef=a}QTI|@4BiC)lkt4wBjfdiq>wkj3`|zjmj~~AbXPoh7 zJm>Ti@u4d|j3#Or9T>#t{`-e`<9VlIEU4qYhxef|H;WtZxC@)U@on7r&sX4+U;DpU zd+-)KxX{2qz3)SKaL)qX`X?7)=-^HG*BkFaF!T%rL#q(9W+57LKxt4-qC1|xwTRZl z80)9LCMp8+SuNEO2@}L2vB4iHM2}REMRv8IL{;qlS5ipFm{X)8NjUbl3#h>oueyj> z^S6%}c1adob!HX!Su*EUewai7Ja8eTU|8BV0LqXr00t@}SXi9G@Yopcz2{C`f6ag3 z{r~$tSU)+2om;mfsP%KurA8E^8AYfDAtE{$68bT6Bvl579*dOLE|36Twgu>=8`8ZcB0p0#**)0$Mx=c>g=aTVNuHa ztG<~dw%&tDnT5%`cAFCio!?Wcqr30P9O<8w^1Z=(jZ*Tr+fB5{1)D;Ab6k$N>nxfC zo(vS1*405kbAmi2Jql6-@;qFVcfZSv!Nt)R;iO%~2aNRhq8;}2&xi1R@B8}N3peB| z_QGbpTZF3f)kW9aO1Cfc_7`$fM0};B{=yV_g(lN%ZSbry*%tp@T(ao=&QM3m@d;2+ za0AgmQ10hQg4nbXkNx}seC4SxU~Xm-rQ_a;Yj2%F-`9VFVBL}U;8%W%Q=YK_^~Nmb z+Y6|-fUQ$ASR4#cnXKT0|8@hKl_T&UKYA2{!#~47-$B^7H^8>X7l4CbjSqkGQJiyX zj0$zDT}4O+X-jpKn=QnpnhLqx()yRov3HT}CUEWm_MN~${}#q0(DD2gLI`A3hJ=fY zRm2O0{;X!Z_j_kIMTft){hs~Zyp~63XSJEtp80OqvjPdx%Q}A%doxbj#igqzE{vqM z6mF`$ZxPQ}vkG6m?o)X23D4vR-)lA>!tpRfse&QJC5DO!i*)8tArpxqX(Lp|igCi- zQa`(3R+6$B$+O8AJGeVzo^{_LH8!7f0Z7^fjc&gmN+a}^*}#R!Ar<(;L*s5Kxa z1IG!}%=tD5RGVu~)GSF|n#-3&G4DfR9W9fX*2vkIC!yy?n6HQqP!n_z2zf9$wd>Ji z4Kj81X&Wh_r9VX`F#_|P8{f433`=Yv5-D(?+;q$2Z4;79Z-YH{*tJ(g&H!7fG{$h8 zw$lIG^VZQnk2K$R-!8dv5KM~R9)PQ1pERP#wY=ZHc74zJ#?rM2)^(pm!w0zX#+n6C zdm%!S`Y1o5&^k4(hESVFeHSVtgGeIyIFO=)`t2;CahQ$J%0bYTuRvc9*c~m9YKAaW z!G0*yUW{PH5x8UO3EckheJHIt5*S;F>785gvCsb&IOrL8E zv)_FXSX=-GLXHR-YaLRa;!Z!<*WJ|sqckO3W z@+B;ByDio8m7-?|IcL-*B{YBA?|PX7V+#f79+#_aU2NNgKyk`ZwTjBXIHso-@xWbo zBW}gG<0n5tvp$Eg+)%r}lv;x;!(B3b)PwhjKInRh(%L56y;eYK$SYF`%e2VK7C~rk-*akw2U-Y&5HQ5@N~hkjcN1obbhs+} zA*DSC%Q6Ks>E1{IJTeTdJ{}RpQH~>&CJ#eAeiXvKC7^#C0-GVqg3}6yi1(mg*dp^T?+kjrr+)n4RB&Dg{BRRoLB@6mP_RlTjnhbF)>) zz~CU_c9b+v!~qcu)oLXH<}M@%524aI#?JR7A`iTg{d{w$-%SYs!ET-!@lc;T5Iqd{ zXuU5vPgvaX9uYwit020Kt+QMSZKA@o#E0@Yp?d9c?hiB6doc|-(z3t!#aB#%z}%bW zo~1uBu+`sbjwr?l?KhH43ENA}ES62j0h^_QYmyKME^5#EgoQuEz+ z)t@yvuJQROu%ZAltIeWBf~$m3##)rd8Im(C327MEq$EXbToov8S*jZZ`F>kTh>Xx& zo(`Bdg_a4jl)}`j>Aq^MoqQ;gBGgD(?TR+S%08Lid4YCb3nk9P*n+6^BMKVwnP7mg zaqMMLfvAlkY&9jK;ZOt~q-nhXUUXAnclcWVwh#Kj#i$p>Qjj4je13itOUuq zOG*P93509_ma`!;O0SYF-+A`!@2oRqhqXn9+b@!t>^4%g`(XA@69*a@X=F!0mh`v- zl`<}V#{~#$HB?IhBFbXQSv{eQ^3=Kn0s8v}u(-6qDh3L|G&DHK{UL*~dVML`3UL%O z(qka5)DYBvm^rOvPYuKrXMTxWNjZ<3L2OOa?u?*;tGzw`? zzw-A*B5Gb%9DyMqH*;O+cIB0RfeY zOeh#4;a7z|=$So&vL_H)ZEW;OB!+hZQY&vhw#2!qY`H8s;G{(|ov}13t0Jhj*+zg; zH^+U8Kzji}t0sSAUZrHN0Hp{aae3tm;z}K1YY{=4kZV=tv1}l$2+m>|vT9u^L=p|QgCOKklAI;$sL3suLP!h2 zeI&%&Y?e_jm$(lk{m=oV2;q}@ga~NzyrA!mR-J7ki1=wVmlR*1{OLg+8g0qJsyY&e zn~->2Bt%fh+A1JG`Z9ryH-E9!wBm&a-a$r{hg6l+r|d zEDYC3zxR?|zuB*jb~~hrY5V$0YOJXczM2bOrg>eyF1cH44^D4K2jrp8QB48tK7f{OLZhRuWtp2&~`NV?0 z=Un~t5huRBWnJ$eM4-|I2eBd-JN21D>$O>QE-hFoQ(%c6ZNz8{6H{7|R6?78jI(mUjt*ph61*m5EKrF4PWd~Jd$`*kM1}X6nrI^PNG>Ow!-UXz$C+=EX zBAcP3TcoBaN#_V{hfVW9$d|bBxSAMMick_ybgH5fWw{JxI%o*ERRt*&5U?SFF*M^@ zX+vPxXlT^}S+1z9|wr2`^15TL^#BfxDtLnyl)@7_N}lI zs&$RSI!CVeeMs5YW-<#I;%RfPMchr82uqz{kJm(6>6*j{MUB-_jQpBy37i8-yeh_7 zCd;CEZwu_&xr?O*Bg3P-M@L7>Xs?dYY&B7)5X=f=GLlw=4SlXyInIQ^+}s@c2L{ln z*QNJ^;_`|6rclwu87?g?a_{>42l)I_6v(h7!=aNqC2_bdrQ%=_bfe9L3lj}d3(Y2_ zqb_q@^d4=srTP*}1Y{a>p~6uQpufMy$*ii?8cPod@slAON%3f&iLf9;IFhhMM1WMv z5|Jl+rNn)wI_N!-s0{?qSE*cPgF5Og_mQ5hFYE4Hj(^zbTi#8p=MwkEj8p{sEtJ_H zuuZlH1gu2N36X~?HJ~p>SdAc>We7@yl$;@TinP_SNp2dVEkelY#@CH|x~n&E7%4); zKPF*_mqpN*`emo`!DQ?*MY6PoNPW^(e@vtaZ7-q4znZ`xVyWY$0#k2uB@RLvrt7HT zx<+40v6LDRu%|1v5=37WwU!hCvwA^4A86p1-M1oV2-czR<+`svS3k0@HbhXRK^kOsVjqzMVq{7Lb7Ng-NEJZe!t?RNrrrLe?Em)`yJi~k(&diT4qX3biJ zp$x`E$)J`ROPHIT!^Fe{Un9MgxfTr)LARQUAOI6J)EDB^ zhlfWoxoQpWf8bu`=0`_I`ChHo$Ak?@9mdASS+XJxFsnRY6XPrJ)KiaRbab4F0==)M zrlz2qS{7sZ>OI?+~%b1d64iOV5!oygGvPitC&eL`_-Jcl&n|2cbxD ziS1pLyAXX=C(LJx5(9bMd(qhZ;Hp}$jh6q%#>3`2PWhvfNQ4SvL@H1XeJ<{iF(F8h5VU|@PatR?XVe!;kB=mI zQU2cYa^#NUljzy!sMj-;_k5nDLl_?Sal+oG$iB$4o|{`>B!9>uhcFSabLUQsjjh10U3+lwmP4?(G|Pxs zBE}ka@7~R7f(`38;j7nv6*t~^Bfj>vZ(wG64wZ6^heyQ4*w_Rfe&hkRSbxq*r{JN7 z9%7#=p~6L|dbCvo)A z$KZ)49+S>IV=Hm{?YA*9U%Pf4?zrQ29D3+sShaEj+qP|GWdFqDPvVFpj>HpBJdXA2 zH(+LVA8NHK1_y?*YSkq6?c0k+y@i4PL7uzG$<=5!+W75n?~?Vdc^dA&|2_;34r6?L z6x(+^2_c3U>5-Iz#w=j^^9$op8pvIgdz+8z=jPa7(lwk&}iJHo<4p_UAY&igjr$den`_1e-06aVN>uaRO_ zBR+)MtEfHiUAxmZ@Yx>;0vr=vq`!Gmjx05WZ=CM7G7<`rSQ?TzU@HOA3z8^}MC*+P zmckb9o!*A()7Rs${$aH06^Ih)I;HEQl;CS~eic9@LFOsaY_n&+H8;s2xAuzS=tCl2 z;y4l2n-S7NQyQZ6ltDMmV$Mg&spdked2tcao-Hi2^rGWR=eUGO=R#MXMzFKzAXK!9 z6hlYK@GLBo*kS;pHo&$N?RpFMV+OkihSd9Q64s^w)1R&(?O#D7;VkK!Nf7v?5B7P? zl2Z77yZX`94$@4DCimncU|jvN?KOP;41&}EjNWN;6uW?R{e87QOs<~9&wp_fzWn7c zW7CGssMH7vZ@^nFcpEOg^zX23+cq3??6J7+y07Dc3ogKqe|!UuKKf{^Sg`^JZ#fw6 zdGCAh`m^7_guwRg+i~~ZcjBM=t zKk_hcx#bo-?|IL|*=L{4&wlG$-(tzZsi&TX?|kPAn3mnqwHheFI0~890aEW;(ld32PQ6>>%)W&eNhKpbN zGK8;w1D;hLN8E^%mW>d1o9z~)cS9^yT1vc@MC=kq|6(LTV$>+4Cd?_^kO;EFzujT2 zZU;iKAL*PIM?ll^n|eyqh+GzEW z+gFH6E5Pp-7cki0Mtgo*=~Hz~d#O5c&S%oiYy{lPzH|}R=4T#pY}e7t85BYXa#8yu z?hHiZBUoI0G>hq0X1=3c%DVch0}H8l32@(X%dc_o@9x8U{_=fz;)y5l=}&)}350v@ zxd$U7qj>2{{t)M%e;!t@ScUQNF}6jZKQc1gwQDCE?rq+@85=il#8F2*3w!tOX5>o* z0@d-C2i?!5^R3$ny6(I1vVErQessh^$jdC{qLT6uZP5jA)swZLF6yn<;zHO(Hfa_> zE;1Lsc8iQbsHl5{j6#(opVRRn|%3*-vSm4nf4F^MuZUFXmy=-Y`DNqj5CTgqipiw0wn#9vPjg1i?;DnOGp6wNj2XR|^&_d+!KXUQQ- z5RS&s{b*n(L-E;K>wQ2u0{HQe5lA~C4VE){<-I#hvA`7oO|y1Sg~Ryp8f3O znEU_aCqIdikr5^uPCM;>9Cg%@c*i^bjJfxhz3k<9>Zz@a;7KA8mMUm8noJ!0(I1_` z<3IW2Q?Pye4h#(q;mk8%#n*oM%U@zs}-pYJ~A;fy#k%%C&cHi(_3RBZ{ZO88Su)rtfq1Edl_sF4|pNNg+7 zpsD_lq^UKwMg#t`KQ!fEO=?JLLQTMu)M#lerG$qRnAe@T%-lP3pJz8~zs^4EthFEC z_hFlKRx+9Ip0m%|YrocOuf6t*FTMz$|NQ;1Z{I!}KnFHWFUBCCmjLVi;0Hfw@FE>g zKKUfvci(;R)1Us-crGvw;oP}Z*s^82Jr&{SOz#3AyLS45s~cyD|E1=e&v@x^OME*$ z|J7h!E9N+AJm2E~wJj}dXl0K-Ld;El>Qt{JxYu}eY%MwlrJ|%iamW$vDkmuY&v-E^ zpJ1uK(-5@eEW`_!^lh(ym9(SpbLCSk&Wqx45)E9dZhpp~HJz8Oi@jTgQM(G8GYXoG zRhV7b0xRZ>`5Mfa6uxoSJF8kX$zxc(E@swDiDHlv;`Dbdr0V8qGyA~wE&`n zn_v3UUzjZh6wcV5qsNZI#TV~2N{q*4>9qJTxDdA}FlGYd8o*_Ryz8#J;M!}ig_UzF zphh-1)DM2}2t5AykKmeX-Va~-%3s2_zV#qH^2k5J7r%HvTz1)Ij&|EtpLYRqAZRV44&IQ-iN3Dfl= z&v{x`h&zbyOmTP>#ImkaAn3AaL;CBkj3oE8+b&Qc--!;nH4HB&vZ05=@iT6{_Sb@q zSJ+G#8@X)k=QKMy*>|Yg%&=(5_}HY+2bb5%a29hoyD|>zg*STvu#1!h;R(AWl>u+d=9+&LFeI%7_V82hKSM_MVXi|eBI+CyS}aNYp`o^g$1xk;V{ zN*k-VMdeTc;t@K3eKU`fC=05ESh~ba-ft3lLF9#pawiGUNuylw;@bK-n4Q}RGov{; zcI=q>_W1Dyqc|WeEiJ>5Bgf2d+|&Q|w;zP3pMDCy``z!t!Gj0QzsoPb+*r`)G5FyR z{|Wx|&pr)j&uxS6{r&ggo_p^$7WvubWrO2_*IxkN|NcLin1zQQei#lMH~K9 zzVn^GgZuBl-zZCXlHf9-Cp zY~nfJIM;noAiF(OH?M-1fUHt0+*=4I4g6LiT~7|D=YiJiXv^uiPTv{23#hdrV%B?$ zw~~VDf^i}8RCJzn8=RFg@;R9&$)esVhPX10(a>iUVa}SS#MM~qoY#N~Z>fCzozxMU zq{yUrfMI;4eUei|a-Nw!E&ezTc!yXp%JHbxhKY>V=Df2xB88I*6A88RFcY|Eyeb(+ zYzy=iJG$`NzUCUYNk_9jcKe!J#$prRuYD8jry^GyA28eN>qb%nhGikh{njRNiccz# z_6_RQs>|mn0@Yi*GC%K-uy{< zq-wofp@{|C2;4WEGQiDyNm=f%A={Uz7~p(G#j2mPK|4+18(+%@581$ z0vpN@BNOW$DZFBLs|iqCTVI7weBus6%LhL22kxvt7&rfoHy$*<(fyA~1n%FXLU7A1 zx0y))+dqCgJooH#CNIF@!-wHbZ`uz#cU}Ou-Eu3u^y15~f8SfoQAUKV+qam^jX(d7 ze}`W`a4CHJ_FG`zzWs35U7vy<|M+qE#V`IFKK$WpV9!PS;QEgogv);Ow_x{$d*O+V zb@lqeqXx)xUo=tgWrUJ@?!T zU;XM|nOF)eZ<9y?96Npto`3E+xcTN=Oz`2~{O#9adFd?NaKnx8j(5BZ?)~(q;n9Eo z5gd8tDBOAHop9AvR~fGfdRKPsdL!I)(;t~&#V4QqnK`+ECqA}r*$GQ$&cgb}hRLvK zqo#GQ&;1-|{SiW-^GBF_j8G2qNyqoZL?2Lyr*NTYm8=rG^VH{2p41zPu(e0X}7_*&gXt`` zbA)1nurTo+McrvwJz89;5Rn1k1vg_60CZa>zHI20#+(>2d68NSS)7Ho!AyxOFr!+l zH0W(6$&((f+H1MB8eWx~U{EqMI&@} z?AQq_D`$<{AKmYJ_r3`}bOMd(Iou;o5&MYk&`u6O3vr&v}hQ(#ry7hI?sFCUK(`Qb?ul~y0dW#v` zq1;WR=#9YRkb5qAbHIzybfJ8eNU?_7YNxbzV5!rvNT3r=Xm46|Ak|=>kYf$Yk&PU_?IW1fQKG>$Q;SF z@ikpwF1P+mW&D}br{Om)xwMNx;5wj3<{0}#DM(rUIeJQjbnaW~8K9PaO8Lmu0WefP zY9Qrp@L`HN7AV>aF{e@D;RH1@={ptPVrbC$9QFnqjG`Ohq<$G3FMw_#>&O`qrwvd< z`1YHxd-_Hf4&jxQIJO|fK?2oBhIm;Lhke+ENe;{njxPK62-(-4`k6gS&dII(aPo_+Rtc7(qcRY=2%!bc`RHk1TIJ!%c8P_o)mm{ z^3-v&COlxECXO9$#n5{yT+iE;vI$uj%vaU%lD^>WPN9rr7=pV)qXZ;FE#~i&8iPRA zP`?kr9VxeeAlM2z+sIubT_$NRQ=rzg(V!7ZJ6N#WUg6l~;;p#JlHU6G>Z5N$VUHiS=9*ZgE zE$I<3;I)CKqtgpUh|-mMA+8ir3;M0|fBCWye+%yWN+m0-E%w{Y)&%pnR{kFLK5drA z*vxUQ>%7o}*6m)70v6|y@x8ohjzbz8x)GG1;arm1mD-M>kelbyHz}H=cN`_%bULM8o2)Y8;sI|%Kx4{7n|oN7ETxs0@C2~o1nJ? zKerbHt(!H7_fUBJ=ut#PM7LI`zu|)2CjBy&2O~f?T<~RUaAQ5#E`RY9mP0QHDtwq? z8Mi=C$>=hf4q+@K)3ckf2K}Jdqbh|Gxsp;4a(NbNz~FCe+ihMvi?dO)F159G^UZG6 zVe&2<3r^1F% z4H$sLbe%`QyG3JHlgVd*LIq~P#;j_S)@Tzw39T148k!OI%bH;Z;P&j5Qyfe_1Z8uk z>vl6l$wq{TZG<4phXO){`xpFw9nKc?AV<4znJ=q}OObn43Ob_0TTV(Twr!~zRI3Nx z6z4b%3R2_mpNK0p!G~>7nntY+V#Kjf?ue(=ci3m?|~%rpOG_RBF!pYwv0C^K6qPTqCoS%m1&6zYA*L)SN)yG&^-Cz@9re2D_UD}7 z(Lha27vZXPxJA(9MX=a{SHZdk{TXGeENHiXYlOO=?BI@zMcWsSK-%L2L2GwFc-Osu z-+2anpFjxK(eaD8o`m?OTD&+vJUv>==)|oFMUF@M=Pn5kd1;w(V=sr%b_}eJ(+QZ6 znyDRyZ@Bu|`N7N|`VH3~**+2&XG-~(1c?Or4!s9!Yv@wPV}v^lj;Ee_3Lbdi0hM1|a+3G$5Jbd4TV?15o4(sg1u#Zddo(w)1D1_X^eVbeZDg-6w%SQBN z3YILqK4WSk<%9@Q7L^_ZDS{t{s4cw`DxQa(Lbndrv# z-n<%m5eEH`;Q<^Y#ZS;>kAYRMyz-LC@sCM+Jd@(m<8r~Y<0=diZLXFmbEwDPKV8!( zufVt6c#^A}dx5grB{Oq3Saz2rHAJ!GjUsSsT!$P2L%}Q=GZYusf1T2zgXe+b>e0g~ zvoVWegk{;h^M8Z8rkUnUNgH5N`})6mgQMTxu1q)XvVueFZXC~Sdsj2(PpV1E1Xq`j zHSl*}phpgm4x=LKV_I^uh?e2%@5LaLK*^v}Ewn^C%;6drD03V~JB?|S77kS=Xcg-Nmq!UP((-Xh>lEqp z;NyT~HI@Lk4v>N2o5gJ#^j{W8J%#(EGTF#f>Y zaf<=1a&ydA^*%GW;v`(L4yfZ>KGeYBrd{UD&L0)7ISc|M2i@GYcrb=S`y^w|J=ZDs zQGck|>)06;!K3F-i@1kA5LERiY}c07E1{jjrxY{CdS21=7==uU_>alg^b=>JSl_! zd>yDP(Dhm?i(<%n5Mq#+Lt68#XG#*j6qBpboVjx2FlwnTsV`Gr4h~8M1I1k<6vh=A zHCCoXZzGHJEtpT4S-yCpl=}}F29H;>6j>)<< z}O%T3lU81Gg1r5^v)jiz3u5f?~Ot?uf)SnPQ(7i8_cT%5r?_IwIS;{Lq!@iMe zlj;@~gsOVv_VBpN6t{9HRRrz-R5$6szfd8c19}qt_ClPwvqlzWJqXiuf%tNhDh#z& zf69$Q%W*mntZeDoZsqarH@F8HtV(1w!)v)F^CR z{UV)=w}zvM(kJ07Rdyw)Sx3?u8fQ*%UK?xpwL$1_*3NR| zB5=FkaaKAntbKMzMfQNTPBC1eYWEF#Mn>*fXTaH{451E1oUg2ZFNpoW2@03o58d4A z)63DFnFLT!ZCzjAgt<9;v=O~; z;KrH8v`iw420@BqvkEL|YQa+6le#-=6_^^!b6kk);5xk|Zb528jkU{Jq%q^BSL$*W zYN@v-MMG`55``h>9pc`l1Qz!~&O?3Uvlaa23E{!5rVts@RZqzVvK+EeX}8F3ePpu#^cC@kQMf_-~e zl!v}+tp$n4np+i)Fat9#B}#D3e451QlME?f#&8_roWm#0V_Hta!?htt1N|jk76ID3L|=QY+M6|~%Qt{nG1 zH8E4davDlhZjq$~v^0@9W?2HI^Jo$aSz^|}EOc((l`6uN&Jxtr={Sb$pYajO{kkPfETxRd*2+-( zlRA)o%UNq&l(k}xInnphJLzvp5Yc|(1P7PHfg2wVH|--1s8vPjiu;TL6=d;|o|1`6 z>E@V5s(m$WQn6g%zSr?QfWTmBUvS@Y%5h2&i_6f<&$#wV3qG}m2JLgexhzX8Gfrs< zYZ96um~5cGB8+tiC2L3q1wi)oJz3h_=ivE%ckTJ`T&^@nDKv^RiiQG@<59X`FTMYb z4gw?9Z>e>`t)rO7(5+Ot-)%p8B}VEqxn2I37j|-6a(pgVw`tGdUI<<(p~o~ixgzmv zI?gFR$H`)jC*dP1i#mm|PY0D3CA`M}-AlDhKc<%#)mmB{k?F>#-NvP$>Hb&(N+%Vk z;NVzF|{QtddyxY+M(`o9bw3GS?_8DXWgFSHc5>g~4yPNZMoxlrq1R2A!gxqf=@l zH^J!QsOj4p+PJn#Wpf&Os=wIz70PgZ7Hjn5k2C#FY8$0Znun?HQv#u6{*0sOrs|jG zR0>b6aFE)W6OJ|gBMAbje2!_y_(~La2{=QHgH-!zU**P#;{zqMmnc2J@SRfN#waCk zQe!l!;yf-$va@8}kHez|c@Q`Y1sJB3`i>(a7Vy#lry5(Mz?9~~o)%Lt!JT_vi#s(r zYQ`wWC28>7_bF|^gyxbls!;$Wnk3)^6`DN7IB7 z!Cec~3XSLFB)BC7mg94D3{uK!$~%ywAqUbLqjaX`j>N}vw5CAfZPOkjiDn6MZKZXU z)?ZU+2~eIsZkroVG_}xciOE$MD+QBwP|YCu_oa2F`aoL1lW6!UI_SS?K+aO2?M#)W z%#dS_rBG5n*UzQnT*CCqVCW5tkIjwS57V5_wcnJ?|4HUzZr(`vCshjKwIpp5PEt?Y zj&b^W9R5@~4z&WiRH4azCq3hU%Ak}|^vf8dl(AaU7VdYBwi+lg2B!h+T?}#Ks8GyV zK2&Sr%5xTQs(xwGaBevIJEyU!g3C4h^HlUUT||-s!7Wxv;mOe>2|BLNsn@22Nygf` zG)AfK>35Q)o14rvWjJO=>yE!k(HkFglAK3%P$G0o+K?LK6n~=YP~zn&0h;6gTwkk9z_aun2;PF) zF`9(Gq{b*E8&m71G|okm6)|n4Yo!){{JfzLxXNp-YKhsz&$**oKqe^HNQu#xSlikK zxukG&lS0xqB_=B=MjXvtnH)aa54nX9w@VTh@jq$>b97M}AhFP-_5oRhln##G)EIH? z%C(i!)2BI2zt+QfoohP>w9S-WPC!WWEXPE03aPY?;@^G^rRG!#&!G5If-uDdb9Hfj z#jRbb?^1M2^hvy^WIo4AA7=!_>s{g-T${MIaBI0{EpgAJzLtPn_q5Gi|JANJX^e8^ z=vXLXY;icH@hKgn950vVFSpKfvMBYOjX{uzObPu`ZI~lSs)y6QKv)PV+|ndSDGIr7 zN)|w>|4If;0;%0notjuYT>Uv=Uou81dNi?GBn>=XTqy=1jd@B*DZw*rkB+j$$?dGE zBL&j=9E%5&KgR6mx6e%m9#&ek5m~ir90PVZj5p`DIF<6 zBhi!Ml{qE6cCFO_H%2KwuM)Q)N>DRK+%rjWPu0gM4yAoqGsd~Lm9C=@gWw^jkyGHb zBB|V@(B(-l$D7mOQb4t}X@E4qxxSlpjB@R)p{J&<+#;e%!?^RLh7qQojSHpLNohNz zHcV?BQM@TA8B>Yg7$k*Uf=QGzj+SxP5T(0RA({lH#piM$t&5WHr=hH+>Xkg15-mCY z{#x?!l0J)#m~qF5D)>1_DV`-b*xMYbl_zOFB@HXlthnza$XULW{@S`J4hbhjlT!Ld zveKrZd2`xzZj4@QMW+TPWiDJF=5V~077qu~+#E-_t7Qz6mYc>Js=+JOGfgFq;+F+QH8jmJ;si*^7}d_}ap;)@ei>u*TFD}*u3A~d^+B#*2ALE&@D6_JD-|R)V?^KQ`o5GorI_M0l{hG9C+*WxdQ!q$V(ukl zR?`Qmb(iC{l9DEso%XnJb^o%)2oiiU#pmd=ab!`+7?q44{kzn7$bnH1mX?-bZhjut zR#%e^Rpcm5Y$cRh8YyB+IxE$|HNfGK1hPa^s-NgLWTWL!(=v4z20P0T6?T1B_(_4`3YmzYyE>uAz7MCqKyIx4kFC3-t*fNXT={A7xg6x?LrvY2j8Tfu0W&U~5}^b)dal0z>tj@cTWWW1eR426 zHwS0VEZJ}7xg4_R;XIs&^Kc%{!+H4s3jpvx1TE|A3Ot|#00000NkvXXu0mjf0RFRn literal 0 HcmV?d00001 diff --git a/devices/surface-hub/surface-hub-2s-port-keypad-overview.md b/devices/surface-hub/surface-hub-2s-port-keypad-overview.md index cdc068e4c3..403bb7cc78 100644 --- a/devices/surface-hub/surface-hub-2s-port-keypad-overview.md +++ b/devices/surface-hub/surface-hub-2s-port-keypad-overview.md @@ -15,6 +15,9 @@ ms.localizationpriority: Normal This page describes the ports, physical buttons, and configuration information essential for connecting to Surface Hub 2S whether via wired, Wi-Fi, or Bluetooth methods. It also includes best practice recommendations for key connectivity scenarios. +> [!NOTE] +> You can find the serial number on the outside of the packaging, on the display by the power cord, or by using the Surface app. + The figure below shows the location of ports and physical buttons on a keypad attached to the underside of the device. The table includes detailed descriptions of each element. ![Front facing and underside view of I/O connections and physical buttons](images/hub2s-schematic.png) @@ -37,11 +40,3 @@ The figure below shows the location of ports and physical buttons on a keypad at ![Rear facing view of wireless, audio, & related components](images/hub2s-rear.png) -## Major system components - -Surface Hub 2S consists of two primary system components: - -|**Component**|**Functionality**| -|:--------- |:----------------- | -|**Video board**| - Produces the image on the LCD display.
          - Provides an audio/video connection path to/from the compute module.
          - Provides video scaling to support external video sources.
          - Performs color correction and calibration.
          - Responsible for power management, including occupancy sensors and device power states.
          - Monitors and manages all thermal sensors throughout the device.
          - Performs internal diagnostics.
          - Captures diagnostics, error logs, and telemetry for all components not connected to the compute module.
          - Controls the behavior of keypad buttons.
          - Provides an on-screen display for control of video source, brightness, and volume. | -|**Compute module**| Connects to and controls all USB devices.
          - Provides video board interconnections for USB, Mini DP, HDMI, PCIe.
          - Provides Ethernet access via wired and wireless interfaces.
          Provides the on-screen audio/video content.
          - Ingests audio/video provided by external sources.
          - Allows video to be passed directly to the video board (bypassing the ingest process) for scenarios in which an external source is HDCP encrypted or is beyond the capability of the ingest subsystem.
          - Provides digital audio output for accessibility and room audio systems respectively (USB dongle support only). | diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index d9c490c776..fcd3dcdc8f 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -30,14 +30,18 @@ ms.localizationpriority: Normal | 4. **Attach accessories and power on** | | | Install accessories and attach power cable as shown. See guides on the screen cling. Remove cling wrap from the screen. Press the power button to power on. | ![* Attach accessories and power on *](images/sh2-setup-4.png)
          | -## Install pen and camera +## Install and adjust pen 1. Attach Surface Hub 2 pen magnetically to your preferred side of the device. -![*Surface Hub 2S pen *](images/sh2-pen.png)
          -A red LED indicator light on the pen warns you when the battery is low. +![*Surface Hub 2 pen comes ready to use. To replace AAA battery, pull off the top button and insert battery as shown. The indicator light will turn red when the battery is low.*](images/sh2-pen.png)
          -2. Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. +2. To adjust pen pressure, open the Surface app on Surface Hub 2S, select Pen, and adjust the slider. + +![*Adjust the slider to change pen pressure *](images/sh2-pen-pressure.png)
          + +## Install camera +Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. ## Start Surface Hub 2S From 1dc2ff8145457ff1d4b0c3ff0c458870442159ef Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Tue, 18 Jun 2019 12:50:04 -0700 Subject: [PATCH 277/303] Updates to hub and devices landing pages --- devices/surface/get-started.md | 7 +++++-- devices/surface/index-new2.md | 1 + 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index 038f421cd8..4269e7f06d 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -137,8 +137,11 @@ Harness the power of Surface, Windows, and Office connected together through the

          diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md index 409879b4cb..b6709b00f1 100644 --- a/devices/surface/index-new2.md +++ b/devices/surface/index-new2.md @@ -114,6 +114,7 @@ description: Learn about Microsoft Surface and Surface Hub devices. From c62f9ff3a9847c30f9dbf2ceb8e0d84e75cbcdcf Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Tue, 18 Jun 2019 16:09:50 -0400 Subject: [PATCH 278/303] chore: Run MS Docs "Generat Master Redirect" - Autoformated openpublishing.redirect - Replaces files with "redirect_url" with redirect entry - Manually removed "docs.microsoft.com" from redirect URLs to site absolute --- .openpublishing.redirection.json | 30128 ++++++++-------- bcs/index.md | 3 - bcs/support/microsoft-365-business-faqs.md | 3 - bcs/support/transition-csp-subscription.md | 3 - ...nced-uefi-security-features-for-surface.md | 3 - .../create-tests-using-microsoft-forms.md | 33 - windows/access-protection/index.md | 3 - .../upgrade/troubleshoot-upgrade-readiness.md | 3 - .../upgrade-readiness-release-notes.md | 9 - windows/device-security/index.md | 3 - windows/threat-protection/index.md | 3 - 11 files changed, 15088 insertions(+), 15106 deletions(-) delete mode 100644 bcs/index.md delete mode 100644 bcs/support/microsoft-365-business-faqs.md delete mode 100644 bcs/support/transition-csp-subscription.md delete mode 100644 devices/surface/advanced-uefi-security-features-for-surface.md delete mode 100644 education/windows/create-tests-using-microsoft-forms.md delete mode 100644 windows/access-protection/index.md delete mode 100644 windows/deployment/upgrade/troubleshoot-upgrade-readiness.md delete mode 100644 windows/deployment/upgrade/upgrade-readiness-release-notes.md delete mode 100644 windows/device-security/index.md delete mode 100644 windows/threat-protection/index.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7254840960..11a8f41c9f 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1,15041 +1,15089 @@ { -"redirections": [ -{ -"source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md", -"redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/windows-update-sources.md", -"redirect_url": "/windows/deployment/update/how-windows-update-works", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/hardware-and-software-requirements.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/about-microsoft-edge", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/security-enhancements-microsoft-edge.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/group-policies/security-privacy-management-gp", -"redirect_document_id": true -}, -{ -"source_path": "browsers/edge/new-policies.md", -"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/change-history-for-microsoft-edge", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/intelligence/av-tests.md", -"redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/intelligence/transparency-report.md", -"redirect_url": "/windows/security/threat-protection/intelligence/av-tests", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md", -"redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-add", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md", -"redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/encrypted-hard-drive.md", -"redirect_url": "/windows/security/information-protection/encrypted-hard-drive", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/secure-the-windows-10-boot-process.md", -"redirect_url": "/windows/security/information-protection/secure-the-windows-10-boot-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md", -"redirect_url": "/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/change-the-tpm-owner-password.md", -"redirect_url": "/windows/security/information-protection/tpm/change-the-tpm-owner-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/how-windows-uses-the-tpm.md", -"redirect_url": "/windows/security/information-protection/tpm/how-windows-uses-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md", -"redirect_url": "/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/manage-tpm-commands.md", -"redirect_url": "/windows/security/information-protection/tpm/manage-tpm-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/manage-tpm-lockout.md", -"redirect_url": "/windows/security/information-protection/tpm/manage-tpm-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", -"redirect_url": "/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/tpm-fundamentals.md", -"redirect_url": "/windows/security/information-protection/tpm/tpm-fundamentals", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/tpm-recommendations.md", -"redirect_url": "/windows/security/information-protection/tpm/tpm-recommendations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-overview.md", -"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md", -"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md", -"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-top-node", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-windows-insider-for-business.md", -"redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agress.md", -"redirect_url": "/windows/security/threat-protectionsecurity-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/administer-applocker-using-mdm.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/administer-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-architecture-and-components.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-functions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-policies-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-policies-design-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-policy-use-scenarios.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-processes-and-interactions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-settings.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/applocker-technical-reference.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-the-application-identity-service.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/configure-the-appLocker-reference-device.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-your-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/create-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/delete-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/determine-your-application-control-objectives.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/dll-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/document-your-application-list.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/document-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/edit-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/edit-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/enable-the-dll-rule-collection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/enforce-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/executable-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/how-applocker-works-techref.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-manually.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/monitor-application-usage-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/optimize-applocker-performance.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/plan-for-applocker-policy-management.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/refresh-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/requirements-to-use-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/script-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/security-considerations-for-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/select-types-of-rules-to-create.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/test-and-update-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/tools-to-use-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-applocker-enforcement-settings.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-behavior.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-collections.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/using-event-viewer-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/what-is-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/windows-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/working-with-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/applocker/working-with-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/steps-to-deploy-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-enable-virtualization-based-security.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/enable-virtualization-based-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-family-options.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/apis-intro.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/apis-intro", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/api-hello-world.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-hello-world", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/deprecate.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/deprecate", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/evaluate-atp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-edr.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-edr", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/management-apis.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/management-apis", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/partner-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/prerelease.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", - "redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/whats-new-in-microsoft-defender-atp", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/install-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-offline.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/block-untrusted-fonts-in-enterprise.md", -"redirect_url": "/windows/security/threat-protection/block-untrusted-fonts-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/change-history-for-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/change-history-for-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/override-mitigation-options-for-app-related-security-policies.md", -"redirect_url": "/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/overview-of-threat-mitigations-in-windows-10.md", -"redirect_url": "/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md", -"redirect_url": "/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md", -"redirect_url": "/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/access-this-computer-from-the-network.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-lockout-duration.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-duration", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-lockout-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-lockout-threshold.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/account-policies.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-administrator-account-status.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-block-microsoft-accounts.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-guest-account-status.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-rename-administrator-account.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/accounts-rename-guest-account.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/act-as-part-of-the-operating-system.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/add-workstations-to-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/administer-security-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/allow-log-on-locally.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/back-up-files-and-directories.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/bypass-traverse-checking.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/change-the-system-time.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-system-time", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/change-the-time-zone.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-time-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-a-pagefile.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-a-token-object.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-token-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-global-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-global-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-permanent-shared-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/create-symbolic-links.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-symbolic-links", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/debug-programs.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/debug-programs", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-service.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-locally.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/enforce-password-history.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-password-history", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/enforce-user-logon-restrictions.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/generate-security-audits.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/generate-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/how-to-configure-security-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/impersonate-a-client-after-authentication.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/increase-a-process-working-set.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/increase-scheduling-priority.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-require-smart-card.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/kerberos-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/kerberos-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/load-and-unload-device-drivers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/lock-pages-in-memory.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/log-on-as-a-batch-job.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/log-on-as-a-service.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/manage-auditing-and-security-log.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-password-age.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/minimum-password-age.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/minimum-password-length.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-length", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/modify-an-object-label.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-an-object-label", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/modify-firmware-environment-values.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-list-manager-policies.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-list-manager-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/password-must-meet-complexity-requirements.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/password-policy.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/password-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/perform-volume-maintenance-tasks.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/profile-single-process.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-single-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/profile-system-performance.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-system-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/remove-computer-from-docking-station.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/replace-a-process-level-token.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/reset-account-lockout-counter-after.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/restore-files-and-directories.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/restore-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/security-options.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/security-policy-settings-reference.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/security-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/shut-down-the-system.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/shut-down-the-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/synchronize-directory-service-data.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-settings-optional-subsystems.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-policy-settings/user-rights-assignment.md", -"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-rights-assignment", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/device-guard-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/device-guard/device-guard-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md", -"redirect_url": "/windows/security/threat-protection/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/advanced-security-auditing-faq.md", -"redirect_url": "/windows/security/threat-protection/auditing/advanced-security-auditing.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-account-lockout.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-application-generated.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-application-group-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-audit-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-authentication-policy-change.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-authorization-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-central-access-policy-staging.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-certification-services.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-computer-account-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-credential-validation.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-detailed-directory-service-replication.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-detailed-file-share.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-directory-service-access.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-directory-service-changes.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-directory-service-replication.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-distribution-group-management.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-dpapi-activity.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-file-share.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-file-system.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-filtering-platform-packet-drop.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-group-membership.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-handle-manipulation.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-ipsec-driver.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-ipsec-main-mode.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-kerberos-authentication-service.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-kernel-object.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-logoff.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-logon.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-network-policy-server.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-account-logon-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-other-account-management-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-logonlogoff-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-other-object-access-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-policy-change-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-other-system-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-pnp-activity.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-process-creation.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-process-termination.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-registry.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-removable-storage.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-rpc-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-sam.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-security-group-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-security-state-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-security-system-extension.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-special-logon.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-system-integrity.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/audit-user-account-management.md", -"redirect_url": "/windows/security/threat-protection/auditing/audit-user-device-claims.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-account-logon-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-account-management.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-directory-service-access.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-logon-events.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-object-access.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-policy-change.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-privilege-use.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-process-tracking.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-audit-system-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/basic-security-audit-policies.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/basic-security-audit-policy-settings.md", -"redirect_url": "/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-1100.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-1102.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-1104.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-1105.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-1108.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4608.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4610.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4611.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4612.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4614.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4615.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4616.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4618.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4621.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4622.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4624.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4625.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4626.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4627.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4634.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4647.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4648.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4649.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4656.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4657.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4658.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4660.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4661.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4662.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4663.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4664.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4670.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4671.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4672.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4673.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4674.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4675.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4688.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4689.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4690.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4691.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4692.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4693.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4694.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4695.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4696.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4697.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4698.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4699.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4700.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4701.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4702.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4703.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4704.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4705.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4706.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4707.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4713.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4714.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4715.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4716.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4717.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4718.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4719.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4720.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4722.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4723.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4724.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4725.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4726.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4731.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4732.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4733.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4734.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4735.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4738.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4739.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4740.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4741.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4742.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4743.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4749.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4750.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4751.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4752.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4753.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4764.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4765.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4766.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4767.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4768.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4769.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4770.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4771.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4772.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4773.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4774.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4775.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4776.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4777.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4778.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4779.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4780.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4781.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4782.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4793.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4794.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4798.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4799.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4800.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4801.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4802.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4803.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4816.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4817.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4818.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4819.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4826.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4864.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4865.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4866.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4867.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4902.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4904.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4905.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4906.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4907.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4908.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4909.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4910.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4911.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4912.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4913.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4928.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4929.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4930.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4931.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4932.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4933.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4934.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4935.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4936.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4937.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4944.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4945.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4946.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4947.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4948.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4949.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4950.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4951.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4952.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4953.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4954.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4956.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4957.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4958.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-4964.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-4985.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5024.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5025.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5027.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5028.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5029.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5030.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5031.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5032.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5033.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5034.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5035.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5037.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5038.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5039.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5051.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5056.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5057.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5058.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5059.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5060.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5061.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5062.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5063.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5064.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5065.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5066.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5067.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5068.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5069.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5070.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5136.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5137.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5138.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5139.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5140.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5141.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5142.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5143.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5144.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5145.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5148.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5149.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5150.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5151.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5152.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5153.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5154.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5155.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5156.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5157.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5158.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5159.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5168.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5376.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5377.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5378.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5447.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5632.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5633.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5712.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5888.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-5889.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-5890.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6144.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6145.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6281.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6400.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6401.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6402.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6403.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6404.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6405.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6406.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6407.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6408.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6409.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6410.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6416.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6419.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6420.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6421.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6422.md", -"redirect_url": "/windows/security/threat-protection/auditing/event-6423.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/event-6424.md", -"redirect_url": "/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-claim-types.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-resource-attribute-definitions.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/monitor-the-use-of-removable-storage-devices.md", -"redirect_url": "/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/other-events.md", -"redirect_url": "/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/registry-global-object-access-auditing.md", -"redirect_url": "/windows/security/threat-protection/auditing/security-auditing-overview.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", -"redirect_url": "/windows/security/threat-protection/auditing/view-the-security-event-log.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md", -"redirect_url": "/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", -"redirect_url": "/windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/administer-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/administer-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-architecture-and-components.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-architecture-and-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-functions.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-functions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-overview.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-policies-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-policies-design-guide.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-policy-use-scenarios.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-policy-use-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-processes-and-interactions.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-processes-and-interactions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-settings.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/applocker-technical-reference.md", -"redirect_url": "/windows/security/threat-protection/applocker/applocker-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-audit-only.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-exceptions-for-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-the-application-identity-service.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-the-application-identity-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/configure-the-appLocker-reference-device.md", -"redirect_url": "/windows/security/threat-protection/applocker/configure-the-appLocker-reference-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-for-packaged-apps.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-path-condition.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-your-applocker-planning-document.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-planning-document", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-your-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/create-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/delete-an-applocker-rule.md", -"redirect_url": "/windows/security/threat-protection/applocker/delete-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", -"redirect_url": "/windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/deploy-the-applocker-policy-into-production.md", -"redirect_url": "/windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", -"redirect_url": "/windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/determine-your-application-control-objectives.md", -"redirect_url": "/windows/security/threat-protection/applocker/determine-your-application-control-objectives", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", -"redirect_url": "/windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/dll-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/dll-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-your-application-control-management-processes.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-your-application-control-management-processes", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-your-application-list.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-your-application-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/document-your-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/document-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/edit-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/edit-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/edit-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/edit-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/enable-the-dll-rule-collection.md", -"redirect_url": "/windows/security/threat-protection/applocker/enable-the-dll-rule-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/enforce-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/enforce-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/executable-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/executable-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/export-an-applocker-policy-from-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file.md", -"redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/how-applocker-works-techref.md", -"redirect_url": "/windows/security/threat-protection/applocker/how-applocker-works-techref", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/import-an-applocker-policy-from-another-computer.md", -"redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/import-an-applocker-policy-into-a-gpo.md", -"redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/manage-packaged-apps-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/merge-applocker-policies-manually.md", -"redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-manually", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/monitor-application-usage-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/monitor-application-usage-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/optimize-applocker-performance.md", -"redirect_url": "/windows/security/threat-protection/applocker/optimize-applocker-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/plan-for-applocker-policy-management.md", -"redirect_url": "/windows/security/threat-protection/applocker/plan-for-applocker-policy-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/refresh-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/refresh-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/requirements-for-deploying-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/requirements-to-use-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/requirements-to-use-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/run-the-automatically-generate-rules-wizard.md", -"redirect_url": "/windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/script-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/script-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/security-considerations-for-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/security-considerations-for-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/select-types-of-rules-to-create.md", -"redirect_url": "/windows/security/threat-protection/applocker/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", -"redirect_url": "/windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/test-and-update-an-applocker-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/test-and-update-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/tools-to-use-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/tools-to-use-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-applocker-enforcement-settings.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-enforcement-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-applocker-policy-design-decisions.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understand-the-applocker-policy-deployment-process.md", -"redirect_url": "/windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-default-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-behavior.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-collections.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-collections", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-condition-types.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-applocker-rule-exceptions.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", -"redirect_url": "/windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets.md", -"redirect_url": "/windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/using-event-viewer-with-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/using-event-viewer-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/what-is-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/what-is-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/windows-installer-rules-in-applocker.md", -"redirect_url": "/windows/security/threat-protection/applocker/windows-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/working-with-applocker-policies.md", -"redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/applocker/working-with-applocker-rules.md", -"redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/change-history-for-device-security.md", -"redirect_url": "/windows/security/threat-protection/change-history-for-device-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/enable-virtualization-based-protection-of-code-integrity.md", -"redirect_url": "/windows/security/threat-protection/enable-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/get-support-for-security-baselines.md", -"redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", -"redirect_url": "/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/security-compliance-toolkit-10.md", -"redirect_url": "/windows/security/threat-protection/security-compliance-toolkit-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/windows-10-mobile-security-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-10-mobile-security-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/windows-security-baselines.md", -"redirect_url": "/windows/security/threat-protection/windows-security-baselines", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/app-behavior-with-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/app-behavior-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/limitations-with-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/limitations-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/mandatory-settings-for-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy-sccm.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/testing-scenarios-for-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/using-owa-with-wip.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/using-owa-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/windows-information-protection/wip-app-enterprise-context.md", -"redirect_url": "/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/encrypted-hard-drive.md", -"redirect_url": "/windows/security/hardware-protection/encrypted-hard-drive", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/how-hardware-based-containers-help-protect-windows.md", -"redirect_url": "/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/secure-the-windows-10-boot-process.md", -"redirect_url": "/windows/security/hardware-protection/secure-the-windows-10-boot-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds.md", -"redirect_url": "/windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/change-the-tpm-owner-password.md", -"redirect_url": "/windows/securityhardware-protection/tpm/change-the-tpm-owner-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/how-windows-uses-the-tpm.md", -"redirect_url": "/windows/securityhardware-protection/tpm/how-windows-uses-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm.md", -"redirect_url": "/windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/manage-tpm-commands.md", -"redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/manage-tpm-lockout.md", -"redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", -"redirect_url": "/windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/tpm-fundamentals.md", -"redirect_url": "/windows/security/hardware-protection/tpm/tpm-fundamentals", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/tpm-recommendations.md", -"redirect_url": "/windows/security/hardware-protection/tpm/tpm-recommendations", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/trusted-platform-module-overview.md", -"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/trusted-platform-module-services-group-policy-settings.md", -"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/tpm/trusted-platform-module-top-node.md", -"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-top-node", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bcd-settings-and-bitlocker.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-basic-deployment.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-basic-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-countermeasures.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-group-policy-settings.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-management-for-enterprises.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-overview.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-recovery-guide-plan.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md", -"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure.md", -"redirect_url": "/windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md", -"redirect_url": "/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", -"redirect_url": "/windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", -"redirect_url": "/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys.md", -"redirect_url": "/windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-credential-theft-mitigation-guide-abstract.md", -"redirect_url": "/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/change-history-for-access-protection.md", -"redirect_url": "/windows/security/identity-protection/change-history-for-access-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/configure-s-mime.md", -"redirect_url": "/windows/security/identity-protection/configure-s-mime", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/enterprise-certificate-pinning.md", -"redirect_url": "/windows/security/identity-protection/enterprise-certificate-pinning", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/installing-digital-certificates-on-windows-10-mobile.md", -"redirect_url": "/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/remote-credential-guard.md", -"redirect_url": "/windows/security/identity-protection/remote-credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/assign-security-group-filters-to-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/basic-firewall-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/boundary-zone-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/boundary-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/change-rules-from-request-to-require-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-basic-firewall-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-group-policy-objects.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-group-policy-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-inbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-outbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-authentication-methods.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-authentication-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-data-protection-quick-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-key-exchange-main-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-rules-to-require-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-the-windows-firewall-log.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-windows-firewall-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-a-group-account-in-active-directory.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-account-in-active-directory", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-a-group-policy-object.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-policy-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-exemption-list-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-authentication-request-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-request-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-inbound-icmp-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-icmp-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-inbound-port-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-outbound-port-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-inbound-rules-to-support-rpc", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/create-wmi-filters-for-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/determining-the-trusted-state-of-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/documenting-the-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/documenting-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/enable-predefined-inbound-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-inbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/enable-predefined-outbound-rules.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-outbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/encryption-zone-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/encryption-zone.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/exempt-icmp-from-authentication.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/exempt-icmp-from-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/exemption-list.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/exemption-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/firewall-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/firewall-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-other-relevant-information.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-other-relevant-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gathering-the-information-you-need.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-the-information-you-need", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-boundary.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-boundary", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-encryption.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-firewall.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/isolated-domain-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/isolated-domain.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/isolating-apps-on-your-network.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/isolating-apps-on-your-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/link-the-gpo-to-the-domain.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/link-the-gpo-to-the-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/open-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-certificate-based-authentication.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-certificate-based-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-domain-isolation-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-domain-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-gpo-deployment.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-gpo-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-isolation-groups-for-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-network-access-groups.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-network-access-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-server-isolation-zones.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-server-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-the-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-the-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/procedures-used-in-this-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/procedures-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-trusted-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/server-isolation-gpos.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design-example.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/verify-that-network-traffic-is-authenticated", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", -"redirect_url": "/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-authentication.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-auto-trigger-profile.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-auto-trigger-profile", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-conditional-access.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-connection-type.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-connection-type", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-guide.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-name-resolution.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-name-resolution", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-profile-options.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-profile-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-routing.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-routing", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/vpn/vpn-security-features.md", -"redirect_url": "/windows/security/identity-protection/vpn/vpn-security-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-overview.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md", -"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/how-user-account-control-works.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/how-user-account-control-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/user-account-control-overview.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/user-account-control/user-account-control-security-policy-settings.md", -"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-debugging-information.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-debugging-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-events.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-removal-policy-service.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-tools-and-settings.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-and-remote-desktop-services.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-architecture.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/smart-cards/smart-card-certificate-propagation-service.md", -"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-and-password-changes.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-and-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-adfs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-policy-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-deployment-cert-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-deployment-guide.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-deployment-key-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-event-300.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-event-300", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-features.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-how-it-works.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-new-install.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-new-install.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-devreg.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-provision.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-identity-verification.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-adfs.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-policy-settings.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-pki.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-manage-in-organization.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-manage-in-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-overview.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-planning-guide.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-planning-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-prepare-people-to-use.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md", -"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/additional-mitigations.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/additional-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-considerations.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-how-it-works.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-known-issues.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-known-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-manage.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-manage", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-not-protected-scenarios.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-protection-limits.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-protection-limits", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-requirements.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/credential-guard/credential-guard-scripts.md", -"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/access-control.md", -"redirect_url": "/windows/security/identity-protection/access-control/access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/active-directory-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/active-directory-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/active-directory-security-groups.md", -"redirect_url": "/windows/security/identity-protection/access-control/active-directory-security-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/dynamic-access-control.md", -"redirect_url": "/windows/security/identity-protection/access-control/dynamic-access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/local-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/microsoft-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/security-identifiers.md", -"redirect_url": "/windows/security/identity-protection/access-control/security-identifiers", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/security-principals.md", -"redirect_url": "/windows/security/identity-protection/access-control/security-principals", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/service-accounts.md", -"redirect_url": "/windows/security/identity-protection/access-control/service-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/access-protection/access-control/special-identities.md", -"redirect_url": "/windows/security/identity-protection/access-control/special-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md", -"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", -"redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/surface-device-compatibility-with-windows-10-ltsb.md", -"redirect_url": "/devices/surface/surface-device-compatibility-with-windows-10-ltsc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/windows-diagnostic-data-1709.md", -"redirect_url": "/windows/configuration/windows-diagnostic-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/EventName.md", -"redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md", -"redirect_url": "/education/windows/switch-to-pro-education", -"redirect_document_id": false -}, -{ -"source_path": "education/windows/switch-to-pro-education.md", -"redirect_url": "/education/windows/change-to-pro-education", -"redirect_document_id": true -}, -{ - "source_path": "education/windows/swithc-to-pro-de.md", - "redirect_url": "/education/windows/switch-to-pro-education", - "redirect_document_id": false - }, -{ -"source_path": "windows/client-management/mdm/policy-admx-backed.md", -"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", -"redirect_document_id": true -}, -{ -"source_path": "windows/client-management/mdm/policy-csp-location.md", -"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-7.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/surface-diagnostic-toolkit.md", -"redirect_url": "/surface/index", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface/manage-surface-dock-firmware-updates.md", -"redirect_url": "devices/surface/update", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/i-am-done-finishing-your-surface-hub-meeting.md", -"redirect_url": "/surface-hub/finishing-your-surface-hub-meeting", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-microsoft-layout-app.md", -"redirect_url": "/hololens/hololens-microsoft-dynamics-365-layout-app", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-microsoft-dynamics-365-layout-app.md", -"redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/layout/", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-microsoft-remote-assist-app.md", -"redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/remote-assist/", -"redirect_document_id": true -}, -{ -"source_path": "devices/hololens/hololens-public-preview-apps.md", -"redirect_url": "https://docs.microsoft.com/dynamics365/#pivot=mixed-reality-apps", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/provisioning-packages-for-certificates-surface-hub.md", -"redirect_url": "/surface-hub/provisioning-packages-for-surface-hub", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/manage-settings-with-local-admin-account-surface-hub.md", -"redirect_url": "/surface-hub/admin-group-management-for-surface-hub", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/surface-hub-administrators-guide.md", -"redirect_url": "/surface-hub/index", -"redirect_document_id": true -}, -{ -"source_path": "devices/surface-hub/intro-to-surface-hub.md", -"redirect_url": "/surface-hub/index", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/waas-quick-start.md", -"redirect_url": "/windows/deployment/update/waas-quick-start", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-overview.md", -"redirect_url": "/windows/deployment/update/waas-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-servicing-strategy-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-deployment-rings-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-servicing-branches-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-compliance-monitor.md", -"redirect_url": "/windows/deployment/update/update-compliance-monitor", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-compliance-get-started.md", -"redirect_url": "/windows/deployment/update/update-compliance-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-compliance-using.md", -"redirect_url": "/windows/deployment/update/update-compliance-using", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-optimize-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-delivery-optimization.md", -"redirect_url": "/windows/deployment/update/waas-delivery-optimization", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-branchcache.md", -"redirect_url": "/windows/deployment/update/waas-branchcache", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-mobile-updates.md", -"redirect_url": "/windows/deployment/update/waas-mobile-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-manage-updates-wufb.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-configure-wufb.md", -"redirect_url": "/windows/deployment/update/waas-configure-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-integrate-wufb.md", -"redirect_url": "/windows/deployment/update/waas-integrate-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-wufb-group-policy.md", -"redirect_url": "/windows/deployment/update/waas-wufb-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-wufb-intune.md", -"redirect_url": "/windows/deployment/update/waas-wufb-intune.md", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-manage-updates-wsus.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-manage-updates-configuration-manager.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-restart.md", -"redirect_url": "/windows/deployment/update/waas-restart", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/waas-update-windows-10.md", -"redirect_url": "/windows/deployment/update/index", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/configure-windows-telemetry-in-your-organization.md", -"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lockdown-features-windows-10.md", -"redirect_url": "/windows/configuration/lockdown-features-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/set-up-shared-or-guest-pc.md", -"redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md", -"redirect_url": "/windows/configuration/kiosk-shared-pc", -"redirect_document_id": false -}, -{ -"source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md", -"redirect_url": "/windows/configuration/kiosk-shared-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", -"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/guidelines-for-assigned-access-app.md", -"redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lock-down-windows-10-to-specific-apps.md", -"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", -"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lockdown-xml.md", -"redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/settings-that-can-be-locked-down.md", -"redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/product-ids-in-windows-10-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-tips-and-suggestions.md", -"redirect_url": "/windows/configuration/manage-tips-and-suggestions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-10-start-layout-options-and-policies.md", -"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-windows-10-taskbar.md", -"redirect_url": "/windows/configuration//configure-windows-10-taskbar", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-and-export-start-layout.md", -"redirect_url": "/windows/configuration//customize-and-export-start-layout", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/start-layout-xml-desktop.md", -"redirect_url": "/windows/configuration/start-layout-xml-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/start-layout-xml-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-windows-10-start-screens-by-using-group-policy.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-testing-scenarios.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-1.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-2.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-3.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-4.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-5.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-scenario-6.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-o365.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-crm.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-powerbi.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-voice-commands.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-policy-settings.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-feedback.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/stop-employees-from-using-the-windows-store.md", -"redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md", -"redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-devices-without-mdm.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/changes-to-start-policies-in-windows-10.md", -"redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/how-it-pros-can-use-configuration-service-providers.md", -"redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/lock-down-windows-10.md", -"redirect_url": "/windows/configuration/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-wifi-sense-in-enterprise.md", -"redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-how-it-works.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-install-icd.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-create-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-apply-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-uninstall-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provision-pcs-for-initial-deployment.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provision-pcs-with-apps-and-certificates.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-script-to-install-app.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-nfc.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-command-line.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/provisioning-multivariant.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-edp-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-edp-policy-using-sccm.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-vpn-and-edp-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-enable-phone-signin.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/deploy-edp-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/guidance-and-best-practices-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/overview-create-edp-policy.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-enterprise-data-using-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/testing-scenarios-for-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/wip-enterprise-overview.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/enlightened-microsoft-apps-and-edp.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/update-windows-10-images-with-provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": false -}, -{ -"source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-release-notes.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md", -"redirect_url": "https://technet.microsoft.com/library/jj635854.aspx", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md", -"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/device-guard-certification-and-compliance.md", -"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-enable-phone-signin", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md", -"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/implement-microsoft-passport-in-your-organization.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-identity-verification-using-microsoft-passport.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-passport-and-password-changes.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-passport-errors-during-pin-creation.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-passport-guide.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/passport-event-300.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/prepare-people-to-use-microsoft-passport.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/why-a-pin-is-better-than-a-password.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-hello-in-enterprise.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/app-inventory-management-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/application-development-for-windows-as-a-service.md", -"redirect_url": "https://msdn.microsoft.com/windows/uwp/get-started/application-development-for-windows-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-accessibility.md", -"redirect_url": "/windows/application-management/app-v/appv-getting-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-accessing-the-client-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-appv-client-for-shared-content-store-mode.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-modify-client-configuration-with-the-admx-template-and-group-policy.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/appv-planning-for-migrating-from-a-previous-version-of-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-windows-10-devices-to-stop-data-flow-to-microsoft.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/disconnect-your-organization-from-microsoft.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/introduction-to-windows-10-servicing.md", -"redirect_url": "/windows/deployment/update/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-cortana-in-enterprise.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/cortana-at-work-overview.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", -"redirect_document_id": false -}, -{ -"source_path": "windows/manage/manage-inventory-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-managemement-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-managemement-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-accessibility.md", -"redirect_url": "/windows/configuration/ue-v/uev-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-privacy-statement.md", -"redirect_url": "/windows/configuration/ue-v/uev-security-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/act-community-ratings-and-process.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/act-database-configuration.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-database-migration.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-deployment-options.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-glossary.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/activating-and-closing-windows-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-lps-share-permissions.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-operatingsystem-application-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-operatingsystem-computer-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-operatingsystem-device-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-product-and-documentation-resources.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-settings-dialog-box-preferences-tab.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-settings-dialog-box-settings-tab.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-toolbar-icons-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-tools-packages-and-services.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/act-user-interface-reference.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/adding-or-editing-an-issue.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/adding-or-editing-a-solution.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/analyzing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/application-dialog-box.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/categorizing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/chromebook-migration-guide.md", -"redirect_url": "edu/windows/chromebook-migration-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/common-compatibility-issues.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/compatibility-monitor-users-guide.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/computer-dialog-box.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/configuring-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-and-editing-issues-and-solutions.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-an-inventory-collector-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/creating-a-runtime-analysis-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/customizing-your-report-views.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deciding-which-applications-to-test.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deleting-a-data-collection-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deploying-an-inventory-collector-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deploying-a-runtime-analysis-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/deploy-windows-10-in-a-school.md", -"redirect_url": "/edu/windows/deploy-windows-10-in-a-school", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/example-filter-queries.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/exporting-a-data-collection-package.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/filtering-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/fixing-compatibility-issues.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/identifying-computers-for-inventory-collection.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/integration-with-management-solutions-.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/internet-explorer-web-site-report.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/labeling-data-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/log-file-locations-for-data-collection-packages.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/managing-your-data-collection-packages.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/organizational-tasks-for-each-report-type.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/organizing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/prioritizing-your-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/ratings-icons-in-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/resolving-an-issue.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/saving-opening-and-exporting-reports.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/selecting-the-send-and-receive-status-for-an-application.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/selecting-your-compatibility-rating.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/selecting-your-deployment-status.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/sending-and-receiving-compatibility-data.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/settings-for-acm.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/setup-and-deployment.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/software-requirements-for-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/software-requirements-for-rap.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/taking-inventory-of-your-organization.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/testing-compatibility-on-the-target-platform.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-act-database-issues.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-the-act-configuration-wizard.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/troubleshooting-the-act-log-processing-service.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/using-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/using-compatibility-monitor-to-send-feedback.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/viewing-your-compatibility-reports.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/websiteurl-dialog-box.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/welcome-to-act.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/whats-new-in-act-60.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/windows-10-guidance-for-education-environments.md", -"redirect_url": "/edu/windows/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-servicing-options.md", -"redirect_url": "/windows/deployment/update/waas-overview", -"redirect_document_id": false -}, -{ -"source_path": "windows/plan/windows-update-for-business.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/applocker.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/bitlocker.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/change-history-for-what-s-new-in-windows-10.md", -"redirect_url": "/windows/whats-new/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/credential-guard.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/device-guard-overview.md", -"redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/device-management.md", -"redirect_url": "/windows/client-management/index", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/edge-ie11-whats-new-overview.md", -"redirect_url": "/microsoft-edge/deploy/enterprise-guidance-using-microsoft-edge-and-ie11", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/edp-whats-new-overview.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/lockdown-features-windows-10.md", -"redirect_url": "/windows/configuration/lockdown-features-windows-10", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/microsoft-passport.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/new-provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/security-auditing.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/trusted-platform-module.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/user-account-control.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/whats-new/windows-spotlight.md", -"redirect_url": "/windows/configuration/windows-spotlight", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/microsoft-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/windows-update-for-business.md", -"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", -"redirect_document_id": false -}, -{ -"source_path": "windows/keep-secure/windows-10-security-guide.md", -"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/whats-new/security.md", -"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": false -}, -{ -"source_path": "windows/configure/basic-level-windows-diagnostic-events-and-fields-1703.md", -"redirect_url": "/windows/configuration/basic-level-windows-diagnostic-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/change-history-for-configure-windows-10.md", -"redirect_url": "/windows/configuration/change-history-for-configure-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/changes-to-start-policies-in-windows-10.md", -"redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-devices-without-mdm.md", -"redirect_url": "/windows/configuration/configure-devices-without-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/configure-devices-without-mdm.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/configure-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-windows-10-taskbar.md", -"redirect_url": "/windows/configuration/configure-windows-10-taskbar", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/configure-windows-telemetry-in-your-organization.md", -"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md", -"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-crm.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-feedback.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-o365.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-overview.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-policy-settings.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-powerbi.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-1.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-2.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-3.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-4.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-5.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-6.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-scenario-7.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-testing-scenarios.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/cortana-at-work-voice-commands.md", -"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-and-export-start-layout.md", -"redirect_url": "/windows/configuration/customize-and-export-start-layout", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-windows-10-start-screens-by-using-group-policy.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-windows-10-start-screens-by-using-mobile-device-management.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", -"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/guidelines-for-assigned-access-app.md", -"redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/how-it-pros-can-use-configuration-service-providers.md", -"redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/kiosk-shared-pc.md", -"redirect_url": "/windows/configuration/kiosk-shared-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/kiosk-shared-pc.md", -"redirect_url": "/windows/configuration/kiosk-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/setup-kiosk-digital-signage.md", -"redirect_url": "/windows/configuration/kiosk-single-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/multi-app-kiosk-xml.md", -"redirect_url": "/windows/configuration/kiosk-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md", -"redirect_url": "/windows/configuration/kiosk-troubleshoot", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md", -"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lock-down-windows-10.md", -"redirect_url": "/windows/configuration/lock-down-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lockdown-features-windows-10.md", -"redirect_url": "/windows/configuration/lockdown-features-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/lockdown-xml.md", -"redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", -"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/manage-tips-and-suggestions.md", -"redirect_url": "/windows/configuration/manage-tips-and-suggestions", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/manage-wifi-sense-in-enterprise.md", -"redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/mobile-lockdown-designer.md", -"redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/product-ids-in-windows-10-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provision-pcs-for-initial-deployment.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provision-pcs-with-apps-and-certificates.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps-and-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provision-pcs-with-apps.md", -"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-apply-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-command-line.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-configure-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-create-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-how-it-works.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-install-icd.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-multivariant.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-nfc.md", -"redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-package-splitter.md", -"redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-packages.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-powershell.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-script-to-install-app.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/provisioning-uninstall-package.md", -"redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-a-device-for-anyone-to-use.md", -"redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", -"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", -"redirect_document_id": true -}, -{ - "source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", - "redirect_url": "/windows/configuration/setup-kiosk-digital-signage", - "redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", -"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/set-up-shared-or-guest-pc.md", -"redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/settings-that-can-be-locked-down.md", -"redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-layout-xml-desktop.md", -"redirect_url": "/windows/configuration/start-layout-xml-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-layout-xml-mobile.md", -"redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-secondary-tiles.md", -"redirect_url": "/windows/configuration/start-secondary-tiles", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/start-taskbar-lockscreen.md", -"redirect_url": "/windows/configuration/start-taskbar-lockscreen", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/start-taskbar-lockscreen.md", -"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/stop-employees-from-using-the-windows-store.md", -"redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/windows-10-start-layout-options-and-policies.md", -"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/windows-diagnostic-data-1703.md", -"redirect_url": "/windows/configuration/windows-diagnostic-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/windows-spotlight.md", -"redirect_url": "/windows/configuration/windows-spotlight", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-spotlight.md", -"redirect_url": "/windows/configuration/windows-spotlight", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-forest-by-proxy-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-forest-by-proxy-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-forest-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-forest-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-using-active-directory-based-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-using-key-management-service-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-using-key-management-service-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/activate-windows-10-clients-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/activate-windows-10-clients-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/active-directory-based-activation-overview.md", -"redirect_url": "/windows/deployment/volume-activation/active-directory-based-activation-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-manage-products-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/add-manage-products-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-remove-computers-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/add-remove-computers-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/add-remove-product-key-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/add-remove-product-key-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/appendix-information-sent-to-microsoft-during-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/assign-applications-using-roles-in-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/assign-applications-using-roles-in-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/build-a-distributed-environment-for-windows-10-deployment.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/change-history-for-deploy-windows-10.md", -"redirect_url": "/windows/deployment/change-history-for-deploy-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-a-pxe-server-to-load-windows-pe.md", -"redirect_url": "/windows/deployment/configure-a-pxe-server-to-load-windows-pe", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-client-computers-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/configure-client-computers-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-2013-for-userexit-scripts.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-2013-settings.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-deployment-share-rules.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-for-userexit-scripts.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/configure-mdt-settings.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-a-windows-10-reference-image.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-a-windows-10-image-using-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-whats-new.md", -"redirect_url": "/windows/deployment/deploy-whats-new", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/deploy-windows-to-go.md", -"redirect_url": "/windows/deployment/deploy-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/get-started-with-the-microsoft-deployment-toolkit.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/getting-started-with-the-user-state-migration-tool.md", -"redirect_url": "/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/import-export-vamt-data.md", -"redirect_url": "/windows/deployment/volume-activation/import-export-vamt-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-configure-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-configure-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-kms-client-key-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-kms-client-key-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-product-key-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-product-key-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/install-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/install-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/integrate-configuration-manager-with-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/integrate-configuration-manager-with-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/introduction-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/introduction-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/key-features-in-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/key-features-in-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/kms-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/kms-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/local-reactivation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/local-reactivation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-activations-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/manage-activations-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-product-keys-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/manage-product-keys-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-vamt-data.md", -"redirect_url": "/windows/deployment/volume-activation/manage-vamt-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-analytics.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-readiness.md", -"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/mbr-to-gpt.md", -"redirect_url": "/windows/deployment/mbr-to-gpt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/mdt-2013-lite-touch-components.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/mdt-lite-touch-components.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/migrate-application-settings.md", -"redirect_url": "/windows/deployment/usmt/migrate-application-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/migration-store-types-overview.md", -"redirect_url": "/windows/deployment/usmt/migration-store-types-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/monitor-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/monitor-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/offline-migration-reference.md", -"redirect_url": "/windows/deployment/usmt/offline-migration-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/online-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/online-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/plan-for-volume-activation-client.md", -"redirect_url": "/windows/deployment/volume-activation/plan-for-volume-activation-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/proxy-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/proxy-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/refresh-a-windows-7-computer-with-windows-10.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/remove-products-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/remove-products-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", -"redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/replace-a-windows-7-computer-with-a-windows-10-computer.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/resolve-windows-10-upgrade-errors.md", -"redirect_url": "/windows/deployment/upgrade/resolve-windows-10-upgrade-errors", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/scenario-kms-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/scenario-kms-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/scenario-online-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/scenario-online-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/scenario-proxy-activation-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/scenario-proxy-activation-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/set-up-mdt-2013-for-bitlocker.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/set-up-mdt-for-bitlocker.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/sideload-apps-in-windows-10.md", -"redirect_url": "/windows/application-management/sideload-apps-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/simulate-a-windows-10-deployment-in-a-test-environment.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/troubleshoot-upgrade-analytics.md", -"redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/troubleshoot-upgrade-readiness.md", -"redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/understanding-migration-xml-files.md", -"redirect_url": "/windows/deployment/usmt/understanding-migration-xml-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/update-product-status-vamt.md", -"redirect_url": "/windows/deployment/volume-activation/update-product-status-vamt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-additional-insights.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-architecture.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-deploy-windows.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-deployment-script.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-get-started.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-identify-apps.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-requirements.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-resolve-issues.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-analytics-upgrade-overview.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-additional-insights.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-architecture.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-deploy-windows.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-deployment-script.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-get-started.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-identify-apps.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-release-notes.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-release-notes", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-requirements.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-resolve-issues.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-upgrade-overview.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-windows-phone-8-1-to-10.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-the-mdt-database-to-stage-windows-10-deployment-information.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-the-volume-activation-management-tool-client.md", -"redirect_url": "/windows/deployment/volume-activation/use-the-volume-activation-management-tool-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-upgrade-analytics-to-manage-windows-upgrades.md", -"redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-upgrade-readiness-to-manage-windows-upgrades.md", -"redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-vamt-in-windows-powershell.md", -"redirect_url": "/windows/deployment/volume-activation/use-vamt-in-windows-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-web-services-in-mdt-2013.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/use-web-services-in-mdt.md", -"redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-best-practices.md", -"redirect_url": "/windows/deployment/usmt/usmt-best-practices", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-choose-migration-store-type.md", -"redirect_url": "/windows/deployment/usmt/usmt-choose-migration-store-type", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-command-line-syntax.md", -"redirect_url": "/windows/deployment/usmt/usmt-command-line-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-common-issues.md", -"redirect_url": "/windows/deployment/usmt/usmt-common-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-common-migration-scenarios.md", -"redirect_url": "/windows/deployment/usmt/usmt-common-migration-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-configxml-file.md", -"redirect_url": "/windows/deployment/usmt/usmt-configxml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-conflicts-and-precedence.md", -"redirect_url": "/windows/deployment/usmt/usmt-conflicts-and-precedence", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-custom-xml-examples.md", -"redirect_url": "/windows/deployment/usmt/usmt-custom-xml-examples", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-customize-xml-files.md", -"redirect_url": "/windows/deployment/usmt/usmt-customize-xml-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-determine-what-to-migrate.md", -"redirect_url": "/windows/deployment/usmt/usmt-determine-what-to-migrate", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-estimate-migration-store-size.md", -"redirect_url": "/windows/deployment/usmt/usmt-estimate-migration-store-size", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-exclude-files-and-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-exclude-files-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-extract-files-from-a-compressed-migration-store.md", -"redirect_url": "/windows/deployment/usmt/usmt-extract-files-from-a-compressed-migration-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-faq.md", -"redirect_url": "/windows/deployment/usmt/usmt-faq", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-general-conventions.md", -"redirect_url": "/windows/deployment/usmt/usmt-general-conventions", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-hard-link-migration-store.md", -"redirect_url": "/windows/deployment/usmt/usmt-hard-link-migration-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-how-it-works.md", -"redirect_url": "/windows/deployment/usmt/usmt-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-how-to.md", -"redirect_url": "/windows/deployment/usmt/usmt-how-to", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-application-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-application-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-file-types-files-and-folders.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-file-types-files-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-operating-system-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-operating-system-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-identify-users.md", -"redirect_url": "/windows/deployment/usmt/usmt-identify-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-include-files-and-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-include-files-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-loadstate-syntax.md", -"redirect_url": "/windows/deployment/usmt/usmt-loadstate-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-log-files.md", -"redirect_url": "/windows/deployment/usmt/usmt-log-files", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-migrate-efs-files-and-certificates.md", -"redirect_url": "/windows/deployment/usmt/usmt-migrate-efs-files-and-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-migrate-user-accounts.md", -"redirect_url": "/windows/deployment/usmt/usmt-migrate-user-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-migration-store-encryption.md", -"redirect_url": "/windows/deployment/usmt/usmt-migration-store-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-overview.md", -"redirect_url": "/windows/deployment/usmt/usmt-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-plan-your-migration.md", -"redirect_url": "/windows/deployment/usmt/usmt-plan-your-migration", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-recognized-environment-variables.md", -"redirect_url": "/windows/deployment/usmt/usmt-recognized-environment-variables", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-reference.md", -"redirect_url": "/windows/deployment/usmt/usmt-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-requirements.md", -"redirect_url": "/windows/deployment/usmt/usmt-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-reroute-files-and-settings.md", -"redirect_url": "/windows/deployment/usmt/usmt-reroute-files-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-resources.md", -"redirect_url": "/windows/deployment/usmt/usmt-resources", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-return-codes.md", -"redirect_url": "/windows/deployment/usmt/usmt-return-codes", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-scanstate-syntax.md", -"redirect_url": "/windows/deployment/usmt/usmt-scanstate-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-technical-reference.md", -"redirect_url": "/windows/deployment/usmt/usmt-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-test-your-migration.md", -"redirect_url": "/windows/deployment/usmt/usmt-test-your-migration", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-topics.md", -"redirect_url": "/windows/deployment/usmt/usmt-topics", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-troubleshooting.md", -"redirect_url": "/windows/deployment/usmt/usmt-troubleshooting", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-utilities.md", -"redirect_url": "/windows/deployment/usmt/usmt-utilities", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-what-does-usmt-migrate.md", -"redirect_url": "/windows/deployment/usmt/usmt-what-does-usmt-migrate", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-xml-elements-library.md", -"redirect_url": "/windows/deployment/usmt/usmt-xml-elements-library", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/usmt-xml-reference.md", -"redirect_url": "/windows/deployment/usmt/usmt-xml-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/vamt-known-issues.md", -"redirect_url": "/windows/deployment/volume-activation/vamt-known-issues", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/vamt-requirements.md", -"redirect_url": "/windows/deployment/volume-activation/vamt-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/vamt-step-by-step.md", -"redirect_url": "/windows/deployment/volume-activation/vamt-step-by-step", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/verify-the-condition-of-a-compressed-migration-store.md", -"redirect_url": "/windows/deployment/usmt/verify-the-condition-of-a-compressed-migration-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/volume-activation-management-tool.md", -"redirect_url": "/windows/deployment/volume-activation/volume-activation-management-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/volume-activation-windows-10.md", -"redirect_url": "/windows/deployment/volume-activation/volume-activation-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-deployment-scenarios.md", -"redirect_url": "/windows/deployment/windows-10-deployment-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-deployment-tools-reference.md", -"redirect_url": "/windows/deployment/windows-10-deployment-tools-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-edition-upgrades.md", -"redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-enterprise-e3-overview.md", -"redirect_url": "/windows/deployment/windows-10-enterprise-e3-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-poc-mdt.md", -"redirect_url": "/windows/deployment/windows-10-poc-mdt", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md", -"redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-poc.md", -"redirect_url": "/windows/deployment/windows-10-poc", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-10-upgrade-paths.md", -"redirect_url": "/windows/deployment/upgrade/windows-10-upgrade-paths", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-adk-scenarios-for-it-pros.md", -"redirect_url": "/windows/deployment/windows-adk-scenarios-for-it-pros", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-deployment-scenarios-and-tools.md", -"redirect_url": "/windows/deployment/windows-deployment-scenarios-and-tools", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/windows-upgrade-and-migration-considerations.md", -"redirect_url": "/windows/deployment/upgrade/windows-upgrade-and-migration-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/xml-file-requirements.md", -"redirect_url": "/windows/deployment/usmt/xml-file-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/access-control.md", -"redirect_url": "/windows/access-protection/access-control/access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/access-credential-manager-as-a-trusted-caller.md", -"redirect_url": "/windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/access-this-computer-from-the-network.md", -"redirect_url": "/windows/device-security/security-policy-settings/access-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-lockout-duration.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-duration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-lockout-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-lockout-threshold.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/account-policies.md", -"redirect_url": "/windows/device-security/security-policy-settings/account-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-administrator-account-status.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-administrator-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-block-microsoft-accounts.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-guest-account-status.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-guest-account-status", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-rename-administrator-account.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/accounts-rename-guest-account.md", -"redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-guest-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/act-as-part-of-the-operating-system.md", -"redirect_url": "/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/active-directory-accounts.md", -"redirect_url": "/windows/access-protection/access-control/active-directory-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/active-directory-security-groups.md", -"redirect_url": "/windows/access-protection/access-control/active-directory-security-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-production-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", -"redirect_url": "/windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-test-devices-to-the-membership-group-for-a-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/add-workstations-to-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/add-workstations-to-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/additional-mitigations.md", -"redirect_url": "/windows/access-protection/credential-guard/additional-mitigations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/adjust-memory-quotas-for-a-process.md", -"redirect_url": "/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/administer-applocker.md", -"redirect_url": "/windows/device-security/applocker/administer-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/administer-security-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/administer-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-security-auditing-faq.md", -"redirect_url": "/windows/device-security/auditing/advanced-security-auditing-faq", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/advanced-security-auditing.md", -"redirect_url": "/windows/device-security/auditing/advanced-security-auditing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/allow-log-on-locally.md", -"redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/allow-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/api-portal-mapping-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/app-behavior-with-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/app-behavior-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", -"redirect_url": "/windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-architecture-and-components.md", -"redirect_url": "/windows/device-security/applocker/applocker-architecture-and-components", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-functions.md", -"redirect_url": "/windows/device-security/applocker/applocker-functions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-overview.md", -"redirect_url": "/windows/device-security/applocker/applocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-policies-deployment-guide.md", -"redirect_url": "/windows/device-security/applocker/applocker-policies-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-policies-design-guide.md", -"redirect_url": "/windows/device-security/applocker/applocker-policies-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-policy-use-scenarios.md", -"redirect_url": "/windows/device-security/applocker/applocker-policy-use-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-processes-and-interactions.md", -"redirect_url": "/windows/device-security/applocker/applocker-processes-and-interactions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-settings.md", -"redirect_url": "/windows/device-security/applocker/applocker-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/applocker-technical-reference.md", -"redirect_url": "/windows/device-security/applocker/applocker-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/apply-a-basic-audit-policy-on-a-file-or-folder.md", -"redirect_url": "/windows/device-security/auditing/apply-a-basic-audit-policy-on-a-file-or-folder", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md", -"redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-account-lockout.md", -"redirect_url": "/windows/device-security/auditing/audit-account-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-application-generated.md", -"redirect_url": "/windows/device-security/auditing/audit-application-generated", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-application-group-management.md", -"redirect_url": "/windows/device-security/auditing/audit-application-group-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-audit-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-audit-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-audit-the-access-of-global-system-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-audit-the-use-of-backup-and-restore-privilege.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-authentication-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-authentication-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-authorization-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-authorization-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-central-access-policy-staging.md", -"redirect_url": "/windows/device-security/auditing/audit-central-access-policy-staging", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-certification-services.md", -"redirect_url": "/windows/device-security/auditing/audit-certification-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-computer-account-management.md", -"redirect_url": "/windows/device-security/auditing/audit-computer-account-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-credential-validation.md", -"redirect_url": "/windows/device-security/auditing/audit-credential-validation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-detailed-directory-service-replication.md", -"redirect_url": "/windows/device-security/auditing/audit-detailed-directory-service-replication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-detailed-file-share.md", -"redirect_url": "/windows/device-security/auditing/audit-detailed-file-share", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-directory-service-access.md", -"redirect_url": "/windows/device-security/auditing/audit-directory-service-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-directory-service-changes.md", -"redirect_url": "/windows/device-security/auditing/audit-directory-service-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-directory-service-replication.md", -"redirect_url": "/windows/device-security/auditing/audit-directory-service-replication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-distribution-group-management.md", -"redirect_url": "/windows/device-security/auditing/audit-distribution-group-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-dpapi-activity.md", -"redirect_url": "/windows/device-security/auditing/audit-dpapi-activity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-file-share.md", -"redirect_url": "/windows/device-security/auditing/audit-file-share", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-file-system.md", -"redirect_url": "/windows/device-security/auditing/audit-file-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-filtering-platform-connection.md", -"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-connection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-filtering-platform-packet-drop.md", -"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-packet-drop", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-filtering-platform-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-force-audit-policy-subcategory-settings-to-override.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-group-membership.md", -"redirect_url": "/windows/device-security/auditing/audit-group-membership", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-handle-manipulation.md", -"redirect_url": "/windows/device-security/auditing/audit-handle-manipulation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-driver.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-driver", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-extended-mode.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-extended-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-main-mode.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-main-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-ipsec-quick-mode.md", -"redirect_url": "/windows/device-security/auditing/audit-ipsec-quick-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-kerberos-authentication-service.md", -"redirect_url": "/windows/device-security/auditing/audit-kerberos-authentication-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-kerberos-service-ticket-operations.md", -"redirect_url": "/windows/device-security/auditing/audit-kerberos-service-ticket-operations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-kernel-object.md", -"redirect_url": "/windows/device-security/auditing/audit-kernel-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-logoff.md", -"redirect_url": "/windows/device-security/auditing/audit-logoff", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-logon.md", -"redirect_url": "/windows/device-security/auditing/audit-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-mpssvc-rule-level-policy-change.md", -"redirect_url": "/windows/device-security/auditing/audit-mpssvc-rule-level-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-network-policy-server.md", -"redirect_url": "/windows/device-security/auditing/audit-network-policy-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-non-sensitive-privilege-use.md", -"redirect_url": "/windows/device-security/auditing/audit-non-sensitive-privilege-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-account-logon-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-account-logon-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-account-management-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-account-management-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-logonlogoff-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-logonlogoff-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-object-access-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-object-access-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-policy-change-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-policy-change-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-privilege-use-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-privilege-use-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-other-system-events.md", -"redirect_url": "/windows/device-security/auditing/audit-other-system-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-pnp-activity.md", -"redirect_url": "/windows/device-security/auditing/audit-pnp-activity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-process-creation.md", -"redirect_url": "/windows/device-security/auditing/audit-process-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-process-termination.md", -"redirect_url": "/windows/device-security/auditing/audit-process-termination", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-registry.md", -"redirect_url": "/windows/device-security/auditing/audit-registry", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-removable-storage.md", -"redirect_url": "/windows/device-security/auditing/audit-removable-storage", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-rpc-events.md", -"redirect_url": "/windows/device-security/auditing/audit-rpc-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-sam.md", -"redirect_url": "/windows/device-security/auditing/audit-sam", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-security-group-management.md", -"redirect_url": "/windows/device-security/auditing/audit-security-group-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-security-state-change.md", -"redirect_url": "/windows/device-security/auditing/audit-security-state-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-security-system-extension.md", -"redirect_url": "/windows/device-security/auditing/audit-security-system-extension", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-sensitive-privilege-use.md", -"redirect_url": "/windows/device-security/auditing/audit-sensitive-privilege-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", -"redirect_url": "/windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-special-logon.md", -"redirect_url": "/windows/device-security/auditing/audit-special-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-system-integrity.md", -"redirect_url": "/windows/device-security/auditing/audit-system-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-user-account-management.md", -"redirect_url": "/windows/device-security/auditing/audit-user-account-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/audit-user-device-claims.md", -"redirect_url": "/windows/device-security/auditing/audit-user-device-claims", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/back-up-files-and-directories.md", -"redirect_url": "/windows/device-security/security-policy-settings/back-up-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/backup-tpm-recovery-information-to-ad-ds.md", -"redirect_url": "/windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-account-logon-events.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-account-logon-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-account-management.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-account-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-directory-service-access.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-directory-service-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-logon-events.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-logon-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-object-access.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-object-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-policy-change.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-policy-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-privilege-use.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-privilege-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-process-tracking.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-process-tracking", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-audit-system-events.md", -"redirect_url": "/windows/device-security/auditing/basic-audit-system-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-firewall-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-security-audit-policies.md", -"redirect_url": "/windows/device-security/auditing/basic-security-audit-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/basic-security-audit-policy-settings.md", -"redirect_url": "/windows/device-security/auditing/basic-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bcd-settings-and-bitlocker.md", -"redirect_url": "/windows/device-security/bitlocker/bcd-settings-and-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-basic-deployment.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-basic-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-countermeasures.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-countermeasures", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-frequently-asked-questions.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-frequently-asked-questions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-group-policy-settings.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-how-to-deploy-on-windows-server.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-how-to-enable-network-unlock.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-overview.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-recovery-guide-plan.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-recovery-guide-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bitlocker-use-bitlocker-recovery-password-viewer.md", -"redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/block-untrusted-fonts-in-enterprise.md", -"redirect_url": "/windows/threat-protection/block-untrusted-fonts-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/boundary-zone-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/boundary-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/boundary-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/bypass-traverse-checking.md", -"redirect_url": "/windows/device-security/security-policy-settings/bypass-traverse-checking", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/certificate-based-isolation-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-rules-from-request-to-require-mode.md", -"redirect_url": "/windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-the-system-time.md", -"redirect_url": "/windows/device-security/security-policy-settings/change-the-system-time", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-the-time-zone.md", -"redirect_url": "/windows/device-security/security-policy-settings/change-the-time-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-the-tpm-owner-password.md", -"redirect_url": "/windows/device-security/tpm/change-the-tpm-owner-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/check-sensor-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-basic-firewall-settings.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-an-isolated-server-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-boundary-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-encryption-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-isolated-domain.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-group-policy-objects.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-group-policy-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-inbound-firewall-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-outbound-firewall-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-basic-firewall-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-certificate-based-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-domain-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/checklist-implementing-a-standalone-server-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/choose-the-right-bitlocker-countermeasure.md", -"redirect_url": "/windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-an-applocker-policy-for-audit-only.md", -"redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-audit-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-an-applocker-policy-for-enforce-rules.md", -"redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-authentication-methods.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-authentication-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-data-protection-quick-mode-settings.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-email-notifications-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-endpoints-script-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md", -"redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-group-policy-to-autoenroll-and-deploy-certificates.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-key-exchange-main-mode-settings.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-s-mime.md", -"redirect_url": "/windows/access-protection/configure-s-mime", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-application-identity-service.md", -"redirect_url": "/windows/device-security/applocker/configure-the-application-identity-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-appLocker-reference-device.md", -"redirect_url": "/windows/device-security/applocker/configure-the-appLocker-reference-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-rules-to-require-encryption.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-windows-firewall-log.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-the-windows-firewall-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-the-workstation-authentication-certificate-template.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", -"redirect_url": "/windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/confirm-that-certificates-are-deployed-correctly.md", -"redirect_url": "/windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/copy-a-gpo-to-create-a-new-gpo.md", -"redirect_url": "/windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-basic-audit-policy-settings-for-an-event-category.md", -"redirect_url": "/windows/device-security/auditing/create-a-basic-audit-policy-settings-for-an-event-category", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-group-account-in-active-directory.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-a-group-account-in-active-directory", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-group-policy-object.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-a-group-policy-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-pagefile.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-a-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-for-packaged-apps.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-for-packaged-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-that-uses-a-file-hash-condition.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-that-uses-a-path-condition.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-path-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-rule-that-uses-a-publisher-condition.md", -"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-a-token-object.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-a-token-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-authentication-exemption-list-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-authentication-request-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-request-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-inbound-icmp-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-icmp-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-inbound-port-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-inbound-program-or-service-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-outbound-port-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-port-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-an-outbound-program-or-service-rule.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-and-verify-an-efs-dra-certificate.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-applocker-default-rules.md", -"redirect_url": "/windows/device-security/applocker/create-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-global-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-global-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-inbound-rules-to-support-rpc.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-list-of-applications-deployed-to-each-business-group.md", -"redirect_url": "/windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-permanent-shared-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-permanent-shared-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-symbolic-links.md", -"redirect_url": "/windows/device-security/security-policy-settings/create-symbolic-links", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-vpn-and-wip-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-wip-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-wip-policy-using-sccm.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-wmi-filters-for-the-gpo.md", -"redirect_url": "/windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-your-applocker-planning-document.md", -"redirect_url": "/windows/device-security/applocker/create-your-applocker-planning-document", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-your-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/create-your-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/create-your-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/create-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-considerations.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-how-it-works.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-manage.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-manage", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-not-protected-scenarios.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-not-protected-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-protection-limits.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-protection-limits", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-requirements.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard-scripts.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/credential-guard.md", -"redirect_url": "/windows/access-protection/credential-guard/credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", -"redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/debug-programs.md", -"redirect_url": "/windows/device-security/security-policy-settings/debug-programs", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/delete-an-applocker-rule.md", -"redirect_url": "/windows/device-security/applocker/delete-an-applocker-rule", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-access-to-this-computer-from-the-network.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-as-a-batch-job.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-as-a-service.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-locally.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-locally", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deny-log-on-through-remote-desktop-services.md", -"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", -"redirect_url": "/windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-catalog-files-to-support-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules.md", -"redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-code-integrity-policies-steps.md", -"redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-device-guard-deploy-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-device-guard-enable-virtualization-based-security.md", -"redirect_url": "/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-the-applocker-policy-into-production.md", -"redirect_url": "/windows/device-security/applocker/deploy-the-applocker-policy-into-production", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-wip-policy-using-intune.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/designing-a-windows-firewall-with-advanced-security-strategy.md", -"redirect_url": "/windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determine-group-policy-structure-and-rule-enforcement.md", -"redirect_url": "/windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", -"redirect_url": "/windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determine-your-application-control-objectives.md", -"redirect_url": "/windows/device-security/applocker/determine-your-application-control-objectives", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/determining-the-trusted-state-of-your-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/device-guard-deployment-guide.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-allow-undock-without-having-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-allowed-to-format-and-eject-removable-media.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-prevent-users-from-installing-printer-drivers.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", -"redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", -"redirect_url": "/windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dll-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/dll-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-group-policy-structure-and-applocker-rule-enforcement.md", -"redirect_url": "/windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-your-application-control-management-processes.md", -"redirect_url": "/windows/device-security/applocker/document-your-application-control-management-processes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-your-application-list.md", -"redirect_url": "/windows/device-security/applocker/document-your-application-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/document-your-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/document-your-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/documenting-the-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/documenting-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-controller-allow-server-operators-to-schedule-tasks.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-controller-ldap-server-signing-requirements.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-controller-refuse-machine-account-password-changes.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-isolation-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-digitally-sign-secure-channel-data-when-possible.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-disable-machine-account-password-changes.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-maximum-machine-account-password-age.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/domain-member-require-strong-windows-2000-or-later-session-key.md", -"redirect_url": "/windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/dynamic-access-control.md", -"redirect_url": "/windows/access-protection/access-control/dynamic-access-control", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/edit-an-applocker-policy.md", -"redirect_url": "/windows/device-security/applocker/edit-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/edit-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/edit-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", -"redirect_url": "/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-predefined-inbound-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-inbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-predefined-outbound-rules.md", -"redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-outbound-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enable-the-dll-rule-collection.md", -"redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/encrypted-hard-drive.md", -"redirect_url": "/windows/device-security/encrypted-hard-drive", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/encryption-zone-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/encryption-zone-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/encryption-zone.md", -"redirect_url": "/windows/access-protection/windows-firewall/encryption-zone", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enforce-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/enforce-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enforce-password-history.md", -"redirect_url": "/windows/device-security/security-policy-settings/enforce-password-history", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enforce-user-logon-restrictions.md", -"redirect_url": "/windows/device-security/security-policy-settings/enforce-user-logon-restrictions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enlightened-microsoft-apps-and-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/enterprise-certificate-pinning.md", -"redirect_url": "/windows/access-protection/enterprise-certificate-pinning", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/evaluating-windows-firewall-with-advanced-security-design-examples.md", -"redirect_url": "/windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1100.md", -"redirect_url": "/windows/device-security/auditing/event-1100", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1102.md", -"redirect_url": "/windows/device-security/auditing/event-1102", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1104.md", -"redirect_url": "/windows/device-security/auditing/event-1104", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1105.md", -"redirect_url": "/windows/device-security/auditing/event-1105", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-1108.md", -"redirect_url": "/windows/device-security/auditing/event-1108", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4608.md", -"redirect_url": "/windows/device-security/auditing/event-4608", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4610.md", -"redirect_url": "/windows/device-security/auditing/event-4610", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4611.md", -"redirect_url": "/windows/device-security/auditing/event-4611", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4612.md", -"redirect_url": "/windows/device-security/auditing/event-4612", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4614.md", -"redirect_url": "/windows/device-security/auditing/event-4614", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4615.md", -"redirect_url": "/windows/device-security/auditing/event-4615", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4616.md", -"redirect_url": "/windows/device-security/auditing/event-4616", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4618.md", -"redirect_url": "/windows/device-security/auditing/event-4618", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4621.md", -"redirect_url": "/windows/device-security/auditing/event-4621", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4622.md", -"redirect_url": "/windows/device-security/auditing/event-4622", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4624.md", -"redirect_url": "/windows/device-security/auditing/event-4624", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4625.md", -"redirect_url": "/windows/device-security/auditing/event-4625", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4626.md", -"redirect_url": "/windows/device-security/auditing/event-4626", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4627.md", -"redirect_url": "/windows/device-security/auditing/event-4627", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4634.md", -"redirect_url": "/windows/device-security/auditing/event-4634", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4647.md", -"redirect_url": "/windows/device-security/auditing/event-4647", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4648.md", -"redirect_url": "/windows/device-security/auditing/event-4648", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4649.md", -"redirect_url": "/windows/device-security/auditing/event-4649", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4656.md", -"redirect_url": "/windows/device-security/auditing/event-4656", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4657.md", -"redirect_url": "/windows/device-security/auditing/event-4657", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4658.md", -"redirect_url": "/windows/device-security/auditing/event-4658", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4660.md", -"redirect_url": "/windows/device-security/auditing/event-4660", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4661.md", -"redirect_url": "/windows/device-security/auditing/event-4661", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4662.md", -"redirect_url": "/windows/device-security/auditing/event-4662", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4663.md", -"redirect_url": "/windows/device-security/auditing/event-4663", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4664.md", -"redirect_url": "/windows/device-security/auditing/event-4664", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4670.md", -"redirect_url": "/windows/device-security/auditing/event-4670", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4671.md", -"redirect_url": "/windows/device-security/auditing/event-4671", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4672.md", -"redirect_url": "/windows/device-security/auditing/event-4672", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4673.md", -"redirect_url": "/windows/device-security/auditing/event-4673", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4674.md", -"redirect_url": "/windows/device-security/auditing/event-4674", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4675.md", -"redirect_url": "/windows/device-security/auditing/event-4675", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4688.md", -"redirect_url": "/windows/device-security/auditing/event-4688", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4689.md", -"redirect_url": "/windows/device-security/auditing/event-4689", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4690.md", -"redirect_url": "/windows/device-security/auditing/event-4690", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4691.md", -"redirect_url": "/windows/device-security/auditing/event-4691", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4692.md", -"redirect_url": "/windows/device-security/auditing/event-4692", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4693.md", -"redirect_url": "/windows/device-security/auditing/event-4693", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4694.md", -"redirect_url": "/windows/device-security/auditing/event-4694", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4695.md", -"redirect_url": "/windows/device-security/auditing/event-4695", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4696.md", -"redirect_url": "/windows/device-security/auditing/event-4696", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4697.md", -"redirect_url": "/windows/device-security/auditing/event-4697", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4698.md", -"redirect_url": "/windows/device-security/auditing/event-4698", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4699.md", -"redirect_url": "/windows/device-security/auditing/event-4699", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4700.md", -"redirect_url": "/windows/device-security/auditing/event-4700", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4701.md", -"redirect_url": "/windows/device-security/auditing/event-4701", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4702.md", -"redirect_url": "/windows/device-security/auditing/event-4702", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4703.md", -"redirect_url": "/windows/device-security/auditing/event-4703", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4704.md", -"redirect_url": "/windows/device-security/auditing/event-4704", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4705.md", -"redirect_url": "/windows/device-security/auditing/event-4705", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4706.md", -"redirect_url": "/windows/device-security/auditing/event-4706", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4707.md", -"redirect_url": "/windows/device-security/auditing/event-4707", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4713.md", -"redirect_url": "/windows/device-security/auditing/event-4713", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4714.md", -"redirect_url": "/windows/device-security/auditing/event-4714", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4715.md", -"redirect_url": "/windows/device-security/auditing/event-4715", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4716.md", -"redirect_url": "/windows/device-security/auditing/event-4716", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4717.md", -"redirect_url": "/windows/device-security/auditing/event-4717", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4718.md", -"redirect_url": "/windows/device-security/auditing/event-4718", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4719.md", -"redirect_url": "/windows/device-security/auditing/event-4719", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4720.md", -"redirect_url": "/windows/device-security/auditing/event-4720", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4722.md", -"redirect_url": "/windows/device-security/auditing/event-4722", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4723.md", -"redirect_url": "/windows/device-security/auditing/event-4723", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4724.md", -"redirect_url": "/windows/device-security/auditing/event-4724", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4725.md", -"redirect_url": "/windows/device-security/auditing/event-4725", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4726.md", -"redirect_url": "/windows/device-security/auditing/event-4726", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4731.md", -"redirect_url": "/windows/device-security/auditing/event-4731", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4732.md", -"redirect_url": "/windows/device-security/auditing/event-4732", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4733.md", -"redirect_url": "/windows/device-security/auditing/event-4733", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4734.md", -"redirect_url": "/windows/device-security/auditing/event-4734", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4735.md", -"redirect_url": "/windows/device-security/auditing/event-4735", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4738.md", -"redirect_url": "/windows/device-security/auditing/event-4738", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4739.md", -"redirect_url": "/windows/device-security/auditing/event-4739", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4740.md", -"redirect_url": "/windows/device-security/auditing/event-4740", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4741.md", -"redirect_url": "/windows/device-security/auditing/event-4741", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4742.md", -"redirect_url": "/windows/device-security/auditing/event-4742", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4743.md", -"redirect_url": "/windows/device-security/auditing/event-4743", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4749.md", -"redirect_url": "/windows/device-security/auditing/event-4749", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4750.md", -"redirect_url": "/windows/device-security/auditing/event-4750", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4751.md", -"redirect_url": "/windows/device-security/auditing/event-4751", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4752.md", -"redirect_url": "/windows/device-security/auditing/event-4752", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4753.md", -"redirect_url": "/windows/device-security/auditing/event-4753", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4764.md", -"redirect_url": "/windows/device-security/auditing/event-4764", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4765.md", -"redirect_url": "/windows/device-security/auditing/event-4765", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4766.md", -"redirect_url": "/windows/device-security/auditing/event-4766", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4767.md", -"redirect_url": "/windows/device-security/auditing/event-4767", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4768.md", -"redirect_url": "/windows/device-security/auditing/event-4768", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4769.md", -"redirect_url": "/windows/device-security/auditing/event-4769", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4770.md", -"redirect_url": "/windows/device-security/auditing/event-4770", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4771.md", -"redirect_url": "/windows/device-security/auditing/event-4771", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4772.md", -"redirect_url": "/windows/device-security/auditing/event-4772", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4773.md", -"redirect_url": "/windows/device-security/auditing/event-4773", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4774.md", -"redirect_url": "/windows/device-security/auditing/event-4774", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4775.md", -"redirect_url": "/windows/device-security/auditing/event-4775", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4776.md", -"redirect_url": "/windows/device-security/auditing/event-4776", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4777.md", -"redirect_url": "/windows/device-security/auditing/event-4777", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4778.md", -"redirect_url": "/windows/device-security/auditing/event-4778", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4779.md", -"redirect_url": "/windows/device-security/auditing/event-4779", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4780.md", -"redirect_url": "/windows/device-security/auditing/event-4780", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4781.md", -"redirect_url": "/windows/device-security/auditing/event-4781", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4782.md", -"redirect_url": "/windows/device-security/auditing/event-4782", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4793.md", -"redirect_url": "/windows/device-security/auditing/event-4793", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4794.md", -"redirect_url": "/windows/device-security/auditing/event-4794", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4798.md", -"redirect_url": "/windows/device-security/auditing/event-4798", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4799.md", -"redirect_url": "/windows/device-security/auditing/event-4799", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4800.md", -"redirect_url": "/windows/device-security/auditing/event-4800", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4801.md", -"redirect_url": "/windows/device-security/auditing/event-4801", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4802.md", -"redirect_url": "/windows/device-security/auditing/event-4802", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4803.md", -"redirect_url": "/windows/device-security/auditing/event-4803", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4816.md", -"redirect_url": "/windows/device-security/auditing/event-4816", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4817.md", -"redirect_url": "/windows/device-security/auditing/event-4817", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4818.md", -"redirect_url": "/windows/device-security/auditing/event-4818", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4819.md", -"redirect_url": "/windows/device-security/auditing/event-4819", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4826.md", -"redirect_url": "/windows/device-security/auditing/event-4826", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4864.md", -"redirect_url": "/windows/device-security/auditing/event-4864", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4865.md", -"redirect_url": "/windows/device-security/auditing/event-4865", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4866.md", -"redirect_url": "/windows/device-security/auditing/event-4866", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4867.md", -"redirect_url": "/windows/device-security/auditing/event-4867", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4902.md", -"redirect_url": "/windows/device-security/auditing/event-4902", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4904.md", -"redirect_url": "/windows/device-security/auditing/event-4904", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4905.md", -"redirect_url": "/windows/device-security/auditing/event-4905", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4906.md", -"redirect_url": "/windows/device-security/auditing/event-4906", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4907.md", -"redirect_url": "/windows/device-security/auditing/event-4907", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4908.md", -"redirect_url": "/windows/device-security/auditing/event-4908", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4909.md", -"redirect_url": "/windows/device-security/auditing/event-4909", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4910.md", -"redirect_url": "/windows/device-security/auditing/event-4910", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4911.md", -"redirect_url": "/windows/device-security/auditing/event-4911", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4912.md", -"redirect_url": "/windows/device-security/auditing/event-4912", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4913.md", -"redirect_url": "/windows/device-security/auditing/event-4913", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4928.md", -"redirect_url": "/windows/device-security/auditing/event-4928", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4929.md", -"redirect_url": "/windows/device-security/auditing/event-4929", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4930.md", -"redirect_url": "/windows/device-security/auditing/event-4930", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4931.md", -"redirect_url": "/windows/device-security/auditing/event-4931", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4932.md", -"redirect_url": "/windows/device-security/auditing/event-4932", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4933.md", -"redirect_url": "/windows/device-security/auditing/event-4933", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4934.md", -"redirect_url": "/windows/device-security/auditing/event-4934", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4935.md", -"redirect_url": "/windows/device-security/auditing/event-4935", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4936.md", -"redirect_url": "/windows/device-security/auditing/event-4936", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4937.md", -"redirect_url": "/windows/device-security/auditing/event-4937", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4944.md", -"redirect_url": "/windows/device-security/auditing/event-4944", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4945.md", -"redirect_url": "/windows/device-security/auditing/event-4945", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4946.md", -"redirect_url": "/windows/device-security/auditing/event-4946", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4947.md", -"redirect_url": "/windows/device-security/auditing/event-4947", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4948.md", -"redirect_url": "/windows/device-security/auditing/event-4948", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4949.md", -"redirect_url": "/windows/device-security/auditing/event-4949", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4950.md", -"redirect_url": "/windows/device-security/auditing/event-4950", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4951.md", -"redirect_url": "/windows/device-security/auditing/event-4951", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4952.md", -"redirect_url": "/windows/device-security/auditing/event-4952", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4953.md", -"redirect_url": "/windows/device-security/auditing/event-4953", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4954.md", -"redirect_url": "/windows/device-security/auditing/event-4954", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4956.md", -"redirect_url": "/windows/device-security/auditing/event-4956", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4957.md", -"redirect_url": "/windows/device-security/auditing/event-4957", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4958.md", -"redirect_url": "/windows/device-security/auditing/event-4958", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4964.md", -"redirect_url": "/windows/device-security/auditing/event-4964", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-4985.md", -"redirect_url": "/windows/device-security/auditing/event-4985", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5024.md", -"redirect_url": "/windows/device-security/auditing/event-5024", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5025.md", -"redirect_url": "/windows/device-security/auditing/event-5025", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5027.md", -"redirect_url": "/windows/device-security/auditing/event-5027", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5028.md", -"redirect_url": "/windows/device-security/auditing/event-5028", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5029.md", -"redirect_url": "/windows/device-security/auditing/event-5029", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5030.md", -"redirect_url": "/windows/device-security/auditing/event-5030", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5031.md", -"redirect_url": "/windows/device-security/auditing/event-5031", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5032.md", -"redirect_url": "/windows/device-security/auditing/event-5032", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5033.md", -"redirect_url": "/windows/device-security/auditing/event-5033", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5034.md", -"redirect_url": "/windows/device-security/auditing/event-5034", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5035.md", -"redirect_url": "/windows/device-security/auditing/event-5035", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5037.md", -"redirect_url": "/windows/device-security/auditing/event-5037", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5038.md", -"redirect_url": "/windows/device-security/auditing/event-5038", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5039.md", -"redirect_url": "/windows/device-security/auditing/event-5039", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5051.md", -"redirect_url": "/windows/device-security/auditing/event-5051", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5056.md", -"redirect_url": "/windows/device-security/auditing/event-5056", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5057.md", -"redirect_url": "/windows/device-security/auditing/event-5057", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5058.md", -"redirect_url": "/windows/device-security/auditing/event-5058", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5059.md", -"redirect_url": "/windows/device-security/auditing/event-5059", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5060.md", -"redirect_url": "/windows/device-security/auditing/event-5060", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5061.md", -"redirect_url": "/windows/device-security/auditing/event-5061", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5062.md", -"redirect_url": "/windows/device-security/auditing/event-5062", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5063.md", -"redirect_url": "/windows/device-security/auditing/event-5063", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5064.md", -"redirect_url": "/windows/device-security/auditing/event-5064", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5065.md", -"redirect_url": "/windows/device-security/auditing/event-5065", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5066.md", -"redirect_url": "/windows/device-security/auditing/event-5066", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5067.md", -"redirect_url": "/windows/device-security/auditing/event-5067", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5068.md", -"redirect_url": "/windows/device-security/auditing/event-5068", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5069.md", -"redirect_url": "/windows/device-security/auditing/event-5069", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5070.md", -"redirect_url": "/windows/device-security/auditing/event-5070", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5136.md", -"redirect_url": "/windows/device-security/auditing/event-5136", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5137.md", -"redirect_url": "/windows/device-security/auditing/event-5137", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5138.md", -"redirect_url": "/windows/device-security/auditing/event-5138", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5139.md", -"redirect_url": "/windows/device-security/auditing/event-5139", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5140.md", -"redirect_url": "/windows/device-security/auditing/event-5140", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5141.md", -"redirect_url": "/windows/device-security/auditing/event-5141", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5142.md", -"redirect_url": "/windows/device-security/auditing/event-5142", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5143.md", -"redirect_url": "/windows/device-security/auditing/event-5143", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5144.md", -"redirect_url": "/windows/device-security/auditing/event-5144", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5145.md", -"redirect_url": "/windows/device-security/auditing/event-5145", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5148.md", -"redirect_url": "/windows/device-security/auditing/event-5148", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5149.md", -"redirect_url": "/windows/device-security/auditing/event-5149", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5150.md", -"redirect_url": "/windows/device-security/auditing/event-5150", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5151.md", -"redirect_url": "/windows/device-security/auditing/event-5151", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5152.md", -"redirect_url": "/windows/device-security/auditing/event-5152", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5153.md", -"redirect_url": "/windows/device-security/auditing/event-5153", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5154.md", -"redirect_url": "/windows/device-security/auditing/event-5154", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5155.md", -"redirect_url": "/windows/device-security/auditing/event-5155", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5156.md", -"redirect_url": "/windows/device-security/auditing/event-5156", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5157.md", -"redirect_url": "/windows/device-security/auditing/event-5157", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5158.md", -"redirect_url": "/windows/device-security/auditing/event-5158", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5159.md", -"redirect_url": "/windows/device-security/auditing/event-5159", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5168.md", -"redirect_url": "/windows/device-security/auditing/event-5168", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5376.md", -"redirect_url": "/windows/device-security/auditing/event-5376", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5377.md", -"redirect_url": "/windows/device-security/auditing/event-5377", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5378.md", -"redirect_url": "/windows/device-security/auditing/event-5378", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5447.md", -"redirect_url": "/windows/device-security/auditing/event-5447", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5632.md", -"redirect_url": "/windows/device-security/auditing/event-5632", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5633.md", -"redirect_url": "/windows/device-security/auditing/event-5633", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5712.md", -"redirect_url": "/windows/device-security/auditing/event-5712", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5888.md", -"redirect_url": "/windows/device-security/auditing/event-5888", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5889.md", -"redirect_url": "/windows/device-security/auditing/event-5889", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-5890.md", -"redirect_url": "/windows/device-security/auditing/event-5890", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6144.md", -"redirect_url": "/windows/device-security/auditing/event-6144", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6145.md", -"redirect_url": "/windows/device-security/auditing/event-6145", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6281.md", -"redirect_url": "/windows/device-security/auditing/event-6281", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6400.md", -"redirect_url": "/windows/device-security/auditing/event-6400", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6401.md", -"redirect_url": "/windows/device-security/auditing/event-6401", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6402.md", -"redirect_url": "/windows/device-security/auditing/event-6402", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6403.md", -"redirect_url": "/windows/device-security/auditing/event-6403", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6404.md", -"redirect_url": "/windows/device-security/auditing/event-6404", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6405.md", -"redirect_url": "/windows/device-security/auditing/event-6405", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6406.md", -"redirect_url": "/windows/device-security/auditing/event-6406", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6407.md", -"redirect_url": "/windows/device-security/auditing/event-6407", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6408.md", -"redirect_url": "/windows/device-security/auditing/event-6408", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6409.md", -"redirect_url": "/windows/device-security/auditing/event-6409", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6410.md", -"redirect_url": "/windows/device-security/auditing/event-6410", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6416.md", -"redirect_url": "/windows/device-security/auditing/event-6416", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6419.md", -"redirect_url": "/windows/device-security/auditing/event-6419", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6420.md", -"redirect_url": "/windows/device-security/auditing/event-6420", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6421.md", -"redirect_url": "/windows/device-security/auditing/event-6421", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6422.md", -"redirect_url": "/windows/device-security/auditing/event-6422", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6423.md", -"redirect_url": "/windows/device-security/auditing/event-6423", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-6424.md", -"redirect_url": "/windows/device-security/auditing/event-6424", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/executable-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/executable-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/exempt-icmp-from-authentication.md", -"redirect_url": "/windows/access-protection/windows-firewall/exempt-icmp-from-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/exemption-list.md", -"redirect_url": "/windows/access-protection/windows-firewall/exemption-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/export-an-applocker-policy-from-a-gpo.md", -"redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-from-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/export-an-applocker-policy-to-an-xml-file.md", -"redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/file-system-global-object-access-auditing.md", -"redirect_url": "/windows/device-security/auditing/file-system-global-object-access-auditing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/firewall-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/firewall-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/firewall-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/firewall-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/force-shutdown-from-a-remote-system.md", -"redirect_url": "/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-information-about-your-active-directory-deployment.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-information-about-your-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-other-relevant-information.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-other-relevant-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gathering-the-information-you-need.md", -"redirect_url": "/windows/access-protection/windows-firewall/gathering-the-information-you-need", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/general-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/generate-security-audits.md", -"redirect_url": "/windows/device-security/security-policy-settings/generate-security-audits", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-boundary.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-boundary", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-encryption.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-firewall.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-isolateddomain-clients.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/gpo-domiso-isolateddomain-servers.md", -"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/guidance-and-best-practices-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-and-password-changes.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-biometrics-in-enterprise.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-errors-during-pin-creation.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-event-300.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-how-it-works.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-how-it-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-identity-verification.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-manage-in-organization.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-prepare-people-to-use.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/hello-why-pin-is-better-than-password.md", -"redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-applocker-works-techref.md", -"redirect_url": "/windows/device-security/applocker/how-applocker-works-techref", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-to-configure-security-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/how-to-configure-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", -"redirect_url": "/windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/how-user-account-control-works.md", -"redirect_url": "/windows/access-protection/user-account-control/how-user-account-control-works", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", -"redirect_url": "/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/impersonate-a-client-after-authentication.md", -"redirect_url": "/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md", -"redirect_url": "/windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/import-an-applocker-policy-from-another-computer.md", -"redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-from-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/import-an-applocker-policy-into-a-gpo.md", -"redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-into-a-gpo", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/increase-a-process-working-set.md", -"redirect_url": "/windows/device-security/security-policy-settings/increase-a-process-working-set", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/increase-scheduling-priority.md", -"redirect_url": "/windows/device-security/security-policy-settings/increase-scheduling-priority", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/initialize-and-configure-ownership-of-the-tpm.md", -"redirect_url": "/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/installing-digital-certificates-on-windows-10-mobile.md", -"redirect_url": "/windows/access-protection/installing-digital-certificates-on-windows-10-mobile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-do-not-display-last-user-name.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-dont-display-username-at-sign-in.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-machine-inactivity-limit.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-require-smart-card.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-smart-card", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/interactive-logon-smart-card-removal-behavior.md", -"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/investigate-user-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/isolated-domain-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/isolated-domain-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/isolated-domain.md", -"redirect_url": "/windows/access-protection/windows-firewall/isolated-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/isolating-apps-on-your-network.md", -"redirect_url": "/windows/access-protection/windows-firewall/isolating-apps-on-your-network", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/kerberos-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/kerberos-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/limitations-with-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/limitations-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/link-the-gpo-to-the-domain.md", -"redirect_url": "/windows/access-protection/windows-firewall/link-the-gpo-to-the-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/load-and-unload-device-drivers.md", -"redirect_url": "/windows/device-security/security-policy-settings/load-and-unload-device-drivers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/local-accounts.md", -"redirect_url": "/windows/access-protection/access-control/local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/lock-pages-in-memory.md", -"redirect_url": "/windows/device-security/security-policy-settings/lock-pages-in-memory", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/log-on-as-a-batch-job.md", -"redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-batch-job", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/log-on-as-a-service.md", -"redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/machines-view-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maintain-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-auditing-and-security-log.md", -"redirect_url": "/windows/device-security/security-policy-settings/manage-auditing-and-security-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-packaged-apps-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/manage-packaged-apps-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-tpm-commands.md", -"redirect_url": "/windows/device-security/tpm/manage-tpm-commands", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-tpm-lockout.md", -"redirect_url": "/windows/device-security/tpm/manage-tpm-lockout", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/mandatory-settings-for-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/mandatory-settings-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-lifetime-for-service-ticket.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket-renewal.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-password-age.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/maximum-tolerance-for-computer-clock-synchronization.md", -"redirect_url": "/windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/merge-applocker-policies-by-using-set-applockerpolicy.md", -"redirect_url": "/windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/merge-applocker-policies-manually.md", -"redirect_url": "/windows/device-security/applocker/merge-applocker-policies-manually", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-accounts.md", -"redirect_url": "/windows/access-protection/access-control/microsoft-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-always.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-always.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/microsoft-network-server-server-spn-target-name-validation-level.md", -"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/minimum-password-age.md", -"redirect_url": "/windows/device-security/security-policy-settings/minimum-password-age", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/minimum-password-length.md", -"redirect_url": "/windows/device-security/security-policy-settings/minimum-password-length", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/modify-an-object-label.md", -"redirect_url": "/windows/device-security/security-policy-settings/modify-an-object-label", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/modify-firmware-environment-values.md", -"redirect_url": "/windows/device-security/security-policy-settings/modify-firmware-environment-values", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", -"redirect_url": "/windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-application-usage-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/monitor-application-usage-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-central-access-policy-and-rule-definitions.md", -"redirect_url": "/windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-claim-types.md", -"redirect_url": "/windows/device-security/auditing/monitor-claim-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-resource-attribute-definitions.md", -"redirect_url": "/windows/device-security/auditing/monitor-resource-attribute-definitions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-central-access-policies-associated-with-files-and-folders.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-associated-with-files-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-central-access-policies-that-apply-on-a-file-server.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-resource-attributes-on-files-and-folders.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-resource-attributes-on-files-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-the-use-of-removable-storage-devices.md", -"redirect_url": "/windows/device-security/auditing/monitor-the-use-of-removable-storage-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/monitor-user-and-device-claims-during-sign-in.md", -"redirect_url": "/windows/device-security/auditing/monitor-user-and-device-claims-during-sign-in", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-allow-anonymous-sidname-translation.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-let-everyone-permissions-apply-to-anonymous-users.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-named-pipes-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths-and-subpaths.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-shares-that-can-be-accessed-anonymously.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-access-sharing-and-security-model-for-local-accounts.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-list-manager-policies.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-list-manager-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-allow-localsystem-null-session-fallback.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-configure-encryption-types-allowed-for-kerberos.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-force-logoff-when-logon-hours-expire.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-lan-manager-authentication-level.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-ldap-client-signing-requirements.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-incoming-ntlm-traffic.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", -"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/open-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/optimize-applocker-performance.md", -"redirect_url": "/windows/device-security/applocker/optimize-applocker-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", -"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/other-events.md", -"redirect_url": "/windows/device-security/auditing/other-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/override-mitigation-options-for-app-related-security-policies.md", -"redirect_url": "/windows/threat-protection/override-mitigation-options-for-app-related-security-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/overview-create-wip-policy.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md", -"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/password-must-meet-complexity-requirements.md", -"redirect_url": "/windows/device-security/security-policy-settings/password-must-meet-complexity-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/password-policy.md", -"redirect_url": "/windows/device-security/security-policy-settings/password-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/perform-volume-maintenance-tasks.md", -"redirect_url": "/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/plan-for-applocker-policy-management.md", -"redirect_url": "/windows/device-security/applocker/plan-for-applocker-policy-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md", -"redirect_url": "/windows/device-security/auditing/planning-and-deploying-advanced-security-audit-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-and-getting-started-on-the-device-guard-deployment-process.md", -"redirect_url": "/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-certificate-based-authentication.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-certificate-based-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-domain-isolation-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-domain-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-gpo-deployment.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-gpo-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-isolation-groups-for-the-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-network-access-groups.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-network-access-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-server-isolation-zones.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-server-isolation-zones", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-the-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-the-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md", -"redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/preview-settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/preview-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/procedures-used-in-this-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/procedures-used-in-this-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/profile-single-process.md", -"redirect_url": "/windows/device-security/security-policy-settings/profile-single-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/profile-system-performance.md", -"redirect_url": "/windows/device-security/security-policy-settings/profile-system-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md", -"redirect_url": "/windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-devices-from-unwanted-network-traffic.md", -"redirect_url": "/windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-enterprise-data-using-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", -"redirect_url": "/windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", -"redirect_url": "/windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/recommended-network-definitions-for-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/recovery-console-allow-automatic-administrative-logon.md", -"redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", -"redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/refresh-an-applocker-policy.md", -"redirect_url": "/windows/device-security/applocker/refresh-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/registry-global-object-access-auditing.md", -"redirect_url": "/windows/device-security/auditing/registry-global-object-access-auditing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/remote-credential-guard.md", -"redirect_url": "/windows/access-protection/remote-credential-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/remove-computer-from-docking-station.md", -"redirect_url": "/windows/device-security/security-policy-settings/remove-computer-from-docking-station", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/replace-a-process-level-token.md", -"redirect_url": "/windows/device-security/security-policy-settings/replace-a-process-level-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md", -"redirect_url": "/windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/requirements-and-deployment-planning-guidelines-for-device-guard.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/requirements-to-use-applocker.md", -"redirect_url": "/windows/device-security/applocker/requirements-to-use-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/reset-account-lockout-counter-after.md", -"redirect_url": "/windows/device-security/security-policy-settings/reset-account-lockout-counter-after", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/respond-file-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/respond-machine-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restore-files-and-directories.md", -"redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restrict-access-to-only-trusted-devices.md", -"redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md", -"redirect_url": "/windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/run-the-automatically-generate-rules-wizard.md", -"redirect_url": "/windows/device-security/applocker/run-the-automatically-generate-rules-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/script-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/script-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/secpol-advanced-security-audit-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md", -"redirect_url": "/windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-auditing-overview.md", -"redirect_url": "/windows/device-security/auditing/security-auditing-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-considerations-for-applocker.md", -"redirect_url": "/windows/device-security/applocker/security-considerations-for-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-identifiers.md", -"redirect_url": "/windows/access-protection/access-control/security-identifiers", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-options.md", -"redirect_url": "/windows/device-security/security-policy-settings/security-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-policy-settings-reference.md", -"redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-policy-settings.md", -"redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-principals.md", -"redirect_url": "/windows/access-protection/access-control/security-principals", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/select-types-of-rules-to-create.md", -"redirect_url": "/windows/device-security/applocker/select-types-of-rules-to-create", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/server-isolation-gpos.md", -"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-gpos", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/server-isolation-policy-design-example.md", -"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design-example", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/server-isolation-policy-design.md", -"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/service-accounts.md", -"redirect_url": "/windows/access-protection/access-control/service-accounts", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/service-status-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/settings-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/shut-down-the-system.md", -"redirect_url": "/windows/device-security/security-policy-settings/shut-down-the-system", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", -"redirect_url": "/windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/shutdown-clear-virtual-memory-pagefile.md", -"redirect_url": "/windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-and-remote-desktop-services.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-and-remote-desktop-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-architecture.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-certificate-propagation-service.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-propagation-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-certificate-requirements-and-enumeration.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-debugging-information.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-debugging-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-events.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-group-policy-and-registry-settings.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-how-smart-card-sign-in-works-in-windows.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-removal-policy-service.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-removal-policy-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-smart-cards-for-windows-service.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-tools-and-settings.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-tools-and-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/smart-card-windows-smart-card-technical-reference.md", -"redirect_url": "/windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/special-identities.md", -"redirect_url": "/windows/access-protection/access-control/special-identities", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/store-passwords-using-reversible-encryption.md", -"redirect_url": "/windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/switch-pcr-banks-on-tpm-2-0-devices.md", -"redirect_url": "/windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/synchronize-directory-service-data.md", -"redirect_url": "/windows/device-security/security-policy-settings/synchronize-directory-service-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-objects-strengthen-default-permissions-of-internal-system-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-settings-optional-subsystems.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-settings-optional-subsystems", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", -"redirect_url": "/windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/take-ownership-of-files-or-other-objects.md", -"redirect_url": "/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/test-an-applocker-policy-by-using-test-applockerpolicy.md", -"redirect_url": "/windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/test-and-update-an-applocker-policy.md", -"redirect_url": "/windows/device-security/applocker/test-and-update-an-applocker-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/testing-scenarios-for-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/tools-to-use-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/tools-to-use-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/tpm-fundamentals.md", -"redirect_url": "/windows/device-security/tpm/tpm-fundamentals", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/tpm-recommendations.md", -"redirect_url": "/windows/device-security/tpm/tpm-recommendations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/troubleshoot-siem-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/trusted-platform-module-overview.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/trusted-platform-module-services-group-policy-settings.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/trusted-platform-module-top-node.md", -"redirect_url": "/windows/device-security/tpm/trusted-platform-module-top-node", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md", -"redirect_url": "/windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/types-of-attacks-for-volume-encryption-keys.md", -"redirect_url": "/windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-applocker-enforcement-settings.md", -"redirect_url": "/windows/device-security/applocker/understand-applocker-enforcement-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-applocker-policy-design-decisions.md", -"redirect_url": "/windows/device-security/applocker/understand-applocker-policy-design-decisions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", -"redirect_url": "/windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understand-the-applocker-policy-deployment-process.md", -"redirect_url": "/windows/device-security/applocker/understand-the-applocker-policy-deployment-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-allow-and-deny-actions-on-rules.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-default-rules.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-default-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-behavior.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-behavior", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-collections.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-collections", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-condition-types.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-condition-types", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-applocker-rule-exceptions.md", -"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-exceptions", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-file-hash-rule-condition-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-path-rule-condition-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-publisher-rule-condition-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md", -"redirect_url": "/windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain.md", -"redirect_url": "/windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-the-applocker-windows-powershell-cmdlets.md", -"redirect_url": "/windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", -"redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-detect-application-installations-and-prompt-for-elevation.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-group-policy-and-registry-key-settings.md", -"redirect_url": "/windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-overview.md", -"redirect_url": "/windows/access-protection/user-account-control/user-account-control-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-run-all-administrators-in-admin-approval-mode.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-security-policy-settings.md", -"redirect_url": "/windows/access-protection/user-account-control/user-account-control-security-policy-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/user-rights-assignment.md", -"redirect_url": "/windows/device-security/security-policy-settings/user-rights-assignment", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", -"redirect_url": "/windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-event-viewer-with-applocker.md", -"redirect_url": "/windows/device-security/applocker/using-event-viewer-with-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-owa-with-wip.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/using-owa-with-wip", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/using-software-restriction-policies-and-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/verify-that-network-traffic-is-authenticated.md", -"redirect_url": "/windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/view-the-security-event-log.md", -"redirect_url": "/windows/device-security/auditing/view-the-security-event-log", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-deploy-virtual-smart-cards.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-evaluate-security.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-get-started.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-overview.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-tpmvscmgr.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-understanding-and-evaluating.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/virtual-smart-card-use-virtual-smart-cards.md", -"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-authentication.md", -"redirect_url": "/windows/access-protection/vpn/vpn-authentication", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-auto-trigger-profile.md", -"redirect_url": "/windows/access-protection/vpn/vpn-auto-trigger-profile", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-conditional-access.md", -"redirect_url": "/windows/access-protection/vpn/vpn-conditional-access", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-connection-type.md", -"redirect_url": "/windows/access-protection/vpn/vpn-connection-type", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-guide.md", -"redirect_url": "/windows/access-protection/vpn/vpn-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-name-resolution.md", -"redirect_url": "/windows/access-protection/vpn/vpn-name-resolution", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-profile-options.md", -"redirect_url": "/windows/access-protection/vpn/vpn-profile-options", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-routing.md", -"redirect_url": "/windows/access-protection/vpn/vpn-routing", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/vpn-security-features.md", -"redirect_url": "/windows/access-protection/vpn/vpn-security-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/what-is-applocker.md", -"redirect_url": "/windows/device-security/applocker/what-is-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/which-editions-of-windows-support-advanced-audit-policy-configuration.md", -"redirect_url": "/windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-10-mobile-security-guide.md", -"redirect_url": "/windows/device-security/windows-10-mobile-security-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-credential-theft-mitigation-guide-abstract.md", -"redirect_url": "/windows/access-protection/windows-credential-theft-mitigation-guide-abstract", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-offline.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-offline", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", -"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md", -"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-smartscreen-overview.md", -"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md", -"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-firewall-with-advanced-security.md", -"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-installer-rules-in-applocker.md", -"redirect_url": "/windows/device-security/applocker/windows-installer-rules-in-applocker", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-security-baselines.md", -"redirect_url": "/windows/device-security/windows-security-baselines", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/wip-app-enterprise-context.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/wip-app-enterprise-context", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/working-with-applocker-policies.md", -"redirect_url": "/windows/device-security/applocker/working-with-applocker-policies", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/working-with-applocker-rules.md", -"redirect_url": "/windows/device-security/applocker/working-with-applocker-rules", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/acquire-apps-windows-store-for-business.md", -"redirect_url": "/microsoft-store/acquire-apps-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/acquire-apps-windows-store-for-business.md", -"redirect_url": "/microsoft-store/acquire-apps-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/add-unsigned-app-to-code-integrity-policy.md", -"redirect_url": "/microsoft-store/add-unsigned-app-to-code-integrity-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/administrative-tools-in-windows-10.md", -"redirect_url": "/windows/client-management/administrative-tools-in-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/app-inventory-management-windows-store-for-business.md", -"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/apps-in-windows-store-for-business.md", -"redirect_url": "/microsoft-store/apps-in-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/apps-in-windows-store-for-business.md", -"redirect_url": "/microsoft-store/apps-in-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-about-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-about-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-add-or-remove-an-administrator-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-add-or-remove-an-administrator-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-add-or-upgrade-packages-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-add-or-upgrade-packages-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-administering-appv-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-administering-appv-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-administering-virtual-applications-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-administering-virtual-applications-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-allow-administrators-to-enable-connection-groups.md", -"redirect_url": "/windows/application-management/app-v/appv-allow-administrators-to-enable-connection-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-application-publishing-and-client-interaction.md", -"redirect_url": "/windows/application-management/app-v/appv-application-publishing-and-client-interaction", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-apply-the-deployment-configuration-file-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-apply-the-user-configuration-file-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-batch-sequencing.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-batch-sequencing", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-batch-updating.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-batch-updating", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-clean-unpublished-packages.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-clean-unpublished-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-auto-provision-a-vm.md", -"redirect_url": "/windows/application-management/app-v/appv-auto-provision-a-vm", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-available-mdm-settings.md", -"redirect_url": "/windows/application-management/app-v/appv-available-mdm-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-capacity-planning.md", -"redirect_url": "/windows/application-management/app-v/appv-capacity-planning", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-client-configuration-settings.md", -"redirect_url": "/windows/application-management/app-v/appv-client-configuration-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-configure-access-to-packages-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-configure-access-to-packages-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-configure-connection-groups-to-ignore-the-package-version.md", -"redirect_url": "/windows/application-management/app-v/appv-configure-connection-groups-to-ignore-the-package-version", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md", -"redirect_url": "/windows/application-management/app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-connect-to-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-connect-to-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-connection-group-file.md", -"redirect_url": "/windows/application-management/app-v/appv-connection-group-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-connection-group-virtual-environment.md", -"redirect_url": "/windows/application-management/app-v/appv-connection-group-virtual-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-convert-a-package-created-in-a-previous-version-of-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-connection-group.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-custom-configuration-file-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-package-accelerator-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-package-accelerator.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-a-virtual-application-package-package-accelerator.md", -"redirect_url": "/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-create-and-use-a-project-template.md", -"redirect_url": "/windows/application-management/app-v/appv-create-and-use-a-project-template", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-creating-and-managing-virtualized-applications.md", -"redirect_url": "/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-customize-virtual-application-extensions-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-delete-a-connection-group.md", -"redirect_url": "/windows/application-management/app-v/appv-delete-a-connection-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-delete-a-package-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-delete-a-package-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-appv-databases-with-sql-scripts.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-the-appv-server-with-a-script.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploy-the-appv-server.md", -"redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-microsoft-office-2010-wth-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-microsoft-office-2013-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-microsoft-office-2016-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-packages-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-the-appv-sequencer-and-client.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deploying-the-appv-server.md", -"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-server", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-deployment-checklist.md", -"redirect_url": "/windows/application-management/app-v/appv-deployment-checklist", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-dynamic-configuration.md", -"redirect_url": "/windows/application-management/app-v/appv-dynamic-configuration", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-enable-reporting-on-the-appv-client-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-enable-the-app-v-desktop-client.md", -"redirect_url": "/windows/application-management/app-v/appv-enable-the-app-v-desktop-client", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-evaluating-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-evaluating-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-for-windows.md", -"redirect_url": "/windows/application-management/app-v/appv-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-getting-started.md", -"redirect_url": "/windows/application-management/app-v/appv-getting-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-high-level-architecture.md", -"redirect_url": "/windows/application-management/app-v/appv-high-level-architecture", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-management-and-reporting-databases-on-separate-computers.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-management-server-on-a-standalone-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-publishing-server-on-a-remote-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-reporting-server-on-a-standalone-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-install-the-sequencer.md", -"redirect_url": "/windows/application-management/app-v/appv-install-the-sequencer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md", -"redirect_url": "/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-maintaining-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-maintaining-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-managing-connection-groups.md", -"redirect_url": "/windows/application-management/app-v/appv-managing-connection-groups", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-migrating-to-appv-from-a-previous-version.md", -"redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-modify-an-existing-virtual-application-package.md", -"redirect_url": "/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-modify-client-configuration-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-modify-client-configuration-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-move-the-appv-server-to-another-computer.md", -"redirect_url": "/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-operations.md", -"redirect_url": "/windows/application-management/app-v/appv-operations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-performance-guidance.md", -"redirect_url": "/windows/application-management/app-v/appv-performance-guidance", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-checklist.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-checklist", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-folder-redirection-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-folder-redirection-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-appv-server-deployment.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-appv-server-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-high-availability-with-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-high-availability-with-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-sequencer-and-client-deployment.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-for-using-appv-with-office.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-for-using-appv-with-office", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-planning-to-deploy-appv.md", -"redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-preparing-your-environment.md", -"redirect_url": "/windows/application-management/app-v/appv-preparing-your-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-prerequisites.md", -"redirect_url": "/windows/application-management/app-v/appv-prerequisites", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-publish-a-connection-group.md", -"redirect_url": "/windows/application-management/app-v/appv-publish-a-connection-group", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-publish-a-packages-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-register-and-unregister-a-publishing-server-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-release-notes-for-appv-for-windows-1703.md", -"redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-release-notes-for-appv-for-windows.md", -"redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-reporting.md", -"redirect_url": "/windows/application-management/app-v/appv-reporting", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-running-locally-installed-applications-inside-a-virtual-environment.md", -"redirect_url": "/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-security-considerations.md", -"redirect_url": "/windows/application-management/app-v/appv-security-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-sequence-a-new-application.md", -"redirect_url": "/windows/application-management/app-v/appv-sequence-a-new-application", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-sequence-a-package-with-powershell.md", -"redirect_url": "/windows/application-management/app-v/appv-sequence-a-package-with-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-supported-configurations.md", -"redirect_url": "/windows/application-management/app-v/appv-supported-configurations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-technical-reference.md", -"redirect_url": "/windows/application-management/app-v/appv-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-troubleshooting.md", -"redirect_url": "/windows/application-management/app-v/appv-troubleshooting", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md", -"redirect_url": "/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-using-the-client-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md", -"redirect_url": "/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/appv-viewing-appv-server-publishing-metadata.md", -"redirect_url": "/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/assign-apps-to-employees.md", -"redirect_url": "/microsoft-store/assign-apps-to-employees", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/configure-mdm-provider-windows-store-for-business.md", -"redirect_url": "/microsoft-store/configure-mdm-provider-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/configure-mdm-provider-windows-store-for-business.md", -"redirect_url": "/microsoft-store/configure-mdm-provider-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/connect-to-remote-aadj-pc.md", -"redirect_url": "/windows/client-management/connect-to-remote-aadj-pc", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/device-guard-signing-portal.md", -"redirect_url": "/microsoft-store/device-guard-signing-portal", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-apps-from-your-private-store.md", -"redirect_url": "/microsoft-store/distribute-apps-from-your-private-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md", -"redirect_url": "/microsoft-store/distribute-apps-to-your-employees-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/distribute-apps-to-your-employees-windows-store-for-business.md", -"redirect_url": "/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-apps-with-management-tool.md", -"redirect_url": "/microsoft-store/distribute-apps-with-management-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/distribute-offline-apps.md", -"redirect_url": "/microsoft-store/distribute-offline-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/find-and-acquire-apps-overview.md", -"redirect_url": "/microsoft-store/find-and-acquire-apps-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/group-policies-for-enterprise-and-education-editions.md", -"redirect_url": "/windows/client-management/group-policies-for-enterprise-and-education-editions", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/join-windows-10-mobile-to-azure-active-directory.md", -"redirect_url": "/windows/client-management/join-windows-10-mobile-to-azure-active-directory", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-access-to-private-store.md", -"redirect_url": "/microsoft-store/manage-access-to-private-store", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-apps-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/manage-apps-windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-apps-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/manage-apps-microsoft-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-corporate-devices.md", -"redirect_url": "/windows/client-management/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-orders-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-orders-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-orders-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-orders-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-private-store-settings.md", -"redirect_url": "/microsoft-store/manage-private-store-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-settings-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-settings-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-settings-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-settings-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-users-and-groups-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-users-and-groups-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/manage-users-and-groups-windows-store-for-business.md", -"redirect_url": "/microsoft-store/manage-users-and-groups-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-windows-10-in-your-organization-modern-management.md", -"redirect_url": "/windows/client-management/manage-windows-10-in-your-organization-modern-management", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/mandatory-user-profile.md", -"redirect_url": "/windows/client-management/mandatory-user-profile", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/new-policies-for-windows-10.md", -"redirect_url": "/windows/client-management/new-policies-for-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/prerequisites-windows-store-for-business.md", -"redirect_url": "/microsoft-store/prerequisites-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/prerequisites-windows-store-for-business.md", -"redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/reset-a-windows-10-mobile-device.md", -"redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/roles-and-permissions-windows-store-for-business.md", -"redirect_url": "/microsoft-store/roles-and-permissions-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/roles-and-permissions-windows-store-for-business.md", -"redirect_url": "/microsoft-store/roles-and-permissions-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/settings-reference-windows-store-for-business.md", -"redirect_url": "/microsoft-store/settings-reference-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/settings-reference-windows-store-for-business.md", -"redirect_url": "/microsoft-store/settings-reference-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/sign-code-integrity-policy-with-device-guard-signing.md", -"redirect_url": "/microsoft-store/sign-code-integrity-policy-with-device-guard-signing", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/sign-up-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/sign-up-windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/sign-up-windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/sign-up-windows-store-for-business.md", -"redirect_url": "/microsoft-store/sign-up-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/sign-up-windows-store-for-business.md", -"redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/troubleshoot-windows-store-for-business.md", -"redirect_url": "/microsoft-store/troubleshoot-windows-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/troubleshoot-windows-store-for-business.md", -"redirect_url": "/microsoft-store/troubleshoot-microsoft-store-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md", -"redirect_url": "/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-administering-uev.md", -"redirect_url": "/windows/configuration/ue-v/uev-administering-uev", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-application-template-schema-reference.md", -"redirect_url": "/windows/configuration/ue-v/uev-application-template-schema-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md", -"redirect_url": "/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-configuring-uev-with-group-policy-objects.md", -"redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md", -"redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-system-center-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-deploy-required-features.md", -"redirect_url": "/windows/configuration/ue-v/uev-deploy-required-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-deploy-uev-for-custom-applications.md", -"redirect_url": "/windows/configuration/ue-v/uev-deploy-uev-for-custom-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-for-windows.md", -"redirect_url": "/windows/configuration/ue-v/uev-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-getting-started.md", -"redirect_url": "/windows/configuration/ue-v/uev-getting-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-manage-administrative-backup-and-restore.md", -"redirect_url": "/windows/configuration/ue-v/uev-manage-administrative-backup-and-restore", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-manage-configurations.md", -"redirect_url": "/windows/configuration/ue-v/uev-manage-configurations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md", -"redirect_url": "/windows/configuration/ue-v/uev-managing-settings-location-templates-using-windows-powershell-and-wmi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md", -"redirect_url": "/windows/configuration/ue-v/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-migrating-settings-packages.md", -"redirect_url": "/windows/configuration/ue-v/uev-migrating-settings-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-prepare-for-deployment.md", -"redirect_url": "/windows/configuration/ue-v/uev-prepare-for-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-release-notes-1607.md", -"redirect_url": "/windows/configuration/ue-v/uev-release-notes-1607", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-security-considerations.md", -"redirect_url": "/windows/configuration/ue-v/uev-security-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-sync-methods.md", -"redirect_url": "/windows/configuration/ue-v/uev-sync-methods", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-sync-trigger-events.md", -"redirect_url": "/windows/configuration/ue-v/uev-sync-trigger-events", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-synchronizing-microsoft-office-with-uev.md", -"redirect_url": "/windows/configuration/ue-v/uev-synchronizing-microsoft-office-with-uev", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-technical-reference.md", -"redirect_url": "/windows/configuration/ue-v/uev-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-troubleshooting.md", -"redirect_url": "/windows/configuration/ue-v/uev-troubleshooting", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-upgrade-uev-from-previous-releases.md", -"redirect_url": "/windows/configuration/ue-v/uev-upgrade-uev-from-previous-releases", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-using-uev-with-application-virtualization-applications.md", -"redirect_url": "/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-whats-new-in-uev-for-windows.md", -"redirect_url": "/windows/configuration/ue-v/uev-whats-new-in-uev-for-windows", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md", -"redirect_url": "/windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/update-windows-store-for-business-account-settings.md", -"redirect_url": "/microsoft-store/update-windows-store-for-business-account-settings", -"redirect_document_id": true -}, -{ -"source_path": "store-for-business/update-windows-store-for-business-account-settings.md", -"redirect_url": "/microsoft-store/update-microsoft-store-for-business-account-settings", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-10-mobile-and-mdm.md", -"redirect_url": "/windows/client-management/windows-10-mobile-and-mdm", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-libraries.md", -"redirect_url": "/windows/client-management/windows-libraries", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-store-for-business-overview.md", -"redirect_url": "/microsoft-store/windows-store-for-business-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/working-with-line-of-business-apps.md", -"redirect_url": "/microsoft-store/working-with-line-of-business-apps", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/act-technical-reference.md", -"redirect_url": "/windows/deployment/planning/act-technical-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/applying-filters-to-data-in-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/applying-filters-to-data-in-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/available-data-types-and-operators-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/available-data-types-and-operators-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/best-practice-recommendations-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/best-practice-recommendations-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/change-history-for-plan-for-windows-10-deployment.md", -"redirect_url": "/windows/deployment/planning/change-history-for-plan-for-windows-10-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/compatibility-administrator-users-guide.md", -"redirect_url": "/windows/deployment/planning/compatibility-administrator-users-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/compatibility-fix-database-management-strategies-and-deployment.md", -"redirect_url": "/windows/deployment/planning/compatibility-fix-database-management-strategies-and-deployment", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md", -"redirect_url": "/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-fix-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-mode-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/creating-an-apphelp-message-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/deployment-considerations-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/deployment-considerations-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/device-dialog-box.md", -"redirect_url": "/windows/deployment/planning/device-dialog-box", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/fixing-applications-by-using-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/fixing-applications-by-using-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md", -"redirect_url": "/windows/deployment/planning/managing-application-compatibility-fixes-and-custom-fix-databases", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/prepare-your-organization-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/prepare-your-organization-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/searching-for-fixed-applications-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/security-and-data-protection-considerations-for-windows-to-go.md", -"redirect_url": "/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/showing-messages-generated-by-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/showing-messages-generated-by-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/sua-users-guide.md", -"redirect_url": "/windows/deployment/planning/sua-users-guide", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/tabs-on-the-sua-tool-interface.md", -"redirect_url": "/windows/deployment/planning/tabs-on-the-sua-tool-interface", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/testing-your-application-mitigation-packages.md", -"redirect_url": "/windows/deployment/planning/testing-your-application-mitigation-packages", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/understanding-and-using-compatibility-fixes.md", -"redirect_url": "/windows/deployment/planning/understanding-and-using-compatibility-fixes", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-compatibility-administrator-tool.md", -"redirect_url": "/windows/deployment/planning/using-the-compatibility-administrator-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-sdbinstexe-command-line-tool.md", -"redirect_url": "/windows/deployment/planning/using-the-sdbinstexe-command-line-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-sua-tool.md", -"redirect_url": "/windows/deployment/planning/using-the-sua-tool", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/using-the-sua-wizard.md", -"redirect_url": "/windows/deployment/planning/using-the-sua-wizard", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/viewing-the-events-screen-in-compatibility-administrator.md", -"redirect_url": "/windows/deployment/planning/viewing-the-events-screen-in-compatibility-administrator", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-compatibility.md", -"redirect_url": "/windows/deployment/planning/windows-10-compatibility", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-deployment-considerations.md", -"redirect_url": "/windows/deployment/planning/windows-10-deployment-considerations", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-enterprise-faq-itpro.md", -"redirect_url": "/windows/deployment/planning/windows-10-enterprise-faq-itpro", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-10-infrastructure-requirements.md", -"redirect_url": "/windows/deployment/planning/windows-10-infrastructure-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-to-go-frequently-asked-questions.md", -"redirect_url": "/windows/deployment/planning/windows-to-go-frequently-asked-questions", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/windows-to-go-overview.md", -"redirect_url": "/windows/deployment/planning/windows-to-go-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/change-history-for-update-windows-10.md", -"redirect_url": "/windows/deployment/update/change-history-for-update-windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/update-compliance-get-started.md", -"redirect_url": "/windows/deployment/update/update-compliance-get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/update-compliance-monitor.md", -"redirect_url": "/windows/deployment/update/update-compliance-monitor", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/update-compliance-using.md", -"redirect_url": "/windows/deployment/update/update-compliance-using", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-branchcache.md", -"redirect_url": "/windows/deployment/update/waas-branchcache", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-configure-wufb.md", -"redirect_url": "/windows/deployment/update/waas-configure-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-delivery-optimization.md", -"redirect_url": "/windows/deployment/update/waas-delivery-optimization", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-deployment-rings-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-integrate-wufb.md", -"redirect_url": "/windows/deployment/update/waas-integrate-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-manage-updates-configuration-manager.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-manage-updates-wsus.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-manage-updates-wufb.md", -"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-mobile-updates.md", -"redirect_url": "/windows/deployment/update/waas-mobile-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-optimize-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-overview.md", -"redirect_url": "/windows/deployment/update/waas-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-quick-start.md", -"redirect_url": "/windows/deployment/update/waas-quick-start", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-restart.md", -"redirect_url": "/windows/deployment/update/waas-restart", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-servicing-branches-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-servicing-strategy-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-windows-insider-for-business-aad.md", -"redirect_url": "/windows/deployment/update/waas-windows-insider-for-business-aad", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-windows-insider-for-business.md", -"redirect_url": "/windows/deployment/update/waas-windows-insider-for-business", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-wufb-group-policy.md", -"redirect_url": "/windows/deployment/update/waas-wufb-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/waas-wufb-intune.md", -"redirect_url": "/windows/deployment/update/waas-wufb-intune", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/manage-settings-app-with-group-policy.md", -"redirect_url": "/windows/client-management/manage-settings-app-with-group-policy", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/collect-wip-audit-event-logs.md", -"redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/deploy-managed-installer-for-device-guard.md", -"redirect_url": "/windows/device-security/device-guard/deploy-managed-installer-for-device-guard", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/upgrade-readiness-data-sharing.md", -"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-data-sharing", -"redirect_document_id": true -}, -{ -"source_path": "windows/index.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/index.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/deploy/index.md", -"redirect_url": "/windows/deployment/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/plan/index.md", -"redirect_url": "/windows/deployment/planning/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/index.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/windows-store-for-business.md", -"redirect_url": "/microsoft-store/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/update/index.md", -"redirect_url": "/windows/deployment/update/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/configure/index.md", -"redirect_url": "/windows/configuration/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/security-technologies.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "education/get-started/index.md", -"redirect_url": "/education/get-started/get-started-with-microsoft-education", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/windows-10-enterprise-security-guides.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/keep-secure/change-history-for-keep-windows-10-secure.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/manage/change-history-for-manage-and-update-windows-10.md", -"redirect_url": "/windows/windows-10/index", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/update/waas-servicing-branches-windows-10-updates.md", -"redirect_url": "/windows/deployment/update/waas-servicing-channels-windows-10-updates", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-10-enterprise-activation-subscription.md", -"redirect_url": "/windows/deployment/windows-10-enterprise-subscription-activation", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-10-auto-pilot.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection", -"redirect_document_id": true -}, -{ -"source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1709.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields.md", -"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/configure-windows-diagnostic-data-in-your-organization.md", -"redirect_url": "/windows/privacy/configure-windows-diagnostic-data-in-your-organization", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/diagnostic-data-viewer-overview.md", -"redirect_url": "/windows/privacy/diagnostic-data-viewer-overview", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md", -"redirect_url": "/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/gdpr-win10-whitepaper.md", -"redirect_url": "/windows/privacy/gdpr-win10-whitepaper", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", -"redirect_url": "/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/manage-windows-endpoints-version-1709.md", -"redirect_url": "/windows/privacy/manage-windows-endpoints", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/windows-diagnostic-data-1703.md", -"redirect_url": "/windows/privacy/windows-diagnostic-data-1703", -"redirect_document_id": true -}, -{ -"source_path": "windows/configuration/windows-diagnostic-data.md", -"redirect_url": "/windows/privacy/windows-diagnostic-data", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/upgrade/windows-10-edition-downgrades.md", -"redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", -"redirect_document_id": true -}, -{ -"source_path": "education/windows/windows-automatic-redeployment.md", -"redirect_url": "/education/windows/autopilot-reset", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-10-autopilot.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot", -"redirect_document_id": true -}, -{ -"source_path": "windows/privacy/manage-windows-endpoints.md", -"redirect_url": "/windows/privacy/manage-windows-1809-endpoints", -"redirect_document_id": true -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp", -"redirect_document_id": false - }, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples", -"redirect_document_id": false -}, -{ -"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineaction-object", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-started.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-started", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-ms-flow.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-user-token.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", -"redirect_document_id": false -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-analytics", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/threat-and-vuln-mgt-scenarios.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/machineactionsnote.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user", -"source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md", -"redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md", -"redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md", -"redirect_url": "/windows/deployment/windows-10-subscription-activation", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", -"redirect_document_id": true -}, -{ -"source_path": "windows/windows-10/windows-10-landing.yml", -"redirect_url": "/windows/hub/windows-10", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md", -"redirect_url": "windows/security/threat-protection/microsoft-defender-atp/improve-request-performance", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/user-driven-aad.md", -"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md", -"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/intune-connector.md", -"redirect_url": "https://docs.microsoft.com/intune/windows-autopilot-hybrid", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md", -"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/configure-autopilot.md", -"redirect_url": "/windows/deployment/windows-autopilot/add-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/deployment/windows-autopilot/administer.md", -"redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices", -"redirect_document_id": true -}, -{ -"source_path": "windows/hub/release-information.md", -"redirect_url": "/windows/release-information", -"redirect_document_id": true -} -] -} + "redirections": [ + { + "source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md", + "redirect_url": "/windows/msix/mpt-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", + "redirect_document_id": false + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md", + "redirect_url": "/microsoft-edge/deploy/emie-to-improve-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/windows-update-sources.md", + "redirect_url": "/windows/deployment/update/how-windows-update-works", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/hardware-and-software-requirements.md", + "redirect_url": "/microsoft-edge/deploy/about-microsoft-edge", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/security-enhancements-microsoft-edge.md", + "redirect_url": "/microsoft-edge/deploy/group-policies/security-privacy-management-gp", + "redirect_document_id": true + }, + { + "source_path": "browsers/edge/new-policies.md", + "redirect_url": "/microsoft-edge/deploy/change-history-for-microsoft-edge", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/intelligence/av-tests.md", + "redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": true + }, + { + "source_path": "windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": false + }, + { + "source_path": "windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/intelligence/transparency-report.md", + "redirect_url": "/windows/security/threat-protection/intelligence/av-tests", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md", + "redirect_url": "/windows-insider/at-work-pro/wip-4-biz-add", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md", + "redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/encrypted-hard-drive.md", + "redirect_url": "/windows/security/information-protection/encrypted-hard-drive", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/secure-the-windows-10-boot-process.md", + "redirect_url": "/windows/security/information-protection/secure-the-windows-10-boot-process", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md", + "redirect_url": "/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/change-the-tpm-owner-password.md", + "redirect_url": "/windows/security/information-protection/tpm/change-the-tpm-owner-password", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/how-windows-uses-the-tpm.md", + "redirect_url": "/windows/security/information-protection/tpm/how-windows-uses-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md", + "redirect_url": "/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/manage-tpm-commands.md", + "redirect_url": "/windows/security/information-protection/tpm/manage-tpm-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/manage-tpm-lockout.md", + "redirect_url": "/windows/security/information-protection/tpm/manage-tpm-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", + "redirect_url": "/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/tpm-fundamentals.md", + "redirect_url": "/windows/security/information-protection/tpm/tpm-fundamentals", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/tpm-recommendations.md", + "redirect_url": "/windows/security/information-protection/tpm/tpm-recommendations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-overview.md", + "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md", + "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md", + "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-top-node", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-windows-insider-for-business.md", + "redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agress.md", + "redirect_url": "/windows/security/threat-protectionsecurity-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/administer-applocker-using-mdm.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/administer-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-architecture-and-components.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-functions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-overview.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-policies-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-policies-design-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-policy-use-scenarios.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-processes-and-interactions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-settings.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/applocker-technical-reference.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-the-application-identity-service.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/configure-the-appLocker-reference-device.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-your-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/create-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/delete-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/determine-your-application-control-objectives.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/dll-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/document-your-application-list.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/document-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/edit-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/edit-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/enable-the-dll-rule-collection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/enforce-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/executable-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/how-applocker-works-techref.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-manually.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/monitor-application-usage-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/optimize-applocker-performance.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/plan-for-applocker-policy-management.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/refresh-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/requirements-to-use-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/script-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/security-considerations-for-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/select-types-of-rules-to-create.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/test-and-update-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/tools-to-use-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-applocker-enforcement-settings.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-behavior.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-collections.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/using-event-viewer-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/what-is-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/windows-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/working-with-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/applocker/working-with-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/steps-to-deploy-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-enable-virtualization-based-security.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/enable-virtualization-based-security", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-family-options.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/apis-intro.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/apis-intro", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/api-hello-world.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-hello-world", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/view-incidents-queue.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/deprecate.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/deprecate", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/evaluate-atp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-edr.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-edr", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/management-apis.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/management-apis", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/partner-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/prerelease.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/whats-new-in-microsoft-defender-atp", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/install-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-offline.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/block-untrusted-fonts-in-enterprise.md", + "redirect_url": "/windows/security/threat-protection/block-untrusted-fonts-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/change-history-for-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/change-history-for-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/override-mitigation-options-for-app-related-security-policies.md", + "redirect_url": "/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/overview-of-threat-mitigations-in-windows-10.md", + "redirect_url": "/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md", + "redirect_url": "/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md", + "redirect_url": "/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/access-this-computer-from-the-network.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-lockout-duration.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-duration", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-lockout-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-lockout-threshold.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/account-policies.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-administrator-account-status.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-block-microsoft-accounts.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-guest-account-status.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-rename-administrator-account.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/accounts-rename-guest-account.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/act-as-part-of-the-operating-system.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/add-workstations-to-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/administer-security-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/allow-log-on-locally.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/back-up-files-and-directories.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/bypass-traverse-checking.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/change-the-system-time.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-system-time", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/change-the-time-zone.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-time-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-a-pagefile.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-a-token-object.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-token-object", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-global-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-global-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-permanent-shared-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/create-symbolic-links.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-symbolic-links", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/debug-programs.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/debug-programs", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-service.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-locally.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/enforce-password-history.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-password-history", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/enforce-user-logon-restrictions.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/generate-security-audits.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/generate-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/how-to-configure-security-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/impersonate-a-client-after-authentication.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/increase-a-process-working-set.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/increase-scheduling-priority.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-require-smart-card.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/kerberos-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/kerberos-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/load-and-unload-device-drivers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/lock-pages-in-memory.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/log-on-as-a-batch-job.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/log-on-as-a-service.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/manage-auditing-and-security-log.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-password-age.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/minimum-password-age.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/minimum-password-length.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-length", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/modify-an-object-label.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-an-object-label", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/modify-firmware-environment-values.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-list-manager-policies.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-list-manager-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/password-must-meet-complexity-requirements.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/password-policy.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/password-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/perform-volume-maintenance-tasks.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/profile-single-process.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-single-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/profile-system-performance.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-system-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/remove-computer-from-docking-station.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/replace-a-process-level-token.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/reset-account-lockout-counter-after.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/restore-files-and-directories.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/restore-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/security-options.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-options", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/security-policy-settings-reference.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/security-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/shut-down-the-system.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/shut-down-the-system", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/synchronize-directory-service-data.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-settings-optional-subsystems.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-policy-settings/user-rights-assignment.md", + "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-rights-assignment", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/device-guard-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/device-guard/device-guard-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md", + "redirect_url": "/windows/security/threat-protection/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/advanced-security-auditing-faq.md", + "redirect_url": "/windows/security/threat-protection/auditing/advanced-security-auditing.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-account-lockout.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-application-generated.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-application-group-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-audit-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-authentication-policy-change.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-authorization-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-central-access-policy-staging.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-certification-services.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-computer-account-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-credential-validation.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-detailed-directory-service-replication.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-detailed-file-share.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-directory-service-access.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-directory-service-changes.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-directory-service-replication.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-distribution-group-management.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-dpapi-activity.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-file-share.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-file-system.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-filtering-platform-packet-drop.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-group-membership.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-handle-manipulation.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-ipsec-driver.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-ipsec-main-mode.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-kerberos-authentication-service.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-kernel-object.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-logoff.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-logon.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-network-policy-server.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-account-logon-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-other-account-management-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-logonlogoff-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-other-object-access-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-policy-change-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-other-system-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-pnp-activity.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-process-creation.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-process-termination.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-registry.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-removable-storage.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-rpc-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-sam.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-security-group-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-security-state-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-security-system-extension.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-special-logon.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-system-integrity.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/audit-user-account-management.md", + "redirect_url": "/windows/security/threat-protection/auditing/audit-user-device-claims.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-account-logon-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-account-management.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-directory-service-access.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-logon-events.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-object-access.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-policy-change.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-privilege-use.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-process-tracking.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-audit-system-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/basic-security-audit-policies.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/basic-security-audit-policy-settings.md", + "redirect_url": "/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-1100.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-1102.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-1104.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-1105.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-1108.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4608.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4610.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4611.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4612.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4614.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4615.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4616.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4618.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4621.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4622.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4624.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4625.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4626.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4627.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4634.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4647.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4648.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4649.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4656.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4657.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4658.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4660.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4661.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4662.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4663.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4664.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4670.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4671.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4672.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4673.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4674.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4675.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4688.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4689.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4690.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4691.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4692.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4693.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4694.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4695.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4696.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4697.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4698.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4699.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4700.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4701.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4702.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4703.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4704.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4705.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4706.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4707.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4713.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4714.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4715.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4716.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4717.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4718.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4719.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4720.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4722.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4723.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4724.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4725.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4726.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4731.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4732.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4733.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4734.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4735.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4738.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4739.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4740.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4741.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4742.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4743.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4749.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4750.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4751.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4752.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4753.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4764.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4765.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4766.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4767.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4768.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4769.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4770.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4771.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4772.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4773.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4774.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4775.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4776.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4777.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4778.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4779.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4780.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4781.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4782.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4793.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4794.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4798.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4799.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4800.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4801.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4802.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4803.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4816.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4817.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4818.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4819.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4826.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4864.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4865.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4866.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4867.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4902.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4904.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4905.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4906.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4907.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4908.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4909.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4910.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4911.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4912.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4913.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4928.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4929.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4930.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4931.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4932.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4933.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4934.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4935.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4936.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4937.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4944.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4945.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4946.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4947.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4948.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4949.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4950.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4951.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4952.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4953.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4954.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4956.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4957.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4958.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-4964.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-4985.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5024.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5025.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5027.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5028.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5029.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5030.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5031.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5032.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5033.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5034.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5035.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5037.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5038.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5039.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5051.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5056.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5057.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5058.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5059.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5060.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5061.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5062.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5063.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5064.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5065.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5066.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5067.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5068.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5069.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5070.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5136.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5137.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5138.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5139.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5140.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5141.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5142.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5143.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5144.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5145.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5148.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5149.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5150.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5151.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5152.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5153.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5154.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5155.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5156.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5157.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5158.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5159.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5168.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5376.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5377.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5378.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5447.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5632.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5633.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5712.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5888.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-5889.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-5890.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6144.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6145.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6281.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6400.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6401.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6402.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6403.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6404.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6405.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6406.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6407.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6408.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6409.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6410.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6416.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6419.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6420.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6421.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6422.md", + "redirect_url": "/windows/security/threat-protection/auditing/event-6423.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/event-6424.md", + "redirect_url": "/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-claim-types.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-resource-attribute-definitions.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/monitor-the-use-of-removable-storage-devices.md", + "redirect_url": "/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/other-events.md", + "redirect_url": "/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/registry-global-object-access-auditing.md", + "redirect_url": "/windows/security/threat-protection/auditing/security-auditing-overview.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", + "redirect_url": "/windows/security/threat-protection/auditing/view-the-security-event-log.md", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md", + "redirect_url": "/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", + "redirect_url": "/windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/administer-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/administer-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-architecture-and-components.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-architecture-and-components", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-functions.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-functions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-overview.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-policies-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-policies-design-guide.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-policy-use-scenarios.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-policy-use-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-processes-and-interactions.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-processes-and-interactions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-settings.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/applocker-technical-reference.md", + "redirect_url": "/windows/security/threat-protection/applocker/applocker-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-audit-only.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-exceptions-for-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-the-application-identity-service.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-the-application-identity-service", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/configure-the-appLocker-reference-device.md", + "redirect_url": "/windows/security/threat-protection/applocker/configure-the-appLocker-reference-device", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-for-packaged-apps.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-path-condition.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-your-applocker-planning-document.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-planning-document", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-your-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/create-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/delete-an-applocker-rule.md", + "redirect_url": "/windows/security/threat-protection/applocker/delete-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", + "redirect_url": "/windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/deploy-the-applocker-policy-into-production.md", + "redirect_url": "/windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", + "redirect_url": "/windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/determine-your-application-control-objectives.md", + "redirect_url": "/windows/security/threat-protection/applocker/determine-your-application-control-objectives", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", + "redirect_url": "/windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/dll-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/dll-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-your-application-control-management-processes.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-your-application-control-management-processes", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-your-application-list.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-your-application-list", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/document-your-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/document-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/edit-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/edit-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/edit-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/edit-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/enable-the-dll-rule-collection.md", + "redirect_url": "/windows/security/threat-protection/applocker/enable-the-dll-rule-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/enforce-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/enforce-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/executable-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/executable-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/export-an-applocker-policy-from-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file.md", + "redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/how-applocker-works-techref.md", + "redirect_url": "/windows/security/threat-protection/applocker/how-applocker-works-techref", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/import-an-applocker-policy-from-another-computer.md", + "redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/import-an-applocker-policy-into-a-gpo.md", + "redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/manage-packaged-apps-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/merge-applocker-policies-manually.md", + "redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-manually", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/monitor-application-usage-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/monitor-application-usage-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/optimize-applocker-performance.md", + "redirect_url": "/windows/security/threat-protection/applocker/optimize-applocker-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/plan-for-applocker-policy-management.md", + "redirect_url": "/windows/security/threat-protection/applocker/plan-for-applocker-policy-management", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/refresh-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/refresh-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/requirements-for-deploying-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/requirements-to-use-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/requirements-to-use-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/run-the-automatically-generate-rules-wizard.md", + "redirect_url": "/windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/script-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/script-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/security-considerations-for-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/security-considerations-for-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/select-types-of-rules-to-create.md", + "redirect_url": "/windows/security/threat-protection/applocker/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md", + "redirect_url": "/windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/test-and-update-an-applocker-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/test-and-update-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/tools-to-use-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/tools-to-use-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-applocker-enforcement-settings.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-enforcement-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-applocker-policy-design-decisions.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understand-the-applocker-policy-deployment-process.md", + "redirect_url": "/windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-default-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-behavior.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-collections.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-collections", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-condition-types.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-applocker-rule-exceptions.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md", + "redirect_url": "/windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets.md", + "redirect_url": "/windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/using-event-viewer-with-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/using-event-viewer-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/what-is-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/what-is-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/windows-installer-rules-in-applocker.md", + "redirect_url": "/windows/security/threat-protection/applocker/windows-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/working-with-applocker-policies.md", + "redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/applocker/working-with-applocker-rules.md", + "redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/change-history-for-device-security.md", + "redirect_url": "/windows/security/threat-protection/change-history-for-device-security", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/enable-virtualization-based-protection-of-code-integrity.md", + "redirect_url": "/windows/security/threat-protection/enable-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/get-support-for-security-baselines.md", + "redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", + "redirect_url": "/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/security-compliance-toolkit-10.md", + "redirect_url": "/windows/security/threat-protection/security-compliance-toolkit-10", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/windows-10-mobile-security-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-10-mobile-security-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/windows-security-baselines.md", + "redirect_url": "/windows/security/threat-protection/windows-security-baselines", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/app-behavior-with-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/app-behavior-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/limitations-with-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/limitations-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/mandatory-settings-for-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy-sccm.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/testing-scenarios-for-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/using-owa-with-wip.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/using-owa-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/windows-information-protection/wip-app-enterprise-context.md", + "redirect_url": "/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/encrypted-hard-drive.md", + "redirect_url": "/windows/security/hardware-protection/encrypted-hard-drive", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/how-hardware-based-containers-help-protect-windows.md", + "redirect_url": "/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/secure-the-windows-10-boot-process.md", + "redirect_url": "/windows/security/hardware-protection/secure-the-windows-10-boot-process", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds.md", + "redirect_url": "/windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/change-the-tpm-owner-password.md", + "redirect_url": "/windows/securityhardware-protection/tpm/change-the-tpm-owner-password", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/how-windows-uses-the-tpm.md", + "redirect_url": "/windows/securityhardware-protection/tpm/how-windows-uses-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm.md", + "redirect_url": "/windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/manage-tpm-commands.md", + "redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/manage-tpm-lockout.md", + "redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices.md", + "redirect_url": "/windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/tpm-fundamentals.md", + "redirect_url": "/windows/security/hardware-protection/tpm/tpm-fundamentals", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/tpm-recommendations.md", + "redirect_url": "/windows/security/hardware-protection/tpm/tpm-recommendations", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/trusted-platform-module-overview.md", + "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/trusted-platform-module-services-group-policy-settings.md", + "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/tpm/trusted-platform-module-top-node.md", + "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-top-node", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bcd-settings-and-bitlocker.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-basic-deployment.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-basic-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-countermeasures.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-group-policy-settings.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-management-for-enterprises.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-overview.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-recovery-guide-plan.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md", + "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure.md", + "redirect_url": "/windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md", + "redirect_url": "/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks.md", + "redirect_url": "/windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", + "redirect_url": "/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys.md", + "redirect_url": "/windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-credential-theft-mitigation-guide-abstract.md", + "redirect_url": "/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/change-history-for-access-protection.md", + "redirect_url": "/windows/security/identity-protection/change-history-for-access-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/configure-s-mime.md", + "redirect_url": "/windows/security/identity-protection/configure-s-mime", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/enterprise-certificate-pinning.md", + "redirect_url": "/windows/security/identity-protection/enterprise-certificate-pinning", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/installing-digital-certificates-on-windows-10-mobile.md", + "redirect_url": "/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/remote-credential-guard.md", + "redirect_url": "/windows/security/identity-protection/remote-credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/assign-security-group-filters-to-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/basic-firewall-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/boundary-zone-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/boundary-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/change-rules-from-request-to-require-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-basic-firewall-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-group-policy-objects.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-group-policy-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-inbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-outbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-authentication-methods.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-authentication-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-data-protection-quick-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-key-exchange-main-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-rules-to-require-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-the-windows-firewall-log.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-windows-firewall-log", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-a-group-account-in-active-directory.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-account-in-active-directory", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-a-group-policy-object.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-policy-object", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-exemption-list-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-authentication-request-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-request-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-inbound-icmp-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-icmp-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-inbound-port-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-outbound-port-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-inbound-rules-to-support-rpc", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/create-wmi-filters-for-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/determining-the-trusted-state-of-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/documenting-the-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/documenting-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/enable-predefined-inbound-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-inbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/enable-predefined-outbound-rules.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-outbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/encryption-zone-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/encryption-zone.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/exempt-icmp-from-authentication.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/exempt-icmp-from-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/exemption-list.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/exemption-list", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/firewall-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/firewall-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-other-relevant-information.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-other-relevant-information", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gathering-the-information-you-need.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-the-information-you-need", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-boundary.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-boundary", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-encryption.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-firewall.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/isolated-domain-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/isolated-domain.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/isolating-apps-on-your-network.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/isolating-apps-on-your-network", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/link-the-gpo-to-the-domain.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/link-the-gpo-to-the-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/open-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-certificate-based-authentication.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-certificate-based-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-domain-isolation-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-domain-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-gpo-deployment.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-gpo-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-isolation-groups-for-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-network-access-groups.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-network-access-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-server-isolation-zones.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-server-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-the-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-the-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/procedures-used-in-this-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/procedures-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-trusted-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/server-isolation-gpos.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design-example.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/verify-that-network-traffic-is-authenticated", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", + "redirect_url": "/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-authentication.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-auto-trigger-profile.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-auto-trigger-profile", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-conditional-access.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-connection-type.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-connection-type", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-guide.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-name-resolution.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-name-resolution", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-profile-options.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-profile-options", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-routing.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-routing", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/vpn/vpn-security-features.md", + "redirect_url": "/windows/security/identity-protection/vpn/vpn-security-features", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-overview.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md", + "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/how-user-account-control-works.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/how-user-account-control-works", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/user-account-control-overview.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/user-account-control/user-account-control-security-policy-settings.md", + "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-debugging-information.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-debugging-information", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-events.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-events", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-removal-policy-service.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-tools-and-settings.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-and-remote-desktop-services.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-architecture.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/smart-cards/smart-card-certificate-propagation-service.md", + "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-and-password-changes.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-and-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-adfs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-policy-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-deployment-cert-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-deployment-guide.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-deployment-key-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-event-300.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-event-300", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-features.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-features", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-how-it-works.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-new-install.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-new-install.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-devreg.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-provision.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-identity-verification.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-adfs.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-policy-settings.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-pki.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-manage-in-organization.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-manage-in-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-overview.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-planning-guide.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-planning-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-prepare-people-to-use.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md", + "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/additional-mitigations.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/additional-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-considerations.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-how-it-works.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-known-issues.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-known-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-manage.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-manage", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-not-protected-scenarios.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-protection-limits.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-protection-limits", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-requirements.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/credential-guard/credential-guard-scripts.md", + "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/access-control.md", + "redirect_url": "/windows/security/identity-protection/access-control/access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/active-directory-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/active-directory-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/active-directory-security-groups.md", + "redirect_url": "/windows/security/identity-protection/access-control/active-directory-security-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/dynamic-access-control.md", + "redirect_url": "/windows/security/identity-protection/access-control/dynamic-access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/local-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/microsoft-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/security-identifiers.md", + "redirect_url": "/windows/security/identity-protection/access-control/security-identifiers", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/security-principals.md", + "redirect_url": "/windows/security/identity-protection/access-control/security-principals", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/service-accounts.md", + "redirect_url": "/windows/security/identity-protection/access-control/service-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/access-protection/access-control/special-identities.md", + "redirect_url": "/windows/security/identity-protection/access-control/special-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md", + "redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", + "redirect_document_id": true + }, + { + "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", + "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/surface-device-compatibility-with-windows-10-ltsb.md", + "redirect_url": "/devices/surface/surface-device-compatibility-with-windows-10-ltsc", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/windows-diagnostic-data-1709.md", + "redirect_url": "/windows/configuration/windows-diagnostic-data", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/EventName.md", + "redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md", + "redirect_url": "/education/windows/switch-to-pro-education", + "redirect_document_id": false + }, + { + "source_path": "education/windows/switch-to-pro-education.md", + "redirect_url": "/education/windows/change-to-pro-education", + "redirect_document_id": true + }, + { + "source_path": "education/windows/swithc-to-pro-de.md", + "redirect_url": "/education/windows/switch-to-pro-education", + "redirect_document_id": false + }, + { + "source_path": "windows/client-management/mdm/policy-admx-backed.md", + "redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", + "redirect_document_id": true + }, + { + "source_path": "windows/client-management/mdm/policy-csp-location.md", + "redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-7.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/surface-diagnostic-toolkit.md", + "redirect_url": "/surface/index", + "redirect_document_id": true + }, + { + "source_path": "devices/surface/manage-surface-dock-firmware-updates.md", + "redirect_url": "devices/surface/update", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/i-am-done-finishing-your-surface-hub-meeting.md", + "redirect_url": "/surface-hub/finishing-your-surface-hub-meeting", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-microsoft-layout-app.md", + "redirect_url": "/hololens/hololens-microsoft-dynamics-365-layout-app", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-microsoft-dynamics-365-layout-app.md", + "redirect_url": "/dynamics365/mixed-reality/layout/", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-microsoft-remote-assist-app.md", + "redirect_url": "/dynamics365/mixed-reality/remote-assist/", + "redirect_document_id": true + }, + { + "source_path": "devices/hololens/hololens-public-preview-apps.md", + "redirect_url": "/dynamics365/#pivot=mixed-reality-apps", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/provisioning-packages-for-certificates-surface-hub.md", + "redirect_url": "/surface-hub/provisioning-packages-for-surface-hub", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/manage-settings-with-local-admin-account-surface-hub.md", + "redirect_url": "/surface-hub/admin-group-management-for-surface-hub", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/surface-hub-administrators-guide.md", + "redirect_url": "/surface-hub/index", + "redirect_document_id": true + }, + { + "source_path": "devices/surface-hub/intro-to-surface-hub.md", + "redirect_url": "/surface-hub/index", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/waas-quick-start.md", + "redirect_url": "/windows/deployment/update/waas-quick-start", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-overview.md", + "redirect_url": "/windows/deployment/update/waas-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-servicing-strategy-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-deployment-rings-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-servicing-branches-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-compliance-monitor.md", + "redirect_url": "/windows/deployment/update/update-compliance-monitor", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-compliance-get-started.md", + "redirect_url": "/windows/deployment/update/update-compliance-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-compliance-using.md", + "redirect_url": "/windows/deployment/update/update-compliance-using", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-optimize-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-delivery-optimization.md", + "redirect_url": "/windows/deployment/update/waas-delivery-optimization", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-branchcache.md", + "redirect_url": "/windows/deployment/update/waas-branchcache", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-mobile-updates.md", + "redirect_url": "/windows/deployment/update/waas-mobile-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-manage-updates-wufb.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-configure-wufb.md", + "redirect_url": "/windows/deployment/update/waas-configure-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-integrate-wufb.md", + "redirect_url": "/windows/deployment/update/waas-integrate-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-wufb-group-policy.md", + "redirect_url": "/windows/deployment/update/waas-wufb-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-wufb-intune.md", + "redirect_url": "/windows/deployment/update/waas-wufb-intune.md", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-manage-updates-wsus.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-manage-updates-configuration-manager.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-restart.md", + "redirect_url": "/windows/deployment/update/waas-restart", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/waas-update-windows-10.md", + "redirect_url": "/windows/deployment/update/index", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/configure-windows-telemetry-in-your-organization.md", + "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lockdown-features-windows-10.md", + "redirect_url": "/windows/configuration/lockdown-features-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/set-up-shared-or-guest-pc.md", + "redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md", + "redirect_url": "/windows/configuration/kiosk-shared-pc", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md", + "redirect_url": "/windows/configuration/kiosk-shared-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", + "redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/guidelines-for-assigned-access-app.md", + "redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lock-down-windows-10-to-specific-apps.md", + "redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", + "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lockdown-xml.md", + "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/settings-that-can-be-locked-down.md", + "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/product-ids-in-windows-10-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-tips-and-suggestions.md", + "redirect_url": "/windows/configuration/manage-tips-and-suggestions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-10-start-layout-options-and-policies.md", + "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-windows-10-taskbar.md", + "redirect_url": "/windows/configuration//configure-windows-10-taskbar", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-and-export-start-layout.md", + "redirect_url": "/windows/configuration//customize-and-export-start-layout", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/start-layout-xml-desktop.md", + "redirect_url": "/windows/configuration/start-layout-xml-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/start-layout-xml-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-windows-10-start-screens-by-using-group-policy.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-testing-scenarios.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-1.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-2.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-3.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-4.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-5.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-scenario-6.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-o365.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-crm.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-powerbi.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-voice-commands.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-policy-settings.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-feedback.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/stop-employees-from-using-the-windows-store.md", + "redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md", + "redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-devices-without-mdm.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/changes-to-start-policies-in-windows-10.md", + "redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/how-it-pros-can-use-configuration-service-providers.md", + "redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/lock-down-windows-10.md", + "redirect_url": "/windows/configuration/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-wifi-sense-in-enterprise.md", + "redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-how-it-works.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-install-icd.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-create-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-apply-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-uninstall-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provision-pcs-for-initial-deployment.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provision-pcs-with-apps-and-certificates.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-script-to-install-app.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-nfc.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-command-line.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/provisioning-multivariant.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-edp-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-edp-policy-using-sccm.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-vpn-and-edp-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-enable-phone-signin.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/deploy-edp-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/guidance-and-best-practices-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/overview-create-edp-policy.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-enterprise-data-using-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/testing-scenarios-for-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/wip-enterprise-overview.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/enlightened-microsoft-apps-and-edp.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/update-windows-10-images-with-provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": false + }, + { + "source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-release-notes.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md", + "redirect_url": "https://technet.microsoft.com/library/jj635854.aspx", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md", + "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/device-guard-certification-and-compliance.md", + "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-enable-phone-signin", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md", + "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/implement-microsoft-passport-in-your-organization.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-identity-verification-using-microsoft-passport.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-passport-and-password-changes.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-passport-errors-during-pin-creation.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-passport-guide.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/passport-event-300.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/prepare-people-to-use-microsoft-passport.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/why-a-pin-is-better-than-a-password.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-hello-in-enterprise.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/app-inventory-management-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/application-development-for-windows-as-a-service.md", + "redirect_url": "https://msdn.microsoft.com/windows/uwp/get-started/application-development-for-windows-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-accessibility.md", + "redirect_url": "/windows/application-management/app-v/appv-getting-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-accessing-the-client-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-appv-client-for-shared-content-store-mode.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-modify-client-configuration-with-the-admx-template-and-group-policy.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/appv-planning-for-migrating-from-a-previous-version-of-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-windows-10-devices-to-stop-data-flow-to-microsoft.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/disconnect-your-organization-from-microsoft.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/introduction-to-windows-10-servicing.md", + "redirect_url": "/windows/deployment/update/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-cortana-in-enterprise.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/cortana-at-work-overview.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", + "redirect_document_id": false + }, + { + "source_path": "windows/manage/manage-inventory-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-managemement-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-managemement-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-accessibility.md", + "redirect_url": "/windows/configuration/ue-v/uev-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-privacy-statement.md", + "redirect_url": "/windows/configuration/ue-v/uev-security-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/act-community-ratings-and-process.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/act-database-configuration.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-database-migration.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-deployment-options.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-glossary.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/activating-and-closing-windows-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-lps-share-permissions.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-operatingsystem-application-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-operatingsystem-computer-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-operatingsystem-device-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-product-and-documentation-resources.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-settings-dialog-box-preferences-tab.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-settings-dialog-box-settings-tab.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-toolbar-icons-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-tools-packages-and-services.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/act-user-interface-reference.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/adding-or-editing-an-issue.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/adding-or-editing-a-solution.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/analyzing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/application-dialog-box.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/categorizing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/chromebook-migration-guide.md", + "redirect_url": "edu/windows/chromebook-migration-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/common-compatibility-issues.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/compatibility-monitor-users-guide.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/computer-dialog-box.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/configuring-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-and-editing-issues-and-solutions.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-an-inventory-collector-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/creating-a-runtime-analysis-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/customizing-your-report-views.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deciding-which-applications-to-test.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deleting-a-data-collection-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deploying-an-inventory-collector-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deploying-a-runtime-analysis-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/deploy-windows-10-in-a-school.md", + "redirect_url": "/edu/windows/deploy-windows-10-in-a-school", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/example-filter-queries.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/exporting-a-data-collection-package.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/filtering-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/fixing-compatibility-issues.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/identifying-computers-for-inventory-collection.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/integration-with-management-solutions-.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/internet-explorer-web-site-report.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/labeling-data-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/log-file-locations-for-data-collection-packages.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/managing-your-data-collection-packages.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/organizational-tasks-for-each-report-type.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/organizing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/prioritizing-your-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/ratings-icons-in-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/resolving-an-issue.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/saving-opening-and-exporting-reports.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/selecting-the-send-and-receive-status-for-an-application.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/selecting-your-compatibility-rating.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/selecting-your-deployment-status.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/sending-and-receiving-compatibility-data.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/settings-for-acm.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/setup-and-deployment.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/software-requirements-for-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/software-requirements-for-rap.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/taking-inventory-of-your-organization.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/testing-compatibility-on-the-target-platform.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-act-database-issues.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-the-act-configuration-wizard.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/troubleshooting-the-act-log-processing-service.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/using-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/using-compatibility-monitor-to-send-feedback.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/viewing-your-compatibility-reports.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/websiteurl-dialog-box.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/welcome-to-act.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/whats-new-in-act-60.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/windows-10-guidance-for-education-environments.md", + "redirect_url": "/edu/windows/index", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-servicing-options.md", + "redirect_url": "/windows/deployment/update/waas-overview", + "redirect_document_id": false + }, + { + "source_path": "windows/plan/windows-update-for-business.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/applocker.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/bitlocker.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/change-history-for-what-s-new-in-windows-10.md", + "redirect_url": "/windows/whats-new/index", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/credential-guard.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/device-guard-overview.md", + "redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/device-management.md", + "redirect_url": "/windows/client-management/index", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/edge-ie11-whats-new-overview.md", + "redirect_url": "/microsoft-edge/deploy/enterprise-guidance-using-microsoft-edge-and-ie11", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/edp-whats-new-overview.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/lockdown-features-windows-10.md", + "redirect_url": "/windows/configuration/lockdown-features-windows-10", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/microsoft-passport.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/new-provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/security-auditing.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/trusted-platform-module.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/user-account-control.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/whats-new/windows-spotlight.md", + "redirect_url": "/windows/configuration/windows-spotlight", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/microsoft-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/windows-update-for-business.md", + "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511", + "redirect_document_id": false + }, + { + "source_path": "windows/keep-secure/windows-10-security-guide.md", + "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/whats-new/security.md", + "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": false + }, + { + "source_path": "windows/configure/basic-level-windows-diagnostic-events-and-fields-1703.md", + "redirect_url": "/windows/configuration/basic-level-windows-diagnostic-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/change-history-for-configure-windows-10.md", + "redirect_url": "/windows/configuration/change-history-for-configure-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/changes-to-start-policies-in-windows-10.md", + "redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-devices-without-mdm.md", + "redirect_url": "/windows/configuration/configure-devices-without-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/configure-devices-without-mdm.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/configure-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-windows-10-taskbar.md", + "redirect_url": "/windows/configuration/configure-windows-10-taskbar", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/configure-windows-telemetry-in-your-organization.md", + "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md", + "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-crm.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-feedback.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-o365.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-overview.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-policy-settings.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-powerbi.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-1.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-2.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-3.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-4.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-5.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-6.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-scenario-7.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-testing-scenarios.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/cortana-at-work-voice-commands.md", + "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-and-export-start-layout.md", + "redirect_url": "/windows/configuration/customize-and-export-start-layout", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-windows-10-start-screens-by-using-group-policy.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-windows-10-start-screens-by-using-mobile-device-management.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", + "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/guidelines-for-assigned-access-app.md", + "redirect_url": "/windows/configuration/guidelines-for-assigned-access-app", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/how-it-pros-can-use-configuration-service-providers.md", + "redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/kiosk-shared-pc.md", + "redirect_url": "/windows/configuration/kiosk-shared-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/kiosk-shared-pc.md", + "redirect_url": "/windows/configuration/kiosk-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/setup-kiosk-digital-signage.md", + "redirect_url": "/windows/configuration/kiosk-single-app", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/multi-app-kiosk-xml.md", + "redirect_url": "/windows/configuration/kiosk-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md", + "redirect_url": "/windows/configuration/kiosk-troubleshoot", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md", + "redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lock-down-windows-10.md", + "redirect_url": "/windows/configuration/lock-down-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lockdown-features-windows-10.md", + "redirect_url": "/windows/configuration/lockdown-features-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/lockdown-xml.md", + "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", + "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/manage-tips-and-suggestions.md", + "redirect_url": "/windows/configuration/manage-tips-and-suggestions", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/manage-wifi-sense-in-enterprise.md", + "redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/mobile-lockdown-designer.md", + "redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/product-ids-in-windows-10-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provision-pcs-for-initial-deployment.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provision-pcs-with-apps-and-certificates.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps-and-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provision-pcs-with-apps.md", + "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-apply-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-command-line.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-configure-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-create-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-how-it-works.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-install-icd.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-multivariant.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-nfc.md", + "redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-package-splitter.md", + "redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-packages.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-powershell.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-script-to-install-app.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/provisioning-uninstall-package.md", + "redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-a-device-for-anyone-to-use.md", + "redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", + "redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md", + "redirect_url": "/windows/configuration/setup-kiosk-digital-signage", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md", + "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/set-up-shared-or-guest-pc.md", + "redirect_url": "/windows/configuration/set-up-shared-or-guest-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/settings-that-can-be-locked-down.md", + "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-layout-xml-desktop.md", + "redirect_url": "/windows/configuration/start-layout-xml-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-layout-xml-mobile.md", + "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-secondary-tiles.md", + "redirect_url": "/windows/configuration/start-secondary-tiles", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/start-taskbar-lockscreen.md", + "redirect_url": "/windows/configuration/start-taskbar-lockscreen", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/start-taskbar-lockscreen.md", + "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/stop-employees-from-using-the-windows-store.md", + "redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/windows-10-start-layout-options-and-policies.md", + "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/windows-diagnostic-data-1703.md", + "redirect_url": "/windows/configuration/windows-diagnostic-data", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/windows-spotlight.md", + "redirect_url": "/windows/configuration/windows-spotlight", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-spotlight.md", + "redirect_url": "/windows/configuration/windows-spotlight", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-forest-by-proxy-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-forest-by-proxy-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-forest-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-forest-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-using-active-directory-based-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-using-key-management-service-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-using-key-management-service-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/activate-windows-10-clients-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/activate-windows-10-clients-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/active-directory-based-activation-overview.md", + "redirect_url": "/windows/deployment/volume-activation/active-directory-based-activation-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-manage-products-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/add-manage-products-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-remove-computers-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/add-remove-computers-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/add-remove-product-key-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/add-remove-product-key-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/appendix-information-sent-to-microsoft-during-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/assign-applications-using-roles-in-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/assign-applications-using-roles-in-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/build-a-distributed-environment-for-windows-10-deployment.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/change-history-for-deploy-windows-10.md", + "redirect_url": "/windows/deployment/change-history-for-deploy-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-a-pxe-server-to-load-windows-pe.md", + "redirect_url": "/windows/deployment/configure-a-pxe-server-to-load-windows-pe", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-client-computers-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/configure-client-computers-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-2013-for-userexit-scripts.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-2013-settings.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-deployment-share-rules.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-for-userexit-scripts.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/configure-mdt-settings.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-a-windows-10-reference-image.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-a-windows-10-image-using-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-whats-new.md", + "redirect_url": "/windows/deployment/deploy-whats-new", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/deploy-windows-to-go.md", + "redirect_url": "/windows/deployment/deploy-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/get-started-with-the-microsoft-deployment-toolkit.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/getting-started-with-the-user-state-migration-tool.md", + "redirect_url": "/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/import-export-vamt-data.md", + "redirect_url": "/windows/deployment/volume-activation/import-export-vamt-data", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-configure-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-configure-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-kms-client-key-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-kms-client-key-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-product-key-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-product-key-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/install-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/install-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/integrate-configuration-manager-with-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/integrate-configuration-manager-with-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/introduction-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/introduction-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/key-features-in-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/key-features-in-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/kms-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/kms-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/local-reactivation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/local-reactivation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-activations-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/manage-activations-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-product-keys-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/manage-product-keys-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-vamt-data.md", + "redirect_url": "/windows/deployment/volume-activation/manage-vamt-data", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-analytics.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-readiness.md", + "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/mbr-to-gpt.md", + "redirect_url": "/windows/deployment/mbr-to-gpt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/mdt-2013-lite-touch-components.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/mdt-lite-touch-components.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/migrate-application-settings.md", + "redirect_url": "/windows/deployment/usmt/migrate-application-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/migration-store-types-overview.md", + "redirect_url": "/windows/deployment/usmt/migration-store-types-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/monitor-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/monitor-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/offline-migration-reference.md", + "redirect_url": "/windows/deployment/usmt/offline-migration-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/online-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/online-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/plan-for-volume-activation-client.md", + "redirect_url": "/windows/deployment/volume-activation/plan-for-volume-activation-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/proxy-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/proxy-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/refresh-a-windows-7-computer-with-windows-10.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/remove-products-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/remove-products-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", + "redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/replace-a-windows-7-computer-with-a-windows-10-computer.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/resolve-windows-10-upgrade-errors.md", + "redirect_url": "/windows/deployment/upgrade/resolve-windows-10-upgrade-errors", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/scenario-kms-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/scenario-kms-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/scenario-online-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/scenario-online-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/scenario-proxy-activation-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/scenario-proxy-activation-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/set-up-mdt-2013-for-bitlocker.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/set-up-mdt-for-bitlocker.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/sideload-apps-in-windows-10.md", + "redirect_url": "/windows/application-management/sideload-apps-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/simulate-a-windows-10-deployment-in-a-test-environment.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/troubleshoot-upgrade-analytics.md", + "redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/troubleshoot-upgrade-readiness.md", + "redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/understanding-migration-xml-files.md", + "redirect_url": "/windows/deployment/usmt/understanding-migration-xml-files", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/update-product-status-vamt.md", + "redirect_url": "/windows/deployment/volume-activation/update-product-status-vamt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-additional-insights.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-architecture.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-deploy-windows.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-deployment-script.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-get-started.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-identify-apps.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-requirements.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-resolve-issues.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-analytics-upgrade-overview.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-additional-insights.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-architecture.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-deploy-windows.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-deployment-script.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-get-started.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-identify-apps.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-release-notes.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-release-notes", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-requirements.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-resolve-issues.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-upgrade-overview.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-windows-phone-8-1-to-10.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-the-mdt-database-to-stage-windows-10-deployment-information.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-the-volume-activation-management-tool-client.md", + "redirect_url": "/windows/deployment/volume-activation/use-the-volume-activation-management-tool-client", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-upgrade-analytics-to-manage-windows-upgrades.md", + "redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-upgrade-readiness-to-manage-windows-upgrades.md", + "redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-vamt-in-windows-powershell.md", + "redirect_url": "/windows/deployment/volume-activation/use-vamt-in-windows-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-web-services-in-mdt-2013.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/use-web-services-in-mdt.md", + "redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-best-practices.md", + "redirect_url": "/windows/deployment/usmt/usmt-best-practices", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-choose-migration-store-type.md", + "redirect_url": "/windows/deployment/usmt/usmt-choose-migration-store-type", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-command-line-syntax.md", + "redirect_url": "/windows/deployment/usmt/usmt-command-line-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-common-issues.md", + "redirect_url": "/windows/deployment/usmt/usmt-common-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-common-migration-scenarios.md", + "redirect_url": "/windows/deployment/usmt/usmt-common-migration-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-configxml-file.md", + "redirect_url": "/windows/deployment/usmt/usmt-configxml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-conflicts-and-precedence.md", + "redirect_url": "/windows/deployment/usmt/usmt-conflicts-and-precedence", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-custom-xml-examples.md", + "redirect_url": "/windows/deployment/usmt/usmt-custom-xml-examples", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-customize-xml-files.md", + "redirect_url": "/windows/deployment/usmt/usmt-customize-xml-files", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-determine-what-to-migrate.md", + "redirect_url": "/windows/deployment/usmt/usmt-determine-what-to-migrate", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-estimate-migration-store-size.md", + "redirect_url": "/windows/deployment/usmt/usmt-estimate-migration-store-size", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-exclude-files-and-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-exclude-files-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-extract-files-from-a-compressed-migration-store.md", + "redirect_url": "/windows/deployment/usmt/usmt-extract-files-from-a-compressed-migration-store", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-faq.md", + "redirect_url": "/windows/deployment/usmt/usmt-faq", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-general-conventions.md", + "redirect_url": "/windows/deployment/usmt/usmt-general-conventions", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-hard-link-migration-store.md", + "redirect_url": "/windows/deployment/usmt/usmt-hard-link-migration-store", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-how-it-works.md", + "redirect_url": "/windows/deployment/usmt/usmt-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-how-to.md", + "redirect_url": "/windows/deployment/usmt/usmt-how-to", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-application-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-application-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-file-types-files-and-folders.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-file-types-files-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-operating-system-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-operating-system-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-identify-users.md", + "redirect_url": "/windows/deployment/usmt/usmt-identify-users", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-include-files-and-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-include-files-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-loadstate-syntax.md", + "redirect_url": "/windows/deployment/usmt/usmt-loadstate-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-log-files.md", + "redirect_url": "/windows/deployment/usmt/usmt-log-files", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-migrate-efs-files-and-certificates.md", + "redirect_url": "/windows/deployment/usmt/usmt-migrate-efs-files-and-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-migrate-user-accounts.md", + "redirect_url": "/windows/deployment/usmt/usmt-migrate-user-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-migration-store-encryption.md", + "redirect_url": "/windows/deployment/usmt/usmt-migration-store-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-overview.md", + "redirect_url": "/windows/deployment/usmt/usmt-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-plan-your-migration.md", + "redirect_url": "/windows/deployment/usmt/usmt-plan-your-migration", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-recognized-environment-variables.md", + "redirect_url": "/windows/deployment/usmt/usmt-recognized-environment-variables", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-reference.md", + "redirect_url": "/windows/deployment/usmt/usmt-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-requirements.md", + "redirect_url": "/windows/deployment/usmt/usmt-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-reroute-files-and-settings.md", + "redirect_url": "/windows/deployment/usmt/usmt-reroute-files-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-resources.md", + "redirect_url": "/windows/deployment/usmt/usmt-resources", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-return-codes.md", + "redirect_url": "/windows/deployment/usmt/usmt-return-codes", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-scanstate-syntax.md", + "redirect_url": "/windows/deployment/usmt/usmt-scanstate-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-technical-reference.md", + "redirect_url": "/windows/deployment/usmt/usmt-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-test-your-migration.md", + "redirect_url": "/windows/deployment/usmt/usmt-test-your-migration", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-topics.md", + "redirect_url": "/windows/deployment/usmt/usmt-topics", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-troubleshooting.md", + "redirect_url": "/windows/deployment/usmt/usmt-troubleshooting", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-utilities.md", + "redirect_url": "/windows/deployment/usmt/usmt-utilities", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-what-does-usmt-migrate.md", + "redirect_url": "/windows/deployment/usmt/usmt-what-does-usmt-migrate", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-xml-elements-library.md", + "redirect_url": "/windows/deployment/usmt/usmt-xml-elements-library", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/usmt-xml-reference.md", + "redirect_url": "/windows/deployment/usmt/usmt-xml-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/vamt-known-issues.md", + "redirect_url": "/windows/deployment/volume-activation/vamt-known-issues", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/vamt-requirements.md", + "redirect_url": "/windows/deployment/volume-activation/vamt-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/vamt-step-by-step.md", + "redirect_url": "/windows/deployment/volume-activation/vamt-step-by-step", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/verify-the-condition-of-a-compressed-migration-store.md", + "redirect_url": "/windows/deployment/usmt/verify-the-condition-of-a-compressed-migration-store", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/volume-activation-management-tool.md", + "redirect_url": "/windows/deployment/volume-activation/volume-activation-management-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/volume-activation-windows-10.md", + "redirect_url": "/windows/deployment/volume-activation/volume-activation-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-deployment-scenarios.md", + "redirect_url": "/windows/deployment/windows-10-deployment-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-deployment-tools-reference.md", + "redirect_url": "/windows/deployment/windows-10-deployment-tools-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-edition-upgrades.md", + "redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-enterprise-e3-overview.md", + "redirect_url": "/windows/deployment/windows-10-enterprise-e3-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-poc-mdt.md", + "redirect_url": "/windows/deployment/windows-10-poc-mdt", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md", + "redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-poc.md", + "redirect_url": "/windows/deployment/windows-10-poc", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-10-upgrade-paths.md", + "redirect_url": "/windows/deployment/upgrade/windows-10-upgrade-paths", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-adk-scenarios-for-it-pros.md", + "redirect_url": "/windows/deployment/windows-adk-scenarios-for-it-pros", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-deployment-scenarios-and-tools.md", + "redirect_url": "/windows/deployment/windows-deployment-scenarios-and-tools", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/windows-upgrade-and-migration-considerations.md", + "redirect_url": "/windows/deployment/upgrade/windows-upgrade-and-migration-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/xml-file-requirements.md", + "redirect_url": "/windows/deployment/usmt/xml-file-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/access-control.md", + "redirect_url": "/windows/access-protection/access-control/access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/access-credential-manager-as-a-trusted-caller.md", + "redirect_url": "/windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/access-this-computer-from-the-network.md", + "redirect_url": "/windows/device-security/security-policy-settings/access-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-lockout-duration.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-duration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-lockout-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-lockout-threshold.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/account-policies.md", + "redirect_url": "/windows/device-security/security-policy-settings/account-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-administrator-account-status.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-administrator-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-block-microsoft-accounts.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-guest-account-status.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-guest-account-status", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-rename-administrator-account.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/accounts-rename-guest-account.md", + "redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-guest-account", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/act-as-part-of-the-operating-system.md", + "redirect_url": "/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/active-directory-accounts.md", + "redirect_url": "/windows/access-protection/access-control/active-directory-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/active-directory-security-groups.md", + "redirect_url": "/windows/access-protection/access-control/active-directory-security-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-production-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md", + "redirect_url": "/windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-test-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/add-workstations-to-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/add-workstations-to-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/additional-mitigations.md", + "redirect_url": "/windows/access-protection/credential-guard/additional-mitigations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/adjust-memory-quotas-for-a-process.md", + "redirect_url": "/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/administer-applocker.md", + "redirect_url": "/windows/device-security/applocker/administer-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/administer-security-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/administer-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-security-auditing-faq.md", + "redirect_url": "/windows/device-security/auditing/advanced-security-auditing-faq", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/advanced-security-auditing.md", + "redirect_url": "/windows/device-security/auditing/advanced-security-auditing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/allow-log-on-locally.md", + "redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/allow-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/api-portal-mapping-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/app-behavior-with-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/app-behavior-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md", + "redirect_url": "/windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-architecture-and-components.md", + "redirect_url": "/windows/device-security/applocker/applocker-architecture-and-components", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-functions.md", + "redirect_url": "/windows/device-security/applocker/applocker-functions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-overview.md", + "redirect_url": "/windows/device-security/applocker/applocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-policies-deployment-guide.md", + "redirect_url": "/windows/device-security/applocker/applocker-policies-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-policies-design-guide.md", + "redirect_url": "/windows/device-security/applocker/applocker-policies-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-policy-use-scenarios.md", + "redirect_url": "/windows/device-security/applocker/applocker-policy-use-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-processes-and-interactions.md", + "redirect_url": "/windows/device-security/applocker/applocker-processes-and-interactions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-settings.md", + "redirect_url": "/windows/device-security/applocker/applocker-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/applocker-technical-reference.md", + "redirect_url": "/windows/device-security/applocker/applocker-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/apply-a-basic-audit-policy-on-a-file-or-folder.md", + "redirect_url": "/windows/device-security/auditing/apply-a-basic-audit-policy-on-a-file-or-folder", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md", + "redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-account-lockout.md", + "redirect_url": "/windows/device-security/auditing/audit-account-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-application-generated.md", + "redirect_url": "/windows/device-security/auditing/audit-application-generated", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-application-group-management.md", + "redirect_url": "/windows/device-security/auditing/audit-application-group-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-audit-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-audit-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-audit-the-access-of-global-system-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-audit-the-use-of-backup-and-restore-privilege.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-authentication-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-authentication-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-authorization-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-authorization-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-central-access-policy-staging.md", + "redirect_url": "/windows/device-security/auditing/audit-central-access-policy-staging", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-certification-services.md", + "redirect_url": "/windows/device-security/auditing/audit-certification-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-computer-account-management.md", + "redirect_url": "/windows/device-security/auditing/audit-computer-account-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-credential-validation.md", + "redirect_url": "/windows/device-security/auditing/audit-credential-validation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-detailed-directory-service-replication.md", + "redirect_url": "/windows/device-security/auditing/audit-detailed-directory-service-replication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-detailed-file-share.md", + "redirect_url": "/windows/device-security/auditing/audit-detailed-file-share", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-directory-service-access.md", + "redirect_url": "/windows/device-security/auditing/audit-directory-service-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-directory-service-changes.md", + "redirect_url": "/windows/device-security/auditing/audit-directory-service-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-directory-service-replication.md", + "redirect_url": "/windows/device-security/auditing/audit-directory-service-replication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-distribution-group-management.md", + "redirect_url": "/windows/device-security/auditing/audit-distribution-group-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-dpapi-activity.md", + "redirect_url": "/windows/device-security/auditing/audit-dpapi-activity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-file-share.md", + "redirect_url": "/windows/device-security/auditing/audit-file-share", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-file-system.md", + "redirect_url": "/windows/device-security/auditing/audit-file-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-filtering-platform-connection.md", + "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-connection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-filtering-platform-packet-drop.md", + "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-packet-drop", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-filtering-platform-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-force-audit-policy-subcategory-settings-to-override.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-group-membership.md", + "redirect_url": "/windows/device-security/auditing/audit-group-membership", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-handle-manipulation.md", + "redirect_url": "/windows/device-security/auditing/audit-handle-manipulation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-driver.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-driver", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-extended-mode.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-extended-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-main-mode.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-main-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-ipsec-quick-mode.md", + "redirect_url": "/windows/device-security/auditing/audit-ipsec-quick-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-kerberos-authentication-service.md", + "redirect_url": "/windows/device-security/auditing/audit-kerberos-authentication-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-kerberos-service-ticket-operations.md", + "redirect_url": "/windows/device-security/auditing/audit-kerberos-service-ticket-operations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-kernel-object.md", + "redirect_url": "/windows/device-security/auditing/audit-kernel-object", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-logoff.md", + "redirect_url": "/windows/device-security/auditing/audit-logoff", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-logon.md", + "redirect_url": "/windows/device-security/auditing/audit-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-mpssvc-rule-level-policy-change.md", + "redirect_url": "/windows/device-security/auditing/audit-mpssvc-rule-level-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-network-policy-server.md", + "redirect_url": "/windows/device-security/auditing/audit-network-policy-server", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-non-sensitive-privilege-use.md", + "redirect_url": "/windows/device-security/auditing/audit-non-sensitive-privilege-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-account-logon-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-account-logon-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-account-management-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-account-management-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-logonlogoff-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-logonlogoff-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-object-access-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-object-access-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-policy-change-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-policy-change-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-privilege-use-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-privilege-use-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-other-system-events.md", + "redirect_url": "/windows/device-security/auditing/audit-other-system-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-pnp-activity.md", + "redirect_url": "/windows/device-security/auditing/audit-pnp-activity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-process-creation.md", + "redirect_url": "/windows/device-security/auditing/audit-process-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-process-termination.md", + "redirect_url": "/windows/device-security/auditing/audit-process-termination", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-registry.md", + "redirect_url": "/windows/device-security/auditing/audit-registry", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-removable-storage.md", + "redirect_url": "/windows/device-security/auditing/audit-removable-storage", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-rpc-events.md", + "redirect_url": "/windows/device-security/auditing/audit-rpc-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-sam.md", + "redirect_url": "/windows/device-security/auditing/audit-sam", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-security-group-management.md", + "redirect_url": "/windows/device-security/auditing/audit-security-group-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-security-state-change.md", + "redirect_url": "/windows/device-security/auditing/audit-security-state-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-security-system-extension.md", + "redirect_url": "/windows/device-security/auditing/audit-security-system-extension", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-sensitive-privilege-use.md", + "redirect_url": "/windows/device-security/auditing/audit-sensitive-privilege-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", + "redirect_url": "/windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-special-logon.md", + "redirect_url": "/windows/device-security/auditing/audit-special-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-system-integrity.md", + "redirect_url": "/windows/device-security/auditing/audit-system-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-user-account-management.md", + "redirect_url": "/windows/device-security/auditing/audit-user-account-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/audit-user-device-claims.md", + "redirect_url": "/windows/device-security/auditing/audit-user-device-claims", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/back-up-files-and-directories.md", + "redirect_url": "/windows/device-security/security-policy-settings/back-up-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/backup-tpm-recovery-information-to-ad-ds.md", + "redirect_url": "/windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-account-logon-events.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-account-logon-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-account-management.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-account-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-directory-service-access.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-directory-service-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-logon-events.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-logon-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-object-access.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-object-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-policy-change.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-policy-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-privilege-use.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-privilege-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-process-tracking.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-process-tracking", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-audit-system-events.md", + "redirect_url": "/windows/device-security/auditing/basic-audit-system-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-firewall-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-security-audit-policies.md", + "redirect_url": "/windows/device-security/auditing/basic-security-audit-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/basic-security-audit-policy-settings.md", + "redirect_url": "/windows/device-security/auditing/basic-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bcd-settings-and-bitlocker.md", + "redirect_url": "/windows/device-security/bitlocker/bcd-settings-and-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-basic-deployment.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-basic-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-countermeasures.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-countermeasures", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-frequently-asked-questions.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-frequently-asked-questions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-group-policy-settings.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-how-to-deploy-on-windows-server.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-how-to-enable-network-unlock.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-overview.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-recovery-guide-plan.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-recovery-guide-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bitlocker-use-bitlocker-recovery-password-viewer.md", + "redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/block-untrusted-fonts-in-enterprise.md", + "redirect_url": "/windows/threat-protection/block-untrusted-fonts-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/boundary-zone-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/boundary-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/boundary-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/bypass-traverse-checking.md", + "redirect_url": "/windows/device-security/security-policy-settings/bypass-traverse-checking", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/certificate-based-isolation-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-rules-from-request-to-require-mode.md", + "redirect_url": "/windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-the-system-time.md", + "redirect_url": "/windows/device-security/security-policy-settings/change-the-system-time", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-the-time-zone.md", + "redirect_url": "/windows/device-security/security-policy-settings/change-the-time-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-the-tpm-owner-password.md", + "redirect_url": "/windows/device-security/tpm/change-the-tpm-owner-password", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/check-sensor-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-basic-firewall-settings.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-an-isolated-server-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-boundary-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-encryption-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-isolated-domain.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-group-policy-objects.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-group-policy-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-inbound-firewall-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-outbound-firewall-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-basic-firewall-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-domain-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/checklist-implementing-a-standalone-server-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/choose-the-right-bitlocker-countermeasure.md", + "redirect_url": "/windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-an-applocker-policy-for-audit-only.md", + "redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-audit-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-an-applocker-policy-for-enforce-rules.md", + "redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-authentication-methods.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-authentication-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-data-protection-quick-mode-settings.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-email-notifications-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-gp-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-endpoints-script-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md", + "redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-group-policy-to-autoenroll-and-deploy-certificates.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-key-exchange-main-mode-settings.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-s-mime.md", + "redirect_url": "/windows/access-protection/configure-s-mime", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-application-identity-service.md", + "redirect_url": "/windows/device-security/applocker/configure-the-application-identity-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-appLocker-reference-device.md", + "redirect_url": "/windows/device-security/applocker/configure-the-appLocker-reference-device", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-rules-to-require-encryption.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-windows-firewall-log.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-the-windows-firewall-log", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-the-workstation-authentication-certificate-template.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", + "redirect_url": "/windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/confirm-that-certificates-are-deployed-correctly.md", + "redirect_url": "/windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/copy-a-gpo-to-create-a-new-gpo.md", + "redirect_url": "/windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-basic-audit-policy-settings-for-an-event-category.md", + "redirect_url": "/windows/device-security/auditing/create-a-basic-audit-policy-settings-for-an-event-category", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-group-account-in-active-directory.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-a-group-account-in-active-directory", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-group-policy-object.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-a-group-policy-object", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-pagefile.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-a-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-for-packaged-apps.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-for-packaged-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-that-uses-a-file-hash-condition.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-that-uses-a-path-condition.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-path-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-rule-that-uses-a-publisher-condition.md", + "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-a-token-object.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-a-token-object", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-authentication-exemption-list-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-authentication-request-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-request-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-inbound-icmp-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-icmp-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-inbound-port-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-inbound-program-or-service-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-outbound-port-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-port-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-an-outbound-program-or-service-rule.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-and-verify-an-efs-dra-certificate.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-applocker-default-rules.md", + "redirect_url": "/windows/device-security/applocker/create-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-global-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-global-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-inbound-rules-to-support-rpc.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-list-of-applications-deployed-to-each-business-group.md", + "redirect_url": "/windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-permanent-shared-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-permanent-shared-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-symbolic-links.md", + "redirect_url": "/windows/device-security/security-policy-settings/create-symbolic-links", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-vpn-and-wip-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-wip-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-wip-policy-using-sccm.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-wmi-filters-for-the-gpo.md", + "redirect_url": "/windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-your-applocker-planning-document.md", + "redirect_url": "/windows/device-security/applocker/create-your-applocker-planning-document", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-your-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/create-your-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/create-your-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/create-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-considerations.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-how-it-works.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-manage.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-manage", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-not-protected-scenarios.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-not-protected-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-protection-limits.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-protection-limits", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-requirements.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard-scripts.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/credential-guard.md", + "redirect_url": "/windows/access-protection/credential-guard/credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/debug-programs.md", + "redirect_url": "/windows/device-security/security-policy-settings/debug-programs", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/delete-an-applocker-rule.md", + "redirect_url": "/windows/device-security/applocker/delete-an-applocker-rule", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-access-to-this-computer-from-the-network.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-as-a-batch-job.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-as-a-service.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-locally.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-locally", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deny-log-on-through-remote-desktop-services.md", + "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-applocker-policies-by-using-the-enforce-rules-setting.md", + "redirect_url": "/windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-catalog-files-to-support-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules.md", + "redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-code-integrity-policies-steps.md", + "redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-device-guard-deploy-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-device-guard-enable-virtualization-based-security.md", + "redirect_url": "/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-the-applocker-policy-into-production.md", + "redirect_url": "/windows/device-security/applocker/deploy-the-applocker-policy-into-production", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-wip-policy-using-intune.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/designing-a-windows-firewall-with-advanced-security-strategy.md", + "redirect_url": "/windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determine-group-policy-structure-and-rule-enforcement.md", + "redirect_url": "/windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determine-which-applications-are-digitally-signed-on-a-reference-computer.md", + "redirect_url": "/windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determine-your-application-control-objectives.md", + "redirect_url": "/windows/device-security/applocker/determine-your-application-control-objectives", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/determining-the-trusted-state-of-your-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/device-guard-deployment-guide.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-allow-undock-without-having-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-allowed-to-format-and-eject-removable-media.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-prevent-users-from-installing-printer-drivers.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", + "redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md", + "redirect_url": "/windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dll-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/dll-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-group-policy-structure-and-applocker-rule-enforcement.md", + "redirect_url": "/windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-your-application-control-management-processes.md", + "redirect_url": "/windows/device-security/applocker/document-your-application-control-management-processes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-your-application-list.md", + "redirect_url": "/windows/device-security/applocker/document-your-application-list", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/document-your-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/document-your-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/documenting-the-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/documenting-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-controller-allow-server-operators-to-schedule-tasks.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-controller-ldap-server-signing-requirements.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-controller-refuse-machine-account-password-changes.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-isolation-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-digitally-sign-secure-channel-data-when-possible.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-disable-machine-account-password-changes.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-maximum-machine-account-password-age.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/domain-member-require-strong-windows-2000-or-later-session-key.md", + "redirect_url": "/windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/dynamic-access-control.md", + "redirect_url": "/windows/access-protection/access-control/dynamic-access-control", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/edit-an-applocker-policy.md", + "redirect_url": "/windows/device-security/applocker/edit-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/edit-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/edit-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", + "redirect_url": "/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-predefined-inbound-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-inbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-predefined-outbound-rules.md", + "redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-outbound-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enable-the-dll-rule-collection.md", + "redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/encrypted-hard-drive.md", + "redirect_url": "/windows/device-security/encrypted-hard-drive", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/encryption-zone-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/encryption-zone-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/encryption-zone.md", + "redirect_url": "/windows/access-protection/windows-firewall/encryption-zone", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enforce-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/enforce-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enforce-password-history.md", + "redirect_url": "/windows/device-security/security-policy-settings/enforce-password-history", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enforce-user-logon-restrictions.md", + "redirect_url": "/windows/device-security/security-policy-settings/enforce-user-logon-restrictions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enlightened-microsoft-apps-and-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/enterprise-certificate-pinning.md", + "redirect_url": "/windows/access-protection/enterprise-certificate-pinning", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/evaluating-windows-firewall-with-advanced-security-design-examples.md", + "redirect_url": "/windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1100.md", + "redirect_url": "/windows/device-security/auditing/event-1100", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1102.md", + "redirect_url": "/windows/device-security/auditing/event-1102", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1104.md", + "redirect_url": "/windows/device-security/auditing/event-1104", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1105.md", + "redirect_url": "/windows/device-security/auditing/event-1105", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-1108.md", + "redirect_url": "/windows/device-security/auditing/event-1108", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4608.md", + "redirect_url": "/windows/device-security/auditing/event-4608", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4610.md", + "redirect_url": "/windows/device-security/auditing/event-4610", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4611.md", + "redirect_url": "/windows/device-security/auditing/event-4611", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4612.md", + "redirect_url": "/windows/device-security/auditing/event-4612", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4614.md", + "redirect_url": "/windows/device-security/auditing/event-4614", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4615.md", + "redirect_url": "/windows/device-security/auditing/event-4615", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4616.md", + "redirect_url": "/windows/device-security/auditing/event-4616", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4618.md", + "redirect_url": "/windows/device-security/auditing/event-4618", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4621.md", + "redirect_url": "/windows/device-security/auditing/event-4621", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4622.md", + "redirect_url": "/windows/device-security/auditing/event-4622", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4624.md", + "redirect_url": "/windows/device-security/auditing/event-4624", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4625.md", + "redirect_url": "/windows/device-security/auditing/event-4625", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4626.md", + "redirect_url": "/windows/device-security/auditing/event-4626", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4627.md", + "redirect_url": "/windows/device-security/auditing/event-4627", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4634.md", + "redirect_url": "/windows/device-security/auditing/event-4634", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4647.md", + "redirect_url": "/windows/device-security/auditing/event-4647", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4648.md", + "redirect_url": "/windows/device-security/auditing/event-4648", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4649.md", + "redirect_url": "/windows/device-security/auditing/event-4649", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4656.md", + "redirect_url": "/windows/device-security/auditing/event-4656", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4657.md", + "redirect_url": "/windows/device-security/auditing/event-4657", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4658.md", + "redirect_url": "/windows/device-security/auditing/event-4658", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4660.md", + "redirect_url": "/windows/device-security/auditing/event-4660", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4661.md", + "redirect_url": "/windows/device-security/auditing/event-4661", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4662.md", + "redirect_url": "/windows/device-security/auditing/event-4662", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4663.md", + "redirect_url": "/windows/device-security/auditing/event-4663", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4664.md", + "redirect_url": "/windows/device-security/auditing/event-4664", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4670.md", + "redirect_url": "/windows/device-security/auditing/event-4670", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4671.md", + "redirect_url": "/windows/device-security/auditing/event-4671", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4672.md", + "redirect_url": "/windows/device-security/auditing/event-4672", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4673.md", + "redirect_url": "/windows/device-security/auditing/event-4673", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4674.md", + "redirect_url": "/windows/device-security/auditing/event-4674", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4675.md", + "redirect_url": "/windows/device-security/auditing/event-4675", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4688.md", + "redirect_url": "/windows/device-security/auditing/event-4688", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4689.md", + "redirect_url": "/windows/device-security/auditing/event-4689", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4690.md", + "redirect_url": "/windows/device-security/auditing/event-4690", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4691.md", + "redirect_url": "/windows/device-security/auditing/event-4691", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4692.md", + "redirect_url": "/windows/device-security/auditing/event-4692", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4693.md", + "redirect_url": "/windows/device-security/auditing/event-4693", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4694.md", + "redirect_url": "/windows/device-security/auditing/event-4694", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4695.md", + "redirect_url": "/windows/device-security/auditing/event-4695", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4696.md", + "redirect_url": "/windows/device-security/auditing/event-4696", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4697.md", + "redirect_url": "/windows/device-security/auditing/event-4697", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4698.md", + "redirect_url": "/windows/device-security/auditing/event-4698", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4699.md", + "redirect_url": "/windows/device-security/auditing/event-4699", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4700.md", + "redirect_url": "/windows/device-security/auditing/event-4700", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4701.md", + "redirect_url": "/windows/device-security/auditing/event-4701", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4702.md", + "redirect_url": "/windows/device-security/auditing/event-4702", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4703.md", + "redirect_url": "/windows/device-security/auditing/event-4703", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4704.md", + "redirect_url": "/windows/device-security/auditing/event-4704", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4705.md", + "redirect_url": "/windows/device-security/auditing/event-4705", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4706.md", + "redirect_url": "/windows/device-security/auditing/event-4706", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4707.md", + "redirect_url": "/windows/device-security/auditing/event-4707", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4713.md", + "redirect_url": "/windows/device-security/auditing/event-4713", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4714.md", + "redirect_url": "/windows/device-security/auditing/event-4714", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4715.md", + "redirect_url": "/windows/device-security/auditing/event-4715", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4716.md", + "redirect_url": "/windows/device-security/auditing/event-4716", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4717.md", + "redirect_url": "/windows/device-security/auditing/event-4717", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4718.md", + "redirect_url": "/windows/device-security/auditing/event-4718", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4719.md", + "redirect_url": "/windows/device-security/auditing/event-4719", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4720.md", + "redirect_url": "/windows/device-security/auditing/event-4720", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4722.md", + "redirect_url": "/windows/device-security/auditing/event-4722", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4723.md", + "redirect_url": "/windows/device-security/auditing/event-4723", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4724.md", + "redirect_url": "/windows/device-security/auditing/event-4724", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4725.md", + "redirect_url": "/windows/device-security/auditing/event-4725", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4726.md", + "redirect_url": "/windows/device-security/auditing/event-4726", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4731.md", + "redirect_url": "/windows/device-security/auditing/event-4731", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4732.md", + "redirect_url": "/windows/device-security/auditing/event-4732", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4733.md", + "redirect_url": "/windows/device-security/auditing/event-4733", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4734.md", + "redirect_url": "/windows/device-security/auditing/event-4734", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4735.md", + "redirect_url": "/windows/device-security/auditing/event-4735", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4738.md", + "redirect_url": "/windows/device-security/auditing/event-4738", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4739.md", + "redirect_url": "/windows/device-security/auditing/event-4739", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4740.md", + "redirect_url": "/windows/device-security/auditing/event-4740", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4741.md", + "redirect_url": "/windows/device-security/auditing/event-4741", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4742.md", + "redirect_url": "/windows/device-security/auditing/event-4742", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4743.md", + "redirect_url": "/windows/device-security/auditing/event-4743", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4749.md", + "redirect_url": "/windows/device-security/auditing/event-4749", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4750.md", + "redirect_url": "/windows/device-security/auditing/event-4750", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4751.md", + "redirect_url": "/windows/device-security/auditing/event-4751", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4752.md", + "redirect_url": "/windows/device-security/auditing/event-4752", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4753.md", + "redirect_url": "/windows/device-security/auditing/event-4753", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4764.md", + "redirect_url": "/windows/device-security/auditing/event-4764", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4765.md", + "redirect_url": "/windows/device-security/auditing/event-4765", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4766.md", + "redirect_url": "/windows/device-security/auditing/event-4766", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4767.md", + "redirect_url": "/windows/device-security/auditing/event-4767", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4768.md", + "redirect_url": "/windows/device-security/auditing/event-4768", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4769.md", + "redirect_url": "/windows/device-security/auditing/event-4769", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4770.md", + "redirect_url": "/windows/device-security/auditing/event-4770", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4771.md", + "redirect_url": "/windows/device-security/auditing/event-4771", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4772.md", + "redirect_url": "/windows/device-security/auditing/event-4772", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4773.md", + "redirect_url": "/windows/device-security/auditing/event-4773", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4774.md", + "redirect_url": "/windows/device-security/auditing/event-4774", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4775.md", + "redirect_url": "/windows/device-security/auditing/event-4775", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4776.md", + "redirect_url": "/windows/device-security/auditing/event-4776", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4777.md", + "redirect_url": "/windows/device-security/auditing/event-4777", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4778.md", + "redirect_url": "/windows/device-security/auditing/event-4778", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4779.md", + "redirect_url": "/windows/device-security/auditing/event-4779", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4780.md", + "redirect_url": "/windows/device-security/auditing/event-4780", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4781.md", + "redirect_url": "/windows/device-security/auditing/event-4781", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4782.md", + "redirect_url": "/windows/device-security/auditing/event-4782", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4793.md", + "redirect_url": "/windows/device-security/auditing/event-4793", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4794.md", + "redirect_url": "/windows/device-security/auditing/event-4794", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4798.md", + "redirect_url": "/windows/device-security/auditing/event-4798", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4799.md", + "redirect_url": "/windows/device-security/auditing/event-4799", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4800.md", + "redirect_url": "/windows/device-security/auditing/event-4800", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4801.md", + "redirect_url": "/windows/device-security/auditing/event-4801", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4802.md", + "redirect_url": "/windows/device-security/auditing/event-4802", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4803.md", + "redirect_url": "/windows/device-security/auditing/event-4803", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4816.md", + "redirect_url": "/windows/device-security/auditing/event-4816", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4817.md", + "redirect_url": "/windows/device-security/auditing/event-4817", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4818.md", + "redirect_url": "/windows/device-security/auditing/event-4818", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4819.md", + "redirect_url": "/windows/device-security/auditing/event-4819", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4826.md", + "redirect_url": "/windows/device-security/auditing/event-4826", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4864.md", + "redirect_url": "/windows/device-security/auditing/event-4864", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4865.md", + "redirect_url": "/windows/device-security/auditing/event-4865", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4866.md", + "redirect_url": "/windows/device-security/auditing/event-4866", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4867.md", + "redirect_url": "/windows/device-security/auditing/event-4867", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4902.md", + "redirect_url": "/windows/device-security/auditing/event-4902", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4904.md", + "redirect_url": "/windows/device-security/auditing/event-4904", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4905.md", + "redirect_url": "/windows/device-security/auditing/event-4905", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4906.md", + "redirect_url": "/windows/device-security/auditing/event-4906", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4907.md", + "redirect_url": "/windows/device-security/auditing/event-4907", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4908.md", + "redirect_url": "/windows/device-security/auditing/event-4908", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4909.md", + "redirect_url": "/windows/device-security/auditing/event-4909", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4910.md", + "redirect_url": "/windows/device-security/auditing/event-4910", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4911.md", + "redirect_url": "/windows/device-security/auditing/event-4911", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4912.md", + "redirect_url": "/windows/device-security/auditing/event-4912", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4913.md", + "redirect_url": "/windows/device-security/auditing/event-4913", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4928.md", + "redirect_url": "/windows/device-security/auditing/event-4928", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4929.md", + "redirect_url": "/windows/device-security/auditing/event-4929", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4930.md", + "redirect_url": "/windows/device-security/auditing/event-4930", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4931.md", + "redirect_url": "/windows/device-security/auditing/event-4931", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4932.md", + "redirect_url": "/windows/device-security/auditing/event-4932", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4933.md", + "redirect_url": "/windows/device-security/auditing/event-4933", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4934.md", + "redirect_url": "/windows/device-security/auditing/event-4934", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4935.md", + "redirect_url": "/windows/device-security/auditing/event-4935", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4936.md", + "redirect_url": "/windows/device-security/auditing/event-4936", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4937.md", + "redirect_url": "/windows/device-security/auditing/event-4937", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4944.md", + "redirect_url": "/windows/device-security/auditing/event-4944", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4945.md", + "redirect_url": "/windows/device-security/auditing/event-4945", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4946.md", + "redirect_url": "/windows/device-security/auditing/event-4946", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4947.md", + "redirect_url": "/windows/device-security/auditing/event-4947", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4948.md", + "redirect_url": "/windows/device-security/auditing/event-4948", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4949.md", + "redirect_url": "/windows/device-security/auditing/event-4949", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4950.md", + "redirect_url": "/windows/device-security/auditing/event-4950", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4951.md", + "redirect_url": "/windows/device-security/auditing/event-4951", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4952.md", + "redirect_url": "/windows/device-security/auditing/event-4952", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4953.md", + "redirect_url": "/windows/device-security/auditing/event-4953", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4954.md", + "redirect_url": "/windows/device-security/auditing/event-4954", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4956.md", + "redirect_url": "/windows/device-security/auditing/event-4956", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4957.md", + "redirect_url": "/windows/device-security/auditing/event-4957", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4958.md", + "redirect_url": "/windows/device-security/auditing/event-4958", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4964.md", + "redirect_url": "/windows/device-security/auditing/event-4964", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-4985.md", + "redirect_url": "/windows/device-security/auditing/event-4985", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5024.md", + "redirect_url": "/windows/device-security/auditing/event-5024", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5025.md", + "redirect_url": "/windows/device-security/auditing/event-5025", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5027.md", + "redirect_url": "/windows/device-security/auditing/event-5027", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5028.md", + "redirect_url": "/windows/device-security/auditing/event-5028", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5029.md", + "redirect_url": "/windows/device-security/auditing/event-5029", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5030.md", + "redirect_url": "/windows/device-security/auditing/event-5030", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5031.md", + "redirect_url": "/windows/device-security/auditing/event-5031", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5032.md", + "redirect_url": "/windows/device-security/auditing/event-5032", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5033.md", + "redirect_url": "/windows/device-security/auditing/event-5033", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5034.md", + "redirect_url": "/windows/device-security/auditing/event-5034", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5035.md", + "redirect_url": "/windows/device-security/auditing/event-5035", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5037.md", + "redirect_url": "/windows/device-security/auditing/event-5037", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5038.md", + "redirect_url": "/windows/device-security/auditing/event-5038", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5039.md", + "redirect_url": "/windows/device-security/auditing/event-5039", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5051.md", + "redirect_url": "/windows/device-security/auditing/event-5051", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5056.md", + "redirect_url": "/windows/device-security/auditing/event-5056", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5057.md", + "redirect_url": "/windows/device-security/auditing/event-5057", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5058.md", + "redirect_url": "/windows/device-security/auditing/event-5058", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5059.md", + "redirect_url": "/windows/device-security/auditing/event-5059", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5060.md", + "redirect_url": "/windows/device-security/auditing/event-5060", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5061.md", + "redirect_url": "/windows/device-security/auditing/event-5061", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5062.md", + "redirect_url": "/windows/device-security/auditing/event-5062", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5063.md", + "redirect_url": "/windows/device-security/auditing/event-5063", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5064.md", + "redirect_url": "/windows/device-security/auditing/event-5064", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5065.md", + "redirect_url": "/windows/device-security/auditing/event-5065", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5066.md", + "redirect_url": "/windows/device-security/auditing/event-5066", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5067.md", + "redirect_url": "/windows/device-security/auditing/event-5067", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5068.md", + "redirect_url": "/windows/device-security/auditing/event-5068", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5069.md", + "redirect_url": "/windows/device-security/auditing/event-5069", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5070.md", + "redirect_url": "/windows/device-security/auditing/event-5070", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5136.md", + "redirect_url": "/windows/device-security/auditing/event-5136", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5137.md", + "redirect_url": "/windows/device-security/auditing/event-5137", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5138.md", + "redirect_url": "/windows/device-security/auditing/event-5138", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5139.md", + "redirect_url": "/windows/device-security/auditing/event-5139", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5140.md", + "redirect_url": "/windows/device-security/auditing/event-5140", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5141.md", + "redirect_url": "/windows/device-security/auditing/event-5141", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5142.md", + "redirect_url": "/windows/device-security/auditing/event-5142", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5143.md", + "redirect_url": "/windows/device-security/auditing/event-5143", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5144.md", + "redirect_url": "/windows/device-security/auditing/event-5144", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5145.md", + "redirect_url": "/windows/device-security/auditing/event-5145", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5148.md", + "redirect_url": "/windows/device-security/auditing/event-5148", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5149.md", + "redirect_url": "/windows/device-security/auditing/event-5149", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5150.md", + "redirect_url": "/windows/device-security/auditing/event-5150", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5151.md", + "redirect_url": "/windows/device-security/auditing/event-5151", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5152.md", + "redirect_url": "/windows/device-security/auditing/event-5152", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5153.md", + "redirect_url": "/windows/device-security/auditing/event-5153", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5154.md", + "redirect_url": "/windows/device-security/auditing/event-5154", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5155.md", + "redirect_url": "/windows/device-security/auditing/event-5155", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5156.md", + "redirect_url": "/windows/device-security/auditing/event-5156", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5157.md", + "redirect_url": "/windows/device-security/auditing/event-5157", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5158.md", + "redirect_url": "/windows/device-security/auditing/event-5158", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5159.md", + "redirect_url": "/windows/device-security/auditing/event-5159", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5168.md", + "redirect_url": "/windows/device-security/auditing/event-5168", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5376.md", + "redirect_url": "/windows/device-security/auditing/event-5376", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5377.md", + "redirect_url": "/windows/device-security/auditing/event-5377", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5378.md", + "redirect_url": "/windows/device-security/auditing/event-5378", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5447.md", + "redirect_url": "/windows/device-security/auditing/event-5447", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5632.md", + "redirect_url": "/windows/device-security/auditing/event-5632", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5633.md", + "redirect_url": "/windows/device-security/auditing/event-5633", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5712.md", + "redirect_url": "/windows/device-security/auditing/event-5712", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5888.md", + "redirect_url": "/windows/device-security/auditing/event-5888", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5889.md", + "redirect_url": "/windows/device-security/auditing/event-5889", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-5890.md", + "redirect_url": "/windows/device-security/auditing/event-5890", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6144.md", + "redirect_url": "/windows/device-security/auditing/event-6144", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6145.md", + "redirect_url": "/windows/device-security/auditing/event-6145", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6281.md", + "redirect_url": "/windows/device-security/auditing/event-6281", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6400.md", + "redirect_url": "/windows/device-security/auditing/event-6400", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6401.md", + "redirect_url": "/windows/device-security/auditing/event-6401", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6402.md", + "redirect_url": "/windows/device-security/auditing/event-6402", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6403.md", + "redirect_url": "/windows/device-security/auditing/event-6403", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6404.md", + "redirect_url": "/windows/device-security/auditing/event-6404", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6405.md", + "redirect_url": "/windows/device-security/auditing/event-6405", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6406.md", + "redirect_url": "/windows/device-security/auditing/event-6406", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6407.md", + "redirect_url": "/windows/device-security/auditing/event-6407", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6408.md", + "redirect_url": "/windows/device-security/auditing/event-6408", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6409.md", + "redirect_url": "/windows/device-security/auditing/event-6409", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6410.md", + "redirect_url": "/windows/device-security/auditing/event-6410", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6416.md", + "redirect_url": "/windows/device-security/auditing/event-6416", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6419.md", + "redirect_url": "/windows/device-security/auditing/event-6419", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6420.md", + "redirect_url": "/windows/device-security/auditing/event-6420", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6421.md", + "redirect_url": "/windows/device-security/auditing/event-6421", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6422.md", + "redirect_url": "/windows/device-security/auditing/event-6422", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6423.md", + "redirect_url": "/windows/device-security/auditing/event-6423", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-6424.md", + "redirect_url": "/windows/device-security/auditing/event-6424", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/executable-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/executable-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/exempt-icmp-from-authentication.md", + "redirect_url": "/windows/access-protection/windows-firewall/exempt-icmp-from-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/exemption-list.md", + "redirect_url": "/windows/access-protection/windows-firewall/exemption-list", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/export-an-applocker-policy-from-a-gpo.md", + "redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-from-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/export-an-applocker-policy-to-an-xml-file.md", + "redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/file-system-global-object-access-auditing.md", + "redirect_url": "/windows/device-security/auditing/file-system-global-object-access-auditing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/firewall-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/firewall-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/firewall-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/firewall-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/force-shutdown-from-a-remote-system.md", + "redirect_url": "/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-information-about-your-active-directory-deployment.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-information-about-your-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-other-relevant-information.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-other-relevant-information", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gathering-the-information-you-need.md", + "redirect_url": "/windows/access-protection/windows-firewall/gathering-the-information-you-need", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/general-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/generate-security-audits.md", + "redirect_url": "/windows/device-security/security-policy-settings/generate-security-audits", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-boundary.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-boundary", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-encryption.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-firewall.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-isolateddomain-clients.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/gpo-domiso-isolateddomain-servers.md", + "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/guidance-and-best-practices-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-and-password-changes.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-biometrics-in-enterprise.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-errors-during-pin-creation.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-event-300.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-how-it-works.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-how-it-works", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-identity-verification.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-manage-in-organization.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-prepare-people-to-use.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/hello-why-pin-is-better-than-password.md", + "redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-applocker-works-techref.md", + "redirect_url": "/windows/device-security/applocker/how-applocker-works-techref", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-to-configure-security-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/how-to-configure-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", + "redirect_url": "/windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/how-user-account-control-works.md", + "redirect_url": "/windows/access-protection/user-account-control/how-user-account-control-works", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", + "redirect_url": "/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/impersonate-a-client-after-authentication.md", + "redirect_url": "/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md", + "redirect_url": "/windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/import-an-applocker-policy-from-another-computer.md", + "redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-from-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/import-an-applocker-policy-into-a-gpo.md", + "redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-into-a-gpo", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/increase-a-process-working-set.md", + "redirect_url": "/windows/device-security/security-policy-settings/increase-a-process-working-set", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/increase-scheduling-priority.md", + "redirect_url": "/windows/device-security/security-policy-settings/increase-scheduling-priority", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/initialize-and-configure-ownership-of-the-tpm.md", + "redirect_url": "/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/installing-digital-certificates-on-windows-10-mobile.md", + "redirect_url": "/windows/access-protection/installing-digital-certificates-on-windows-10-mobile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-do-not-display-last-user-name.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-dont-display-username-at-sign-in.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-machine-inactivity-limit.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-require-smart-card.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-smart-card", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/interactive-logon-smart-card-removal-behavior.md", + "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/investigate-user-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/isolated-domain-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/isolated-domain-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/isolated-domain.md", + "redirect_url": "/windows/access-protection/windows-firewall/isolated-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/isolating-apps-on-your-network.md", + "redirect_url": "/windows/access-protection/windows-firewall/isolating-apps-on-your-network", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/kerberos-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/kerberos-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/limitations-with-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/limitations-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/link-the-gpo-to-the-domain.md", + "redirect_url": "/windows/access-protection/windows-firewall/link-the-gpo-to-the-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/load-and-unload-device-drivers.md", + "redirect_url": "/windows/device-security/security-policy-settings/load-and-unload-device-drivers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/local-accounts.md", + "redirect_url": "/windows/access-protection/access-control/local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/lock-pages-in-memory.md", + "redirect_url": "/windows/device-security/security-policy-settings/lock-pages-in-memory", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/log-on-as-a-batch-job.md", + "redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-batch-job", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/log-on-as-a-service.md", + "redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/machines-view-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maintain-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-auditing-and-security-log.md", + "redirect_url": "/windows/device-security/security-policy-settings/manage-auditing-and-security-log", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-packaged-apps-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/manage-packaged-apps-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-tpm-commands.md", + "redirect_url": "/windows/device-security/tpm/manage-tpm-commands", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-tpm-lockout.md", + "redirect_url": "/windows/device-security/tpm/manage-tpm-lockout", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/mandatory-settings-for-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/mandatory-settings-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-lifetime-for-service-ticket.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket-renewal.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-password-age.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/maximum-tolerance-for-computer-clock-synchronization.md", + "redirect_url": "/windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/merge-applocker-policies-by-using-set-applockerpolicy.md", + "redirect_url": "/windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/merge-applocker-policies-manually.md", + "redirect_url": "/windows/device-security/applocker/merge-applocker-policies-manually", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-accounts.md", + "redirect_url": "/windows/access-protection/access-control/microsoft-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-always.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-if-server-agrees.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-always.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-if-client-agrees.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/microsoft-network-server-server-spn-target-name-validation-level.md", + "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/minimum-password-age.md", + "redirect_url": "/windows/device-security/security-policy-settings/minimum-password-age", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/minimum-password-length.md", + "redirect_url": "/windows/device-security/security-policy-settings/minimum-password-length", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/modify-an-object-label.md", + "redirect_url": "/windows/device-security/security-policy-settings/modify-an-object-label", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/modify-firmware-environment-values.md", + "redirect_url": "/windows/device-security/security-policy-settings/modify-firmware-environment-values", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", + "redirect_url": "/windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-application-usage-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/monitor-application-usage-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-central-access-policy-and-rule-definitions.md", + "redirect_url": "/windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-claim-types.md", + "redirect_url": "/windows/device-security/auditing/monitor-claim-types", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-resource-attribute-definitions.md", + "redirect_url": "/windows/device-security/auditing/monitor-resource-attribute-definitions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-central-access-policies-associated-with-files-and-folders.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-associated-with-files-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-central-access-policies-that-apply-on-a-file-server.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-resource-attributes-on-files-and-folders.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-resource-attributes-on-files-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-the-use-of-removable-storage-devices.md", + "redirect_url": "/windows/device-security/auditing/monitor-the-use-of-removable-storage-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/monitor-user-and-device-claims-during-sign-in.md", + "redirect_url": "/windows/device-security/auditing/monitor-user-and-device-claims-during-sign-in", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-allow-anonymous-sidname-translation.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-let-everyone-permissions-apply-to-anonymous-users.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-named-pipes-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths-and-subpaths.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-shares-that-can-be-accessed-anonymously.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-access-sharing-and-security-model-for-local-accounts.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-list-manager-policies.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-list-manager-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-allow-localsystem-null-session-fallback.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-configure-encryption-types-allowed-for-kerberos.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-force-logoff-when-logon-hours-expire.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-lan-manager-authentication-level.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-ldap-client-signing-requirements.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-incoming-ntlm-traffic.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", + "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/open-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/optimize-applocker-performance.md", + "redirect_url": "/windows/device-security/applocker/optimize-applocker-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", + "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/other-events.md", + "redirect_url": "/windows/device-security/auditing/other-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/override-mitigation-options-for-app-related-security-policies.md", + "redirect_url": "/windows/threat-protection/override-mitigation-options-for-app-related-security-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/overview-create-wip-policy.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md", + "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/packaged-apps-and-packaged-app-installer-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/password-must-meet-complexity-requirements.md", + "redirect_url": "/windows/device-security/security-policy-settings/password-must-meet-complexity-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/password-policy.md", + "redirect_url": "/windows/device-security/security-policy-settings/password-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/perform-volume-maintenance-tasks.md", + "redirect_url": "/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/plan-for-applocker-policy-management.md", + "redirect_url": "/windows/device-security/applocker/plan-for-applocker-policy-management", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md", + "redirect_url": "/windows/device-security/auditing/planning-and-deploying-advanced-security-audit-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-and-getting-started-on-the-device-guard-deployment-process.md", + "redirect_url": "/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-certificate-based-authentication.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-certificate-based-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-domain-isolation-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-domain-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-gpo-deployment.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-gpo-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-isolation-groups-for-the-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-network-access-groups.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-network-access-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-server-isolation-zones.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-server-isolation-zones", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-the-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-the-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md", + "redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/preview-settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/preview-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/procedures-used-in-this-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/procedures-used-in-this-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/profile-single-process.md", + "redirect_url": "/windows/device-security/security-policy-settings/profile-single-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/profile-system-performance.md", + "redirect_url": "/windows/device-security/security-policy-settings/profile-system-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md", + "redirect_url": "/windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-devices-from-unwanted-network-traffic.md", + "redirect_url": "/windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-enterprise-data-using-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md", + "redirect_url": "/windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md", + "redirect_url": "/windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/recommended-network-definitions-for-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/recovery-console-allow-automatic-administrative-logon.md", + "redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", + "redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/refresh-an-applocker-policy.md", + "redirect_url": "/windows/device-security/applocker/refresh-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/registry-global-object-access-auditing.md", + "redirect_url": "/windows/device-security/auditing/registry-global-object-access-auditing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/remote-credential-guard.md", + "redirect_url": "/windows/access-protection/remote-credential-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/remove-computer-from-docking-station.md", + "redirect_url": "/windows/device-security/security-policy-settings/remove-computer-from-docking-station", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/replace-a-process-level-token.md", + "redirect_url": "/windows/device-security/security-policy-settings/replace-a-process-level-token", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md", + "redirect_url": "/windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/requirements-and-deployment-planning-guidelines-for-device-guard.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/requirements-to-use-applocker.md", + "redirect_url": "/windows/device-security/applocker/requirements-to-use-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/reset-account-lockout-counter-after.md", + "redirect_url": "/windows/device-security/security-policy-settings/reset-account-lockout-counter-after", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/respond-file-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/respond-machine-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restore-files-and-directories.md", + "redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restrict-access-to-only-trusted-devices.md", + "redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md", + "redirect_url": "/windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/run-the-automatically-generate-rules-wizard.md", + "redirect_url": "/windows/device-security/applocker/run-the-automatically-generate-rules-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/script-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/script-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/secpol-advanced-security-audit-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md", + "redirect_url": "/windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-auditing-overview.md", + "redirect_url": "/windows/device-security/auditing/security-auditing-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-considerations-for-applocker.md", + "redirect_url": "/windows/device-security/applocker/security-considerations-for-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-identifiers.md", + "redirect_url": "/windows/access-protection/access-control/security-identifiers", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-options.md", + "redirect_url": "/windows/device-security/security-policy-settings/security-options", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-policy-settings-reference.md", + "redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-policy-settings.md", + "redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-principals.md", + "redirect_url": "/windows/access-protection/access-control/security-principals", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/select-types-of-rules-to-create.md", + "redirect_url": "/windows/device-security/applocker/select-types-of-rules-to-create", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/server-isolation-gpos.md", + "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-gpos", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/server-isolation-policy-design-example.md", + "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design-example", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/server-isolation-policy-design.md", + "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/service-accounts.md", + "redirect_url": "/windows/access-protection/access-control/service-accounts", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/service-status-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/settings-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/shut-down-the-system.md", + "redirect_url": "/windows/device-security/security-policy-settings/shut-down-the-system", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", + "redirect_url": "/windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/shutdown-clear-virtual-memory-pagefile.md", + "redirect_url": "/windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-and-remote-desktop-services.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-and-remote-desktop-services", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-architecture.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-certificate-propagation-service.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-propagation-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-certificate-requirements-and-enumeration.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-debugging-information.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-debugging-information", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-events.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-events", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-group-policy-and-registry-settings.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-how-smart-card-sign-in-works-in-windows.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-removal-policy-service.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-removal-policy-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-smart-cards-for-windows-service.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-tools-and-settings.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-tools-and-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/smart-card-windows-smart-card-technical-reference.md", + "redirect_url": "/windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/special-identities.md", + "redirect_url": "/windows/access-protection/access-control/special-identities", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/store-passwords-using-reversible-encryption.md", + "redirect_url": "/windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/switch-pcr-banks-on-tpm-2-0-devices.md", + "redirect_url": "/windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/synchronize-directory-service-data.md", + "redirect_url": "/windows/device-security/security-policy-settings/synchronize-directory-service-data", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-objects-strengthen-default-permissions-of-internal-system-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-settings-optional-subsystems.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-settings-optional-subsystems", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", + "redirect_url": "/windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/take-ownership-of-files-or-other-objects.md", + "redirect_url": "/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/test-an-applocker-policy-by-using-test-applockerpolicy.md", + "redirect_url": "/windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/test-and-update-an-applocker-policy.md", + "redirect_url": "/windows/device-security/applocker/test-and-update-an-applocker-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/testing-scenarios-for-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/tools-to-use-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/tools-to-use-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/tpm-fundamentals.md", + "redirect_url": "/windows/device-security/tpm/tpm-fundamentals", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/tpm-recommendations.md", + "redirect_url": "/windows/device-security/tpm/tpm-recommendations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/troubleshoot-siem-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/trusted-platform-module-overview.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/trusted-platform-module-services-group-policy-settings.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/trusted-platform-module-top-node.md", + "redirect_url": "/windows/device-security/tpm/trusted-platform-module-top-node", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md", + "redirect_url": "/windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/types-of-attacks-for-volume-encryption-keys.md", + "redirect_url": "/windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-applocker-enforcement-settings.md", + "redirect_url": "/windows/device-security/applocker/understand-applocker-enforcement-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-applocker-policy-design-decisions.md", + "redirect_url": "/windows/device-security/applocker/understand-applocker-policy-design-decisions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md", + "redirect_url": "/windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understand-the-applocker-policy-deployment-process.md", + "redirect_url": "/windows/device-security/applocker/understand-the-applocker-policy-deployment-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-allow-and-deny-actions-on-rules.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-default-rules.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-default-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-behavior.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-behavior", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-collections.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-collections", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-condition-types.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-condition-types", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-applocker-rule-exceptions.md", + "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-exceptions", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-file-hash-rule-condition-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-path-rule-condition-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-publisher-rule-condition-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md", + "redirect_url": "/windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-a-reference-computer-to-create-and-maintain-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain.md", + "redirect_url": "/windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-the-applocker-windows-powershell-cmdlets.md", + "redirect_url": "/windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", + "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-detect-application-installations-and-prompt-for-elevation.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-group-policy-and-registry-key-settings.md", + "redirect_url": "/windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-overview.md", + "redirect_url": "/windows/access-protection/user-account-control/user-account-control-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-run-all-administrators-in-admin-approval-mode.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-security-policy-settings.md", + "redirect_url": "/windows/access-protection/user-account-control/user-account-control-security-policy-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/user-rights-assignment.md", + "redirect_url": "/windows/device-security/security-policy-settings/user-rights-assignment", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md", + "redirect_url": "/windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-event-viewer-with-applocker.md", + "redirect_url": "/windows/device-security/applocker/using-event-viewer-with-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-owa-with-wip.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/using-owa-with-wip", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/using-software-restriction-policies-and-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/verify-that-network-traffic-is-authenticated.md", + "redirect_url": "/windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/view-the-security-event-log.md", + "redirect_url": "/windows/device-security/auditing/view-the-security-event-log", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-deploy-virtual-smart-cards.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-evaluate-security.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-get-started.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-overview.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-tpmvscmgr.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-understanding-and-evaluating.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/virtual-smart-card-use-virtual-smart-cards.md", + "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-authentication.md", + "redirect_url": "/windows/access-protection/vpn/vpn-authentication", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-auto-trigger-profile.md", + "redirect_url": "/windows/access-protection/vpn/vpn-auto-trigger-profile", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-conditional-access.md", + "redirect_url": "/windows/access-protection/vpn/vpn-conditional-access", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-connection-type.md", + "redirect_url": "/windows/access-protection/vpn/vpn-connection-type", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-guide.md", + "redirect_url": "/windows/access-protection/vpn/vpn-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-name-resolution.md", + "redirect_url": "/windows/access-protection/vpn/vpn-name-resolution", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-profile-options.md", + "redirect_url": "/windows/access-protection/vpn/vpn-profile-options", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-routing.md", + "redirect_url": "/windows/access-protection/vpn/vpn-routing", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/vpn-security-features.md", + "redirect_url": "/windows/access-protection/vpn/vpn-security-features", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/what-is-applocker.md", + "redirect_url": "/windows/device-security/applocker/what-is-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/which-editions-of-windows-support-advanced-audit-policy-configuration.md", + "redirect_url": "/windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-10-mobile-security-guide.md", + "redirect_url": "/windows/device-security/windows-10-mobile-security-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-credential-theft-mitigation-guide-abstract.md", + "redirect_url": "/windows/access-protection/windows-credential-theft-mitigation-guide-abstract", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-offline.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-offline", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", + "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md", + "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-smartscreen-overview.md", + "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md", + "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-installer-rules-in-applocker.md", + "redirect_url": "/windows/device-security/applocker/windows-installer-rules-in-applocker", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-security-baselines.md", + "redirect_url": "/windows/device-security/windows-security-baselines", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/wip-app-enterprise-context.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/wip-app-enterprise-context", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/working-with-applocker-policies.md", + "redirect_url": "/windows/device-security/applocker/working-with-applocker-policies", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/working-with-applocker-rules.md", + "redirect_url": "/windows/device-security/applocker/working-with-applocker-rules", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/acquire-apps-windows-store-for-business.md", + "redirect_url": "/microsoft-store/acquire-apps-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/acquire-apps-windows-store-for-business.md", + "redirect_url": "/microsoft-store/acquire-apps-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/add-unsigned-app-to-code-integrity-policy.md", + "redirect_url": "/microsoft-store/add-unsigned-app-to-code-integrity-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/administrative-tools-in-windows-10.md", + "redirect_url": "/windows/client-management/administrative-tools-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/app-inventory-management-windows-store-for-business.md", + "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/apps-in-windows-store-for-business.md", + "redirect_url": "/microsoft-store/apps-in-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/apps-in-windows-store-for-business.md", + "redirect_url": "/microsoft-store/apps-in-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-about-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-about-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-add-or-remove-an-administrator-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-add-or-remove-an-administrator-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-add-or-upgrade-packages-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-add-or-upgrade-packages-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-administering-appv-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-administering-appv-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-administering-virtual-applications-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-administering-virtual-applications-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-allow-administrators-to-enable-connection-groups.md", + "redirect_url": "/windows/application-management/app-v/appv-allow-administrators-to-enable-connection-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-application-publishing-and-client-interaction.md", + "redirect_url": "/windows/application-management/app-v/appv-application-publishing-and-client-interaction", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-apply-the-deployment-configuration-file-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-apply-the-user-configuration-file-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-batch-sequencing.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-batch-sequencing", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-batch-updating.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-batch-updating", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-clean-unpublished-packages.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-clean-unpublished-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-auto-provision-a-vm.md", + "redirect_url": "/windows/application-management/app-v/appv-auto-provision-a-vm", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-available-mdm-settings.md", + "redirect_url": "/windows/application-management/app-v/appv-available-mdm-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-capacity-planning.md", + "redirect_url": "/windows/application-management/app-v/appv-capacity-planning", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-client-configuration-settings.md", + "redirect_url": "/windows/application-management/app-v/appv-client-configuration-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-configure-access-to-packages-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-configure-access-to-packages-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-configure-connection-groups-to-ignore-the-package-version.md", + "redirect_url": "/windows/application-management/app-v/appv-configure-connection-groups-to-ignore-the-package-version", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md", + "redirect_url": "/windows/application-management/app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-connect-to-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-connect-to-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-connection-group-file.md", + "redirect_url": "/windows/application-management/app-v/appv-connection-group-file", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-connection-group-virtual-environment.md", + "redirect_url": "/windows/application-management/app-v/appv-connection-group-virtual-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-convert-a-package-created-in-a-previous-version-of-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-connection-group.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-custom-configuration-file-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-package-accelerator-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-package-accelerator.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-a-virtual-application-package-package-accelerator.md", + "redirect_url": "/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-create-and-use-a-project-template.md", + "redirect_url": "/windows/application-management/app-v/appv-create-and-use-a-project-template", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-creating-and-managing-virtualized-applications.md", + "redirect_url": "/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-customize-virtual-application-extensions-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-delete-a-connection-group.md", + "redirect_url": "/windows/application-management/app-v/appv-delete-a-connection-group", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-delete-a-package-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-delete-a-package-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-appv-databases-with-sql-scripts.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-the-appv-server-with-a-script.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploy-the-appv-server.md", + "redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-microsoft-office-2010-wth-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-microsoft-office-2013-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-microsoft-office-2016-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-packages-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-the-appv-sequencer-and-client.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deploying-the-appv-server.md", + "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-server", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-deployment-checklist.md", + "redirect_url": "/windows/application-management/app-v/appv-deployment-checklist", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-dynamic-configuration.md", + "redirect_url": "/windows/application-management/app-v/appv-dynamic-configuration", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-enable-reporting-on-the-appv-client-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-enable-the-app-v-desktop-client.md", + "redirect_url": "/windows/application-management/app-v/appv-enable-the-app-v-desktop-client", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-evaluating-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-evaluating-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-for-windows.md", + "redirect_url": "/windows/application-management/app-v/appv-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-getting-started.md", + "redirect_url": "/windows/application-management/app-v/appv-getting-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-high-level-architecture.md", + "redirect_url": "/windows/application-management/app-v/appv-high-level-architecture", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-management-and-reporting-databases-on-separate-computers.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-management-server-on-a-standalone-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-publishing-server-on-a-remote-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-reporting-server-on-a-standalone-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-install-the-sequencer.md", + "redirect_url": "/windows/application-management/app-v/appv-install-the-sequencer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md", + "redirect_url": "/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-maintaining-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-maintaining-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-managing-connection-groups.md", + "redirect_url": "/windows/application-management/app-v/appv-managing-connection-groups", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-migrating-to-appv-from-a-previous-version.md", + "redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-modify-an-existing-virtual-application-package.md", + "redirect_url": "/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-modify-client-configuration-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-modify-client-configuration-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-move-the-appv-server-to-another-computer.md", + "redirect_url": "/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-operations.md", + "redirect_url": "/windows/application-management/app-v/appv-operations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-performance-guidance.md", + "redirect_url": "/windows/application-management/app-v/appv-performance-guidance", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-checklist.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-checklist", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-folder-redirection-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-folder-redirection-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-appv-server-deployment.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-appv-server-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-high-availability-with-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-high-availability-with-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-sequencer-and-client-deployment.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-for-using-appv-with-office.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-for-using-appv-with-office", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-planning-to-deploy-appv.md", + "redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-preparing-your-environment.md", + "redirect_url": "/windows/application-management/app-v/appv-preparing-your-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-prerequisites.md", + "redirect_url": "/windows/application-management/app-v/appv-prerequisites", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-publish-a-connection-group.md", + "redirect_url": "/windows/application-management/app-v/appv-publish-a-connection-group", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-publish-a-packages-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-register-and-unregister-a-publishing-server-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-release-notes-for-appv-for-windows-1703.md", + "redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-release-notes-for-appv-for-windows.md", + "redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-reporting.md", + "redirect_url": "/windows/application-management/app-v/appv-reporting", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-running-locally-installed-applications-inside-a-virtual-environment.md", + "redirect_url": "/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-security-considerations.md", + "redirect_url": "/windows/application-management/app-v/appv-security-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-sequence-a-new-application.md", + "redirect_url": "/windows/application-management/app-v/appv-sequence-a-new-application", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-sequence-a-package-with-powershell.md", + "redirect_url": "/windows/application-management/app-v/appv-sequence-a-package-with-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-supported-configurations.md", + "redirect_url": "/windows/application-management/app-v/appv-supported-configurations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-technical-reference.md", + "redirect_url": "/windows/application-management/app-v/appv-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-troubleshooting.md", + "redirect_url": "/windows/application-management/app-v/appv-troubleshooting", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md", + "redirect_url": "/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-using-the-client-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md", + "redirect_url": "/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/appv-viewing-appv-server-publishing-metadata.md", + "redirect_url": "/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/assign-apps-to-employees.md", + "redirect_url": "/microsoft-store/assign-apps-to-employees", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/configure-mdm-provider-windows-store-for-business.md", + "redirect_url": "/microsoft-store/configure-mdm-provider-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/configure-mdm-provider-windows-store-for-business.md", + "redirect_url": "/microsoft-store/configure-mdm-provider-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/connect-to-remote-aadj-pc.md", + "redirect_url": "/windows/client-management/connect-to-remote-aadj-pc", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/device-guard-signing-portal.md", + "redirect_url": "/microsoft-store/device-guard-signing-portal", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-apps-from-your-private-store.md", + "redirect_url": "/microsoft-store/distribute-apps-from-your-private-store", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md", + "redirect_url": "/microsoft-store/distribute-apps-to-your-employees-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/distribute-apps-to-your-employees-windows-store-for-business.md", + "redirect_url": "/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-apps-with-management-tool.md", + "redirect_url": "/microsoft-store/distribute-apps-with-management-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/distribute-offline-apps.md", + "redirect_url": "/microsoft-store/distribute-offline-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/find-and-acquire-apps-overview.md", + "redirect_url": "/microsoft-store/find-and-acquire-apps-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/group-policies-for-enterprise-and-education-editions.md", + "redirect_url": "/windows/client-management/group-policies-for-enterprise-and-education-editions", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/join-windows-10-mobile-to-azure-active-directory.md", + "redirect_url": "/windows/client-management/join-windows-10-mobile-to-azure-active-directory", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-access-to-private-store.md", + "redirect_url": "/microsoft-store/manage-access-to-private-store", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-apps-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/manage-apps-windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-apps-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/manage-apps-microsoft-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-corporate-devices.md", + "redirect_url": "/windows/client-management/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-orders-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-orders-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-orders-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-orders-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-private-store-settings.md", + "redirect_url": "/microsoft-store/manage-private-store-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-settings-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-settings-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-settings-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-settings-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-users-and-groups-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-users-and-groups-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/manage-users-and-groups-windows-store-for-business.md", + "redirect_url": "/microsoft-store/manage-users-and-groups-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-windows-10-in-your-organization-modern-management.md", + "redirect_url": "/windows/client-management/manage-windows-10-in-your-organization-modern-management", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/mandatory-user-profile.md", + "redirect_url": "/windows/client-management/mandatory-user-profile", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/new-policies-for-windows-10.md", + "redirect_url": "/windows/client-management/new-policies-for-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/prerequisites-windows-store-for-business.md", + "redirect_url": "/microsoft-store/prerequisites-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/prerequisites-windows-store-for-business.md", + "redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/reset-a-windows-10-mobile-device.md", + "redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/roles-and-permissions-windows-store-for-business.md", + "redirect_url": "/microsoft-store/roles-and-permissions-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/roles-and-permissions-windows-store-for-business.md", + "redirect_url": "/microsoft-store/roles-and-permissions-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/settings-reference-windows-store-for-business.md", + "redirect_url": "/microsoft-store/settings-reference-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/settings-reference-windows-store-for-business.md", + "redirect_url": "/microsoft-store/settings-reference-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/sign-code-integrity-policy-with-device-guard-signing.md", + "redirect_url": "/microsoft-store/sign-code-integrity-policy-with-device-guard-signing", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/sign-up-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/sign-up-windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/sign-up-windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/sign-up-windows-store-for-business.md", + "redirect_url": "/microsoft-store/sign-up-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/sign-up-windows-store-for-business.md", + "redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/troubleshoot-windows-store-for-business.md", + "redirect_url": "/microsoft-store/troubleshoot-windows-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/troubleshoot-windows-store-for-business.md", + "redirect_url": "/microsoft-store/troubleshoot-microsoft-store-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md", + "redirect_url": "/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-administering-uev.md", + "redirect_url": "/windows/configuration/ue-v/uev-administering-uev", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-application-template-schema-reference.md", + "redirect_url": "/windows/configuration/ue-v/uev-application-template-schema-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md", + "redirect_url": "/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-configuring-uev-with-group-policy-objects.md", + "redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md", + "redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-system-center-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-deploy-required-features.md", + "redirect_url": "/windows/configuration/ue-v/uev-deploy-required-features", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-deploy-uev-for-custom-applications.md", + "redirect_url": "/windows/configuration/ue-v/uev-deploy-uev-for-custom-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-for-windows.md", + "redirect_url": "/windows/configuration/ue-v/uev-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-getting-started.md", + "redirect_url": "/windows/configuration/ue-v/uev-getting-started", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-manage-administrative-backup-and-restore.md", + "redirect_url": "/windows/configuration/ue-v/uev-manage-administrative-backup-and-restore", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-manage-configurations.md", + "redirect_url": "/windows/configuration/ue-v/uev-manage-configurations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md", + "redirect_url": "/windows/configuration/ue-v/uev-managing-settings-location-templates-using-windows-powershell-and-wmi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md", + "redirect_url": "/windows/configuration/ue-v/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-migrating-settings-packages.md", + "redirect_url": "/windows/configuration/ue-v/uev-migrating-settings-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-prepare-for-deployment.md", + "redirect_url": "/windows/configuration/ue-v/uev-prepare-for-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-release-notes-1607.md", + "redirect_url": "/windows/configuration/ue-v/uev-release-notes-1607", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-security-considerations.md", + "redirect_url": "/windows/configuration/ue-v/uev-security-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-sync-methods.md", + "redirect_url": "/windows/configuration/ue-v/uev-sync-methods", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-sync-trigger-events.md", + "redirect_url": "/windows/configuration/ue-v/uev-sync-trigger-events", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-synchronizing-microsoft-office-with-uev.md", + "redirect_url": "/windows/configuration/ue-v/uev-synchronizing-microsoft-office-with-uev", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-technical-reference.md", + "redirect_url": "/windows/configuration/ue-v/uev-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-troubleshooting.md", + "redirect_url": "/windows/configuration/ue-v/uev-troubleshooting", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-upgrade-uev-from-previous-releases.md", + "redirect_url": "/windows/configuration/ue-v/uev-upgrade-uev-from-previous-releases", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-using-uev-with-application-virtualization-applications.md", + "redirect_url": "/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-whats-new-in-uev-for-windows.md", + "redirect_url": "/windows/configuration/ue-v/uev-whats-new-in-uev-for-windows", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md", + "redirect_url": "/windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/update-windows-store-for-business-account-settings.md", + "redirect_url": "/microsoft-store/update-windows-store-for-business-account-settings", + "redirect_document_id": true + }, + { + "source_path": "store-for-business/update-windows-store-for-business-account-settings.md", + "redirect_url": "/microsoft-store/update-microsoft-store-for-business-account-settings", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-10-mobile-and-mdm.md", + "redirect_url": "/windows/client-management/windows-10-mobile-and-mdm", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-libraries.md", + "redirect_url": "/windows/client-management/windows-libraries", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-store-for-business-overview.md", + "redirect_url": "/microsoft-store/windows-store-for-business-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/working-with-line-of-business-apps.md", + "redirect_url": "/microsoft-store/working-with-line-of-business-apps", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/act-technical-reference.md", + "redirect_url": "/windows/deployment/planning/act-technical-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/applying-filters-to-data-in-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/applying-filters-to-data-in-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/available-data-types-and-operators-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/available-data-types-and-operators-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/best-practice-recommendations-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/best-practice-recommendations-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/change-history-for-plan-for-windows-10-deployment.md", + "redirect_url": "/windows/deployment/planning/change-history-for-plan-for-windows-10-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/compatibility-administrator-users-guide.md", + "redirect_url": "/windows/deployment/planning/compatibility-administrator-users-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/compatibility-fix-database-management-strategies-and-deployment.md", + "redirect_url": "/windows/deployment/planning/compatibility-fix-database-management-strategies-and-deployment", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md", + "redirect_url": "/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-fix-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-mode-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/creating-an-apphelp-message-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/deployment-considerations-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/deployment-considerations-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/device-dialog-box.md", + "redirect_url": "/windows/deployment/planning/device-dialog-box", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/fixing-applications-by-using-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/fixing-applications-by-using-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md", + "redirect_url": "/windows/deployment/planning/managing-application-compatibility-fixes-and-custom-fix-databases", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/prepare-your-organization-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/prepare-your-organization-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/searching-for-fixed-applications-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/security-and-data-protection-considerations-for-windows-to-go.md", + "redirect_url": "/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/showing-messages-generated-by-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/showing-messages-generated-by-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/sua-users-guide.md", + "redirect_url": "/windows/deployment/planning/sua-users-guide", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/tabs-on-the-sua-tool-interface.md", + "redirect_url": "/windows/deployment/planning/tabs-on-the-sua-tool-interface", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/testing-your-application-mitigation-packages.md", + "redirect_url": "/windows/deployment/planning/testing-your-application-mitigation-packages", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/understanding-and-using-compatibility-fixes.md", + "redirect_url": "/windows/deployment/planning/understanding-and-using-compatibility-fixes", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-compatibility-administrator-tool.md", + "redirect_url": "/windows/deployment/planning/using-the-compatibility-administrator-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-sdbinstexe-command-line-tool.md", + "redirect_url": "/windows/deployment/planning/using-the-sdbinstexe-command-line-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-sua-tool.md", + "redirect_url": "/windows/deployment/planning/using-the-sua-tool", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/using-the-sua-wizard.md", + "redirect_url": "/windows/deployment/planning/using-the-sua-wizard", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/viewing-the-events-screen-in-compatibility-administrator.md", + "redirect_url": "/windows/deployment/planning/viewing-the-events-screen-in-compatibility-administrator", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-compatibility.md", + "redirect_url": "/windows/deployment/planning/windows-10-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-deployment-considerations.md", + "redirect_url": "/windows/deployment/planning/windows-10-deployment-considerations", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-enterprise-faq-itpro.md", + "redirect_url": "/windows/deployment/planning/windows-10-enterprise-faq-itpro", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-10-infrastructure-requirements.md", + "redirect_url": "/windows/deployment/planning/windows-10-infrastructure-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-to-go-frequently-asked-questions.md", + "redirect_url": "/windows/deployment/planning/windows-to-go-frequently-asked-questions", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/windows-to-go-overview.md", + "redirect_url": "/windows/deployment/planning/windows-to-go-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/update/change-history-for-update-windows-10.md", + "redirect_url": "/windows/deployment/update/change-history-for-update-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/update/update-compliance-get-started.md", + "redirect_url": "/windows/deployment/update/update-compliance-get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/update/update-compliance-monitor.md", + "redirect_url": "/windows/deployment/update/update-compliance-monitor", + "redirect_document_id": true + }, + { + "source_path": "windows/update/update-compliance-using.md", + "redirect_url": "/windows/deployment/update/update-compliance-using", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-branchcache.md", + "redirect_url": "/windows/deployment/update/waas-branchcache", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-configure-wufb.md", + "redirect_url": "/windows/deployment/update/waas-configure-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-delivery-optimization.md", + "redirect_url": "/windows/deployment/update/waas-delivery-optimization", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-deployment-rings-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-integrate-wufb.md", + "redirect_url": "/windows/deployment/update/waas-integrate-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-manage-updates-configuration-manager.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-manage-updates-wsus.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wsus", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-manage-updates-wufb.md", + "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-mobile-updates.md", + "redirect_url": "/windows/deployment/update/waas-mobile-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-optimize-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-overview.md", + "redirect_url": "/windows/deployment/update/waas-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-quick-start.md", + "redirect_url": "/windows/deployment/update/waas-quick-start", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-restart.md", + "redirect_url": "/windows/deployment/update/waas-restart", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-servicing-branches-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-servicing-strategy-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-windows-insider-for-business-aad.md", + "redirect_url": "/windows/deployment/update/waas-windows-insider-for-business-aad", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-windows-insider-for-business.md", + "redirect_url": "/windows/deployment/update/waas-windows-insider-for-business", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-wufb-group-policy.md", + "redirect_url": "/windows/deployment/update/waas-wufb-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/update/waas-wufb-intune.md", + "redirect_url": "/windows/deployment/update/waas-wufb-intune", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/manage-settings-app-with-group-policy.md", + "redirect_url": "/windows/client-management/manage-settings-app-with-group-policy", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/collect-wip-audit-event-logs.md", + "redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/deploy-managed-installer-for-device-guard.md", + "redirect_url": "/windows/device-security/device-guard/deploy-managed-installer-for-device-guard", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/upgrade-readiness-data-sharing.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-data-sharing", + "redirect_document_id": true + }, + { + "source_path": "windows/index.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/index.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/deploy/index.md", + "redirect_url": "/windows/deployment/index", + "redirect_document_id": true + }, + { + "source_path": "windows/plan/index.md", + "redirect_url": "/windows/deployment/planning/index", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/index.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/windows-store-for-business.md", + "redirect_url": "/microsoft-store/index", + "redirect_document_id": true + }, + { + "source_path": "windows/update/index.md", + "redirect_url": "/windows/deployment/update/index", + "redirect_document_id": true + }, + { + "source_path": "windows/configure/index.md", + "redirect_url": "/windows/configuration/index", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/security-technologies.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "education/get-started/index.md", + "redirect_url": "/education/get-started/get-started-with-microsoft-education", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/windows-10-enterprise-security-guides.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/keep-secure/change-history-for-keep-windows-10-secure.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/manage/change-history-for-manage-and-update-windows-10.md", + "redirect_url": "/windows/windows-10/index", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/update/waas-servicing-branches-windows-10-updates.md", + "redirect_url": "/windows/deployment/update/waas-servicing-channels-windows-10-updates", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-10-enterprise-activation-subscription.md", + "redirect_url": "/windows/deployment/windows-10-enterprise-subscription-activation", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-10-auto-pilot.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1709.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields.md", + "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/configure-windows-diagnostic-data-in-your-organization.md", + "redirect_url": "/windows/privacy/configure-windows-diagnostic-data-in-your-organization", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/diagnostic-data-viewer-overview.md", + "redirect_url": "/windows/privacy/diagnostic-data-viewer-overview", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md", + "redirect_url": "/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/gdpr-win10-whitepaper.md", + "redirect_url": "/windows/privacy/gdpr-win10-whitepaper", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md", + "redirect_url": "/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/manage-windows-endpoints-version-1709.md", + "redirect_url": "/windows/privacy/manage-windows-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/windows-diagnostic-data-1703.md", + "redirect_url": "/windows/privacy/windows-diagnostic-data-1703", + "redirect_document_id": true + }, + { + "source_path": "windows/configuration/windows-diagnostic-data.md", + "redirect_url": "/windows/privacy/windows-diagnostic-data", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/upgrade/windows-10-edition-downgrades.md", + "redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades", + "redirect_document_id": true + }, + { + "source_path": "education/windows/windows-automatic-redeployment.md", + "redirect_url": "/education/windows/autopilot-reset", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-10-autopilot.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot", + "redirect_document_id": true + }, + { + "source_path": "windows/privacy/manage-windows-endpoints.md", + "redirect_url": "/windows/privacy/manage-windows-1809-endpoints", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/use-apis.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineaction-object", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-started.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-started", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-ms-flow.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-user-token.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-analytics", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/threat-and-vuln-mgt-scenarios.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/machineactionsnote.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md", + "redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md", + "redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md", + "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators", + "redirect_document_id": true + }, + { + "source_path": "windows/windows/deployment/windows-10-enterprise-subscription-activation.md", + "redirect_url": "/windows/windows/deployment/windows-10-subscription-activation", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators", + "redirect_document_id": true + }, + { + "source_path": "windows/windows-10/windows-10-landing.yml", + "redirect_url": "/windows/hub/windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md", + "redirect_url": "windows/security/threat-protection/microsoft-defender-atp/improve-request-performance", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/user-driven-aad.md", + "redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md", + "redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/intune-connector.md", + "redirect_url": "/intune/windows-autopilot-hybrid", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md", + "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/configure-autopilot.md", + "redirect_url": "/windows/deployment/windows-autopilot/add-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/deployment/windows-autopilot/administer.md", + "redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices", + "redirect_document_id": true + }, + { + "source_path": "windows/hub/release-information.md", + "redirect_url": "/windows/release-information", + "redirect_document_id": true + }, + { + "source_path": "bcs/index.md", + "redirect_url": "/microsoft-365/business/", + "redirect_document_id": false + }, + { + "source_path": "bcs/support/microsoft-365-business-faqs.md", + "redirect_url": "/microsoft-365/business/support/microsoft-365-business-faqs", + "redirect_document_id": false + }, + { + "source_path": "bcs/support/transition-csp-subscription.md", + "redirect_url": "/microsoft-365/business/support/transition-csp-subscription", + "redirect_document_id": false + }, + { + "source_path": "devices/surface/advanced-uefi-security-features-for-surface.md", + "redirect_url": "/surface/advanced-uefi-security-features-for-surface-pro-3", + "redirect_document_id": false + }, + { + "source_path": "education/windows/create-tests-using-microsoft-forms.md", + "redirect_url": "https://support.microsoft.com/help/4000711/windows-10-create-tests-using-microsoft-forms", + "redirect_document_id": false + }, + { + "source_path": "windows/access-protection/index.md", + "redirect_url": "/windows/security/identity-protection/", + "redirect_document_id": false + }, + { + "source_path": "windows/device-security/index.md", + "redirect_url": "/windows/security/threat-protection/", + "redirect_document_id": false + }, + { + "source_path": "windows/threat-protection/index.md", + "redirect_url": "/windows/security/threat-protection/", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/upgrade/troubleshoot-upgrade-readiness.md", + "redirect_url": "/windows/deployment/update/windows-analytics-faq-troubleshooting", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/upgrade/upgrade-readiness-release-notes.md", + "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements#important-information-about-this-release", + "redirect_document_id": false + } + ] +} \ No newline at end of file diff --git a/bcs/index.md b/bcs/index.md deleted file mode 100644 index 49e0775203..0000000000 --- a/bcs/index.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: /microsoft-365/business/ ---- diff --git a/bcs/support/microsoft-365-business-faqs.md b/bcs/support/microsoft-365-business-faqs.md deleted file mode 100644 index 332b565f0c..0000000000 --- a/bcs/support/microsoft-365-business-faqs.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://docs.microsoft.com/microsoft-365/business/support/microsoft-365-business-faqs ---- \ No newline at end of file diff --git a/bcs/support/transition-csp-subscription.md b/bcs/support/transition-csp-subscription.md deleted file mode 100644 index 45a6e1c74c..0000000000 --- a/bcs/support/transition-csp-subscription.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://docs.microsoft.com/microsoft-365/business/support/transition-csp-subscription ---- \ No newline at end of file diff --git a/devices/surface/advanced-uefi-security-features-for-surface.md b/devices/surface/advanced-uefi-security-features-for-surface.md deleted file mode 100644 index 9c6edd4717..0000000000 --- a/devices/surface/advanced-uefi-security-features-for-surface.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://technet.microsoft.com/itpro/surface/advanced-uefi-security-features-for-surface-pro-3 ---- \ No newline at end of file diff --git a/education/windows/create-tests-using-microsoft-forms.md b/education/windows/create-tests-using-microsoft-forms.md deleted file mode 100644 index 3551b9aa41..0000000000 --- a/education/windows/create-tests-using-microsoft-forms.md +++ /dev/null @@ -1,33 +0,0 @@ ---- -title: Create tests using Microsoft Forms -ms.reviewer: -manager: dansimp -description: Learn how to use Microsoft Forms with the Take a Test app to prevent access to other computers or online resources while completing a test. -keywords: school, Take a Test, Microsoft Forms -ms.prod: w10 -ms.mktglfcycl: plan -ms.sitesec: library -ms.pagetype: edu -author: levinec -ms.author: ellevin -redirect_url: https://support.microsoft.com/help/4000711/windows-10-create-tests-using-microsoft-forms ---- - -# Create tests using Microsoft Forms -**Applies to:** - -- Windows 10 - - -For schools that have an Office 365 Education subscription, teachers can use [Microsoft Forms](https://support.office.com/article/What-is-Microsoft-Forms-6b391205-523c-45d2-b53a-fc10b22017c8) to create a test and then require that students use the Take a Test app to block access to other computers or online resources while completing the test created through Microsoft Forms. - -To do this, teachers can select a check box to make it a secure test. Microsoft Forms will generate a link that you can use to embed into your OneNote or class website. When students are ready to take a test, they can click on the link to start the test. - -Microsoft Forms will perform checks to ensure students are taking the test in a locked down Take a Test session. If not, students are not permitted access to the assessment. - -[Learn how to block Internet access while students complete your form](https://support.office.com/article/6bd7e31d-5be0-47c9-a0dc-c0a74fc48959) - - -## Related topics - -[Take tests in Windows 10](take-tests-in-windows-10.md) diff --git a/windows/access-protection/index.md b/windows/access-protection/index.md deleted file mode 100644 index 6f99c4db34..0000000000 --- a/windows/access-protection/index.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://docs.microsoft.com/windows/security/identity-protection/ ---- \ No newline at end of file diff --git a/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md b/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md deleted file mode 100644 index e020be4aad..0000000000 --- a/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: /windows/deployment/update/windows-analytics-FAQ-troubleshooting ---- \ No newline at end of file diff --git a/windows/deployment/upgrade/upgrade-readiness-release-notes.md b/windows/deployment/upgrade/upgrade-readiness-release-notes.md deleted file mode 100644 index 1dbfd97e48..0000000000 --- a/windows/deployment/upgrade/upgrade-readiness-release-notes.md +++ /dev/null @@ -1,9 +0,0 @@ ---- -title: Upgrade Readiness release notes (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -author: greg-lindsay -description: Provides tips and limitations about Upgrade Readiness. -redirect_url: https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-requirements#important-information-about-this-release ---- diff --git a/windows/device-security/index.md b/windows/device-security/index.md deleted file mode 100644 index be91262028..0000000000 --- a/windows/device-security/index.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://docs.microsoft.com/windows/security/threat-protection/ ---- \ No newline at end of file diff --git a/windows/threat-protection/index.md b/windows/threat-protection/index.md deleted file mode 100644 index 1417ec0534..0000000000 --- a/windows/threat-protection/index.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://docs.microsoft.com/windows/security/threat-protection/ ---- From c2ef82551c5a1c709dae4b58c4f51e32816f058c Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 18 Jun 2019 13:53:15 -0700 Subject: [PATCH 279/303] Added alert icon --- .../microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 504baecd76..5d53cdeabf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -61,7 +61,7 @@ To lower down your threat and vulnerability exposure: > There are two types of recommendations: > - Security update which refers to recommendations that require a package installation > - Configuration change which refers to recommendations that require a registry or GPO modification - > Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight ![threat insight](images/tvm_bug_icon.png) icon. + > Always prioritize recommendations that are associated with ongoing threats. These recommendations are marked with the threat insight ![threat insight](images/tvm_bug_icon.png) icon or the possible alert activity [possible alert activity](images/tvm_alert_icon.png) icon. 2. In the **Security recommendations** page, you will see the description of what needs to be done and why. It shows the vulnerability details, such as the associated exploits affecting what machines and its business impact. Click **Open software page** option from the flyout menu. ![details in security recommendations page](images/tvm_security_recommendations_page.png) From 10e68132e3fca4a24d3f0d6f27ca03a49c2042c7 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Tue, 18 Jun 2019 14:49:42 -0700 Subject: [PATCH 280/303] Links and new issues added (#500) --- .../resolved-issues-windows-10-1607.yml | 2 ++ .../resolved-issues-windows-10-1703.yml | 2 ++ .../resolved-issues-windows-10-1709.yml | 2 ++ .../resolved-issues-windows-10-1803.yml | 2 ++ ...indows-10-1809-and-windows-server-2019.yml | 6 +++++ .../status-windows-10-1507.yml | 16 +++----------- ...indows-10-1607-and-windows-server-2016.yml | 12 +++++----- .../status-windows-10-1703.yml | 20 +++++------------ .../status-windows-10-1709.yml | 20 +++++------------ .../status-windows-10-1803.yml | 20 +++++------------ ...indows-10-1809-and-windows-server-2019.yml | 22 ++++++++----------- .../status-windows-10-1903.yml | 11 +++++----- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 16 +++----------- ...windows-8.1-and-windows-server-2012-r2.yml | 8 +++---- .../status-windows-server-2008-sp2.yml | 6 ++--- .../status-windows-server-2012.yml | 8 +++---- .../windows-message-center.yml | 12 +++++----- 17 files changed, 70 insertions(+), 115 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1607.yml b/windows/release-information/resolved-issues-windows-10-1607.yml index a6ec153084..4b9f034e96 100644 --- a/windows/release-information/resolved-issues-windows-10-1607.yml +++ b/windows/release-information/resolved-issues-windows-10-1607.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -67,6 +68,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusDate resolved
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4503294
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 14393.2999

          May 23, 2019
          KB4499177
          Resolved
          KB4503267
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >
          OS Build 14393.2848

          March 12, 2019
          KB4489882
          Resolved
          KB4503267
          June 11, 2019
          10:00 AM PT
          Update not showing as applicable through WSUS or SCCM or when manually installed
          Update not showing as applicable through WSUS or SCCM or when manually installed

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4498947
          May 14, 2019
          10:00 AM PT
          +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503294.

          Back to top
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4503294
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503267.

          Back to top
          OS Build 14393.2999

          May 23, 2019
          KB4499177
          Resolved
          KB4503267
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " diff --git a/windows/release-information/resolved-issues-windows-10-1703.yml b/windows/release-information/resolved-issues-windows-10-1703.yml index 3ab3f15bbf..d5caa67124 100644 --- a/windows/release-information/resolved-issues-windows-10-1703.yml +++ b/windows/release-information/resolved-issues-windows-10-1703.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -62,6 +63,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusDate resolved
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Resolved
          KB4503289
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 15063.1839

          May 28, 2019
          KB4499162
          Resolved
          KB4503279
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 15063.1805

          May 14, 2019
          KB4499181
          Resolved
          KB4505055
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 15063.1784

          April 25, 2019
          KB4493436
          Resolved
          KB4499181
          May 14, 2019
          10:00 AM PT
          +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503289.

          Back to top
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Resolved
          KB4503289
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503279.

          Back to top
          OS Build 15063.1839

          May 28, 2019
          KB4499162
          Resolved
          KB4503279
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml index 2c1d600e65..0a611e7088 100644 --- a/windows/release-information/resolved-issues-windows-10-1709.yml +++ b/windows/release-information/resolved-issues-windows-10-1709.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -64,6 +65,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusDate resolved
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Resolved
          KB4503281
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 16299.1182

          May 28, 2019
          KB4499147
          Resolved
          KB4503284
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 16299.1143

          May 14, 2019
          KB4498946
          Resolved
          KB4505062
          May 19, 2019
          02:00 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel.

          See details >
          OS Build 16299.1127

          April 25, 2019
          KB4493440
          Resolved
          KB4499179
          May 14, 2019
          10:00 AM PT
          +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503281.

          Back to top
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Resolved
          KB4503281
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503284.

          Back to top
          OS Build 16299.1182

          May 28, 2019
          KB4499147
          Resolved
          KB4503284
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index f30b599296..996005c7b9 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -32,6 +32,7 @@ sections: - type: markdown text: " + @@ -65,6 +66,7 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusDate resolved
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Resolved
          KB4503288
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

          See details >
          OS Build 17134.648

          March 12, 2019
          KB4489868
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17134.765

          May 14, 2019
          KB4499167
          Resolved
          KB4505064
          May 19, 2019
          02:00 PM PT
          +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503288.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Resolved
          KB4503288
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503286.

          Back to top
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml index 1e0221bf45..e0eab68c77 100644 --- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml @@ -32,6 +32,9 @@ sections: - type: markdown text: " + + + @@ -74,6 +77,8 @@ sections: - type: markdown text: "
          SummaryOriginating updateStatusDate resolved
          Devices with Realtek Bluetooth radios drivers may not pair or connect as expected
          Devices with some Realtek Bluetooth radios drivers, in some circumstances, may have issues pairing or connecting to devices.

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4501371
          June 18, 2019
          02:00 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Resolved
          KB4501371
          June 18, 2019
          02:00 PM PT
          Printing from Microsoft Edge or other UWP apps may result in the error 0x80070007
          Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) apps, you may receive an error.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Resolved
          KB4501371
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 17763.529

          May 21, 2019
          KB4497934
          Resolved
          KB4503327
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Resolved
          KB4503327
          June 11, 2019
          10:00 AM PT
          Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
          Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

          See details >
          OS Build 17763.134

          November 13, 2018
          KB4467708
          Resolved
          May 21, 2019
          07:42 AM PT
          + +
          DetailsOriginating updateStatusHistory
          Devices with Realtek Bluetooth radios drivers may not pair or connect as expected
          In some circumstances, devices with Realtek Bluetooth radios may have issues pairing or connecting to Bluetooth devices due to a driver issue.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server 2019
          Resolution: This issue was resolved in KB4501371.

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4501371
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 14, 2019
          05:45 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4501371.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Resolved
          KB4501371
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503327.

          Back to top
          OS Build 17763.529

          May 21, 2019
          KB4497934
          Resolved
          KB4503327
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " @@ -83,6 +88,7 @@ sections: - type: markdown text: " + diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 93243a1403..038724ee59 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -62,7 +62,6 @@ sections:
          DetailsOriginating updateStatusHistory
          Printing from Microsoft Edge or other UWP apps may result in the error 0x80070007
          When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
           
          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server, version 1809; Windows Server 2019
          Resolution: This issue was resolved in KB4501371

          Back to top
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Resolved
          KB4501371
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          May 02, 2019
          04:47 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505056) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505056 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505056, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4505056
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Affected platforms:
          • Client: Windows 10, version 1809
          Cause:
          In certain situations, installing an update requires multiple download and restart steps. In cases where two intermediate steps of the installation complete successfully, the View your Update history page will report that installation completed successfully twice. 

          Resolution:
          No action is required on your part. The update installation may take longer and may require more than one restart, but will install successfully after all intermediate installation steps have completed. We are working on improving this update experience to ensure the Update history correctly reflects the installation of the latest cumulative update (LCU).

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          Resolved:
          May 16, 2019
          02:37 PM PT

          Opened:
          May 14, 2019
          02:56 PM PT
          Layout and cell size of Excel sheets may change when using MS UI Gothic
          When using the MS UI Gothic or MS PGothic fonts, the text, layout, or cell size may become narrower or wider than expected in Microsoft Excel. For example, the layout and cell size of Microsoft Excel sheets may change when using MS UI Gothic.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
          Resolution: This issue has been resolved.

          Back to top
          OS Build 17763.475

          May 03, 2019
          KB4495667
          Resolved
          KB4494441
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 10, 2019
          10:35 AM PT
          -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 10240.18244

          June 11, 2019
          KB4503291
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 10240.18094

          January 08, 2019
          KB4480962
          Mitigated
          April 25, 2019
          02:00 PM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 10240.18215

          May 14, 2019
          KB4499154
          Resolved
          KB4505051
          May 19, 2019
          02:00 PM PT
          " @@ -82,15 +81,6 @@ sections:
          " -- title: May 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505051) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505051 from Windows Update and then restarting your device.

          This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505051, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 10240.18215

          May 14, 2019
          KB4499154
          Resolved
          KB4505051
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          - " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index 6e44dcec30..5032531126 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -60,17 +60,16 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Mitigated
          June 13, 2019
          02:21 PM PT
          Some applications may fail to run as expected on clients of AD FS 2016
          Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016)

          See details >
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Mitigated
          June 07, 2019
          04:25 PM PT
          Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
          Some devices running Windows Server with Hyper-V enabled may start into Bitlocker recovery with error 0xC0210000

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Mitigated
          May 23, 2019
          09:57 AM PT
          Cluster service may fail if the minimum password length is set to greater than 14
          The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.

          See details >
          OS Build 14393.2639

          November 27, 2018
          KB4467684
          Mitigated
          April 25, 2019
          02:00 PM PT
          SCVMM cannot enumerate and manage logical switches deployed on the host
          For hosts managed by System Center Virtual Machine Manager (VMM), VMM cannot enumerate and manage logical switches deployed on the host.

          See details >
          OS Build 14393.2639

          November 27, 2018
          KB4467684
          Mitigated
          April 25, 2019
          02:00 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 14393.2724

          January 08, 2019
          KB4480961
          Mitigated
          April 25, 2019
          02:00 PM PT
          Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
          Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

          See details >
          OS Build 14393.2608

          November 13, 2018
          KB4467691
          Mitigated
          February 19, 2019
          10:00 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4503294
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 14393.2999

          May 23, 2019
          KB4499177
          Resolved
          KB4503267
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >
          OS Build 14393.2848

          March 12, 2019
          KB4489882
          Resolved
          KB4503267
          June 11, 2019
          10:00 AM PT
          Update not showing as applicable through WSUS or SCCM or when manually installed
          Update not showing as applicable through WSUS or SCCM or when manually installed

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4498947
          May 14, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4505052
          May 19, 2019
          02:00 PM PT
          " @@ -86,8 +85,8 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Some applications may fail to run as expected on clients of AD FS 2016
          Some applications may fail to run as expected on clients of Active Directory Federation Services 2016 (AD FS 2016) after installation of KB4493473 on the server. Applications that may exhibit this behavior use an IFRAME during non-interactive authentication requests and receive X-Frame Options set to DENY.

          Affected platforms:
          • Server: Windows Server 2016
          Workaround: You can use the Allow-From value of the header if the IFRAME is only accessing pages from a single-origin URL. On the affected server, open a PowerShell window as an administrator and run the following command: set-AdfsResponseHeaders -SetHeaderName X-Frame-Options -SetHeaderValue \"allow-from https://example.com\"

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 14393.2941

          April 25, 2019
          KB4493473
          Mitigated
          Last updated:
          June 07, 2019
          04:25 PM PT

          Opened:
          June 04, 2019
          05:55 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503294.

          Back to top
          OS Build 14393.3025

          June 11, 2019
          KB4503267
          Resolved
          KB4503294
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503267.

          Back to top
          OS Build 14393.2999

          May 23, 2019
          KB4499177
          Resolved
          KB4503267
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " @@ -99,7 +98,6 @@ sections: -
          DetailsOriginating updateStatusHistory
          Devices running Windows Server 2016 with Hyper-V seeing Bitlocker error 0xC0210000
          Some devices running Windows Server 2016 with Hyper-V enabled may enter Bitlocker recovery mode and receive an error, \"0xC0210000\" after installing KB4494440 and restarting.

          Note Windows 10, version 1607 may also be affected when Bitlocker and Hyper-V are both enabled.

          Affected platforms:
          • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2016
          Workaround: If your device is already in this state, you can successfully start Windows after suspending Bitlocker from the Windows Recovery Environment (WinRE) using the following steps:
          1. Retrieve the 48 digit Bitlocker recovery password for the OS volume from your organization's portal or from wherever the key was stored when Bitlocker was first enabled.
          2. From the recovery screen, press the enter key and enter the recovery password when prompted.
          3. If your device starts in the Windows Recovery Environment and asks for recovery key again, select Skip the drive to continue to WinRE.
          4. select Advanced options then Troubleshoot then Advanced options then Command Prompt.
          5. Unlock OS drive using the command: Manage-bde -unlock c: -rp <48 digit numerical recovery password separated by “-“ in 6 digit group>
          6. Suspend Bitlocker using the command: Manage-bde -protectors -disable c:
          7. Exit the command window using the command: exit
          8. Select Continue from recovery environment.
          9. The device should now start Windows.
          10. Once started, launch an Administrator Command Prompt and resume the Bitlocker to ensure the system remains protected, using the command: Manage-bde -protectors -enable c:
          Note The workaround needs to be followed on every system restart unless Bitlocker is suspended before restarting.

          To prevent this issue, execute the following command to temporarily suspend Bitlocker just before restarting the system: Manage-bde -protectors -disable c: -rc 1
          Note This command will suspend Bitlocker for 1 restart of the device (-rc 1 option only works inside OS and does not work from recovery environment).

          Next steps: Microsoft is presently investigating this issue and will provide an update when available.

          Back to top
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Mitigated
          Last updated:
          May 23, 2019
          09:57 AM PT

          Opened:
          May 21, 2019
          08:50 AM PT
          Update not showing as applicable through WSUS or SCCM or when manually installed
          KB4494440 or later updates may not show as applicable through WSUS or SCCM to the affected platforms. When manually installing the standalone update from Microsoft Update Catalog, it may fail to install with the error, \"The update is not applicable to your computer.\"


          Affected platforms:
          • Client: Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2016

          Resolution: The servicing stack update (SSU) (KB4498947) must be installed before installing the latest cumulative update (LCU). The LCU will not be reported as applicable until the SSU is installed. For more information, see Servicing stack updates.

          Back to top
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4498947
          Resolved:
          May 14, 2019
          10:00 AM PT

          Opened:
          May 24, 2019
          04:20 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505052) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505052 from Windows Update and then restarting your device.

          This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505052, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 14393.2969

          May 14, 2019
          KB4494440
          Resolved
          KB4505052
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          " diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml index 8ae2a4ecef..1a2f316a92 100644 --- a/windows/release-information/status-windows-10-1703.yml +++ b/windows/release-information/status-windows-10-1703.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -60,10 +60,9 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 15063.1563

          January 08, 2019
          KB4480973
          Mitigated
          April 25, 2019
          02:00 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Resolved
          KB4503289
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 15063.1839

          May 28, 2019
          KB4499162
          Resolved
          KB4503279
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 15063.1805

          May 14, 2019
          KB4499181
          Resolved
          KB4505055
          May 19, 2019
          02:00 PM PT
          " @@ -79,20 +78,11 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503289.

          Back to top
          OS Build 15063.1868

          June 11, 2019
          KB4503279
          Resolved
          KB4503289
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503279.

          Back to top
          OS Build 15063.1839

          May 28, 2019
          KB4499162
          Resolved
          KB4503279
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " -- title: May 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolution: We have released an \"optional, out-of-band\" update for Windows 10 (KB4505055) to resolve this issue. If you are affected, we recommend you apply this update by installing KB4505055 from Windows Update and then restarting your device.

          This update will not be applied automatically. To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505055, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 15063.1805

          May 14, 2019
          KB4499181
          Resolved
          KB4505055
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          - " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index 55dd4088ef..bcb005f9a8 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -60,10 +60,9 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + -
          SummaryOriginating updateStatusLast updated
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 16299.904

          January 08, 2019
          KB4480978
          Mitigated
          April 25, 2019
          02:00 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Resolved
          KB4503281
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 16299.1182

          May 28, 2019
          KB4499147
          Resolved
          KB4503284
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 16299.1143

          May 14, 2019
          KB4498946
          Resolved
          KB4505062
          May 19, 2019
          02:00 PM PT
          " @@ -79,20 +78,11 @@ sections: - type: markdown text: " - +
          DetailsOriginating updateStatusHistory
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503281.

          Back to top
          OS Build 16299.1217

          June 11, 2019
          KB4503284
          Resolved
          KB4503281
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503284.

          Back to top
          OS Build 16299.1182

          May 28, 2019
          KB4499147
          Resolved
          KB4503284
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " -- title: May 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505062) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505062 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505062, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 16299.1143

          May 14, 2019
          KB4498946
          Resolved
          KB4505062
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          - " - - title: January 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index cfec8c3b62..79f9c6cc48 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -61,11 +61,10 @@ sections: text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - + -
          SummaryOriginating updateStatusLast updated
          Startup to a black screen after installing updates
          Your device may startup to a black screen during the first logon after installing updates.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          June 13, 2019
          02:21 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 17134.523

          January 08, 2019
          KB4480966
          Mitigated
          April 25, 2019
          02:00 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Resolved
          KB4503288
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

          See details >
          OS Build 17134.648

          March 12, 2019
          KB4489868
          Resolved
          KB4503286
          June 11, 2019
          10:00 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17134.765

          May 14, 2019
          KB4499167
          Resolved
          KB4505064
          May 19, 2019
          02:00 PM PT
          " @@ -82,20 +81,11 @@ sections: text: " - +
          DetailsOriginating updateStatusHistory
          Startup to a black screen after installing updates
          We are investigating reports that a small number of devices may startup to a black screen during the first logon after installing updates.


          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
          • Server: Windows Server 2019
          Workaround: To mitigate this issue, press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Your device should now restart normally.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          Last updated:
          June 14, 2019
          04:41 PM PT

          Opened:
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4503288.

          Back to top
          OS Build 17134.829

          June 11, 2019
          KB4503286
          Resolved
          KB4503288
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503286.

          Back to top
          OS Build 17134.799

          May 21, 2019
          KB4499183
          Resolved
          KB4503286
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " -- title: May 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505064) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505064 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505064, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 17134.765

          May 14, 2019
          KB4499167
          Resolved
          KB4505064
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          - " - - title: March 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index 30186020f9..d7c3a03b69 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -34,17 +34,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -65,17 +65,15 @@ sections: - type: markdown text: "
          This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

          - - - + + + - -
          SummaryOriginating updateStatusLast updated
          Devices with Realtek Bluetooth radios may not pair or connect as expected
          Devices with Realtek Bluetooth radios in some circumstances may have issues pairing or connecting to devices.

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Acknowledged
          June 14, 2019
          05:45 PM PT
          Startup to a black screen after installing updates
          Your device may startup to a black screen during the first logon after installing updates.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          June 13, 2019
          02:21 PM PT
          Devices with some Asian language packs installed may receive an error
          After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F

          See details >
          OS Build 17763.437

          April 09, 2019
          KB4493509
          Mitigated
          May 03, 2019
          10:59 AM PT
          Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
          Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications, you may receive an error.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Mitigated
          May 02, 2019
          04:47 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".

          See details >
          OS Build 17763.253

          January 08, 2019
          KB4480116
          Mitigated
          April 09, 2019
          10:00 AM PT
          Devices with Realtek Bluetooth radios drivers may not pair or connect as expected
          Devices with some Realtek Bluetooth radios drivers, in some circumstances, may have issues pairing or connecting to devices.

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4501371
          June 18, 2019
          02:00 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Resolved
          KB4501371
          June 18, 2019
          02:00 PM PT
          Printing from Microsoft Edge or other UWP apps may result in the error 0x80070007
          Attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) apps, you may receive an error.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Resolved
          KB4501371
          June 18, 2019
          02:00 PM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          See details >
          OS Build 17763.529

          May 21, 2019
          KB4497934
          Resolved
          KB4503327
          June 11, 2019
          10:00 AM PT
          Issue using PXE to start a device from WDS
          Using PXE to start a device from a WDS server configured to use Variable Window Extension may cause the connection to the WDS server to terminate prematurely.

          See details >
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Resolved
          KB4503327
          June 11, 2019
          10:00 AM PT
          Audio not working on monitors or TV connected to a PC via HDMI, USB, or DisplayPort
          Upgrade block: Microsoft has identified issues with certain new Intel display drivers, which accidentally turn on unsupported features in Windows.

          See details >
          OS Build 17763.134

          November 13, 2018
          KB4467708
          Resolved
          May 21, 2019
          07:42 AM PT
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4505056
          May 19, 2019
          02:00 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Some customers are reporting that KB4494441 installed twice on their device

          See details >
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          May 16, 2019
          02:37 PM PT
          " @@ -91,9 +89,9 @@ sections: - type: markdown text: " - - + +
          DetailsOriginating updateStatusHistory
          Devices with Realtek Bluetooth radios may not pair or connect as expected
          Devices with Realtek Bluetooth radios in some circumstances may have issues pairing or connecting to devices.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server 2019
          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Acknowledged
          Last updated:
          June 14, 2019
          05:45 PM PT

          Opened:
          June 14, 2019
          05:45 PM PT
          Startup to a black screen after installing updates
          We are investigating reports that a small number of devices may startup to a black screen during the first logon after installing updates.


          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803
          • Server: Windows Server 2019
          Workaround: To mitigate this issue, press Ctrl+Alt+Delete, then select the Power button in the lower right corner of the screen and select Restart. Your device should now restart normally.

          Next steps: We are working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          Last updated:
          June 14, 2019
          04:41 PM PT

          Opened:
          June 14, 2019
          04:41 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Workaround: To mitigate this issue, see KB4508640.

          Next steps: We are working on a resolution and estimate a solution will be available in late June.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Mitigated
          Last updated:
          June 13, 2019
          02:21 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Devices with Realtek Bluetooth radios drivers may not pair or connect as expected
          In some circumstances, devices with Realtek Bluetooth radios may have issues pairing or connecting to Bluetooth devices due to a driver issue.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server 2019
          Resolution: This issue was resolved in KB4501371.

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4501371
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 14, 2019
          05:45 PM PT
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

          Affected platforms:
          • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
          • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
          Resolution: This issue was resolved in KB4501371.

          Back to top
          OS Build 17763.557

          June 11, 2019
          KB4503327
          Resolved
          KB4501371
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          June 12, 2019
          11:11 AM PT
          Opening Internet Explorer 11 may fail
          Internet Explorer 11 may fail to open if Default Search Provider is not set or is malformed.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
          • Server: Windows Server 2019; Windows Server 2016
          Resolution: This issue was resolved in KB4503327.

          Back to top
          OS Build 17763.529

          May 21, 2019
          KB4497934
          Resolved
          KB4503327
          Resolved:
          June 11, 2019
          10:00 AM PT

          Opened:
          June 05, 2019
          05:49 PM PT
          " @@ -104,9 +102,7 @@ sections: text: " - - - +
          DetailsOriginating updateStatusHistory
          Devices with some Asian language packs installed may receive an error
          After installing the April 2019 Cumulative Update (KB4493509), devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server, version 1809; Windows Server 2019
          Workaround:
          1. Uninstall and reinstall any recently added language packs. For instructions, see \"Manage the input and display language settings in Windows 10\".
          2. Click Check for Updates and install the April 2019 Cumulative Update. For instructions, see \"Update Windows 10\".
          Note: If reinstalling the language pack does not mitigate the issue, reset your PC as follows:
          1. Go to Settings app -> Recovery.
          2. Click on Get Started under \"Reset this PC\" recovery option.
          3. Select \"Keep my Files\".
          Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17763.437

          April 09, 2019
          KB4493509
          Mitigated
          Last updated:
          May 03, 2019
          10:59 AM PT

          Opened:
          May 02, 2019
          04:36 PM PT
          Printing from Microsoft Edge or other UWP apps, you may receive the error 0x80070007
          When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
           
          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server, version 1809; Windows Server 2019
          Workaround: You can use another browser, such as Internet Explorer to print your documents.
           
          Next steps: Microsoft is working on a resolution and will provide an update in an upcoming release.

          Back to top
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Mitigated
          Last updated:
          May 02, 2019
          04:47 PM PT

          Opened:
          May 02, 2019
          04:47 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"out-of-band\" update for Windows 10 (KB4505056) to resolve this issue.

          • UK customers: This update will be applied automatically to resolve this issue. You may be required to restart your device again. If you are affected by this issue, Check for updates to apply the update immediately.
          • Customers outside of the UK: This update will not be applied automatically. If you are affected by this issue, we recommend you apply this update by installing KB4505056 from Windows Update and then restarting your device.
          To download and install this update, go to Settings > Update & Security > Windows Update and select Check for updates. To get the standalone package for KB4505056, search for it in the Microsoft Update Catalog.
           

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          KB4505056
          Resolved:
          May 19, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          Windows 10, version 1809 update history may show an update installed twice
          Affected platforms:
          • Client: Windows 10, version 1809
          Cause:
          In certain situations, installing an update requires multiple download and restart steps. In cases where two intermediate steps of the installation complete successfully, the View your Update history page will report that installation completed successfully twice. 

          Resolution:
          No action is required on your part. The update installation may take longer and may require more than one restart, but will install successfully after all intermediate installation steps have completed. We are working on improving this update experience to ensure the Update history correctly reflects the installation of the latest cumulative update (LCU).

          Back to top
          OS Build 17763.503

          May 14, 2019
          KB4494441
          Resolved
          Resolved:
          May 16, 2019
          02:37 PM PT

          Opened:
          May 14, 2019
          02:56 PM PT
          Printing from Microsoft Edge or other UWP apps may result in the error 0x80070007
          When attempting to print from Microsoft Edge or other Universal Windows Platform (UWP) applications you may receive the error, \"Your printer has experienced an unexpected configuration problem. 0x80070007e.\"
           
          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019
          • Server: Windows Server, version 1809; Windows Server 2019
          Resolution: This issue was resolved in KB4501371

          Back to top
          OS Build 17763.379

          March 12, 2019
          KB4489899
          Resolved
          KB4501371
          Resolved:
          June 18, 2019
          02:00 PM PT

          Opened:
          May 02, 2019
          04:47 PM PT
          " diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index d8fce2b490..b4cca0b008 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -21,8 +21,9 @@ sections: Find information on known issues for Windows 10, version 1903 and Windows Server, version 1903. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s). -
          Current status as of June 11, 2019:
          -
          Windows 10, version 1903 is available for any user who manually selects “Check for updates” via Windows Update for all devices that do not have a safeguard hold. If you are not offered the update, please check below for any known issues that may affect your device. The recommended servicing status is Semi-Annual Channel.

          The June monthly update is now available for all versions of Windows 10. Microsoft strongly recommends you keep your Windows devices, regardless of which version of Windows they are running, up to date with the latest monthly updates. Monthly updates are critical to device security and ecosystem health, and help mitigate the evolving threat landscape.

          Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
          +
          Current status as of June 18, 2019:
          +
          Windows 10, version 1903 is available for any user who manually selects “Check for updates” via Windows Update for all devices that do not have a safeguard hold. If you are not offered the update, please check below for any known issues that may affect your device. The recommended servicing status is Semi-Annual Channel.

          We are now beginning to build and train the machine learning (ML) based rollout process to update devices running the April 2018 Update, and earlier versions of Windows 10, to ensure we can continue to service these devices and provide the latest updates, security updates and improvements.

          Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
          +
          " @@ -34,17 +35,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml index 15933ee460..256030a289 100644 --- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -63,7 +63,6 @@ sections:
          Event Viewer may close or you may receive an error when using Custom Views
          When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

          See details >June 11, 2019
          KB4503292Mitigated
          June 13, 2019
          02:21 PM PT
          IE11 may stop working when loading or interacting with Power BI reports
          Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

          See details >May 14, 2019
          KB4499164Mitigated
          June 13, 2019
          02:21 PM PT
          System may be unresponsive after restart with certain McAfee antivirus products
          Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

          See details >April 09, 2019
          KB4493472Mitigated
          April 25, 2019
          02:00 PM PT -
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >May 14, 2019
          KB4499164Resolved
          KB4505050May 18, 2019
          02:00 PM PT " @@ -84,15 +83,6 @@ sections: " -- title: May 2019 -- items: - - type: markdown - text: " - - -
          DetailsOriginating updateStatusHistory
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"optional\" update for Internet Explorer 11 (KB4505050) to resolve this issue. We recommend you apply this update by installing KB4505050 from Windows Update and then restarting your device.
          To download and install this update, see How to get an update through Windows Update. This update is also available through the Microsoft Update Catalog website.

          Back to top
          May 14, 2019
          KB4499164
          Resolved
          KB4505050
          Resolved:
          May 18, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          - " - - title: April 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index cacbe9d898..c6f2a419b8 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -66,7 +66,6 @@ sections:
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

          See details >January 08, 2019
          KB4480963Mitigated
          April 25, 2019
          02:00 PM PT
          System may be unresponsive after restart with certain McAfee antivirus products
          Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.

          See details >April 09, 2019
          KB4493446Mitigated
          April 18, 2019
          05:00 PM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >March 12, 2019
          KB4489881Resolved
          KB4503276June 11, 2019
          10:00 AM PT -
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >May 14, 2019
          KB4499151Resolved
          KB4505050May 18, 2019
          02:00 PM PT " @@ -93,7 +92,6 @@ sections: text: " -
          DetailsOriginating updateStatusHistory
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          Affected platforms:
          • Client: Windows 8.1
          • Server: Windows Server 2012 R2; Windows Server 2012
          Workaround:
          If you see any of the previous dictionary updates listed below, uninstall it from Programs and features > Uninstall or change a program. New words that were in previous dictionary updates are also in this update.
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1080)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1080)

          Back to top
          April 25, 2019
          KB4493443
          Mitigated
          Last updated:
          May 15, 2019
          05:53 PM PT

          Opened:
          May 15, 2019
          05:53 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"optional\" update for Internet Explorer 11 (KB4505050) to resolve this issue. We recommend you apply this update by installing KB4505050 from Windows Update and then restarting your device.
          To download and install this update, see How to get an update through Windows Update. This update is also available through the Microsoft Update Catalog website.

          Back to top
          May 14, 2019
          KB4499151
          Resolved
          KB4505050
          Resolved:
          May 18, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          " diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index 584416430c..34d366614e 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index 1de697b2ee..a7ddbf6451 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -29,17 +29,17 @@ sections: columns: 3 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -65,7 +65,6 @@ sections:
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          See details >April 25, 2019
          KB4493462Mitigated
          May 15, 2019
          05:53 PM PT
          Certain operations performed on a Cluster Shared Volume may fail
          Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.

          See details >January 08, 2019
          KB4480975Mitigated
          April 25, 2019
          02:00 PM PT
          Issue using PXE to start a device from WDS
          There may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension.

          See details >March 12, 2019
          KB4489891Resolved
          KB4503285June 11, 2019
          10:00 AM PT -
          Unable to access some gov.uk websites
          gov.uk websites that don’t support “HSTS” may not be accessible

          See details >May 14, 2019
          KB4499171Resolved
          KB4505050May 18, 2019
          02:00 PM PT " @@ -92,7 +91,6 @@ sections: text: " -
          DetailsOriginating updateStatusHistory
          Japanese IME doesn't show the new Japanese Era name as a text input option
          If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

          Affected platforms:
          • Client: Windows 8.1
          • Server: Windows Server 2012 R2; Windows Server 2012
          Workaround:
          If you see any of the previous dictionary updates listed below, uninstall it from Programs and features > Uninstall or change a program. New words that were in previous dictionary updates are also in this update.
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.2013)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1215)
          • Update for Japanese Microsoft IME Standard Dictionary (15.0.1080)
          • Update for Japanese Microsoft IME Standard Extended Dictionary (15.0.1080)

          Back to top
          April 25, 2019
          KB4493462
          Mitigated
          Last updated:
          May 15, 2019
          05:53 PM PT

          Opened:
          May 15, 2019
          05:53 PM PT
          Unable to access some gov.uk websites
          After installing the May 14, 2019 update, some gov.uk websites that don’t support HTTP Strict Transport Security (HSTS) may not be accessible through Internet Explorer 11 or Microsoft Edge.

          Affected platforms:
          • Client: Windows 10, version 1809; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10, version 1507; Windows 8.1; Windows 7 SP1 
          • Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1
          Resolved: We have released an \"optional\" update for Internet Explorer 11 (KB4505050) to resolve this issue. We recommend you apply this update by installing KB4505050 from Windows Update and then restarting your device.
          To download and install this update, see How to get an update through Windows Update. This update is also available through the Microsoft Update Catalog website.

          Back to top
          May 14, 2019
          KB4499171
          Resolved
          KB4505050
          Resolved:
          May 18, 2019
          02:00 PM PT

          Opened:
          May 16, 2019
          01:57 PM PT
          " diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml index 92d6817a3d..08b34fe4ba 100644 --- a/windows/release-information/windows-message-center.yml +++ b/windows/release-information/windows-message-center.yml @@ -23,17 +23,17 @@ sections: columns: 2 items: - - href: https://blogs.windows.com/windowsexperience/ + - href: https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#1P75kJB6T5OhySyo.97 html: Get the update > image: src: https://docs.microsoft.com/media/common/i_deploy.svg title: Windows 10, version 1903 rollout begins - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064 html: Read about the latest enhancements > image: src: https://docs.microsoft.com/media/common/i_whats-new.svg title: What’s new in Windows Update for Business - - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/bg-p/Windows10Blog + - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024 html: Get an overview > image: src: https://docs.microsoft.com/media/common/i_investigate.svg @@ -50,9 +50,9 @@ sections: text: " - - - + + + + + + +
          MessageDate
          Windows 10, version 1903 rollout begins
          The Windows 10 May 2019 Update (Windows 10, version 1903) is available today to commercial customers via Windows Server Update Services (WSUS), Windows Update for Business, and the Volume Licensing Service Center (VLSC)—and to end users who manually select “Check for updates.” We are slowly throttling up availability while we carefully monitor data and feedback.
          May 21, 2019
          10:00 AM PT
          What’s new in Windows Update for Business
          We are enhancing and expanding the capabilities of Windows Update for Business to make the move to the cloud even easier. From simplified branch readiness options to better control over deadlines and reboots, read about the enhancements to Windows Update for Business as a part of Windows 10, version 1903.
          May 21, 2019
          10:00 AM PT
          What’s new for businesses and IT pros in Windows 10
          Explore the newest capabilities for businesses and IT in the latest feature update in the areas of intelligent security, simplified updates, flexible management, and enhanced productivity.
          May 21, 2019
          10:00 AM PT
          Windows 10, version 1903 rollout begins
          The Windows 10 May 2019 Update (Windows 10, version 1903) is available today to commercial customers via Windows Server Update Services (WSUS), Windows Update for Business, and the Volume Licensing Service Center (VLSC)—and to end users who manually select “Check for updates.” We are slowly throttling up availability while we carefully monitor data and feedback.
          May 21, 2019
          10:00 AM PT
          What’s new in Windows Update for Business
          We are enhancing and expanding the capabilities of Windows Update for Business to make the move to the cloud even easier. From simplified branch readiness options to better control over deadlines and reboots, read about the enhancements to Windows Update for Business as a part of Windows 10, version 1903.
          May 21, 2019
          10:00 AM PT
          What’s new for businesses and IT pros in Windows 10
          Explore the newest capabilities for businesses and IT in the latest feature update in the areas of intelligent security, simplified updates, flexible management, and enhanced productivity.
          May 21, 2019
          10:00 AM PT
          Reminder: Install the latest SSU for a smoother update experience
          We strongly recommend that you install the latest servicing stack update (SSU) before installing any Windows update; especially as an SSU may be a prerequisite for some updates. If you have difficulty installing Windows updates, verify that you have installed the latest SSU package for your version of Windows and then try installing the update again. Links to the latest SSU are always provided in the “How to get this update” section of each update KB article (e.g., KB4494441). For more information about SSUs, see our Servicing stack updates guidance.
          May 14, 2019
          10:00 AM PT
          Take action: Update Remote Desktop Services on older versions of Windows
          Today, we released fixes for a critical wormable, remote code execution vulnerability (CVE-2019-0708) in Remote Desktop Services—formerly known as Terminal Services. This vulnerability affects Windows 7, Windows Server 2008 R2, and earlier versions of Windows nearing end of support. It does not affect Windows 8, Windows Server 2012, or newer operating systems. While we have not observed attacks exploiting this vulnerability, affected systems should be patched with priority. Here is what you need to know:

          Call to action: From ae41ded789e5d81fcb44f99b48101bfd64d29cd5 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 18 Jun 2019 15:12:34 -0700 Subject: [PATCH 281/303] Screenshots for UEFI and changes in checklist --- devices/surface-hub/TOC.md | 2 +- devices/surface-hub/images/sh2-uefi1.png | Bin 0 -> 56453 bytes devices/surface-hub/images/sh2-uefi10.png | Bin 0 -> 73328 bytes devices/surface-hub/images/sh2-uefi2.png | Bin 0 -> 76946 bytes devices/surface-hub/images/sh2-uefi3.png | Bin 0 -> 58665 bytes devices/surface-hub/images/sh2-uefi4.png | Bin 0 -> 73087 bytes devices/surface-hub/images/sh2-uefi5.png | Bin 0 -> 82156 bytes devices/surface-hub/images/sh2-uefi6.png | Bin 0 -> 63618 bytes devices/surface-hub/images/sh2-uefi7.png | Bin 0 -> 65982 bytes devices/surface-hub/images/sh2-uefi8.png | Bin 0 -> 55469 bytes devices/surface-hub/images/sh2-uefi9.png | Bin 0 -> 52448 bytes .../surface-hub-2s-deploy-checklist.md | 82 +++++++++--------- .../surface-hub-2s-secure-with-uefi-semm.md | 28 +++--- 13 files changed, 60 insertions(+), 52 deletions(-) create mode 100644 devices/surface-hub/images/sh2-uefi1.png create mode 100644 devices/surface-hub/images/sh2-uefi10.png create mode 100644 devices/surface-hub/images/sh2-uefi2.png create mode 100644 devices/surface-hub/images/sh2-uefi3.png create mode 100644 devices/surface-hub/images/sh2-uefi4.png create mode 100644 devices/surface-hub/images/sh2-uefi5.png create mode 100644 devices/surface-hub/images/sh2-uefi6.png create mode 100644 devices/surface-hub/images/sh2-uefi7.png create mode 100644 devices/surface-hub/images/sh2-uefi8.png create mode 100644 devices/surface-hub/images/sh2-uefi9.png diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 27249ab885..2a580770fb 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -33,7 +33,7 @@ ### [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) ### [Local management for Surface Hub 2S settings](local-management-surface-hub-settings.md) ### [Manage device account password rotation](surface-hub-2s-manage-passwords.md) -### [Servicing and updating for Surface Hub 2S](surface-hub-2s-service-update.md) +### [Manage Windows updates](manage-windows-updates-for-surface-hub.md) ### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) ### [Save your BitLocker key](save-bitlocker-key-surface-hub.md) ### [Microsoft Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) diff --git a/devices/surface-hub/images/sh2-uefi1.png b/devices/surface-hub/images/sh2-uefi1.png new file mode 100644 index 0000000000000000000000000000000000000000..ecb5aad455b234b1509dab6756614fd8d2c3d2b4 GIT binary patch literal 56453 zcmbTd1yqz>7cV|Yh)6e*(nv`T-Jl@djl|F}zyL#+sDyxYgLDcC0@5M^QbPF0MajiesMDSNf`kEd?q(zbANLkZ5c^*a0LImdZ+Z5^&R%vlHz#>^GYOrCIzFl(SGUI@ejuX|U1P@(4@YSy zc0~m?xgZ&=056cgJzJ2Mr#D0FM zlMs>=bQBSnU;|1EiAaixOG^u|i9QsO5`HKpEFvZ-A}J&OP)1ag?e7meb~isKXBk5^ zjlX+gNAm2h{{B8P!opA}R0t|21om?g7Lk^g7JeuyEGjC9kawqCalARgY12TMT8#yG3g&hC&&Nt z`2_fR{$s*3iby>T*3c0qW??&pEkg{R!8T*d;D*8@$&lb z77%~+K&%;m9rC~Bh8PF?fP@V}5O9E>BS<|Et0u=EYkXu>{Xq8qU_WCp*z-Su(*KXj zY^th%0wc}FYv$(d1cpNR{)aUnHG6-MJo_KI;6q7l)Qm;MWW*(89s&g)0%aaP{FhY+ z?BwPg{J*eD8HFWdi2hHk*sO7~_qYFlWp;9uaR&Q&*<)>X^RjmV3Hx}vu(SQw zlQODcPp}_$W2|;!|Kq%-s;a&p*xAh!OMnc<5 zy|*JsQ%#;7>mMOEHzyefhlkG2A`;?)(qh=$vKJMX7L;}tkrV_1MS!9YB}JTo4#5Ac zR|7i+{KHG2;}?s$h_i5U{g9)ZP!I?1J^y|CiJg#_BKp z=h*&hitztx;oDLMUyS8a+8c`AnY_V&b@n@^C}X$y4L^^a8Mts&uorn;(*EBTl!J8cs$ zT{8pgCsSPvok29L!M`>X!D)yj>nFG zM5gmIVW_Dg(kjRE0%@fhwm4bnL7?E(`&!rB{1I{9&nws97D?$m=37}D88%9O@pQU<=R+vr7*X8wTO%!Ds_+hJyD-!CU zfr#SBi}QVNsJo?xhN|kySCO)^_g{BR>~v%!<~FnKru1#De>^It@0eR$US60oHMZRG zk+RIU>g-r@oT^q**CZb|P3&uDi)+@EdEZR*Z z%T%V+A!}KBUvWyjZeWZdaX?%p&a>%G+81I~lQIK|O5FFdg~9mGg`kF^9v)UtRHewp zbH^kTb<)bKSrP|Ig`f$QO+EtJ_y*(y8#7L+gm1^kS7EeTaSlztI%GnYzff(BS#%;=mbtZ8|9m^(jvg91d+Uaf!+SW6dl)&5aD#j>;i%t(sw{G>{Q5rPC{En_=$e z_L3e;Q|c=Ifv4JuYPb=_ya{}6xoH9tE#kD)nOaT8W=0^%;rqS9l!VE}QWn&kB#fp! z70wAw1qFGPIWz_t%bLR-C7U3G&r0>%x}_G6`I&7viMO~oFf%(-*s95x8n4pb>+LxH z0BC(M>Dq6>uybW{6&2?G7K>YD%+TA4-}h zo?X9~DDXw?nDCnk*hP$V88I^ETjk{u-Mw2^S35mDE!2xTZt*aSygay0^?5v>R5_Se zUw|61=Ya07?(6EX$VYfSGJ~3hhWgr5%)c6(tJGlx60?fbHh0T^KWSeco|SF8URn~p z`=nB@I5jiB+k0gZD^53G`ug;FmEz^~wTC2FOKXCfOXSx@K69X*S@!6*%#V$Bh2q1R z_NqbgB!&=WgCC5Iz3)TD^Xm6JHB%8|(jv5pzN%2Ef;53BoWt(xtj49#>wT!_Qj6pI zpw6(SW(`9wiB3`}?}rbqiD^!)=Ct9L_L>&$_V3D+8t%{F6dA|Ww*H%88W#Hng!%daEQ?685CPfWbKq-4rnG?zJ9 ziPP9zpPmTMHh6pO)55Y5B86W1II$w}Q3^{LqkHI++xpdS8;TUXYR7jjFW1TFgpo7b zTK9myX|v9DUBBSN@JbzeV6>t8!yf1Td$9I#2SEY8%2?CGRj-zuXVFo$j3sX-yjwD9 z>F8*vTLJ>>ZF(cj)zzOoSqeSuu`o8y%gSs8tyeM(vD%rM&SAr}xTsR2Z)<>_HRERv z9Qr2W=#;*IxELrENgO}_5qcOb*HgbYHg-Dp^Y|E+ESWy=g?MgydB^7)eA;llslBzK zwX#7H2uxwr@K#pV2{4&GSP2fkvMFR{aN92BZEbDKrl#vmPX~fmn}Yk1IkhlZujtXt znZ@O_ydrIoJ^aNuX=nJx?;ot)n21o1rAuF`Ld}EEX$~p#Z61hZo6g#%yG`&kBW>sO zd-40<+Pgn|@I2syC|+N}cXoF8jH-kbtUg-WaE!py>| zg}I?z$cAhF?8e=o+`gryMI$)e&(BY_PieMcr8Dq=UN$hy*>nq=jM6~s;o$<2y75}x z1m3t;5DO7E5ifY9AOXTOQBYX1vF>fZlSqY2c|s|Dd@RS0>ISzd*9?)>&7*H)m8WB4 zTU%KhoEICzRJ*&o?sXnxrdHas`IdQBmX;4j_&M@eh>@y&-+hfLv0A5{fIH4MhcI}A z_hZRFVQ$XsX14vfWr$nyVju78E7+bj1>?qAsXt+wAj;x<_)5F@VK zB`Ap{pS~sn8q?sVhIv5;>F<-@#Z!4;mJx0%$CTGLI>FU^O5%lZH+ux-B}!1QT!WCW z%x|uzvERAPOa~+;h^4#*C}4O+p%q{999JQdjeh!L`PW-!{R)jha-uqGeNGB`T&?qV zxt?U0l2mQ8Ojk|1RWzOXQRT~$+)Yv|Bo znev6l*8j(IhTMhV;P!B!t?$*QZExgQj>zqx*RM%Glr?X5LM>aG_pjQrBih3xfUoA) z!ViDitpwa)Rv`N+-t7ppix1+!i-pw4tKH_NyFynFK7|1H(W6`gTvdWZv9yYp&2}h| z<{n@jsUR?Sdb|(k9`D#vwCa>$wCu7kyWry3yZR0^n~>T365OmC>S>Vf9Cocda}JD@ z@%TLU1k(+R{C(dQyb`ims2Hh;y(T?5=sm0Su-$)Ax%R42&U-b@WDbg`OZT3eT!m!c!<*!w#c&|JkEztm}J&%RN#yqJ~h#>y>3+cw=zD z)ihn?Nj@E28%x+mC>gD*m)jxX`@=P=`~JKrw354)*1^1V0ckOYyh!@C)7+ir#@_RU zfZe$>@Al)7x_dhwh@!BOXx4Ifgtvj?+Le?3Gd(oASg-eHR>BOM(_`TdvmNRbDOQAA zEiJm*jXu&V;eirztHh99xE>g_zu~410O*Gw8a2*H(u(_k6T04~;$fb-3g>yd-93*^ zM@}GtmCEafgKMUzJB)NR7hNCrGuJR%qr*?;6&$xO{WOzksg#ge&n7>)2zNUL*P;t^ zUs9{SX=&$JJTWGLwzjlgaghIhF%o$?m!F*(A4@b<36z<6-+PJbMU>-|sLUg?-Rop$ zRxftOzT6IXW&y3YfQ01ttmijaf6h zrNzb5qpCz+`M6sAm*ZRs$IwjI9_!PJ)?a$hIh(uKTpX?Xot5<-JP7cgOBx=L3P2Lq z-FO_%I)sgsYmQGe)a1V|ZY12tgtkJ?KesEp$-e8nWqR2 z;A*E3Z&LSZHngDN?57RJ9KLY%ZLR1VLv<*0iD&U_J}5GLO$QFg`BcDEx6uBPz?&gm z#v||n-j3PLVSj_>JZwB>ZlcIGD|po!dUhUQ7uH@48a!+K zq*gaj1L*J7T!EbVif9?MeVwR57pNy})`sV%UJ{X)DRidVA%6QSGyp&Y${zAF9ME%l zy`m@Vr9a}ldY$MY`o?j*H~aRNN|#mJLeZ0-w;OVgeyl{=F551JO{`Z$b`_x!kzSjS z6juA)%bn+)tk=A5tHC@P%p8pc3=xM(Z~ZsiAfsWjJt%)Z#iJcJl13DC;r#53!DTJN z_E$|YI-qW+Amjqv_$nNYfGREvNT`jVPiHczZW!%urk;TxsSklJ6eAqC_t0Srm9uvB zznzxP)}Po29eo1x#p>I6_7(uel0Eruj-Lp(CcnglUsyygdBR3Vb>8!b>~<=4Z07;* ziKa9E03H-!+JxDJg&nuSk-z(^fZ_+JLo$q&iLI?|MlSm&Se206?pfY)m)v%XRYUN` zP2u@Zm3+^@_Vg7u@4DeF-O;OuhOIBoS$V**7R374> z3taOE9DzV&-~1x8$(1fkgpa2U7v|NIKdhoPHa1qvmcO`W?b^b<+(>a*!^HCl3j_HV zbU%1ux=x|_Of)ono#?BP-CfyG-7E+!cw+4i&UdzF7Q11GS$uHaoZu}xMX;F5hTB=A ztpo^pN3067Q88<8l%;vlZQNC1MW;2ffFNoJ``OjWYMqszy&H|Cr5h#0`#cGw8oSla0G_H|nk9s4ZR%T1JRo)%H%~rdtH=FH>AU7*kIFfR{ zYwM9#q<}(x+mPQdI(em4{+lgV(4!C=J4H+{T6)?mMEqVw+q9cn!(N}6O=ZazS z7fhNNXylCDVb8UYCbCs49ej2)beMP#^TItSoe)2;I=zf$Hc$`@wN-%K5)|%5 z8B7Vw9x6Wnq&xKGTC(2OXLfuDTYpnvioJw8K*gTQ-)6m?Z^HD*4OjVkLlhvN(=Tpz zO8KAD9o)0avzh_n0^T90X{FR)H6EuKvc+9zFF#yI>WtFf{GL1Ui&iIrZwWHWoWhhQ z`(GtZDBSz#KmI7Y5(l8v--|v%cKYNw(d+Q{dvpVBSTIbmng#cG#T}54X#e*&Mn=QK zW~(Cna7#<~c~ylSrof#5sBVDDV4NIZhxJ-$MST3d5U3;Gr>+a+ECw-QlG%p3?pYeO ze{wLOcm>xoe{Cl7qaZ&L)0vpgy;pQHG2ccKc|4bncChxjz*pBFf*%tJ7S@@8lgE*8 zs|&%Xa|0`d>qf%mjDmc7KS0!QVQw*N#U}v^DxuDOy|#jM{AlL4`}u7%LGnvbS1vLe zF_#Xf&h@G)GR)5W#r_A(_quEE+aH1ZpQi_yp~=2Zx;B^VLtw@Ar`Vc7(9{f*2_1a3 zeGP7`X9_%hChgbIgIwHOMzvwCVLCut%qLtjojkeiH>(YGA|l^U4lps=!(X&TCF9## z=@Zfh9@{=-N_z1OehWv((ZFULHbFIT<3S(SHydM5r|Xu}{rkYasu((PIyPAszE~O! zxUX`!M4!#H#Tk$LnwL<#NW#P<-mpmeCPp}0AZR~%d*Gtze6YW&axnzSQj<5lkrq=} z*q75w^M=rJsmtBIIN89xP4BT^QeNaf|KiK`iSAHaTbwuwSwPex6G;ZHSPsXmJt-hA zfEl|8|IIQ6iEkDexR02i>Gqvy?42wX0kFq~8d_AkspSQ2vKDn!j;->X2+(9tn=J+U z<=lPKu>3(nbZ?9Ex7hC2M6iO3C;;$fr|T(SKJ?0>nGc{ewD@`zp+&7tUwAaxqIh%p zS+O{S6aXmkW*%d|tqTD7vnS|MMRAs!a#I1wnUcko_fK1H&nP9*eNrDNdZH52LpXP$ z7#$$mOafrat4hx20z`B3Sa3$2ui0ES@52ux&g}Ni;TUHC*!^H`^t`}G@8}U|*&ctA z*ep-y80Wj1r7Lf)h~uIGT1|Zc*e^6JN`{}Z%wrpVCP8v00q#Ca9`^JGAAbDVlxTM| zk|np?QL)1BOY@FdwL&g4|iVvY>o(CIs(FqwgeP6^V(|+&BEUT@t!hm)!u3a$oI=XbN;qQG92IiBP57F$q(D@Z)GhdC>YHdSq& zBUP_TBDO)fw=LuLq~uM{zckv0{{rqkYjZE4yOU*LcEg5jUO;%}Sfz=ePZ=j<4n9+1 ze*dOX^puvq+mzC|^|RfA77+CwA#f_x6^Kq6ry3qKQyIQkd#JflJm(#HRApAllC8Y# zIPo#4i{7=?+Y|RI9$?b31cq!_9dz-yk_ImS-jbeYI_&;6CJ^_fz9M@qcvKpiVGG4b zD0&rJwmBJ1$E<0`yr65F<1OL^_ygx!EXxQ|KFmuJFaYS8B_w(tFIrG(vE0lKxbWBk zx!*ZJ#whiNzubLr(7p?kJy$CxSPQ1VmO9Yw<0}QQi zK^0G$i<8js30fFmXvw(US%|%$mq_9YlDnl(;_Unam_QevH~}UzZGn) zt6TCEiCnTGg%8l#%uG$8`(CmREzvY|91~e&IZx!Eb|P1cBs}JDSiWrf-LV+pnzsww zZri_4Sjt8SU>j{J<^2pD|M+N3bGw3SC@Z6!lcqTA;B&eLZ3W?ry%9bJg$8zbW|pG; zSlsdQ6htrDq}Xf!Sb8KmU)(Q9*Z#-5BapXyZ2`2y_-3K9^6Lky$cXFQ&B+e*05rSp zDCTa%_3-k@EBm|7w|hgNX4zrL?%qxxhuZ2{hnIa zDmS8XmcbYSJ-=hY(QGs=`hc5wR7a;!<~?WYSsk;}=cG14dJ|hq$sW$1ZuPCnT|Rwo zJg_n3&NB%XnIDLWRdWII;Y>@pU=@(XgH~A%|F2FKrV>fm_r5ERQLPZmywb0081yqU zBb$>+R@Q^i-v(tGAOsDC*2oB{zrac5e&_Ht!=cA0xpw^aa7m+ZELf`T`y z>=fd}3fN*vhZqkd*hOt_(9Bax6|><%LmIEc@F&O-Ws4=h^(Ny|&W8G(BBcu9eE{I;E0=N? zqyEYFT~U8l5<638X6QS+#wX)p0g|Xs(okue3=vYP-UolUwcNsO1VLku{W-DP5fH%M zN{VfoTVuf!JOH2o;^Id%prDDR{FJ)gT&iy%imUrF8Y>j5&Hj;o;`lI5A_6Cd`35$TpAIl7=TRm5_XI%xRQnAB(^ilvWWAS{Py0kw| z_|>7{J3^hXdx|9`aAaI|cDV7Kt0zn)^(aV}~S!1-@qPqM2&a zf0ZDdnx(H`x~^r%Dj28NS!kw|TXGB5k%Z;NdP0rem=2xYhTs8$L^SC`JQ9_ zB(p`K5@zsh@RYuf@{a`omAEwo%^ez?&N}v30v?#Z4xHgOTMXwD_CDRLm!q8g>_e#& zgeB-fVjH;lAkx^7N;wOp$$4V})*+lXNlHA=5NOjZ*G?e_TcIGK?D$PD@!_$t1fGS+ zFy)?@#w)->`FrsUYNGj0(YJ0BX`4A3j029(-bvqnpvA3T@<}SHM8gpY1pSC-%co8? z{QSXOywbNeN1IZYV_ z@U38UwR;?_zR9zyK2UNlr1WKx45f;bIyGN~6gEaPiXThFq}!jG`x@A~r>zLw$sh-? z8Pm?32aIO>2eTWKlVOI(bNke-(7%t$68BeH7=hw}9v%1M$kpXg5UKj=ye zuRe%FeU%SFE62W?~?YjNo2mK>!P zE!FfyBfEljV6oJ>NhNiF(8x{ZZLS#CEH#$> zb9~1<*Y^+Dqx-C``&yLDAay(%7c=`1(pX9@zIdQ9xe8zWW#?kvJ^x|Ou(#hPd*41- z_7q8+!0f+|2L*Q|k1BA)lHPWC@w7#1#Z>(aI6L1qNGy~fU#IE^V}P%pvBd)5vyY8A zN*xS0g4W&1R1?)qguZg8vjcE%y=c%_4;_gq8899PC}-ib#8+pKYktqW7muf!nlm<@ zpqUyi_Fa2k!e$MAtW(W7oOVglZs+WpSIH<}tXIwUIBmIVHj^>0a$9Cs`W5eRn%Z!x zW+-7rDci48S;p{qHp0@c&m-I`ueeLuJQqJ$e314mAel3!y)XWWTqR0hnKt^OX8M`c9wYZo$ zmrLFMHcf%kDK_xK-^c_%)O3J8k<|FC6)4`a8_S>_Sh-csDeII<38;MDX_+r`V_-mu zq~^_O*iPdR zMNjnH;pr1$opG`F$(B$XM;%qKHkTY=iw}>n!@9o z`<+>h-bW(dt_0xvMUWmpBe0Tiu~l%vl4eGIBtQqSkX2BaIwn8s0i6%NMZql#8POo+ z|H?0X7A(iu5unVi4S!x9^J9H5V}S&`-zqq(vu{v1+L}?nY+R^+%Nppab@W?=#)5yJDYirM3*p~IRO{X48>2@ZO?~oa%1vPcdA?n-Fhx#q!85@C4Qt5?(5VNXUD*d!${zudcr{_8zrU&lFqHh4?cW&Pll4JltGMt$i zS)2T+m1lNu>$elgZ^=sNFt5 z;3E}Fi^dgIauszVkA({}t^4(7b$jGHPvh9$E2)MX<&SV_CLl7~*$nTm>OQGv zOJJwN*8-@`!p-MNGRSYe=*ubDwKOxbf`S4o9SpTIp67b{f}AQWgRjpECB|7aoP5Dg zgl@wExLwLYoL1)R9VD{%Wa0&=0N*t})V*z}E#Ylr=UT9Z@5GDz>h0^x_+4G~R<>Mh zT5RuG3@wp{#oFqlm`@xc8JY8SeV{-MtD1ehqE zJDHryoC2+SB{4p)snvg4vJLt_d)+7>dWSH>5V@k-&li6P;p8FONaKw!jV&vpP`QaB zf9S6RjN=@2n(#!ck>kNW_b3_P?&LMlit=r6m!YG!;J)>4mGp!_j4$Ewc1cV5&ONcJ zO2lR*1^6rv3%1-Mpy73SffJ~L-^0UVLw40qk>?Isa9TWYWQ%w^sYEzsEWzYBQ^6}v zNfd8bT(Y=4DXyVzk=En2MM6nBP-^{7hS@n6UqVQ$+eEZL%-c_PU-T~C=PAOnThY-{ z?{WZQykZ0nuGss{3r3lik4>V6o*LrRMgfELhysR=5=bJv;jy&|hc<#bhvlw@qjqa2 zQ`6S~WblNv!m!2wPHlh(*51}dEd_0-4W^uJ#avtwNW%ULKa{2>X!1w`q8ZmDi- zk^fY0fv-LssGR85g}8Z9Su0bl~r!Ta<|(DA{t|ua^z<>h6)qL5Z!A58OFf`0J7me2*&$qI8Y-%8S9wv7yRRDBc(3heuKG??|a z)3PIsAkNvvRQc!~rI}BEM_{9J2DtX*e#TD8+~UsQ2ay5%O-J?g=AQS03kU~x_XRdNkmjuT5Y z*mYQtKLb?KR{26-IgN%rLbXDsq?D8YT~%8R@14|xth`0%&|uT6%bNB~if2>?)VB&- zNZx-oXire$^LbP1T5V&J59Iy)t90z=`-8EBoDnGsHBH)6veoq+(jV`|maJN}+RJE3TA}Xk9ilQ($8$wH-K0>I-3_b7M(l;=Yg7H# zmx@VgY>6@BSVLufQDQ2;ev>QXN$k0SFYp}moPWI%sob>`|F&S*>$tmBJ4pJB@D>+9 z?adnkc^11bZ!*Z=#8&sgY#8U~uRa|-tm%QZo(s|7-BJ@>*f+iZZFYKffBtHfz>$=V zS2ACn2-?;H4VKX5qv5SaA2cXs7#WcB`N+>%c7je|A>;sD3TBGI z<^9vp&^qDIYRdYay7}b+Ev*69ss%*XE%^}c9A?rw`nw-mS_zCJzV3?XtH^{Yr)3o@ z_SCCkT4ltr*Hc0{TWQizvHaLm|K??c{Xnm2iY{TrEw1HB65Z;LRZO39OBi42D}MuP zvB5}GUEWPR!FEO*$y3#xGi5Ny;3|{HcB@l-FL>V_I@n*XQrx3eAm;oKc5$Gj8TPXZ zce`PPAqCiUDvbi#-~+t(az6#w#S+HQlS%hb(R=|HGw}61SsQ*t`dn%Id`>9U5a;e) z?0cLFFAb@uMA2o@H8CgK^=Ue%@#}L&&&d-?3N^RhY(g45BD*zhJcDHLwp9&ACp6;b z()hA+xPy%Feg@O8fXhnww?x*jy0<@$;(Ra2^^)vZqkBfK@{3+QYOwSkh`8#@KPbtk z=sVaVtgw#6UgDYirF?2Vq&ojWRscjQpAd8mh*Y27R`&)duvAq%6^9>jIR$CxXG@XP z@dK31WLT64ubKB)4}EALBF(kG2Z3q&Km3El#J;o*%1mI_jmN?*)h`A3X1+_svtYSd zB=esoG^PFRXz3_1GMT6Rx1mJ^NUY^#^tbWF+%xb&uHavQiXvI9#-ZhJr^|DD*BQ^x z|9}kggbx>|Cv*PFau?8;b>*G1|AVve)(6T;4Ey~RR$k5xH^+NIjMXc|za`*j!UXo| zoCrTA!$+F|Yxdb|8Y&(CKV$;(LO0`oft*mnSVQH{XMeDmGd3n(9+khs;?lIG`X!f| zoPV@ACnqe4;r&kw59hrK0!i$JkbF_qh$Dkg>i7>JNA`g5U&nPb!JM>sHUE`G1l6LP zm5~2ytiMj#gMS?Dn&QKzg#QmZGs$A#Tbw{m^^Y3j&-8J9nEq(WQtD8e7Pn%84d>Y; zaiJlOnGY86n&IH%%JnPy#fvqTgg&8E|I?Az9~Ti`b(^PP?Qj*27O8c!{A-_D49*CB zpqV;$oobSs@f(M~^PE-XM#`VDs14T5Ux=R>QvB<2`WU6MANqfJ^fk+)4-VA+fN-vF z*gpCGqf~bR?cJ8n<^M#R__C%y^FJAq=RNsU;6H;~G}R630wI4kpnsu7(=7e310MPp z`X&79a86}vL1(Md{$F-o-R<{lpFQ=fsE{c?)Hw_KSXPmk=%(J<8=ug;oeWouewrOBH1>+k>3+ zCL^*f0%r}*+F@FFQSj4`EO!WQ^(bY0Gi*-pDf>N^WX?O{lx{J|=hXAEL|wHnN|?Na z8)}+&Qw@@nhO73yS=*gghlH5cPN%$dwp3fk*6|??p*)6rN$L*qq-B_Q4P=;iKBuSn zh=O*X^DfqIyR+{79i3iT=;wmOhU+26$gAz{l(2WZ4+)~dS2wRjvflz82BI!_pmM)8 zZ*X*-Sx^XdBccb~MUXAj@OmZcy!nvcvl??VWUwC891d$f$-3BQ@H zr4RVzed+@Mfc{0b+ii67yEW+ag)7Fzmjq@}BH6C={j-gu2F1`Bvh@8LghFH4aPHZB5PU|4Q0kdFtC5O%;$ z-ab2RMfg&FUht2kCuW$A%@hccH>PhpTcDT@c^cg-e1Ds&vE4U=XOXTOVC*P5n|BO~*nhb>huM1c2mZ)JnF<-tNdqy7Q*+bb7( zPl{NBT-5U=x_u6~vdP+Tztq}>?QPap2Q9zadx|I1;uN(5ERK96TvRxBIauoTB@=kw zRY&Ut_y7)D--Jry3*tWyc1x#&@l!6XUR{gr%8WbGS%)w3hL$#dGuZT4Y(UtZqVrys zMcSEPKC8oo_RrnDRV$pjycuz7RcNEC+#L8zs zz;QeueFAGpg-kqXd1=~x?OcvRt;6RPj(>HET>QSdiAx6d^q1{ z>!Y^)&`)6NdxN_!nTCMK6(lMB(a#+ak5@1o7}Y{%6NC<@vO-^c6U)EV>g%#B*K4@< z?RcT?Q1A@?Dkj0c*+q}29{pxS61_2X-g4NxRwQ>ev+j2@YI`~QDB!$_!OTV+PHTRF zYG$2RS^QO6F3cJNI;mWKSyXVH?@`rG86KQ+%i?{U|JM&9cv+Z(#?fZso9`$}Kve0` z`kU?M=OX{t3AhL z#b|H0(L0AMk<*9rcM)b`VTakR!I%)lG<2f+$5_upE%PmJRtr0n4T5?j98QpAjS*Wv zsnFjPPP8wOb`2+jsP(ODjozEG+jJ?#xyTa;w`YXkZ1IGU?p`*$H|~vjny6D$b#JD* z-|U&)>hYv-I7jk)MC8=xq~7k&=TkP3ivfcq%}gwqytasN1nazx;zG#9LNgHk3r5(I z%Qmw(NxN;aQ=qTz%jt5yiN^fnl!GgtJky(-vn?~04=aI3DK8aQ&inQ-1;JZMWd|`8 zf*4B=X0PxwB*e7My72fkDRR|ZYX7C8HaF>ZhCf?87GXd{uV8R@om z*H;4rDo0*VLKL1ZiOm<96H!`U(I9pkMolXlek^0QBx1z3Ft+Fub6F-#6)o(l7jeh` zk~szKTFVuREVxxs8EsN?vT zgXNzrgoC9K1-p@XnVMV`RicskPAdrQme|&a`74@BHkgqJRZ_>ig#Ne?ECZl zNAW7?J&y*<91i830lnMFpU)IS955XMdIqA&#WGhLV&2!D9;4Y8$#}!Q=PhOv!hqM@ z#pXn8*{I`j4HyRyaVw+1f869ml#BjqJ;kio-zs7OzcVCd=4gTD>ibt_2}jGC(CN&> z*#Rj;oh@p%z+uW;=BiIo0Km7Kd%2k+*e$?l=!v(H8fo75^DyFC&rDbQmf2JVwAka; zHR^4_Ns{82(1WXfI7Ui2X73KdI(Su0GlmLd3z-o%VDFAtp|=Rs$&(32qF5u}4>TV| zZ?j>)ffTaIR{^+ch7}iP8~S;1APP=iyiCF6+a7p`2-_sSvxP$U_9}#5ZsZqP9Dn!p zK;x&N&`rdexzMXw7h*c)JfCw^>eW>lyAVMpHaMY5x~#cuSl!y(G_jJ^<fF|Cx1klGL#9R~#U!-dM=pd!pb_dX+Ls6*? z@F&Gn+uA41`BdnQ6U7OYA-hx&S>aB7s6^+exu6R#Vk6OMp&jo*A6(mBe;>Wx;#QOb z|9oX9Q4qe(pzhq+7!3Uq%Nl^wJs?5XPOuEWcY4w(L2Y z07~z2`Us)^{&C3}so5)jnCbmaGr5m%6d8X~rqn#pWPlEC(j_+pUtF~TV{zXDqC$_Q zfr{^3FV4LV(Jqi1MKDA@NEem^pFn@4G4va<4j6s*1iBY;0h`*ln!hxb=(>1pU`I`q z+`HofRXo~W(kt9SUGAN}vfIxI=@;aot)%yA2>>u`ACcmSWK#Yfl={tG`{>R20H1Uw zxUwMf=DDM2fyR^DZJ8+#Z~*=HHOWt*1c0W>0^iXIyXEfic}JIWo?j|l1c}eF?=Ln! zTN#xp=$koju(6A%`A|{BN&n&Oo+Uacxwo&1bLbG0tgEOLm~aa)=Oh;N%;H42VEcOF z2B_H4_4D*DkFy3!i661*bC@sNdU$#G*^`6*d!IM9fr-vG)9U7sG2%GK?^w{~FcbxImuQj<@LCTC`g-)9sfknL6>htV`GB^fZWUNRqLgL z+}sLY(E+_u{pfsCpUlsgQQc^>NZ%VVVbtd4g&gEu)avLPxHuGzW)1%q zhGfn*CKTM)k+>iA*viYr=t+5%{i}famfNvu5X5+)Z7RX!$B^xvx9F(I`K+C*+3?8V&Uj;MI6Xc(rBs4Mfk1@kYE!r1N#%BL=Sz|K1W*Sw6#Dt9zFhq zc6JVIhw6LOa{BGwgAI?x1q$8H(?=-1!osxN~<-*rBXJ0X!XRq|0X032c4jTqqs6Sc7==Bsr|Z z^U?U+h2mOI=P2tA(G1cU0C@kiDPOn64ba>uRdWG(_EvW0u`5b_zUQQkulU9fw%KSk zQB1IuCD8D8rPcom=GL|X?AmN+UA{(vSx_ET_JnCQY^uvw)5Vy>l$4&s=g5X~xNzqO zQPfq_e!!9<%Hb+uHvgVXO6Sp*_3svd&bZ!oZN%Ziyd)lFph3!mq-U>-%zRcr*_<+I z=v3(+dnZ+SYvJo>0lSj;d;JX^7xVMUphktO!4SP4DVVE~0V*RE9h*%ap&WThX-Z;} z{NNp5{MI+XfUTJJe(U#0{lT%5#;((j6T@A}#-(=-vz04@9~mP;PjcN-TS<1!c7owU z#qWGpQ}yt=rBO0hj|Lcoj*H4p`%+#(f05v^V6Tw2y4G> znxSij%lT{m+9$%1r_Who0kt+o8*WvFGW~A{*cXftMN$gtw*ZwI{mCLj#SdGIaR846 zC#LeD;N=6&d^zX=>iPVt&vtp`0IPs)d-7It(ZgEN@V$av?;dt2R43p(t~n*2Y2`-! zZMy?%CSAApM_xXisVBw{baP%&yie|8eOqT@7^pXqP1aG)D0aol5yW;=s11l;|QL98C!slSOeI~Gl`pL&4gE`4_KtHVw)Sg ze=Odu0tsASMtVpd`X@>GW@rl7Ts~V85;}Bkm>-$w46pxq{!GVnV}rrP&VOlkUbvvv z^U~oYdB1Lc57v7SUu+w)c;~&uA?7fhtF!;POQD3snYks&Xq@`ywB``2qQke#8YdT; z+<@Iip?fV`Ns)q0Sj*{Kv#f~r6>EjigL0L+&@oL&l?yL`4LN_adsQ1OEFWQT z$ob|)<<&|VVk|dL%+qoQhEzh1t;zZG*dTWpiv`~vXRrBP>%f~o7k6F2&O;)b&1BG9 ztTqbG2U(F%F?S!f51BvqlxS zOgV0uckl+C-uyt2&-yg;HbMc3D1ODt8BIo#y3ZH) z<4yDm|30^iJ}f3N>qad+b72l^OyE+aM97`j(M;LBlD+kw6i-8^QXssnPX-u zGVOZXep&j$Rz_ZS>Iailnt0flPr6yfx^DMHQ@R)xGwl6~4nJ&b#zo`kt{SdDvJ`l?RP=Nsvt2Cb-VgtZEn z@8j7&kfaP#>TB?%cml%<3erb}3=jH`2#8_ry!y=pew?H%iRz9bNrnZhHHspG)ar)R z@QcHc-|Ro$c|SyzoXNu42OMZ)l^@P$si}+HV_>>__N!xVVV3VZM`iE-#nV}aMb(81 zd*~2wL}KU~Qjl)x5~Mq%k?!u6&H<5*k?uyiOJD#2X%J94q+7o2Iq&)AnjcT*Xi&2%soI){lu?vLipgmJ?Ov za9tg7D*&}_LPOA^!tcGXD4=#t2s;X@sy1ZwudK~?mY+WwZZoA=OO$uZKCOnsD|bY4H7XoMG! zk&*E^TyEhfm#(krTLu};)ZV%d0vc%ojET}`1ai!Sf7!yuOnkfx=om>8R8u}oY103@ zlkeWtk}@$QsQ=={>Z{DNJEze9?dkluPL{v%r>?<_0tnomyg<&`EM)q3yYhIinsh7w zi*sEoEid zI0j1mckFG9q?edJ)U`Z>Rol+d$Wg&{De6VP;cF}8E%J`Ojge)iPOLCN(?9o*Ut|+S z(O*U+T;V0#$-?^umXJeCfb%IRxN2*s_2S^IaOfHs7+6|b8u$V9fY5}iZ{M&%QQ`fe zOyBCWcazk*Pl2NRfJ-e8k5B76DIW%H8}RE-+)d+1=GrT~PF6bY<`HLSXYwfwX0JC) z)D$R`89|3ZJ{Zp=z=;ziVbT&p+m2ocAK;1(hVhd-{8?_KUWB%)tF>5@ZWlFqM{78FqNrwJg&`h0gpwUPYw$LQp^wK$0L8TRRIE zgpBmGKUbj--1}s1m<)z{oO4??t>6&RK23OGadBfy%dpurF4>QRwqD2#PYxJAwhRWv zm*in<_MFgPHL25`<>4^T&OeOvC0c5x5+e9-(1w~pQ78q+<6a!#?E~ce2x}& z%776&Cs~%y#DLHqd+9IhBL`zvlToN#2T$ZNm~ z(o|D4O5AChHxj;HapQClmoid!g^hePhx3i@oI9;`$jo0>S0Ae~k;lpi?$ontX{MGG zLWi$8alW)Kr)21{#(Ynp5Dx9721(OR>#{B_%;JD#K7L%EhW%JQ((4Wku(6R34E)>d zuq?2nQKBp;WEI(!HGklDUez+2PRdT?jL_7oBImQ8EltkI$OyO|pPWp5DuToPSMNN4 z38G}l4bpYs>z=&ckfX}&G6`7>Z5YWf82|K(hy>?HaX}a@W@x|TbJQ>g2M3Tz)6%zZ z3PQr|$i3oDeN(He6tS{1-@k)QR=#q!dujm#47}9a$G_s#`L^Y&ma*MSItBp3!p=^{ zhXmw|IM^ozrZyB`o1mfCW@2LE@-p6hD6Vh#6xd3PnSQHl5$%|so*rmwVc{+Fhd4C_!a*Lh0p}rIH@Ajr zvhXCR7i`pG?P;W~fS;fLAQK$~gOW!4SXyGioaKm{tC&X(lSmo0=QDpP)92mU1vE7a zWh)~D%_E9!Qxb(8Hw&ZJ?`72ptj5zVAxmvd2jfKCG_w|bReJ3VVq)vIgOVtu^*pQj zYFdCilFMGFvbM3=+uz^JCW}ZmRs~Zbw%q{)6c+#l*uTawtFyMV%UU!m@cSWj>D^JF z8pSyz*s^G!!l1NLGLhfDymfh3shtIt{~Nqc^#=t6NNhAoOmkl-{&u!O)pj+aI!D-x zmzS5~(M@c~1<~TLJOqht;Twk6J@h>=Ya|H&p#vJ%>9~bo5yc|~Gb!XAA8)5^(-FRw zL7$Pqzd3qQC{qkT zLSSKI7UVjmP4%{nl?h(}=iy6fc^K*_#puDL4f)+yt*z~OUNNY_#x1$G#x2zQHje+MOZ8MtJCytf{ z3e;&aC1qq}^z}*2?Z?vCCMMVbb@S;HAq+aW?x?O9@q!EBBKY!mavYRb!}8+G3hZe-v42M)y*7D6QinuijgNs~KAIoQ!) zbxl=oOpNFj4j+-+n|0iNOw_P+j{Jg{mteMLnzi{{uvxRNt6RN+ex~3KuuhnnM`cY- z1Ei#M~>-r@#sO^y$-ur!&3`=c`w-;Q9|^+6p1+q}Y+#Rr*CtX9LkG&akd8Lp$fgkvzln zCB@`RF4@Xf>#r5-bPt{Bq#|QDrDk}f_yvF}W`(lKkqZb}shm`b6X*m~*vht<5 zxjA4C+4w%t;DJJ^35W;?e(lse*nZ%_-&@T9!w-gr;u~h5fp|l~&_27!ObCipCYPg>chuL@`C%?CtSov57MALU24ATPo_DJ9J#& z=H%EAZfQuP8x>{#arN=13hhjS2G)0(#gUS|-d#rXmlVRD=%Errx`2w62n-Y;FI(y~ zfC2WVPv=^7wd3cRvUJ6bx3h)m?d>8S9v;9Ofk89a(oTVn&egW6x;izO^iaAP*O9RV z6f<=7cz1t4?Sn03+_B|^I~$wArfphGV8Vd>=ja*T6YV%kFq_RF+C z@^jj!;*z3k%Ua0-XTYkE3NZBWP!b@Ine_a$po$^POGFqD==5*qTFBI;SJkr)-k1A! zc0Kq5Hd7X#_E`(v%gmbSAp}# z48iyINRr=vZD?rlGC~FI9@cXVfl%950WV=|@=CbeI_d}*no zt^U&4zjHnO5?vw*Dj%&AO*wZi_b4%c`AqKC21s9WrihCGV)znaNTPiw9aav`&<$lUB z)K{l{^)2COIY6{~W)BoBPQ5U@FajAH8DV8+J~mvLu;5E17eoe?S5&mMi@=#Mk*mtf zk%DJuHRWOMh9|qbrRC)Xsp9@e#0_t3&I+XsQQgx$k5`%kAN5lf2LyMdI_cJf@$o*w zG&C$J#SX+tcQ9#QGAcpCSq-}4z@cp4BZtiDV#@h04L)s9;pm_+tm> zgfdQf{06QDP=0AGH9j6c505}jzj@v6_C%IBrxt-sKZms1q43$_Z&&m%8mSY#Z6;B@ z>+J~x*otH99BI5PU@C9*uYh_ubeYJ32N)Y0BkOpkPcg=$6su$87C6pk|4F>9TE3p= z!?#p#*&|Rq1&|(Xt*a||@iIaxB@-t3WrIfaOi+2=qn~5kGIsgsyNCG>BIok*QiPp^ zm6x~5>ndxbKT?J+*|6OUFtr8`E)`&yp!oQBfFZWTSfQ(>HTPp$nK|02B=uYUuTx(# zQc}RWfy&2~V8_(~8lc|uI;s)o>P2+HHr^Qf^cE&m4&dy@OD6C#%_BEEx zj9Wf4PmiIBF=3)rH{I3o(NK8zE(S0>m`6v$VV4Jd-T_^JO7?lPR#~Z-H=mL*J);-J zNfa$DxTDoxfhtj}@9_FFH)*uHhnHPuvx=pdurMH&mW~oKGxq`0@P<`hJx}IzbH@BF zO!xhJbv>GW^#090Y8hri88t8<2bf}z`3NX{vfcF3uALl2!DVG-fEE$z>+AAv=ByJwYGSW+_lG6I39_O^4Ak_sDME*dG0i*uLae?Sr|YFyshJKP7< z%9=JgRU(7DnU0PZ2c&-4VV(1q!W!%yId8@ z#I%t3A*o@pQh@7pSA$^Cwe+3h(h;8oSYSt2K}^^4vj(}shs_)H6LZ-_K&|cV9y%`^ zE;l(qI}5V zikSA@+`Q${iYJNa6{O;Xj~sad^Sr32Xwa;AK#rRvjv0WnW&8g`iX-6`T8l|aPJThf z8xW2lC@@DVx=70Uo$&F;4BdbU%Uq5;@g+R=0S%0ie7uYP-zUbe{@hyj^3+#-2uDS7_wgS8i zK;6Cmyu49+z4pqn#crvQ83Ycx16(4ipa*w7?LU^1OdFUq<;8<$`X}FYG3fE5hpa|U zu6rUn-U_f{M+&X~3dYBY=(^dAO+etO=(J2&0`k=U!ICySH7%`DzqP)-;-EF?FE>5g z(Ze}=6u;c?kp{IuqXC%49XbH#%$sbVgtcLmc6NqwM!Ynj2u*0_;{;;@j(;FE_UzWB zCICKbS^l86C;WvD9`B> zMz7WGS@ph^OO&&w`rv@y9y2oRBLItHfAdJ@NA8Nyse0e!_;}a#@|ubOa70+y#Z=}G z4?HW~+E;-00)ui6-FX@1+;BOUlfF|@B9zId!@>O!t~#_(U0xpZ?ORw*lJ`*?ZeX4Y z46jaZhEo|PGi^ai+u1Nd6uW4~%*Jd}=>&k`0w3e&fi4OEKx0FtcMgd3Tnn(1!9E1+E6J%>xmjuT$-hyI)wZYM_yXtYsThRA$?WJ85Jbm^Q|Y2Om(lD(~LC zQ*fo)Qu>{fV;EurAfnDRbiBMyE@{GfczDQLwFI|{q&|b`B@S|qA%frA{|E@zrg&xqV zb%2Z--rPC8A_Sum&-oL13Q-14i3O1A|WC9p0q3BYz;)9Emkv|luHiCj6V^!wupwPn~rYM zpQ4x0(F77t+(Ftd@!+_4IHKGy-_fma44>RNOy?JQsV&FRNn~oe>q{ zF{)9SZ3GHKcliM&VwLCN*%2xO4$oQk0%}sNEG$7i8CKbgUX#Ve#e?tCP#=&Q2K}we zLaX;)e{Lu&oV9EzTTjI*N_Fi6W`{|PD}Kw6_MRO%BQiJxNT zDUkgyMAUW4IqUVsOlb4BdFA}E3^VVYxs8@uD&TxxQ3yw9X$N}s{XBJVX=xdY6w+;D zN01b0rX>zK&Ex>?`JJk@|M8r`QEoiTSm)o?=2t1kV5q1l_ZR~Yv%PUWw^ zf7gh`j_qz|630v?6a-^BF1GRVGcs~>zXN|ySB}fHL>s727pNKK8VApv42SA^f{@X-#?~SNCly_2q13vwJLxW zMiUhZrBWz*V;;wyo0n${+zO`PpN?*7Y|Z>t!`%2RzNVI@SQs?wF{6nQDD?(xbURzy zP9tM6N}nkjEZFWjr8BC+U6BF?NWdyaUjE%X;iMc54Rurrfrn;XL@RVu`SSrsA~$4| zAvywOc)(3sYmU9^#_Te4ZZr4e99~)hSt>w(tnY(Mf&>;=#b~5c2XuMb+~yHE!k&<} z>24bo5N4jw`T_p6!Tu9PE)+uK{b5{>!i zUg}yy=}^FwKkk2nFd@J~mF|2h@4#TKnQyV!+l;tFZ&*ZLKT~`Bd=}L;h&|kLm^83OH@W zRv#=VOs;1x;@m%vk>H@?ol6Psz*t*Xht2v-;G0u5_zq4^PZu*PnWR~OEl9ZABBIs3 zWiy7e?Y!{n+gOS^j8{u!ToGKPsr~ENaq@@5GJsvYZ=t0PB!WRdN^Jnk39$3%IJq$- z*WbaQS#zE@EmYF*p-*mybjrj(x(D zD&s2q-;7YttuE4F_o*raG53#XfO~_6QGb41Uhd@glPm1foPXx4w}u>Gm01n*L*K50 zQOxUURk8)J=F<<^!@>O=X0|-^f)kD{9$sFzD1i;5p$_Pen@OMTj>o2OW9M9hadH0n zW^ksxHqViawHxY)@yc;2|0inVxCj|MscybKaciJMWN12wR#oBoA2RAV%+M$;smHf7 zJbGzk-{h=56aufHTWo4-O4U%KXhe5tAH&fLCM?Jd@WnO@bVhdDj%$Uxyilc#M@Iq2 z({`!gy5(24fdgOrBZPv-*0YUC)N-mWnp2jUjpg-g7S<>+FLJ#5KO6mLuIJ|aQyF;F zA>?>|rV#gC}XP++WPm#*H47+jAT9zMrLpnLQ5#K*d{^w z>1?U}s*dL3yTblk`saLEbGCK${ggBxK|M#Fg4qZuO06$;ZOcbOJp~Q{AFQmXlS!Bg|zod5@uT9sA)8l`3V$W_qe2pnsynLj!@8u>>yb}$tNGlN8) zwE{K*;87yp$QtA#_00b+sNYl7E)leJSe8Y|K-#J~aFGDiR;~}CC`I+sJ5GDj}X)UBzDy)+#cB5EsN&ikGED;j0*VHATRFj4(Cna#f9O z;Vccv)r;d+()jRRqu>cJ!8=w~l#JMS;*!D+$l1qYsH66KRW3-Vq*!8T#YXlFd9}va zN5o1^UrIga=HVn2RDVT*M-o@(ecc2^pS=~5Qh%jE0l!LbhKKx>us2DBX~Pn1#gF(X zKYVj`@v-{rSMTd%7A1}6`y@)t@!|b>L0!ATmi4!Mq14i}Y6{OCGqw7s==E4wSVf0U zLehy|K6gOgHM~NR>p(kb+}pC1 z{VWt1ysLPbcPWeSlk(QTf5*o}jl4?LkRses)K2Z%YlEi~ED})Nr}gwiK-3825=jkp z47_TaEtp(h_p3mT!hJz8U!v~8^eqI_HGorW%pv924 zscBjlN8_Uei>Q>@IvXI5Q-4`JCbbE|Pm(@=*3sAZ#H>P-i#LVrk?h_2_(bDDPul{F zPMy&!sh$Y{4LbuIagRF5T3WmWIHUD(SpC%Ws%r6rS9<3OlwZakC|v-5th%B?V{Sq1 z6)L#^f@H`4*NEEi;kT~=qcJk5m1>Wor*lrIZ6`B%>MWSZ#n@q=S;q`lR~?LBAGNCy zNXux~78R@mU|eANIp}s95e$YM<+>M^l>>oWz4w}_yW;5KsTZ>}U6d%2>mhE+%%AqU zGNcs=6Ox!Uirw9Ts9rN}>4y0~tL_j8!uLg*X4i~K)eSiRys}9eSjH>}0|>DUis{s^ z&I**YU7#G69AWV!+;r= zhXlm6%c{%Qx*W1hD8VSf@MLQ}pIad3^^#%)WTtNM{^oZuppavS$}8;d9iibrM|MKO z!0OG-iTny`_MjOhSk}sW)96FD0{L4w*7#S(NR$OjYFJ(gTqNM$5 zd)lq2U&@T0oMSvh?*&c>4s-s&7_kJ%aDm&)CmkEr)>rN5pogI5XR?cXOV^X$h805Iz<- zjBXS|v|5Xc)wm>1O+&}(2W@$?faa(|M)@Asex(2PkBtLw=|SYb8$&qhNTU<-I9x7v z)#T3IFrMkv{ZxuWZ_#V8qzrn93sD`5#Om)Q<#&89K)zaQnq#_q|D0Mx(%n$Qd>?RD z0a&-MyQs_5G!HJu*MeSLs(~(&X*Hqmgf4L;wu)?Q>{*=Vq{@+( z4ovh5hJ-Y!Z#9Y)lRtcTyz`K2>kQ%S=ZLG@8lvR)sfYj6S6q*YfqOfT=~DCb0A6Ex zL7i#v0|K|0n1~>rT#$A;1c#xXRVBkUd(qyg`S6`qJVk+MWm`2;&oB8DM#b#l){PUQ zSXt@n4FPl>U5Dl7fKeEITQz;5)!1KmLpvKsCBP}0e5>Nl8U~~vzD!u2pAn7)P}Z2K z-+6HrSwn$ne6eCisLd4;4Yk=b6w*Q=A)&O_hAg81miwJMtKUbdf=N+h_hZ2wlda)i z7IyXq-SJq_r;hf9F$=!ScS}8jvEg){k>=Z#8AbH;kwHCxyN_I?TP_&}-g#({iG@$U z?US24?l)`V7f~!m@sr+3f=s^>C8l4^B_nbN0RIe?WPXe==&EA7wDfV zYn@Fn58Gk?v9tYho5%S!@PaK=UE2-aR5FAemUz@sHF-T%WBIO& zY*;{w**v$6Gs=LUbubT!6lj=Zz@|l9g`sEs9@DX3>{v8w!WlOm3J0ewHUiGx;h}xD z;|BOGjOX_2sNSMp#eAisqb)iIU~Bed(jzje53r+i-6O4DsPaGV^9=;F|}NLRoWK;aM1|q?|DaME_yXY-pjUQhI+-@bib(va-F3 z8tsX6PPXX{9Bmjho=U8%wA6bntqKUZUHiVNr+o)&RLP|_Qizg;Npan{^Im|Uw3+SQYKC~Ql)=-8}LFBO+vRj&_UVJ6EH2{{Uie`j`J6L z8e?Pc`0W=K7G`(Pz01V6a_}%|GK=>!9lZn;6cps*Ni%>n%dR(uh#Jv=l;bjqufR^^ z`Pb;~98SPQN`^@EL(DhpgtrQcZBByz1O@=?eMhl}zbtYXMLb0DosT~Zta3cGm6er& z3$CbZXsEn#Nf_R8u(e%kcCa%rAOmp>sn2|u#i2_6^y%Y-;NwSEDOAX=V9gg@X|EE1R_2L9M7P!JmI_OG;MzaX8^ z-W=#MZTw9AmUg(j@UJBVeJ5M}@RT=ww+#<8e8`d93nXJ9vCog?-C3n#NMlW+3)X=) z-N!8|m0Y3gUn_CYNEw!IV{ZaBY}h*=Tsa^L?$)~o4vY1dC1Uq`>B;>t2laX-QawG- zF}9XU<8GR1mjWk3oQO65gNbJV^R$p-*e2Qa`)Y&L#Ldi?AX^~0?`|y>P8!<>?Cap{ zzK|PuN7AB%ign1PnMx2xsivo&ZU+NFA>6JDF~48oQ&2DI@Q}9Nl~+h0Cs8x5ir9J& zmTnN^yiQ8BD!v`DFhmswh-u1s%*U}gQ z1d762wCTRz%A)bioo75A5makf_+K41za+kC^Eha}@f=#Xy9AJQC!MDl6M0V$I|D<} zcT4pj4jP$L#6$Nq7`v~Q>^g14slom`IbJHFE_`n}Ty+;SdF}AY821luiH&L%K==>4 z!(#f)_CEd+ln5U!j|s8Arxwa>!nts{zKww)!G#>>(>V^$p>gR*&aZ=1k0ldg9$s2= z{KvJnzstXUmrVL;%--dlYA&_T1jbAw-U&m!UiUKgcdU36xmqx%mVg;L+Bgb++bD3l z*el5kMP0P19*q4QxP=E)9uOOP)4X+lyqu@{y%3R3LTrfirDRgk9TK+CZS0E$75H5! zcsl;BW6>uF$Y6~sx-38!fTx?r1qX!PY;7e+Qbj*$%rrW!9GwnRVPGLd?z6uTliU#* zv^c)=WMWpH0Y+!jpzElGFKF$3(of)d1!AUgd1nya1PQ_~Dqwgo%qtr?h@raeo(}%8 zlRH7Xy^(7H*PV}Efm`wX;-Tl0!Y8{!QCCf86`!bk5B0cx|IL++uJy-bvSR@jm57-kz==q3jFTF^IDZ}H!fiz_ z6xYjQ)ZF=NGuE#KV7VRK*iiSbdOeQsoS!s2{lYSz!1p(Ze<>v7_;mw4>1Ql^+J)m{ zttnkHHTU4@enri3!#Pl8QigiIGx6B`z$}FQhSEv9oSSiV_1fTOP~F453u5gs8u%ZoX)FmujIq}>@6QS@N9NwJ!fq103y(ATE|vGGjK-xDos zhxgwJb&QFTblWW_rg88u31el%ymz_>^%heY5>8g%V!CAgBFcN}h@EV|fyeIe@B119 zc0`_#%UL8<5Ev8ne$QV}Kr9*-K|g~|Iz_g=awdvg>8?Mrcl@LU z-CS%XCc0)zVI`OgxG%RjU<99T4PCE}Tq`PkbzDy4MhI?oxFL>qccYv}5u@lJ{{g5f z2c+7;?iCfES>E8RFY(vM>jU<9Dy_dG{fQS{soAh{6l>D$JpAIW0wfTFQueHu`N{Jt z;qt#f5me;-E-OItd&_`}n;X=#wI}p%M6_e$@%ArO@ZZgufvB-Jy$%~T$0j>OjUP@< zZ?RoW9FPa|7~nUC#(Fx?=D^3cwH-VJSB7&0&=CL)nm3cPe#{>= zX^bP^zlf#Ac$wW!altMk>aCCSW<8*qDLYy7+SBZbMF-WI1r`;0^KaPr9U2ERuSV@s(ribxXJ4)&&|M z4;HOd`Z+eg5Zl?=CH`ApaSg8rkIN%}|Ghs(!2;G!#EqDimV=|?T2M=KbF=)`a4>3K z;N2b|J&xYZ01}enf+FYV=EZJN8tF# znoa5yjlc%H!t_@vP~&UvTmclaFfoI$wsU;HMc|TM`*{4;c_oMU3I$6!$In$DT#6GT zW+ykuC>aF(3XIKSNz(l4k1|q@M#M+{1Bs*4m1qK_>leTE>;S zmS|tEpFdxB*`bKWdl@iM{;9&T>vTygi?498vSeJWAwM4k0&)k$0e68)@5XL6=>GKy zAaa3PV^es|?J}U&QkETYoYOhXW?g0yyxQNZ@ise*ZC{J}<{`cJ>@9jOc4qDBst)fb zUm2PZMSF+yXgLj+c}6^5g5Q%X21EU94#I|NLlN7yyVf3%fIkp_r7XEaN`EBkp-p;a9?N;Wy=grWH)V}%S0=~BNBibshatc zgErPNAn6Nyre6TXvN#b-OUt1l)F9o;G$8g^GLyWUKXnb%^_(1E4VZDN5m4ayd3y3y z7Xs+j_s&IcF%w$$RRG2&@QF@9ra;Y_ux%iu7s7UT27;`cDC?@-TjEUSKsD+AY|CPu z89|o^AQX;dEHbVTuc85Lf|>*Y^B`YD*kJiQfN1H-HV|YXGhoJuRGrzLz@?#Od`_if zrsU4CE4+sk6cz1R@*(dVP>@(ujKVd>eeEA2TUt<%(He7RcmqCAA*%Rf*5~X@i|ZtE zlOpWYws&RVbhk&9ySRxk-U%s?Ae#&g-L~^uc=IW7(5K{82+5 zC6Ghy{IFiN8~ia$;@kDOa3bEozS!#NuGv_>ag|<|>%_fSE?xL6iUYhLS;pz%j4FNs z?$+p09d!P~&M5ouxyt97_YJP2>x`IdC_yzlo!#AkE=mMAAJv9%EFt%d>uGw#Pge!! zEFqPDAB~MxM=^C@Io(a8v?w(lHstL-?elm4l@t`J!;@i_cl=hT^F2g^zvCZaaC+f39nILGF)x3C8SqH`RjkVztjed=FcF zK5i<)_i0}G`2Ol)QTDL#%0Bo(^;du@i-T9W-TkzX7O)g;uA$VqOiLx=-Orx;?7ho@ z&+q-S^}lXX(|^A8?ZT}1Jri?%B}2%gN6P-PuUW%b67y7RJ+@eU&L%!*r#_5^CE6F? ze)@!MOzBbV;QU7A3>{62|=5sTyp*IY8s34 z1nT_Pv7Kj)y{}^iE8wl?I}66b*B9&hL@S>4e@18CWigJwDcD$TH{wHxR=_V~*({b8 ziF3HVJw3RoH2yN?Ygdd$jfd8q_J6Wl)lep*(PUr#?@JDvD*tVz7DJaGwbk?NzFR?LjB(>( zs&Wk_WEbKB`+8mOE+Y+t1~X=(B6hu_TR)VeDi0~ZL*`$=VnEAYAH*ks+_W}>DZ{#yS=-;dAq{% z;Dg(?Vok-Xb_>~2_`Q+$wOdN}NVSiU|DGrc*>(btBdAX6b;s@10XtLpEW4w>lT{AC zpx~UDJbNam+b@fGw9k_WHEkjCJ>{3ubmdlCXGOS29=L0FugCUwa`CRy?HcYF2)yGY;xuKL+Ve5UI`7CT|C~4y$}W?s_`ab6Vkk3CeG3&M03wu8-vc zd7G*FFNruk{SLk9vde4xm3gUC8MqU2QR{eEOH5T3+n$&MRU9hJBs{ zdRO%ij{8rKXU91uqWb8d{Nr-$_UP1XR%B44AGH%gWzA>j@CHHltKA@)4yWfo zyuS9@E zj{UE(^KB5^N~I}_ttjTYFZT7jz@LA!s@)zgF3L{gSi@7J#cpnoQd~@)UO-huu8Z>= zzutaNnPihs=Ap6Lpb&d+aw8->7mSo7W_lbw`RMs8^eMqLYO!R+ZEl2XBU$Xd>uJ#7 zkHPk{YBN=VvY%sFj>3sc$HJ$w%STqZt$~e%se1EI`D9%i=6N4X)?|mz(P4zTB{<+<3}^FgR^HMH+qO}Rj;2g@ z+sgWATU!22H~pC5sOP$!>#JT?!nW(qxTBdM=JLblC3y&6uKNQaKhS?Vj#Kfa*5s?q z5rS0o;MeUA0d{VZy$XVroZC^FblWO{iQeI`j5tl&>*KFq9cqlmfrI{ncz^ z%Ce1Xc)LB_ zl!Wj0X7r1!7J-&xj#}lN|5eA!>W(9XPmyE$D<^51>#0L|#ypp+#`-8m3lI98)Oa$D zG=;9GnHO)Kw%aZGuo$cE4!@kN69WixPLrz-^BbxET4e4v|3R3;r;K2<8j`h3z&}-= zqks(d{@Df}O3{_!k^kUHS*r?l3|PQ1c0E`bY5)Hcl5XAv{zp-2#MshIEtHn~A12Zi zFX8{9q2MMaURwVsQ}S?WwEv-GgZE#|@hJWSQXLHjt0D^|0d#WJ=km$S$_2n>NLTaCmoFsp|F&XhHK#av9vE)a-WdPRhzVY&N%Ekk?u!~YoE1)VY2vHy#O>Lm9h zoAY4%k0(WHd%&cc{rcY>CpsoZ;{R_9C$cb|so&)vCF_cbh#NcotvTm zx|f97h04s-{}1Oi2bmZj`9EHj9)8)Vz4HIH70p?@X_)_KOYPP{aM4lz@79!+i)jh} z+u^Ryf^!4<5B78gxTl5Wk^g||Oa1%Ks%iuB7r-c7*6OjQmeu_SlS-nG-v8Rj2t1Yu z>A^lTioFG3s?AF2@Unojf#5VSQd#{9f}ZdGjgXw75*sh1`QHimf!c&prk^AK*zF<= ziUJ8{G603Xzz7%DL!j+{UTqd%Wl7!t2aCC$$CjEx{<~dH{|gAq|Hq8EdwQz&{0}hf zXnJ)~9&I}HKQdV=s7ZMBzn{>kOKLQ5{WnImyu6>Bg z|9QmKe^<7I^?l- zpI1W@uAzW~61*qQl$84^mI(>3XUmB?8~lwo2mDiW;arv)9D$8+d`AvM2pHMoi4vR*M$R6t5#8|XZtFxs z0-Z$1q}+UDTmb?5@U2ui$9fOU7ktO1!;ki7a|Aio<}M(Cg0aJaEai=!YuCErf?G0{ zX+R9H(dcED0wym`z!U$KKXy^J+m#X_$m03X!n|m%n=(Kj4l>x7DOCk{*+LTt1imcDp8}#-gf#J0!q;N1i>jzIH8OEGB>fl7|6F^M{M> z(@h+n7-*Y1ENXO*+}NnRLE^n*l$g4gmz3ORJXr!Lnm97LI1&^1MHHwfcn@@+S0o-x z^7A@m5Ea(C!ztBk5t@$vez_rW_<1Ng0vffhPhLs_MXtjHVI*Nn<6`>t*kC02;n9ZC zN-CmFAz>m7QUAnfz_cXWJ(Xj@#Dj9 zHRd4^sEjf2h4c#?yf?so1P2d4C&G>)T*$?+_W!%${R@@4GUNqX1zPY>o|ZJK%+fh? zc(9{56o&x|wT!U{D*ju9I0@v8oXn((SHIFOHJNvV7cLG(_eHI2UQa@ryt< z!4FZOj=5)8vQUwfzB=s2_;ke(DbjtRi^D@PZkgY>!$WA4Hjtu}N-;`BM*}5|_iS## zN7e)ja(h3_Px^sq#yKD}GHU45+1w!ID+^Iys`d!e-8M_>a{KxVQ6xbtca_)SZq)|> zMKflxdFM~%qzeROUB~nSRgZ7*W#XEZ*@Ly>JP9{J!zXYb(6jd?btn-WL~6^al`12{ zIV{%Z6$!M6C~0{(Hf5qoSi}vk16?X_yn)2aessV<{ z16<2LB6}Jt-fh(f5r|%U7@EX_+v(;l5*|o#9xg=4Qi;&C0givY_eUHG7;!G=E zJ|=Y(?L}*mZx`B<8`1p=*{OlJRZ@0#>Zg=-KOq$Id5;|z#u$d!xed>2hEHL5G~!r| zkv73x(=T4gV5p9&k}RK7!wFE4$$Lyp4(~ewW;t!(v;#^-7-uxFGBCrVQePtRkOZq* z4)nbKhOnR*7s-&Ij_F|zrWxR_2;ZZmS(IUWEyZ}cQvFsUUmUfX8zh-dS}+S0$VN}W z+R6seOBeP)=Fvb3g4_Z#(Aba9_$)6{(V@UpOaY;zfTNHCr!5&{fK=+)h9(HRM-W2m z%)%ieOU^lc^qrRz*yIWs9}Um19EaIzwlrGF4>w$pi-_Hw7qcvo>)iHj-qgMUtKS{_iU_v>)2eP%y#%DnW6@`ONm?_ml zY&i2XO`0G=1u#N9YP-H`|AN!PNR%jiXKHeP>EhWV5QEDQ4ya;WV`YVA=CSMauQaBX zqMFhis@m=Z{_!pQR<;I9DWF*(wM&OFqbt|Zi&^cnyljv^`VM&gQ&rkomFZW^MACg5 zx;*v`!T_7l)fSzm@Oql+>8mQ!2u@hWcqmku{54Q^1Ob5+K*8KVhsB&OlmHu0DVDKX z^H;xOnQ6kU%WXNfkB+Isi;JyX5x4Uxz|JbTtJZc799e95I`~%EoOHR*7*ip@OlvDH zE6865ko*dMV@aLF(({+jOw^d6bK53ySfNu{j)U(6IeCe&&>TEJL!*ImcCRQZsL?kp zbbs=m-wI}Nm&ZMViJwt;44>U~@)|J_^8XbaBlii5ehX>#r&H|~hOd5ID6TDM( zyq)(mO{!BWSRRZ;16$Fb<54B@Q};88VrBZ0YbR{EGpg3L8O-DAL_Xpm7hW#|J0!{W z6{vD>zw*lq9RUsEcF!|1@fkSEF7f9cJ z7;b@8-tkDq@0AZh242a3r3OzILWDSQLBTFlUm~hW&>6E)cF1`c^ysPKlpg?SkSY2M zJk!(}S)@rORJ_#8Oek6`MsQ1CF>w%rLY>Wlz(SdZBE4|W0fF)ID-`2N;!r>vr>cYs z(xX#b9&*5v05$?}rtT3mMOW?n5F5Q`0wKUe!}E9dj+z|&Jx@hAJZhXl4X!JC864Ci^2=6HDN z*%}zTogl!>5KC4M;YJ5VRLjF?#}qm$%j`&zs8ffil2ftUia9Nr7~CFO2XVqk(2F#| zGHL{bgFv$`-9{2Ty_6a(iDSr*V+cl7!ee*cZY75}nz*{R z0=wrv7J~%rA_K8mL=A)X%>(OjTU#B22I^556vbJAxgd1Hl6WvT6$ENqGSF0NTBJCA zR+K(YR8i$Lq0aI1+`T!AwfSad-M*P6hM7|FJrDkwCs5;AnXVYhw0MZ8mg;W!)cjry zcqUZja9GVMR=BDJL0Dj(DM!Tw1Lh`(ogXv&$2}ZgFpN(zS`a&b)`Hqg_8mGE!ji3l z7snDhic>$UaX5pkdTr6?d%)=XHxY%A2vJ7OWs7X-ECN=o#3%mbEs>31n?*2}UjRut zq;X7f-xL z)q^^MHCEi0NP%lq6P#N5P5e-hGlvW&Po0WPlMRjzo-s?X1{W);f|wvL!dMhlp+5;Q z!N}Sr(q;J3oV7>=soYY}Wo6n?HRE>blxRobpHK$ei%CHsR??RiVc)QUGzgW1sQy6p@*270I%$~qRR(vlP38v`5#b_9r-l$yP*JE^^S-U(eAC)6(Uiz=i6#tc z>*ns&MAr5?3SMvkhaO~-u7`ku$}NePUy^I9?Xnwg9AT_(KT?nf6D_$6W_4$$wu*3B zqG*>JD%oi?IWrtQOD2~IgHqiPGG!$N32v`dB{(yfi+WAOwan|`*5xcQFlvx_1a(X} zSOOnOTum|g?Sd)CkRVdhhmV|qCKh}_PZFFto))}bVFM5k+NxvWkV)-lngr6x>Jr-H z8_sXzWe5ffZCHv@51B&;4t^-c$S3`JD_~Kli`)N`T)J*YZa|P&Cfd!iUN?rKk2gNLg$3 z;_P501p{INseg;0hL={njfAte)Jl(mx*lH>Lk$KQU+Ihr5Pr)!h0c-`$P4NzjDA_$u% zUk*Whbs-d%ao1OuoI{s?E8FBS`-NKGcx_}0)~H5@(8PVL?E(p5C%c)XB{b?8(EdM~ z-a4v{uKykl?oM%ciaQjC;7|%hgS)%CTe0G9#fw{j;_gx?8l2)<+_`z5@BOWnKXPW0 z%sDeFd-i-}Zya1^8Bo$(iN@D6C3tvv`PJxWc#>dVY=EB$EM!O&7ZDu6X0UNK1vqZo_{`y<*#mIMZS($z4jp#=^` z;fHS)8uVdcvieD=NQ*A50gGpEDXY5J7=+7-#+xL|O>PYjt5Ooe``uO%rKTrReUw;u~K8Tk#)F@x+C3!F`1boiTfArW*rJO+0t$&SD6N)DqpTb75 zvyyRfaK|)0rR;{{B~d=yf`(l5Cp-%ktjL$RN&z9MYNh(-aUF*J%hzeiaSi(26W7U+ z99k@;y>)&u_`A6-wIv#g7H;H6%EP=y%zTDK4Gv2#2KJX`d&{3|o0O0zW}iSUWRa3I zS+e$r5v&vA=EC|MCboM^RSSwMp85l0AZa0sHOSu~h524&%mqa?8%2hcXnO|j%vV_C zzl_2N)Aj0p7QxivsQmF^lt5UNHWgHPW;PUTdWo*RjPMkrc_4_I2*YpwB8ux$`pfv3 zd9nN`6<}^u4d&VookrP31lY=pSzSz3@H4@D{oQi`bp|YE*KuUSNBW7 zr8jJ8`w($d1qCjsml#{V$0P|6FbhvoT{4@Lo`jeHpn^H}Fa?YvV>8XIfrE>yWqaA+ z)d40=Q=`#R7}U#SyfXNYxNMm4IJ^dxnMt0!gaoM6CyH=96a>-o5_Ei2G}5!mZMBO~ zXE>8d0uZdN41h!ksWP)(QfHh|irX|(mJXKf0~HnHl|qR=EIZsViPA$^mX=-dKTf^_ zbZiNJ!jC`+P|@#9T389*Z5+5b7#k@E6cZJ1EouPmbUdPu>gRUi-x^2CPYIL0DvAwHh^8OL$fYe7H}nfz7P3@@Uk< zXvGN@j9-uLZdq|qs7v4{8mrROb!F4fnt#TRX0Hata#6rbn%FP9kd53b^AQQ`U^cO$ z0Ys=}Bav_#s>*xz6wR$`u?dj3r2g2Y{dNdL;b3Nsjs8vzV_hRinCmvx@yB3ib5;IWir0`iArUbGXX%#63i;39jBjX?C2SDPP-AE3Ue7LbZkcRlaZ*cVU@i(0 z*Ubqn1aY6k@JEiLcH}PV1S~*1+P6lXh(#wM=Q0_@LMsXg=F-ps*Q5%F@hbw?yI!NK zTmCx5Q&GXq0jR<)CZ91hb$GHWbxhomar}J!?v4E5LfBZ9Jw0;+*X#^khOK~r&|4WD zfigA3$wnB~QeG=MZ0JLLG%piIiaZ=mh?YlzUho>j4%ACfkPKh40)WGsBiHgJg4!#B z0VW!qdRJ-=)=08Qc8~}*Wq|~BiY^AU$TR#Wz_A)h~OB$Qy*BnZOH?-!MJF}>xBaksMsRjTN%vw(p^f2?{Oe!@{U#M~>+{Bt_`g;#GVK=b`g1H#N_vmqF zOH48N3;A|CHOK^jBQBy4Fe7PK3>QIUh*2G>OnQdA>43DQX>$tZ$GzlAHZ#^FVC7ejkpP>RKlQ-*@>W|QJuc^7hoQs;_TKj!AE7+pP5&gQg1T&7$-GztDGMn;&`2J%lFeG z$W)A%x-?Eod~>B~^9m8MdE@x6?MQ$<92!J73F%xRURxfMKq}QlJUmIZf zJMsr=MtB(~;6(4aaoUw3FLfo3!fRWz>VZN%5`DW>T6B=eo{cf__*Bqv9#juw2%l%``@=%n*1{CYGiH0;eTpv9+=ss9Ptk29kteg`{Ol zP?FrDZR4b*Z<5e}%|t?>Jn)rjJduTk{L^Hy)HGJ3@HX!7uG4fOI5i5)seG1PR1y=i zfax#Df5Nk|lW38?f8a%+=B5TD@i?L&jy5CWqst%FN2333gld~m)3qJn%;NexRV7Ee zV?S7OVLJGREuyYgjHaa~?1IuQqHEhXF`G6Ha)lF$6(*QIW(@PJwy{WRAlAPjXo zZ)2xn$v`#1FP+cw%y!fzp!t+A(T+S&C@8k?i?Vd9A)WD4=s?PunsvzoXT{qD$egBJ zrW}iI!7C;n158Gvw&4BLICY&2-X(e~Ni~min|6SBifSWQ>9gXa(mp1z1MCs-oTnqO z4Qcv>v_bI+_PhFYUu~Ez<`?^w{TxP2;?-vT_@EzcUOdIzSY7r`C%hh_u9|JnfMPGIjv` z{;SS#i5zMR-2jmOC)exneXb=xb)8Ys9KVhAIyXt z5dma6!Qn(hrc>;3%;y^ z#Tpe%b;U<=K?DCS7(jzyO|vc4tY1|6jRvR}7K!ZM#q12A{YE#R-GS#ITZmY`_S_q( z;6uZT#z;y>e309~i8{cE9V(#x#+yfG%(D*wKp6^MF%y)o5BqVW!j+bs_%g&})8vgk z2X=k9rne|5X|^9}WF1h#9ZOYLtcocFGoeeP{*NQYk%(qopojLdwqn#^z!jjG=we9H zWho+=%+4`!4x0m^c;QKw63LZ*a;UCI95eD44^a%zW*F*L8>7E8anQkglpZ>SZ(dPj zl!zhBqkq$O=4&6zBhbsUVh!gF~%_+uagl2b! z^lGi-WZw^Jo4hm?pgC;z3`N-t?!9aN@HDid4NHPoK~~y{yKM}A3Pt19KcWw)+vM_WtSqem zG~r3dfT2Pk;6zp&YS8$UGqw-XFBg4~urpxJKsBSiCSWCyB4W%w+(#vhI};8^*+VquPRU5CSmF3kF2h z9amCyQ-7ee{)o{0K@MNWWD5%mqpaz1ditCbJpx-@k;dVQSMjH7yAE@_m&g4|g58z2 zVoN_?@0Xh~&j`|douo4q(lW2)5KRVBrCTUQNi=1=v1lYv6 z(`_AXqs|JwRtb zJ~pR%FeY-Y!xbluEGn=++aZ)1wFZVSnr`wF%5NHs(TMu;G8 z+us$YG$olCC7>EF zJ>IUuk#CH81N0)YO`wJr4tb*=2|Tfnc#fC;^A)wwP5*sNbZmoa5$6*FtQ6F$NmW0J z`;C_MvE|vfY%Z(FK~Hh$pTC?H3)v*otP06Qqy7@K<)9KkWENxIs6oc^0qRlWo2p*JI~;DT3*HrsG5580ZYr4aiz(6F%HG1N z;pKKG%V>bYcEongiv0$WF(4R9>1|8fu)$|^oqr#eFTG8gou>UuQ?yLx7=`gOwZBPKJ`bDYb59fRhDXYoDy=eo7$G*xGcb7m;54fiorkth*>hw3 zh`OSPg(Iafli261fQl^X9Sm#e8g&jg*GE(#j|9UF0pfhk`8wt9AlE@BF(2*imrYzx zE@?&>0v{hOSQ(Au#tPfL8#r7^hFs>F*A**^ko44LthUhzzX^HL18P;K+AY}9WaU_j6iDAb| z`b*cZpKQ3d2dihJ+jdiL95G(MRTC8Dre!sa(LaWzzy7k3a2(&w4?blDQJ84Y4^|? za7*KAKio(iIW_Z@yVO#e=1Fw)(zxi<3}tT1ND87|eP=v+W2)>9$%nu$!@7Opj$o2& z8RR~q11Z7Us*=C@e~vYK3}?LDjqSXI;HQ0PvUnY{qpNwvBBPJ&!BAf3iohcYO?j(m z5RrT83uJvZ%TX%DPCpZr_`@AX`@?5N9}w)Yl8zm0-Cu(9`vECOJMQO*i~cm}HVIoy z2|`Md1B9(bl_jK|GfQW&WW0IfLpoox2aiqO)Sd&xvU9r$Vohh3?%+m^$nUfhYUSoL z;t^kv?~~^?P2@!;fI6^U0|(xZ?MEeK1L*Mo{Kh| zS&EMd;jTaqVA_4%2g|x{e5oWMV*;sd=mV2h(^s`e_N?x^xW6TZl(v#M# zD@vz*ZEjOc_Gf83tJPCy8}T*pxo*=#56gmpLKxe7*>~EH_<{@!_RJg@l`=ik}s=DOFnCxkENx-tGCqEvhj~|Gr4o= zXU@-noDJL!&g*sYP^oZ8?nXr`DgqaOujmnxvVRz1gIW;~5V2wGPF6hoJw1=eMJkIF z>XzrcLhGD}lNqRi3>hqO7#;aY09lv?$B*CDQsv7^Q+FfO1_H}Y=`F^`_c~;d)ExErrOWuSg<(Kl|$WXL+4_G zVe)-XE)@uKuqbPG=L_wm%dvJ#mMCiGQm6N>T!4Bj*150gcYye|P6NY{FHP(!?}f6X z!?nb6h9uvc0!q7VKdb;x%G;@EniLX>uHv|Wuv?sXTzrlqwFkOdO0WHl8L);l%;B6A zxwE{kyam@E+-y%L7WXrc772Kkn@6$-unQ6vHq4hsONgwB9IfOu&oLq%V8js zdN$8seM|!+yG>Wexv?{^YzGytOHnRsR>w#RH90X#DXOpDc=LhsE>6-+*?X8?&)jaI zYq%aqDautZ2qJ*KW${yzGJP@YbTxuNKA}S=Z!Vz7M9`1M_YR2x{##|54ufhwVoMUC7*Fl zu`^%;j7@hyei}se`}vjoMx`2VN~OeCPF(%wpK2@{n{bmHgc$^O--ON9LG%n?ZA$;( z`^AJ(=UD46q$C4oLyCopn^$KT4ZSh$meDt)^)9O3hE zggMBRt-L!@&g@Z2;#LVS0EH#)UEwbFd=6PP#UL$5KxRCPgxeR-vNyK!#>Ll_PfZ3V z*1VLXzfXUdx+|{epIiK4=88pA@fANnN2gY=FG3EiKv2Lwr}#p1MrY`{LmZ3B1IP6fn>a_$Q7M(jH!Ud=b35WD4;I_^&*E~EH8Qb>LkD#T`l6c{BFyPz`L zG(;JwUs3hmTxJss0iU&Oh7WB`kv%J?fz8qv;p-V6J-Z)6F8pHP`3(ZCCW=J+?5}_) zriqYnh#bLhqHl4vF`6tEz)ABa4m2m@IB2)DEcRG{tfdhNwsB$gu`NO#n#k`64o>7(qOeQp!t>dR++HRNug{`{J?nfrncBWU(K`CzZ{!h@Z_ zpUwMvgpXJs@QWvJ_-sAj~d$NZQ#WELkmZ4 ztwXV7B^W~exhX{6E^;y9me?=+l0RbsGKS9h>f|>@l9eQs;(PHU@2RyZ{OH~*dJ$

          )YyRhkpq z$50%TL1M%CX5EuUBnVe&9guWPtqTfqHm1~Zxku*Zol66oW0_)6n5;=QYqzO*l}XC>&R2Lv>(Of zS)*QMRMp#$pUOOGS?yk8#tE%wrOs>#az)sUX>KoxV(E3SfC<4)wf`Mv>CWD(Z1=Rz zO{&V+IzLrZKLD#U-`|SFx%aita(ExsiWLdMwD0~+SZR;3^5$M*uiP#Yv>_c|F3iiM ztjg(jh76eGav!~0XQquewp*@sG>^i!5_UREp0nA%X{xd)(@~tFSj|P--Nj0Y$9C|M zdIq`r#z558X7mSaRITRw&n7!0%yrYz2YkEIt(oO&`U#8hpQU9B+)i=qY^TLu?N>T5r04PL=psL0o%*E zW2c@SJ|=pCc@dh_cJqcEM}MX)aCfNn#`#Q+ez4k0ae$8jIkoNy53D+?Q%@BLTDUVV zp~Jw01k=hH2Vph&F4a2Y zhZt0BpSEP5CHbuC4=M*7GvGpV0By}AW&@tylk6+ro_%P>o^>V6x+*y2tMPL!pbt1H zm8mOA{*193P9Dyt*l&%TT$0 zPXt?QA+m%-lVo$Xr65K!e1$N>4&1odBInc;V3@9en`JU-`1xIPI=|-?nm463NViOR za_+?wds8b{&7K}XE_(hPPgV@}-Mte(i4?Pj6ruz($fya>V64)8(>kko%$sLr35og0 zmx*B=Pem*PPVj9cR&wsDb8lq8&Y*(N)ZDJG`s-&kl_T6I;mJ^SXD>*ohTm`gIt+9~ zx6Bp)8cJ8@9IN2}Bg+(ws?6qsI~KY47ebBp8zh_nl?$!Wa>xVn+D$tkbVB2mpPvXk zQF*R9k1Rdiz*QH|(5zSaJ&e<=A{wzQpxOmI`36rcbL9Rs8%7Y7R5G>};3}2-x_|TB zWYL&M=E>=Eg6<;&s+|);fBM5u2=0-N+ zVzBJRj|iaU!nUbtt7q`3ENJ(EgT0^S2Eyaqf<6HIxo?7XyA_ z#2RT=3{c&1Uc%adnd*-KVqQi++#3@JMWDi2_?v|necE%2{z7}E*S z{9HN#e24z)Z1s7QK9_NaV&BX8zyJW@7Ugc3*nNZBqr!vuiaf8S%=eWJj~EVDBlZ`L zQKk-cso(-(4f-jj5aq7+brNMw;_VU*o>bwk&+{pc<#Uj#!@&+7$Y^W9nEkp+$~EsV zOL)Y1a@xD2RQ@7#%iYgEDv=1!oHx47N9NbZ$_?_?12^q^PyxdQR{U22IlBzRSI6)w=O|+=`19md7GY~~r{y=GG-XM6&ZXC<5Tufu`ig!1 z80=s&C+jF*rp}Xp)f^>J=`QPR$8m81Cgl|Fq~!)6`pxIJ-MemBEeGOxmW4F07jUqp z82EY(5At-&H_^?P7^OGxA_ZzzEhx*@gJ-;@9M?a5;GYCKTPeZ;@N!^PsQ(Fb6f1L7 z`8@4c>%({g3A_}878v-O=YyI$L;#02qWB0-P{@EqF2Ppyv;{niXAJO>C<>0{^B8D0

          x%39pkW}Hp`elF@oA3g`Rs6)fLE^F%q+Liz_ zQ^+D)=yg|Mra~N1og)>ESuV0|OLpp9qorW8)kP6Cd-EU1CRVdnxZLJ)QhDZ>=;nle ziH=%b#|!lU&&s!sr>E(^n~L*>k1KaN0b@`rb)){-)**IfP3#slPs=4o3Yi*mbFY@d zyr1Y2T@=V){`rc?#;qfmkxAHE0)(hwhpFA4;kZrLBJ!Sg9&+x!GTT5CJE0N^G0}cu zeAw2)+sLJV#BOS1aCSA3f$8!L-*(MzK|+5$u^*bw;v1BfeTM4=78CbVk3@6I`{KAU zKA#SA-Tol|n(Jw)G`k_RZ#3{X+k}sy+QXHc!Dm|KSI>31pM3$6veObfmk?gOT1{$6 z>X9;k&B6`O+Z_Peo`X6S)eMYHJFFC`HtUx!;Pn;?Y9WaXNp=Mf`JGsH3_X-Sww{Vw zgoX&6d*AyE+)ylkjWfw8Z28vjTz9uD1~6mIIdRtKNc%jn(a?jNl%b3=J;>5gWjg5H zZjz9$OqZOWK{eO$Gj-FcfrE|y8Bmukxl-kV9t{oHp$!iiex#C(6KA%rnSB6t{~Wc6 z%W9}1DH4t7n%=<1&fGEuXO<9gnVyoEE**=LH_snvM=;F+Y{vIKEywv84@Kk9Lcc9T z#R)6RlNU-39T0K7(Snjp0^!%ou(YH%b(*U?Iz6je>ouuv7FElPLwsg#wwS+` z-jRXyfXcehU)_Y&Y4FAhOHPDt z#j%cK{{4(HK~aY~1#m&tPIw$|MJx=&;~UK&Q(0J;JmGC)feZkLXL{we-z6Sqt$a-# z2_}f36WPmbevZ!=<~hmb4#IIwV`~-EJCjT(T>K3%Vh2*iG%BM+r*%;m!`>~Sv4X$Y zh9_X8i7}L-`#F(eCmQFn&=1Hgjf`5OJx(lzW0n+KI1cng${w2@)A@5HRK`4IE!3L8 zcuQx`My}MWc+E^5+nyli;cDhb?1npZoAiM1abn+GWSg9P$Z3Z+LKtd>sy_154!=Q5 zya}bC3yF}#ez^682HO=&Q&StYsu*y`2y~HxnUy>MR4R%JnYOEWB`r}5E>0BHk!NV0 zz({llq{lo=BVUK-;4IRsH6+(Nq%fXF+S`Sx}8xE;Dl&l{{Ta!mhoM zHUaH0Mbsj%RbQx%X>>zk@Th-}VI|a74CZH=D^Vms0zQr!0L^Rm7;ZXZR5w#1nL- zQq`7jSf%-7?ty1pLu^*5Vegahk2_fY;L68DNb58O-;6RCjjPk;r0HaF`rL3W4;bMz_c6N z%t%6EWntbg?j-B$KC~F21@x~oyxx9*m<+;Y_m_F%&eIMC5N@JVlM2Z=28}J^c1zAq ztr{xQaGDzo{7Ly?!>ua^fZsxngE1o$BJ7u%Fo|=KZfut*esGe~AuwCR_QLb;jj%3_ zDkG@s!;O>ZU3M2QWsVHDG~1ow9-aWq*-pP8NR107P!D$ll0MUY&9eWjNQ@Y`nfq9} z^Wbgb?q3}oNrpxpZowoB_#&+a2Q0J+t!|ya_f!kb5=V@qcAX|_6^U|V58vvC1@hZ? zu%qJ?6h6n%N&|WOENW6C%Xl_s^;<}(L7+lUE{mOmzfChF%AaNZItt7Nm&t*O-TM!_ z2$O-fK5;~T1d6h1L_`anCqA=(j-pHoTVPexwrII|Q&(Nlvk0W9cA<&S$scQ`xefc{ zUG2FCvM4;d&=_A|f_*=&^)F2yRD^;D8}u!Q5rh%DN1{4YWOgl)#}aIZjd>`TX*TQW z#*DhGcMG{4Oy*z#KqmwZj!{0pA23y3pfLV~ZqagNMdHiI$4o_4cEM$;jAZ7&`->3X ziuFyx^pv!DvWCN<={_c&ekZdI3ULI@&ZiIhGejJ4I}5&XM9*x^va%(nw9-&4G#%vp zuHN*(8Tr4r(Z55T?T0xR8UBM!bO2!PSCtd{?msc#|Lw$q0|2lav^biM^hThg|KX|% z)m2T7K$A`){(r!V9_`K!fqK~g_vvC76<_G}V%@kD{U7L>@=5>{xd{IMop6B3$FL-G z?u~P<|8@cZ!3=pvqdlo?cKhOO<0AM!T*Uyi*(i`sYf6IWjq(m28G%=wXo@f8xOkZI~osF-{mLJIen<$CIuv`?F zo4q=tgWrtqV?rQ zo;U8rYRr) zU;mpO5#p%JL|MrHyAs({5|PTbx31cB|DE1bj;-7nCUrm) z`Hn2eZN@F;h3ZR3&?4!NJ^IrM5C#l(aCD}HUjq5Uc#-8lHP;|TsyWt$tWr?vzFaV} zM6ecjPVx}$Oo^@rO9tHE4*K88k>)eGxix5EVVd#Pe0}mbGm}RXGywQry~vNf&{TV3 zv$>&mkQL2GOf1d*ym$EM=F7Qs)KJbj32Uo4DXoC4^D_l*06>>yLn~xjXq_DZfFEj5 z53i+H+N)Pnn@c{;Zx?0HzLC~b!pUjRj;BGXNqD2cqW+ks7}!p+?U{Um@Lhdt?^nkh zKj3hD*|;Gg8aQ~W9OOj;kXQgakjDq}z^jjsPai3SOGAb^*XQ#Z0EN8Voaar`Z{6l@ z^9RmQt7Q@{pvw2jnK4GdkE^Z4(49~io2kwcq>qi2#=-VXsK1QRY4zF<`;6V0f0g=5kZ1E!y-@MAR9-T z$4N1?%E1&TTBmL)GaV9Rj9q(DXVhbB46TOwhsy%dDnykn@UvZrj>rW71ikhimdDEr z$kI`S7j0f`LLi0@e`@Z#1;5BD0RU8Tx`B7odi+(#(mg%@rsWXNlucX3C}3H#yx*1z zUbp1l9O(BtxKU)YC*eAHShNH8@G|so4hRFE4pf&{23hrH@RV+Z-~`^zRanjJz$+poO@7XLJsJJAIm@Qo3ztdIjD~5rl^B+mQEzT9sNR{p+;E&g=eG1NUve zAm8`wqL3CWQ6V}JG??J#okxW0t^K;!+X$zQ%bi%U8}WPeQuRB}Pw-in)vFE}fyZ@k z#}_?b2LUsQ%ghJ#0UD#Z=8I+$9kv0$q$7Fsjn``|Bkye)!mihxdq=l}%o|z?1ng2SZ9q8@RcgMf^*yUvi{o2J_BBRn#x5nOmM&RWR z8pp4P{@BgO?nI+I9qJ=wfP8r)oR|Ohk5+@Lp$W>S{hJOTVD0t?MwONmNyX&~3Oq@lRnk>XZz~>f=1xwv_Tn5r zQZrWHKCQd1A0HFuuQXTg2*$6s;}8>u@z#(Hz+1Qf5_=gG4bl;ns-^wTH65`vij52)h8B!vi{#KlDOay+UV}=R*0v49}XZ1Z2~tsc&(8f;t4NJ1^X9#wwx|O z1x>5+mOaiIw2F3CW*a#7hMqSokq~k7 z&ST=>%;H;?U){|Hc!~0n?E79(;H5hVYZYr)FJJ)bb)y!^_7e2;ZmsoH8 z_R|vS@o;`vK}xTBlR?|R+2b*EaGpxR5{bCR1aY?33B%=Rv-La|v1yIV0-Bq;7FXY2 z=Q4uc>cws@;hvs4<}jDCmC5ZVcFK-M+bTbp>FcD0AUOtnX3rECIPt+`#8^JWP~rpv z7hhJBsA2g#Qn`SZD+vyIp(1Wd#)JNpMEi5k#^d$j5%{@Rxj)If83==^dIRq?7gHv>b-G_tx9c5lf%9|MMGW0c3{1bQ3 zO8;C_>&BCRp9d=yz__v+>PkD&bJK2w7)93QZD{0Wr5Nm3P=O2|4LuRKWH?E&`^s=U zJ)~jmMEp1J{f+Q;0muY$0=wxH?av{MM%CqRmFE0?A;@hDOrd=HsNcZ;U?lcT`O+rd zlhxp6%lv~C{`u_aU`S}_>ax5-43IseWsD=^V~YeDW7gT_sCFDeMB_}Z@^He>1y?@f zm4wcLW(HWQ{Zd>ML!EYi^WXo7_vCKpo~*Q_H*qil2O8w$H3;L12d*fDEp@5vA8Z}9 zH&Paowm*K#(&ry@udveeAM!?!{EA!|hP81wJCMU65(q=H`V!G`v7X&bqevMrJfzRp)+rXq0%t65h1@_ z3;S?Gd6Ly(XskYKtb%LyZ?3HCJ%7C(w&)W>F>?1;maTA z$c51M|0dMJU=i-I4lJKa{R0HKaqO*-#mFnwr(}g!JfHTuy`7s;_OwBDCK|62t1`N_ zDaG&qwU)w2U~IVDesdqEkqH*D$T;t~TSQu7eVW@V_#}b?*dmNnqzi4B%88oTDtkWQ zkZ)?l5+PfucTx7dnJP%B66rEkS<1S2n$=5iyL+>?7nY<{xh9I24JJu z;Biv^RP}&YAJWqF5ZrtKiayf97ullb^zO&qx@YeKjLQ+F_qWRJCrPwC-$N^`jx8uW z)y*NZu)p7}vlK9s@dyx(C4{MZ--e-@QSURa(->ruE?Z#qm1=)dmzQJrlUhr?%R2a1juB_M0DY)~opxg6 zUk^5Y(~J!9mhShs_xmC*GQay)aX+}+4o)w1uVE?21%5Ffh-T~b>vCz(`*0Wlpy6S? z+}bW)Z?kTVk=*`<;D#Hh>Bj1?q0ub-^ql$8w{mh*XEwzvQ@{y>0Qe7^LkTuRQOooP8t@3rUOXr}Y6at{+0fumWd>2qV=5zmk|h7CcUn9IArO*HYD` zjBg*IrsmfZf*b#fr z>v_LXb?iD4xKD$MhAk#R9N#x*UM5!4`6t&}?eYmr zxU=JOt5_9NwySyP_~P~OL_myNpVH@iL>wwe_4Xh&vwgi}cpqP2;CGQ?wqd6#NJCux z_K#2;s)_V|Ra=v1Rp2|?o2MQ4%BU@RdH8fQXNGnDFI8jGRgt5XO!ap1>>PhhU9Ui2 zZJdmov1@;NbECDr`7NfLB}Pcpb2~||HqhJ7;|y=+*j`S9h>Xc1QM4>kDtxYNugXyW zCLJqpNpGdmp;Nsw+!Iwm{3a~uB}Xa9Z{SvYQ!#et(+T`VE#>>=ILq4!V}?QC(y-77 zYb^Wo(#-qYFk}f+qo2-d?D1wcQT%=-==F@vYt!p&-F>vL^JTJTrc70|lkua7&vVMQ zh=A`6*y(LzDX2Y!+}V6&@%?e9^`i5gy664xM$+cX#8R#IVN%U&dG1(7&Dx3>@Xe^q_w6|Sr29)_PC4fAz=HH)8#KR`~vUk+X(3|VU9$Zn;Pl{UyZ)=4w6 zzrE}8POr4v35A|eePCD6Wdjm@Q?cq=qr+R$V_#JFU1iVXHlILsbAm{N+268)w+Vs3 zE|GTQw-jyvTP5+%9k5+36e*@ zL!guQt9H)=MELFUCY$iQ>-OpS+}~Ut*a_$Ij~J%TuJ)f{T-2 zht+)E`40mC`!l-NK~Jw})>9fxE(q^a*0qfiFEhS1EcIKA!>xe;;|Y z2HcAGc)gpQd_^Mv;$vbqqvp1>aXFkRRd956zt)00VW*o*nFAxnjsImxw1N**mx44JoDWac)$PiRR4^fqXhVpbe;)W zIIE0TO{8#D-i}DBrNvCAMG)4%9p&l6ae6&ujw%&cyLpZ(@cDBT|84KIMW_^J(~aEEY!Yz1aKxj3>G8cj4pWMegsb zHDWFokq907(Hh!_kj;lo@GnO70;wy5HblH7{!j$s2J$7BF?jQZ#<*N9`+k=}z=JR$~Iy(U#KRWRt zaC`u>L%ot(T7of+sON1w2e0luQCR#R;=e;p@y`8m@!Y2|sEX~;%QdCg)!mC%_sxl4 z!KZ%{83FHQ7;>HO-$N!YNQp>wUmpx;FP>Mrf;`RN(q{r+DsOY_l+0_krKF%S4I{Uu z-4nxSRqdcX{Z@6d$Ls5SZ*Sv?buWFt8z`8ZaR`SUyiMdFz1^pB=)@ZI`q8V z?Jd2YkBN&LZ)H8jh`&u4-Kaa1;L=y?PwQUK%05@LV>z9H-2be#6F`d^lSl)f<|hKX zk7l~BRMGG}50L<@+sh|!5Ai+Ei%oR_yU_TMNdgHoKw7sdwLe>yK|fJ*Y4hK;(_7+l+F*Y)`-?>6iybWNTlP^F=o?kBbm~@}IK`zf1Vl*V~vEH<@@-xvY_5ZK_u* z)bqKWR5`T;F4&0&ER@#eAWg1bp7iusodyT>oc7G$2j2QUVy(X(`karBzrQ}!V2OzS zdJ55udS6I;_ZaK^m$npiap!RHbSCX2KI?aU%wZ_J^*SUF=-Kz>>XwlFy5A#ejehzy zHf3LP#FhYQXL9OZaKV+B7}l9Fp49R6Hq7keVVagwEatr9`0AuK@N`x>U*AytCN|^s zAPW-sm~_IQf0rome$D(w>GZI0CF~gFa%+avbs_iu+PB-faSdUqeV2^8k;>f+s zx(M0|E#{7BKgex;`|U9#%-*p(`TpxL#puujQ}iTGdfe;Xgi}A@*{Q(uZF4WN>$PHB zMZDvsY*X~LyPHw#a5v~}`MvL=$8SnhyGG;)56yYGz$RX$(7}-lkiE`g0~?)t^e=gL z^5W=zJm;IqdBsvU!D3C@b$1kh+=J#OmO0l=lN^~BkRf&mK1Dgg^KiYZPrLi-O6WEU@3CUBf4rL$qG_tm?O^>zE58TLqTATN9E; z>E0~C(WH?5iX@nFu;aDMwh-Ub^7=^Q=wHW0&}U2G`BxhPCRp?IIcZWb+0*pb=Z`HQ zB6+qo+RgjEl%}wWSh=p}Qvu2aUDkHDj61SphmZL;;FJ-^*EzrU^Q*m+$H$CZmnW3h z2pWpO(axbR()?v)Wh6-=8SZa1#0oOO0Qk7j#-JCuAm@di?!aqlubN7sv2gnEq3<;0 zX~%q4eUQzdMeZ^?$qE|g_B#Rb=cxDBA%h&msBgQZOZF7Cgu?7EO>iubZ)v{9j5P=& zY!pFPMdiZ;xt{%fZ|vANew$(ooC`VEl0(*xHHt^q)I2Mz|;L5+RD|u zCq$MtHK0fox7aZway_%@XazUG}c)a(^{g9K`*`=81 zxff-t_nSzIs|1_RrcrKMIVTP5T&Cibo~Pmn_yd+W@8S1_7OI>U)cZ}}J+Hdj&im*0 z+qPvPj~{EFh8Uyz)z$9ueU32h#r%gDm#^$7R`hSL z&i6YgY9S)?>oCy9RvM0iZ=+HS_7(6bNbOcIIGRyM%lDnTp-t+NqFhdafwdC^-C)K` z0g)c9ug8OK1hVwfuV1u&wijbY5o(Kf?>uhT?9|h$r)2}-g|{)-g2XzS4-R=U!licu zyS_MoZvP8aMP*XEl-cwX^F(x92Q^~~S?QW^c5KB7^mIL~D~b6Z?M>X~4t#z;%pn*J z+5UIFJ3WJ;h1Q}-Bx?eF;g4~uqhd$9p^>$?49S1Yv0ldgQ8RD^)z>`n7%3Y@YcqbE zGh0bf)k=Kc(wh;bD&_y+yYaN|)pN#Y*g|y2D$?yXrTBbnRp4@-ME4RfyL=O}&Fr}>@FcW!o_@$kfS4$HVX+p$|ky}+0)-F)sH_VKrH>Bu#)DM^5 ze|4}|Nf~%Dri);({`ewAQZ;!TF_gL7=E!E}jXDhroK4+bGx@|N{6N+8MU!YUE|7jSxi7L%Toc*+u=@m-)evqyy|4}_TI9x{EgEHCo zDZ}gKuG=G>r}H=_q&hdTWwJPeB7vepzz+yL~tcq0i0nu=c^Ha0UfHR*d?D3ETX_Re5jb3aB&8)hO z1mN3`KavMzi?^3fV)r%AADOX=>&tx8=_tF;!K98P?x!k=;-WWey*tHzC~4}!*oY?B zwm@}7yij$u!N%7<$~r%HyYD8Xj@?)1d?!@Qoehiy%({y|Pl8@X4z!d6rZOYc@E4IN z{5kz+RO?=kTE*(C>%cW75(wQhzx;-4f1P7t^?dOdXt@{bF^TnCrjdiGU%V$vf~1@s zvA?{HhnT;2N_XgL==az@+CB}o_B^G-{Rm+*Lshez{nhqTG<6X8w?I5d@_n@h^8W>j z5_RoD#(=ccW<9E9qyRzt#Z4PG5Biydy5{E`D;d6c|9ZQ-bIF`kB#E>Rl}_gqYkqpo z6Or6_$Gz)D$C7ZUt}6s~&osa5xGoO{$sr*{lI{^B#+(#I@eWuF?p zzd9N(y9b{$XW-^rZ&$~>bqN+rq1FUZDEkiWT5;nTk_rIIMaAYy%ewLjkThimU1aP8u=YgRm=4_VT|r39@ppDF#} zuA8pAe}Jp%%Db-`Iqn2~%k8&ccYn>{Yo2*w^HZ?w;DjO)w(CFt@FQ!~$A0mDKmFRr z7XV19NXjq_rB+h%{(0paZoB=q$44F7`uGd0pJ#_1m}BM;=O_rH?ZzH(&epy7B9oDv zO=2KYV5b%))l>Ie{lg#p;{R@Zvh&ol4^3^k;_F}f&r84e(_2>`cG`(u!w>(@*S>o9 zW^X}Phnr1jk}21AlBrZSo$)-!^}JkHN6zzH*Ke^pzCQor=ihwdDd&FlG3)dXTyppW|9Rp0e|hN|SakGpr@ZaFxp#c=4X2%a z)|c;$E_l!R-M%jzTLxmuYYyFf_m@BZ&zEh(oNL>e4tK>B|9cif0T+)}^Vu(OQz&+RIsg9$Lc}?)cHyn4=o332X<{oqMC6~Mf zZ~N#uXP^6*-@mu_gbR+v8%{mq@MDiyddb&stB8!vkb+|R=)d^OlgB@Q@!6-HeD;m( zHE((ADf1I@P9z z&zyVCIp@CRqWAvzQRlpmUPKRG`j(SVc*8$k+k4)7&+Z8W%^4%9z)2-N&q3}cY^K0Y zIGFA~;caKJufP4A(@y=H`^QB0fpZQ!;rC>ZEsHT1X#x)Z%<^F8szjF1}2@@h^`nT>9=aPCf0NH&%}Lz*~>tfts|`k7Q#iT{;RKC{^Zv2;fH_puWx_N(Z`*6(Feb^IV#-pi~qaop)LNvBmeu?Z#w$; zli&81kN^J3!j@;R`}TD!nadH}OlQ7Rly3d*2j6nR>)-I^e;zsX)T0-5!}yk3M>gFx z*U`}76>hxzipy@=a>6^_f5@sYo`1?Y*9M1QbkXU_T1gTpKS&*ZdguCIUVQRvKlsh3 zPx#;m52F(Hc070U`o5)oREKk}aA zAOEil&N=g}&t3g|BAc`=7D(slGv9b*6}wfJ?|@b+wXkO$zBi<=RnG5bB{Z~z4Ke| zI_;bbZi-HP>uIN*f6=LfzyJH!oqXa4zIy+%cfI!rS1M#Wth>w3J~cD``7@3>{N0z+ z{BA3I;0cSi{Ngho{QljeUXqCeU-$0UT91ppJ=LJE)@-&O!3Qiy^x(qufPNs|J!ZK3^2r7p=zq!KpQQK*q4022bD zTD2BPjZQLkz@m9c*Hdw{_NxM<2@p9$Lez>FYE1-aCI(uzt13ey6)BulI^{5P2Ce1U zsxmTK49QA&bYyH@DHTgKX?f{<#uH2yN5?7wIq6(S#*XSC8Q(*Jez{nUL?)BqK!6z4 z%B5Ne+{xy%77)X*Fjfk|&gXL$h0-{#0sxTl(&PZO;#fHp*^ZPggy1Zyj*gV1NTfQl zX|Afn!zBeE66uU*BM<-q+BW(lBgIf-sd&-_xMvOBwSnS{FWKfmzgymR08 zXJ^>O%|nI2&2?sMu9egc_gsb$jEc>^H+3F=W_PW~bKMz6;4puDY`hY3 zC*9GNfuJVIxNHjwYUAT&Wv4qcHUa107YkKPq!ShcW_vsw8!gl#^s*ftN#^@e!;^Q? zJevWoZGG{I-{CQ*pKA8Gf>TP zCn_-E58L`R>B4+{Xd)F%DH9n0B1Z(JBHOZ$I_l`ouC6GI&zpNSV5Uic?ehqcGXx;5 zh+69nK*k%?Q0d8O%!kle{_mT9=KSiHJxOOfI+i zI&6fSGfwZ==r_UZk6e4%H4hEvtu0TD zpYS)IdEe;=TD6)s9YQdvm95@rHlJ}sBBfzkw@j%Z03t&};1QcY4M=MZXsnnMQAnB; z03v{H8=#4Hk)CMK#1Jq9-D-ZbGuvj7$)8!SU3=(P-~Yw!8{hbE|8f2tHwfjVRL#jY zY0@=*x5iiN=DrMVJ=3UI$O@K_`AP3M~wXet;sp{V&bP#6HC6h?4Mq$f#}6Vre4eW1yiz|@~@ zr8O>TS`KaHPI-N{Y>j+8sq!@A^(@Vq(%2b0u#t=~ebCYaynELShKoP?sdt}uWM*`0 zktT;WwY@c4Z_L^)ZTB>_JtUee%^Nun)RcZ`TgcDQt|=w86``j0GZ8iNCk6;I@cU1{ z@PwX>ifS`v*c#Bu|DV*=ZKFSBvguhTTU!Zwno47856|?j3Vf?)!7{fa6_sl+;g&yn z&a^jV2Xk1_Ox2s6B^V%LsZ_)xPdW9zn{J9vaElS+)dV84lbzi;7XX6N@Nm&b&R^~8 zDN+hEeRHzBHoR@@mACyG5n8rmS+ZV)wn-8;^r2zqc3r-Ly@$x&j(m5C9;UIH-ww zwwf~K{mFG`y$EPr=C)slreUwGw?R z)I_9pW6xYf0#Zs75o_#(3jht52gZGXgU!QV~l`^2phK>wVkLEAT-9b=`Y%{ z{WT|MW7LfsOT(YV3}0*RHak{pXta@lCgvOwwUPrhdR}YI7$P!ixEf6q*7&{v8g3`e zt|1}>K!!xbId3@mXsxtFU=wrDGz^)^6B~U_jmEZ(h;dt;nB8UsIYY*PpyBg^hzQ2} z2oYPYBGOIA&qg02pw`CSv@xpGaFc0Ge=}({5H*WvObo5HCSut1QEd9|A|N$=YE1u- z)?hk88@hyupp+)98E0mKndWG%iL@ChGc=}2oO8~YQi_PU5CEXHGEYGw(qMk&Sp{@!eT1WXd36HV~L0%GXsRp08XVeLu8y2X;brb!X4ha71Mol7A{(( zls02w*%kmOr4W%Ji=s%%2rZHC=&~($d~8%}6)LSYa^#FDt%9H)29eeh0c^*y9fwGVVMGcn zM=-_(w}frUNJ<$JsiqGiLu6(+WhkYLxUiC`lhgr${YLI40TM}?6FWxF0Q3aV8tLsC*J%@|T7HIUX?Y2ch&wlKuO zOJ$IWP)4C&MbcWTC<=t&N-C{XuCuqRr+;K<8xT2(L?{DLpp*)uIszjll~klOkkXnM z7q)9_tu5PQoCTrpCR4x|05I-EGT_2N!MVk4%Vo%lhf`ul{iYPGuSIhJh?4h#$rZ{@=7>+R!0q%&zE8Y>inAk25>)5+AprY)IND&Zw+ zLA@|GR`-23kw|!MDv@+-hd8f>bp&v2Hwyh~rOFu3=Cho0Ak&S3??*~0$924fSFhDL z!%R9G`t?es8iqj-gmu5F0fZ1zs?P2nDWff$HrT?o7&r9Dv+YD8sUlUal%!OS;|4Oa z9DDAZx!bl57RE;N9i2VBJq)2%^9cx1RH~IAtVfZ~JQ7YfzM*$%wymUH~ zb`u_G@N2cuuLBpzupS2KT(+;Lcgxxh+XlA)W8MAT$z-}PJfc;YP3LNrN~u`jLP!~* zu(Q2$JNvo=Kde@&h|IC9FbWpTol`H@ieqDbt?bt;p5-`}N-V8M&4S8v?7Zr;Mh^A|1}+&Wk+j^{c$8Rv;) za^8aZBO^l_*R8jNm_L6(xl&%e>baDc6haio3!a;BJqMo|Qaj58)UAOgd=3l^kO zslm;gwUl$`FDMqq*S+`x0A_NXmc^yk)oN8qnayMa-}e%UQmHszC>*-Z`2OU@#8(Y2V*=$F5rXyP^ma?hz`mJ04KajG{ Ud$V`laR2}S07*qoM6N<$f_tISJ^%m! literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi10.png b/devices/surface-hub/images/sh2-uefi10.png new file mode 100644 index 0000000000000000000000000000000000000000..eafc0617a27d6ff022e1a4095b58bc105a482319 GIT binary patch literal 73328 zcmbTd1yr2N5-vJea7{vx!3pj@2J7oz{|{+|Ybx>iBq-!cBTy4c(QJA{j?ggexX|2X7- zOYNfO1vY0^F?Vrvb2c@XaEGc%@nQ{_SIpVm*wxWl&C${BzZ0eWUzJJ4#9k(bhm=Os z+QH1x!-e*L;4v3Bb~P6uf9Ypr;eyVZ8Y>4c3o9=hCnF0tFAK{*qzaB^))rp>3n}P@ zl8L9R#l^_R#QIlV1qEIi2Nzdk2UBwyaRG9uf0(ST z&3MhYxH(ujIZPON%uOvAElfE$76Py&Hg{~ zD>++3qtMvy|F@i%*nC+&ywcV#(24c>PxPpoJN@UAoi*v-6~k+6`Vt8ORMRdxLdjpjvAHT9M>ev*p|>=+bu4&`8cWwZ*T7&#Pxri!0A}S3X`XO zE4P1O!*;w}T&c;!JJ%2!lc1zn?@~21GBQngSwT!(N0%aEiFArutHWq+UZ9fB!OV<^ z^+RVbe~Zh3m{^m^V9IvN-@ohF;ke?9fw0lNyZxj!Ct&VM?p-)K$y?(2jm2%b{i%}U z;>Rp~{W7YW6(ev}4Jrz&pJ#GXkS@G3+$UVx1vjBga4izO24-F>C((eAw0-NC8Om-}lnFjG&(elZVbr7TKj1O7sG0vw!09qWTH`nq)l z_Fn@M2aISKna-~+ZZJ_)rf08Y2$c;r8|(%OKU6z8hb@O(@=?n0(h@1)CJ%Rwca6X2 z09|(PZF4zz^i23|xkP;_EMhQteUJR`#!z!k&O@%ydoFk7L zFH27^&twDT!bN{+>14H0MPEncW4^F7vIHz_l6Nw84=V;)-aG?VR8L-Bh-i-->Uqt{ zYH4M~B|1{-ka^woG*$BapjIesQeHB}`_wmSZy>$>-nV}YTYS6BIB+Nxk$XkRj9=x6 zlxob*mMTys3p1RaT~AtZSd^#MWnf2u$x^0rYt$?>Kd66kdag+P22W`{RaAH7_BkbW zfD(4NV48=GmHf*4fNMCo2eon9KV ziOgB1+1Y8SP^r}>A62@v+gI>1lsME<)YbBmYoTi2r91pC7N%pO29C}zh^;v@>W}!E znj6?!PsFrPc>@%L4G*ctxRxzwYio(11~fQA>SqS*wNl+(-JLzoma5%0)03(BeSLi& zgH@WZs$8l%yw|(8>EA`PofAa8rpjX#cuWlm$*ZhPkf-u+cj9x~>D|7tlx*WtG1C9%1wL_*arz*ySBjC%+tTbq%+ol#%AH6a8G(76UhX=S8YSrOFB$TIAz8o8ySS<< z(3r=O#Ian`l8vC7;v1~5FFVOfLygPj<>f+^f69Q((anTWO`r45mhplWGSYcMl*8LM z1pa^Ka;13E^_#!b9Ud}Jxj0$p_F1_*xyQuDPEAcOxA@S5XnM`+R{X%+tkrQEg>p(A zuW<>Csnw@SN-ms#;PscN@m}vwr)|!;yc_-PDw$EgKz|qL)QKKMvf%FHyejr zlu42Nt-ez>BYpH~@~_(3+VVuoF_4gCWgT3ey61J&73AgRCHvdv<{C?)Ws{VxDqRJA z!G`x3v(SB4RDix z8RDiP5Dc@vcfkIHX^w_VZ=#)Qjvw9y2KH1zx~g&M6DhBIcYqLMJS|t9ytnY(g&I%z z8ga65G{_PUqHhjt_R%aT6Om3=kwV8y_IYH*u>(K`k>)&|U^F;DZ#6Jt9n?P|*(O;& zNoXaGfADbQ3&pV(d@ZqzDYgaPMa6a;Q=_Qrr%hXnQ0L_d_P zZb2h@KXA|>1uF9an~@X|mmVHBr`Kop?cia0v04HJdA*@k z{GV<2>5alPcfSaihbtbuR@3PxcU13(sZMFHJH?IpR8jO0r)0hLTU#|E zLzZuHOeAJb;DjJU1cn`_scy?))!_tE2dYQx`fixX2!)7SN^C`f;sE!l=$!LRU)1AvsopPF90SM1n1A1hS@G*07J# z2e1E>s|Z}r-@gv;ez38fe3GBOPA~5$^7fk?;e`3h{Hy7M+N+i5RS=CuTccBfwe@J2 zAWop-at{4Q0$hurN4NhrpJBkt@vpF+%`<;|5iI9)J@OPTLz?7)+J)6Kft!-~NIpO?>xAj(%WIJ_!Ga*I0)u;7ryl50~XS>?owh=w} z{&xGO5F=4+=f~N}Dr=%so}gDv#O#cR#!`{0-~HncspjAiZOh-)6jLOO>0>MCfL>V_ z|LZ;2&)Azw@B8pCB{XkH%HwjzAaHb}WzB1XwF!O(l6UhLmP023&2F3S*|K~$gb87j zW|li6x@lp2y$MgAincz0zzf6n=AHPiyvNTs)YmvQ+(JYb*0|?*Ts|Lc)Ou)>$#a#* zl;I?h#6_`@0isPcN=2W)0RRjP^tCP*7dUgyR5)U=*wdGrpGfrE*KJC3CWO!s0Lpig z*HtNxOl6)vSAFEh;N371dFPP*#Z0FCfeB8;3SJL_HY>ft*Dk49s&7*}8aS->)O>eG z_p4Tpbbi`amZ#s37(-Slnm-?rLtMFt7E+_6ZuapjMtFVh$oJXmRR>auG;17io6)lc z)jGUq&Le8|7n^e8eq=rEbPn7HvzgA_&_gH>CIY@(-4e4G<6X^Xj5;KG>@0;4LW8EI z?PB!6{d()9qrj8jzy)~Ynx5rnF%ZLfKFw;9WOhzi38{^&)?xI)%y|%Nf(4AB#mF5U zebLXY`Kmv^bg8;DC8tRJ5V1kL@xXV_WhbbSS;(E5@?*Zv&RjwMaFSCaws@v#xs0jG z;o0xiSNF&I!B0gMj1L8(@3X7VlO0nHSb{AU`TYDFsiA@Frh$|m?N{?%aY1{3yNKn` ztMK5)vTG6YIME$dqq$5svchVr>2D>i71%-nlWrSvIiGZLa6~aDxHoMcQDYY5?<~5t zwq|wm?GtjotfognE!i2$@5hz?*}gnKoj5IL0supLOS`v=HWNVjINTbQd3OBmy=7ch zP0>sbAJv#dYz#1q2mwzT2-hRpGm>;6wO-yrKE5Z@2y@9{e^-GepOoMo7@=pc$vtP38tszky$ho zrSZ*f)DksT@zbGdC4)}F)oZVt8aV^O_KcpK_?$)v+Mm>7I7C0M$;F6e4!4c0JcLo! zClq@BD9;-vf%;ewMTfAFgZou6;pKa##*ATu@7y1oJ$9MC(sYq5 z>(gK*1yjfHpwrWwszZ0UPq@2lz?+icr6`lDIvbsMR|yV zwCq05ReR3(ZUUNQ0d-2xuj!ezc;q)W*2&y8-hNrG8h7%)U8n~DzWRVw_U0bjMjYKk zV#K_)CG}T1m|!ol+aOu1dN>3j+DIoWCvmZ9!hQXW5ZHG`X|6p+pU7>-mu>y}p=Fov zZ0tJ4WA15J!z?VWKM$yk73Y&-Ll_?yrEkOU$F9oPx;woQUiUMyFn~8-U<6U3#X|k` z9)?K@J7Q*!7+PF?`!BIqI@7h!LSp$i<;yiHH|7=(+9wiZJ5GO~0swC+AB|T(NEc`| zAC{aoTkLBsI$@Dhszfmsza#xx0{~$d_h8_Dqap{_nQBve%qbNF`Fx~tfcqd9Wdi@WeeF<@X=XY zROLXZw#A^5TEV-gh8`Y-dlKKr`*jdSgYw+WNhoB+ife!IH)m~14NGi9C8ms^ZciZl z&;55iKip(mYCXE|G4HG5T8twqwC|Z;;az)jV|+k~5{Lq@pe8mRO;5?9f`LtSByMNt zf%=a9h<<7gth(z2hgHtxC5_gX{nlCf5++Ux3e&%_#p+K4fcVoJHxZrA90OKy9rYP+2K4wJSUYKQ$4IAL zvTCFm?yiE73oB_DCuit|=jjHw$Gbl&wvY!2Dr=}1!}n^WrD;xsZrgdC$9yIi;*S?* z$ZB_c9Y$f*Wup24q_(%`;33OO40`G64nM3b1D2JJ)2(+0iW9FQ00<7LcWC=6e?(>* zM(gQXoIo}c3kC*NKN`Pw!vofK7Fiu|vw1fA%B!0%U_5+&dJEoJ7akR1(8Nar+N8}2+KX}dE}U+hNRi+{wW79LNHg*9$N0PM@f&~H;=;Fm@Zq5%OcbqEML zdA2$xzh_S{2@gSn8Xnv2+GRCH<>6tYewGVm^M105WdT}zIEY2ebVcgv0Ho@cyZy7e z7`OeJ8Bg};x(;Z4oG8|LD^#V2Q+ zLtjmcG(}(>SGTa_t=y9?#Z(*HWkJS%Mo%Hr+`?M}B6b5|WR->5g{Bkfh)=7FFh#9p ziKo|BgzWn%hKs?ZGK)hs!lYOzVen_DhUgsKz3~-YQRT29*+juU7)PrVY@O*w@E8VN z*o+iA6G0+Rkp&bg;YMiI{vP zDco1i7{R1LzPkQ;^@R8sd!;hwY`;B=SL9j35JSP03_r+4%T8?w3jqWV!Rl+;{`k`& zs+|oWe`r(4>v|d_nRnQ1G;sL^!`)!L>o|dFS;fo4r|^WHNGF1hNbhlDqbHA_HfWgk zt3*s{uKW3zBC%UqQ|-3;^Rep-yiYHr`ZcZvL3~QRECec^6Tf+^=cv<-6#^h!H>OlH7!#0pXa!Fe`JQx zK0oEjrcDjRyz;oPT0i=|L6C~Ix4p5z%Q}|f^q$aGz}j0!P0LE!H?g3dMu~urI||fRlHa9rE#YkEs5wyCv~S6EaOu%J(K}WOz|cP3|D&KdT@UWB-+R zh5@tur?{-ug6-{i;fN98j}b(feD0S>sblSrR~Ng_gdesZnMvXCUIDa+c(0d%e&-9$ ztE)?4(3f`q<+zp`>C|m{w5P7$-D2!g?S2xN`!>ItEO#!NU=tws$s9JEx0iV6tpRTa z3l|}XOyfv2Ny!iI?$Tb~;7L?30|7_Es1nnjek1W89;wAg(z9MLFuq;=ldP> z&KrddD2xyw5ZX9dsAOE7&0F(+{=ts%g-wj%^-ME`wt-I8+5x1>ccv2xI6S)phvpXf zHmK|cPN$_`sNjSUK=-3y`;@JT&d>uBalWPF= z@9^7N@o|w>A~ZxqS#R0ehhN0&Lkw60X{f8mHge`&OT#FH9fMbvP_oTn1=(y@o`uUqn1If+JB; zP`Z$_e&IoT6D&i(Xw>=F*ADI~?Q~HuGC<*J(^Km}NWy=#1Z3nc)*ghyMf_pT@q%(7 z0`Oj;$-PFALge;o*ZjvyxG^n!J>d`kCzgZd?CRdd+Fth8jR1gfU?@2&S*q+(%Jl>I zuj)N891IbJ)~|)?sQ>y2U>r#)4Lmb-xcKV{09M4|5fQjpd03O;AKxGa{~Q?Tm61Kw zgoM7R8SoA`w60O}@7$1v>MbuhCC_&U+zvy#`2n4*-&$+mSmIw-#v{KB@kGobpH~iX zdZ>&?{HLuI9&ei-h#Drk=2Le5cUTx{Gd3UvlAz%~^KFEup{W~V>Z|{cm4HC8vW5gq z8Dx0hAgH?^#mM5nqIgZ8&+0p%vqMt&@9_99S( z!NN#vFxwO%pl#x1NQMp%^oWSB1MMe@IjIOvJAT{?^s`YVhmnPmV@q_Y7DmH>Yv;`@ zSc1eUDZ#>lFc7VBDtb62Kc#T2wNJtfSQ~*@0J+TJOXe%mKIvR(@eREGaon2uXrv@* z`So8p-%UXpr7FhlNybT|vZ*AvP>`+-k3o#RQEPAO+ovc5%2z;GU=L{FYe|L1fpxGa z+4L-M$hq++YmtO&WJg1r9!kcNoTZ}qba3dyPzeOv0kLE_cM~#C1SvYcf zceRAMlmjLV?)xc96tYtvmeB}zx04w|(+AB0uCZ9H^|vc@@)hmHbmg4YpzEwA3elhA z^XYG73OXOJXP{wmqpOwC2lVYRHO&Lks=CQoNQMoXZL?&3n&W8#Au$Zc>>qYJ0jWMg zF;~8Ex7&0~_H+6xC_wlI>3N^)RcwKRcUzZqjnXVS4B%BD^n{?0TN?yT+=0e{pwfA} zseNa5=Mr=cpySVZFsxPbO6Uhl0Ai;O18!*rmr&`~vM&@x5N&$PaRMG#YOP+aIBx-m zD(3(j8dS7Sllnvh|EH`HU{wc4&Nejj`2yuO*)Ti43coKNYVmj!aY#uKL&AE6r=hJA zoD7KcHFiNZ4Hae}P107cY#93_PDKg+vs<4=URwYCn~J^l-4-5<5nlKve7F|0dhT&r z`c_^}$7l|}VX?;mlFe7%EF>t7_NfThYxjO zVw57#y0q5`2#4q3Be#PWGj7*MlcYu3naMr=LnCiKSUOjWh7thtiouk1zCIr*wOXqT zEm4##D3%H}-uO+|xJL4T5sMBDC2kZvtS}PRP!)%mOIf)nF$Fv{(jK~7m?1jW;l^6J z*~p5C@DeDQb%9_8u}Kd5(gz5Vtni07@y{MAa%j}Zu+*o9(Yu>*EWuxCLX(-<=sgKO z{xmc5@+$6VK!u!Z!$Ehd3l=oESW*N^Qn{LiQ;7NsuxEq3z_F@;}Iu5 zS*o(9ghb0)`2NRkHVP@g8k8ckfnC#3Pq`$;C%l<&J|wqw0mO|;=Qp~BDj2o`g18b`%#>7O0fAuhUP2T z%E(h`5^kyLL`o;L94Aak)vh(Ty_qD@C{lozY5T3|-pk4`R6SBS)eFW6XvU<6 z{NRX58ndI=kO;_+Wf3<4;H}a_cdtilkjTWse)keTWDcCR)<~J|r=jQ|QMWLt#hOJ) zILV9#*Q=x8EnsUgrm9dIJ8d?WY(a0S8xLbrF6kyf?~Hma$;tE1G1V5-JHbFV;z#L$ zYK>2bmV!BIxwVInBZa0AEPTARejK|`vh1&>R>|ok8s;G_-`HVjCGF?8+{PRJ#)x4A zNA~$=YBe@Wef#NpUF!q^dkDNUwUXnzR}fZVvOsQ-5$%$~BEVt{+@p_c(uZ-x2rHAekg1VIVIi)zS zoPcCCX=&yL0iRVZMBwAs;ls<&A_y6gAc1uRZaU~*Yi*a|qp&jr$Whs=lH7^!gv5UrjQ^?3bS6)pXZDZxWjRfoXM;W6B zIXWLpW(@?eR!@054I6KaSH%Ef<*-*z(JYN!Ar`F`j&zZX|2Ws;(-@PY3xgeQ z+{qf5xIml279~xIiwaNfgV1FRlKId{t|v-&NEBN3y;;Z9oKA$6>RZg>5 z8DKDlPY~Md0YH#p;dc6Z;Q>A1m}&X_D_(yKC1{p6S)9Hxpvtmov918Ow~&fI-y*dHHIG(0SjLi%GT*a*MZ$wC(aEl4ik z1lx87-#P>CVQ(}S$%#@X3Dm#tY$=4e@5B~o+&Nx5ZL;0Cnq=~%!#G?yGirnvG|$24 zwG#?WIjpdd48Nxba#YlMB$LiD+(lCFm%Z793=oVHi7hvqvTY{!Mz#e@%F?npU%b@O ziouUd;a+um;is&r^K(@yYc5k(Mf10^qGm3DP!?d%nW3y2E1Fa! z99j=!UjwtbCP7r8pk61-8eVvTe>pKSStyI1Fg9hs_LwSl6m(<%5ILg_3h%3;Zoleb z0YbnJ>1F%Hf7U_q9f=|m{s=>3G6O_1QR3a0Utg+Iel)n$YBr$chv4r?v@F4-f$TQ5 z7O%D_qc-uXkhHB{C5h$&C<1Lu5Y|CS($X7$F5DuF@e~g?HV!t!r*~JHol8Z3ZGhsj zhJw+0Xs5L1yICaTx&ry=fo9#`=ok^FUemIM8^`w9)Pft;q>ZWak|;B`X(9{oF{lyV z+}duYnMmdh#3B{9Wq;ndM3efcaElUwg~Ky9gpj3Z$&$$fggl4$V6!q1&XW`D{;_*0 zZvns|BOF9-ZcAEQRxPWHO|4K+yt&pZnZqs7=o%dbUDrk zYxRTVmc=VAe4h|@^U5~PeAJE`j z6jEe+q=9}94+2OtRu*`npx)}*>0lZC2ftSFvg-N@gJ1jti3p;=2vEFf=HuqmO)BDinb5J5qWWlIE zb~#QmTz2u@MC-=D2F7SwK=^1V+r^!B9&MW8(FbkvIarA z8elCOJ=7`+mzj_hy$=5#%cO$?ge95yNf;@P$VlcR%e2PMyH5k%{9-z8rzq@INEEcP zy2+Y07}3|**q~RyHTZ#vlBN5GFf+M;n?w*|B}+}Z7@i0+LVf{DTNymfl1^HhlcBWa zePejvBJ}bEE<7GtqI5p2m`u}n@A_P2UCt)_SRDfXO{iK7sZvf=s)N4;eGlwfzAz=J zw%b6@{SAq=c58JUEKE2yrHo9L*ajaw7d@SEXkx9}a*H2hL&j^Bz+~85Vd0N+m9>Tx z@bF|%C@pyPu<0rj6#pJ6w{v#nwvy%tw32#O0tdsF=C(I~pE0Uu1BQT7O|2H}lvCcB z3ALu_>J6E|2blu!f$?GFnL$gJU7R0ij%q(?Z&6n)TgzBIstj&Z0Vm^ zis(wzbY5|C;!(g0BbhtXTC1pQ6i;zPY=WXf)JsdIwL!tXGC;AirjpZ@kTMlTJ7&m; z`df9IJOm19SO}=*`}ZFzre;nk)OI;0g!@A=&M|}g+Tv><7D+b+^YSDMR#<9QAeQNL zF-pxO$<~`py#2jgx{NL`tdxa z)VI}n>F@eduT~>o)9JHnl2raNG7Mj*{{$^eav)AX2pN3Q-cdvDJF0kWB`S@2MnYX4 zLT?lDRCDa`Wcc~ZTR@K!o+Q>UG^RMLo*zK|I+SV#NN#wZDPH(%P&g=6M0gEegx`Tf zGIE>P(VFlPlll~r{bB*7oR#gOF4DPK?M!Ls~FFB7C3`sW%7+}xO~fu8sf-R`#;2dMeROhGb_vS7Sx z@r2y|0{FAxpVN3jsCLh`sZ+)swcE+-&;75SqsmYAP8Qx!BXtFUrV z_j8xV_zTdWIstb#4&_ZK9mWpu{S{xmFwN$b&ouMC-P>7bw?7xJnLgKqM7;0@u%eNb zN0M)|-O7nYJWnUBLxGQ#)$aaBA8^gU<-fOc(lLL4Wl8`1_jV3yFu7B%^q+sbHNv~f zIaUu}V3XEYS8jEnksGNO?8ty3u9-MZHb20P;{__Z@i2Bg3B1S=c!6jtWjwXu9XRlx z_N`vJI(YssTen%= z8s5{cCGuk-Tgl*%EPbuyHFv!jwC2@nH|v9DC4^{{bEl}bbEQzD(RSahpIwhq7{sk$ z3NiCL>VoWPNP9L%(MX_Rh-MDcZJej3!L7B!ERn=>rss<*3gv{ArF5^-X+mvV zd4^+a3ifSB&Pih0Y>8^~PaR$XJL^EdnxJJPHzfc3IY@^jTTg%7{xT5hJwSQNQG&2X zMppWi1oj*XVFoQM*i4-3h5Sy*o^QVQk5Fiu3?@iJ%5H@i%QLaidJczPAsjx=LHOp@2)Ma;XUH;CcGqFRI-z=O=8NKt8K7k^i z+Uzf0(A}bv=J4Le-P`kd&IKjCI`I66w##NtdBixe&fU(tlJ&HX{c$_v>j?cFzR_E= z>ow)Y)wg?y+>ce~hiy`H6j+})tbRT?7G9^IvI2&BRBbiNmolG<<^lt;pckbKE_OPl zVFKI#^v^i9FMAw$#}R|0!e3-twr963?2!M?9 zkfB|FpB;xJ7~!q)^EOUf)sh5X4x6*OjgKmS+&5B)8cib-8W{S79DI1a?jb!C#1QU) zlVME3*vvFmvIicfmo@vSiVozDt;HMpRb41H^nqPakd>EH`Eh=R*}(CBOE#X1@QP|@ zAgoN=vX%p*Be(7P@t{W#Gri7cF}i{cuqLZ$SYlj;6biPS%uhPmmH*?gtl0(&1E6Ep zW1?UHnB9&jMa0wW-=2L(Jvah<-I=?r)m$~1ElZ!4gS~2L|9rWZol3~$h=OQ@!agZi zt^p9udD15cj+8kwn@aTxv9d2u}-+`Weu$0l2bLr;T=~N?ts7*(p-MggqNv@4Xd@Mv~i-Fuu+ zF)xAwBD3wAToNihMoakW&cQr@tz%mAJj(zRpC;AM)s zH+z;Ds(gqSkOt5!-RP6$E8@Ss9M(BHtD|;1vPg*W|fT`TWSRMpJZ#aLp**(&O zEC)UFW&8x0d=;D;wvM)SN79g20rd(g0?s2@rKXs5*y{`?T3xEvEbl34b-x(bf4<_l zMor;BGv&12Gc0LiwMCEqIvSGzv|_d)*3~0TK|%%sI+?%^ceZT~$G7`=USeE_I;U4Z zV308Yr1q>9J@aH9Hv#oVJ8KH8n;p96^&RK)GtRvek(6IzS!lnC2R_N*09cFBb^DkC-dsqzN(}2}Jl;q1 zoNUz0Y%I@`P2v^G9QV|=Ki?808k~i6EO-Pc1T0VBJDPL*eIfhQhw)^!dbH?QZrlHS z8FQuo>1RAwcX9|ao1`D|nlCaGpMD(r?W&{4fZLH+#inHb+hzgM0vlK*5gKzJGJ=^| zUM|#NV>o~S)&K;qCa#-Y^}St;&OsKNu~nwOzW#RQrBvCer$dc+cXYpoIGH?DPL(`; zeyQtM>aYJ%&%uH}g*8ZQKk~RQWxL~zhp}2_??s^l_v+^H)AnKoa`u}J@AjAd?HLC) z9tjPTgwt-0WVz<_bk{UB%iUE~C04tX4s@|u#+_=3c4s4(LrMk!g*I;IXg?j%^3(SB z<&S?qSpZ*lZ*Rz-Xe>83#3%=YYU9$bFRWEhgoTR==e~}s3G%yc#g9TD5J3=AAm8bA zK1rDY>k6Ar={P@c`=dto)a)!H9T$t~{G9nL*|!4j!tvi62tM!P|C|GtzxxDt>ouN0 z`lL!zzL4warnR3>PN!oeukMp5yd}A{nP&~@HR#;8tx;mQ^;Bv}n&gG&0|Uts7E({Jy%{=?^Cn#$mxMe5(M*BL-=i=K^^r&0@H0&Aj z;tHkH$?$1Pe$52=8x4K$RjoSb(W-AcxWZdRlV0niN{Ey{2{ll4hxO{zK`wVi{;Nj9 zw;nzR_qVG^Lo+Jh!b6&FyaQG%0xR2}oG-%(2s&A7CvDlAe}+M?9|+l>FjX>lJQ+WH zO^5@i2~Uh!qxvEM8eQ%S-c{KBF5BtkHAQ$z&oThp!}>)I z@m4+h(;U%1nF1Vg4K5e@OgmWD8s`|jPisl2uWaz@#g5;;4%f@r&t=)YUafq5c)ZQQ z(9uP2^lRb9?YIz$A<|8qn?Fa-?Pe$K|B|y84_$hw(&FR{O}e}E5T(ay)_-a!(E|q} zr-ea}^WB$1C}iwZ`f1VNrJNC%sqcDw48ARjO! zLVsyK>QBv-fMNf04rr^arWVK!6sr7NP!gHB@84prdwL-3ll0T62ii|9O=dN^Otv>>H0or` z)bk`LJvJPsqGS>e7q7OAtZVvWWwxI0@t4c`=FefY?d@!v&7Qu~9xGYQqiy11v|Bi{oM2Ti_XzsGrWr^K@t z5E~FTDOq=v3marerrY`!um-w|EMUY<{rC_+`IHUv(^p5g+&#Ip6q;cB^nJG!1Sr-7 ze+}8X>HVeiDJ4%Vo^1X2*Q#d>gEs|EjD$ilg(;UaY!txKM$XxGUmgvRi1VvcxgfHX z*;}oG(-{b$xFLs)6ip-LUjggqO-9LUxaK|TnE}OeL{<@9WB!nC8 z@H~-I!B2Ca7x8prj2_+`?R;@E$96xFib;L^{rP~^JNkNNz+4}v=i_E~OMJ%d*xe!@ zI6MOmwOO(^EWmqhJO@;qFXP(@-?Gv^D+2^B^k=q+JQ+%jIVoL*o0HM72^ zkx9mpoaT}qH~$j%ZHgl|BcTTirjv(<V0c{(qh zwqXX$GF=sR*bp8rSKNG@SgpCL40k?_yP4fq7Z5DC&wO`6FIBYDoA01l{a3{SeZ(U= z@yPZ+k}Xvl<1b1NoK+qMSaGcA*B`dt{Q?5Xrb_$>C#={W#~(tYi6`twvN-3LsUikp z=oE!6Ki^2+3uTCDkKj_){++L`k;`R2p9O`_mzlb}DB5{@0RmBB*ZYGBnEPp2qp?X( zEBY*MZ=Da4oP2h2_&IFrbjnBWI4BlmL;B!rhh46}40DrbYFH6}Oqxv7Bjo69GKTRJ z5z{ps{@n)B&{}yExhs07+nL|E5aWY-uOttHgkQ(I>_+t9DqE zkljTzgnQ#p%j5tb$@_kF7>lX8x25`@nU~1)?Rt&vzSAY1_cP2 zvlWqk?+O2A%9*`7VELMNB2@W+4gdg6r?tPdAW7$dT$$a~3X3dadZXG3-#;x}iysFq z$8S?>8#_5IVnya~fzT)%I!wbw6Pqo}+?h%yKg^O&~gqXs|SD4fywu zOJpGe85(Np@bS-kLz)YmDY3HgGg{&S$G-vaiff>2$dKb_(~ZXXuoh-G;m0S&g}Kj2 z1+Z#qg2%}pQ#05uQ{HX^0O9m439HTeri*!N{a2Tl-*${6^JTx;{o;dDnefI~@Lj2g zUh0~CsGa&$J9TV(Vy%@z_BbV@-?Ot2!R_wYIt0@hb(=S-qWVhlmgQzX()yQD0MC2I zx(nSLlDu3hfxNY?jj7u8&0l*kHa7};IUiFO?uQ=H#~a%m#C2?Bb$(&{I1s?dYM`C4 zUQ8yas2Z*~mtz2&>lI|=6l8p?pN^Wtt4NNXSQt6q+bgfC-*n2{sg20rF5HSusHhrv zdkw!Ic}*|Nc0NS1ymY-+YF(UN*cwo4eY?!r10|S{49GHur{SqxmqZ2ts^&G1)u#3U z!X5`ZM~ky)af|E-+U0q04;kAiZVlYT3d|M+@c}!-Ju3F)6(u`&dqk@p84E6t^LcWT zN)M-{j;gALLJ!J@-ba&9#kAJN%bH()I--5`zF2awE~X8MU>br41fs6W%gZTvSx#*;QJ+#%-Sr^DLXj!}L;ns1iwR|T8Lr<2qYM!8#moHX;=RU;8}>gh@9_dymKRT* zp)H%iQ}bQB*+UDBy}S!u3k+GAgU7)IG(eFS53PMye1eagkNs7+y+@3ToB{w)m)1d& zm;rUH`R%ye?)6(3HDX@heg9m10N}F0K`-EsFsA(aNal@u$NYQy1&;zi7@vV0)Vl{f zt`JVR&PNYJZ|g40O`k$Vflum59_(!@wy&V?1DrJhFPhjoR#r6V?+?pqOEk>JE6KqT4^>bMnY+c*3!s z35V&R=Vb;TOnTP8AF>frZ@FGRRHtMpoH>TyQx&{HM=%%cGapOEQT!gcKjh?E5vraX zkw+~SjIi}xL0${-LjA1zwmzTR?jAS6QQwW>%koIS9Ce@%++LVC^HZ5nX=!WNA_oNC zJ&nX}EM|T$DEN-%Y3sJ0Tm#URt6UysUf~mZ&&X*$*o+!S@5U#HpOKpJaVB8yS_<%$ zr~Pd1QJxVXtUlTk%Qp=O+>bsc;nSROwN4ykotjLnF>!wJM5y+CrhyofA1gU@F*3TH z?hr2Y4{206o4j<&!C9I^84sl>R(09TrEL}x;Sw^K>g(8^2b&Oa1G7poW!W+O&!DsW zyndpu23LfUurIJt`s@CC+-JWE9KhP|`^T3Bt0F}*YMPNlWLaKqbzgVp(;8Yl+~j(? z3%fXJT=uKon*meU<;cQdr@rAHGrPs=;7tGGyWNwoXysNhJu$dBQ_esR>Kgppg@t}f z_>%Y${1-D_eq&P0!2p~aI+m!RvH44hS~llFoh8_FBdNzui8RV3c7DuPEK9gnyU?~i zF#qYHEQ?_Xr#*MQ5}o8u>gE$2F!X&Iige-9kLCk<+xqPXkLDO`HBw8}rp|+Nr z*6zjL{%A+v?CrO3JbTm^tyPG{kWzNuzTuT@_~F=$ zQevvQ`XF<#SS;t8nCWQt>Bo6Q`Xra;Erzs$HQAt6z}iQ0wmN(IldLR$Mii8rQt1xk zt7wJT3(a!g?2~Eou1P&rYm*J{D}p%C|2-4cc2jkd>GXn}47ATR<|1+sN}WkZtd3-(-HcIK~8 zFJfH9MXaS+;5`wp_Hh;e8rlu`x^+67Q@YvQdzT1Etg{)R_(dr+OL1}M@Aa9CaM}-Z)WSnm>KpslgjgFyL|d+22jLX+ zgU13N;X-G=4HY;XeS3p$*}1jatX}Nmm^txh(VAq5;Z@~V-1BHvZiex3*_b{%$|SB*$iw#@0oT^b>B+5Lh- zIL1T8v6S(65svdK=uB}}2%p_0r(Jc`eLc99{at)x-O28tMj9^kTcvHUvz$k_wFSQA z%~1#qKdgCoL%%2pWr~WF$?_3uATK4KMP*LiAD8C7A$!yA zVkzo)U|GDJ9NW>O+2H@d(pg5u(R5q5aSQJ5?!lcvkl^m_?h<5xBxtY@+ya5%?(P;m z$Y6uJyX&3zTlep*RjaG(RCU$V-sd^%}_}0?v&`1+QBYCy1@Z0xD52=>=z?Mzh&)PrCb^et3;^X73 zQJ0JQ;FuRa=@L!rZtn;}Y8ad_eM4l*iip}V!AVt;#yQ?H>!8=IN5wa8#*R60K0cl5 zyAJUP?+bDWLujbMU9i_!r6O6jpTnezZvM1PcDtpt#0y zvGGg%wFl<2y-ABU1#Zr<*VWQMgip5cy-ALQ%_%cpVg?@j`0HuyAa|v;*34+h#d8EL zfeUS40HbVp>WPWr*^KyHgvr&^F}TG9PM9%NkR+b`IVz6w)ZGdcS7w`(lX<%kP!&|o zW3|r;^Z6v1{7B(jz~E9P4GR4eq4MHAQ>`*&f4zHTv`s+g9@BmcWbR&tuJ3Z9xfBup zU4>)S@|`oJw{1IOQMzgg{b-tHSyRKq;sJjTCi~d&EJZD$0^+L>=X$VozH2qy(X!{J zuB4!K@W_nYIqB|S;+bdr(zBJGtbURh)jI8OsaDm=%*`#HN^m2jh6}C%X~;7LtoMD> zQwnUBlg5JIVJKOBdx($E)5s(HhzID^RUI$4D@+Ick-*5UX!dfeYxFL?N*I{gdzJK} zSS`>-3#RnDctP!IjyqWzTCg10N$#vU*%}_HBR%Rs{1}i#o_2d07l55TZP5W*?%jM| z(DV$NaKc`rF0qz8cyQ9$KHV#_ljm0wdg3I7Fb=U;qob9cW>;bE6S<7EYX7OlME;pE z&KoOF9hT|AvCQ}M)SU3w$sCJ5_Z`9>#rm-G^Q%_L7u-+sDM7ysu$8tCu@4`Ie>@n^ zbxc9D{ezFv%T?AY(|^DNz`#>#xrlazC@9OjHXMd!IUf;T^#{S+6c9BYjg& z$r}58G>>uK2T*-DXg&Os3}?sU;CJ7To(FmPz-&24dHu zoxC=`C>%;$uYfZph=iPGUNM8y)`XXhsl453NHa+g6biIh`bSEcWRBcf3w;P+fS90f zt!|Ak``A*zzCdFIb5$;lN`OV!U|P1Zkxs;*({o`J9Q26TH0dG?61`6L`vi0AG#<-d z=6f6@=;aW~Zr5MK26;aE{I#2#DlEiNp(}IICLR_pq!SIJOQL&nGO6Y~A3@@k3HC?- z#A1WT0?)}+ieu4xI0=(;+4lGo*S^l12t)Q~8!1LY0Pv2d>|8P(e%yaoc`{w7OiYT( z1^X2Ex-&CY-ctt#BWW@eL}?qklIN?5=^7->Ka}BD(MJNgw)LZ%+8V(0)Ra0);|gY| z5q0VavW{x)_qd!u9tkLnX(|4@ooT9WE~>wqZBwVt#q@QP^7L4}yD`9WhIV4K@U=si z(%pHEjdUIdF!LDs9*?=&IyoR>urs{1t3>$)?$59+C^2WPprdMYesvT%V_<*)O`c9b zg7l`ZNP`*id%aNRD(T^~)pT6IKs?z?DJaZCevRp~8cjJI05AB%#vs6YW~bO>>!(38 z%xsAYo8ZqCpVBK%FG{!L)kl{}Yrhrg@OJ!==`InreUYOh;vPCcGUG}FqA;@Q7GS$K zn506bBlwp>m*2fKasG0JmLQ0SzQ>1!Y;@6=6nCzrF}L_T2P7?96PXz!i^-+8+_$Y6 zHs*%p$>oDJ^VT+4?I6Do-%0-Y$u&L|kc?g`L0GI{+pQJNIh${%Q~>}wmzT@UgJW|| zxCx^Iq3GR&S;g%cmXF%X5OC@d&f^o`Abgz_@yA~$CYfT~(Cc0L&#SGpev5@$DGTbR z91eTP0GFuU>-XAg+#xhq)>Y#gvmZo2ci`sGBxeDVO0c8W&clzMY|9KVx;bn@w#Iij zEN`cOx%0c7bDuE&`P`OQ=*wVNP5R?%$`8e0d>y0gl*}$-2Qg~E16+T-=Ptk2p1O0q zhkR2;HdOX=-MrNATe?22JKk#&Zc((-5Mi7T&w-((_lctcq|Uo5x6&r}lxvZINXlfJ znzL1jUPS=w{jM0(=;T#h8EcmwV)?q&Z^yT$&V5Sf0H$VIN-|qI6l38=d~BV8KFm1r z^O%F#d&Dpz#NWGN?qB}^aBjG!E4;o30;BzaNTlJg@Eh~0O!}@m$n|-LRnk~beV1aDp>K-Nah12s@dR!`^j-C28=Mqze-SefHm(#*9QX2R^P8(w zb@l9dSVm%;81Lv<>V^HZ&XH~6Vb?y{BBGxL3M|?llIzxw@L@*b0Mv~2e}Xoa2LcFF z-XrI`wSyyhMKpUl*)!vuSAta8xzhWVSdn$K)lI7^;gL(nn8(`ucA`nkpsrs$%- zgpYq3aR2#zX5>C3*DY`<`Aa*hD4h_q-#|HM=G|nbTCVh>Gy`xPLFz!6dWL3#|BaJ z4ojr_;KqhC467l$dkj zYPnm#xNL~ejT!t_ybf74c5cdW9F>299l(`%(<~P>)}$i%GMsk4x+`Q%V~7=!Acbwq z9=Q8O8$34$u9F2&(5$5UxpA=ZiJMMWyCke7#sRD(c|nbHR{TvXqrD(g%1dGbB`JFw zQ0lL5&!mor#%=Y4rds;wvV(_KhF`bf=|hGve+!RV@rGe4+KsHc^#=N_y}pokwir46 zx#^uai$@C0Gd)~eN-;vor!gX`Nk_C34A--eXns>fuaf*-kypB4@zckVho=2v1ip=N z$I3*z#anF+q_;~uok;C^OIJ&|QhSf%rG+$9m`3CcgZ-(Baggu%0B5!!@o}P}bS~R} zkk^IoZ1z)4;ky`wPn^NCpEyu0_tfK3pnQpoM>tBBblkt*YnP@POVyp`t{( z&(6-3K=C`|l4?6Ik18dgucVakt@mz!uH2L(0y6Ep^yGgXzuAdXHAoWs zXNITrw`XUE)Xhpj9}XwJ0ZU_n_pzVzvF#clh81f9=tto4o}VM zx~S%70Hc))++-7$f3DEYF^zm@pCeYq#Y-F3Gt-PF#n{b<1=V8 zm4~TMr~iaxgdH7;AZF6i1pQ`K$6Bx)(VKeBlJ>)9hb60zL!as%52@$fv*$$r@i%AT z3&3T(-0U(rPCZJ=;r^{uyR2?($NHVNKJvfMACw%_pPC5Tg%REkp7A-Zj5Feb zZFg??RDfAIuRIfw3nM)~Nd^b+wB_n#&GjW)sbJRu4cf>;hX$S}lFF(2X@j*q0yl9P zbPlGMh)zQq*r@XPOooLaoWa8%4rNpwBJKV?UAQ1~6qS@dPROWEwHx!%ejtMv$O_ey ztn<0;uAQyYDYq2-H#ca7NR83Q9cnHp0~4}5k){u6FENe%GqIokY;wHpeb7`|6=$R6 z{->-cwcp20fu&xn79bLg8kF^S{)&avSi8`QBa_x>0DQLu$tWfZCFxK>Mz2nLg zMt4QZ-l zXn|#t@nd6y^z2O6%Hwr{OzdEQ#>z^AWY%7{3`>BD3(V>`k$1=AT*1He=+LmCwK{I@ zN!YIr?a|iIXycq;D=LaI$hZ;(NHShg6en-E)sgt-y~)e7h@G1o)H2NSE?Q9JxQ_a};HwD-n3;&2CGw<} zo#0D_*NC3pf5jT|5R~+uaGo4i)La2BRXe)w%h>df&avLI_(~#JoC*JE;T;!AG`?ng z6F0uZv_AJf4@KNMZh3heq+Y4cLm>@Ws{C2y7sLmQAN|p2!p65E1ycfQ=TK_M?mi|6 zdWAx6>~kn5kbrfTkuq*fq#N6+7pEg4U7yQD1mY3o0yS4>pK+))78}?k!hiub?czK& zMs~(-KAA2z8uz|icc={How#l9nm}Ri?NuY>{BJ9qL|`K06+&LL^kNFQ=(2Zbd{s_H#Vr`pq}Zel z1L&!en+74elHzCflKK0d1VLi;x~z|PSy)(p8yc-6rFjUStB9#cu&>@5Uz*W0(_}|C`^LhY6_%1s~1XlX5JzMkiHKwB^)!Ch&L8)H&${nfJYw zO{~i4G{{AIMh&-Lv7iArwq3toom=q$cY=(dz*xaJS|(~8&%VvQj`dhNU~5;P@Pw&U z>)y+&?E!p9Sw#hK9k7a{q~7{IJbpl>-$+P+bHVg zp&{y!xb@(Iks~ejEB%HfLNf+-{cb1)iT0}ZFv9VWL-8YA@OzVZ2==tnMhI-1|AMDA<<*}}u<{!b2N1M%t_>Abnh zmk%SoU${}$vLnoM0*Tx$Gb(KTr`sU2BkRA*HW?)kIr^nDIFC|Hh`*(26uv}2+FG0}RKtK$v6q8)CyEu4` ziWu-XnG5%nKYsq$rG@1F`mBrdpIU3#dRiomdA9#m=r#a+rd70XzO7?nKzJ&2Y613bx9HK%t>lOb5ir&TK18|@L-EY0lwo?b- zVqIeA|{-0`ga z%u_@HAQ=@liwl>)_e-jdJ}LKizY6jnJPb(O73v$jOj zw`UsBZ@GWa*TRMq_quq5w>p}kPup(pxie6vz@}FZ^*$yZR*FScbs_ePIZ8<>ce*8E za+-RpSgb%}7zkq=l8L#$c9?b4Bv+}3gN91@ShIAi`y(M5l?IcYu)Y*st(aP@01-1j zAAXbD&p#Dk*ZC7W1KE#e{x{ASC3nvZ9S%o>N7?IM(i9m0phEtvWdafr;mtuDbhuU` znHpyga8ZE9c02EKdr>nFXfK+`94$Z1#)A&@{6@7$|Ng}9Ad?e`jHGt=&;LyeDTr@L zkL#T;j9akK?P(F5Wgh=(a8?rbA2oRxfEq^w`kA2)cT=%Do|$oH z4qYhF_DdB6iG%fb&i;XJ%Lli2CqFIvpz$lBs3BcoR5#m8oa^e#Z}|Y7Byd5Mpb}GC z$cubJJleY?`N$X>7Os+5LLNa;QK8Ct_K3!8%a4fXpS^E2x;%0JTgJGL&Y$gKiTFJY zqRWH0&HpFPYjWtQkGo*BuRIs59Hlb$Lq{|WbMbG-?IP(fV7;Qb(Z@gn;`=VDBgNQO z(w-4VRNbKWQ^|fh&Ml?)_IgnHXzm9_-{a4}I0PcIzjdxneKpp(s~FFyj` z3t1g`c(RO1E(9R?4a)=n#7CHH0H*nBDn^`;hBW)ES`cS!IRPs`kM(uHs-T}Ht1iu+ ziU}tlo0(2omNw+{F)qhv-q(;{3I3{Pf8_hB7KnJ$+TCVc0bthkVMC{0P8%1$8#x@XoU<3weM4U#$6c!a9STa*vJd?e zO5p%(+UYHPK*(r^G-&&9`ltW&)Y?hOAY%Wt4GC^ENus`{pN_d092I)xwQJx48$BlF z0rn{ciFrIX*~M&?ImhrA*fVWmcydzvJ1<|nLfMa5p?{OfT>9MHF8trr>>S_B#u;R( z@OW>GWn+fFhSH!yk7{f-tPEHvZh)q@i+LBi}fz1Ht z(y~UQAX{-vPJpYMvrR+gG_9?igItoaCD+M`r@eL$dy()FyXCFri{<)SiWMo69g~98 z<9-f~_UhTu;i;D|j%lE~GG+}ZZT;B@PMucILTvB3CV zO@W6@W)qOt{Ha;GfgF`-8uASpc=wQwK!6caeTQ=SQ(U`5Ro8Y;%M+lvlMgO9ap3me z32V5qApp3(d{eE?jN!`^`cloD3>U|*&pnkhMoN>2Q)5DFDpc>@mxB@p%?Y(s)=uRQ z^33b~@D(m;FN;C$`P^@)dynE4YB3d?YgHtCM&N^*`ro8O7x;dATD@eq`MRuhNVm5- z3+1q$L+?9`Sm^Dq-u%6gD9#YDkUF3ouhh3gJ!p$JEch@|^vAW;AOCX@V+eOpG!eyi zbx=dSb{DVY@<00#=>8vOK~jzE2F(Bo=#xT?B z<|xRX4zoYmNW!COSGNn%Kfxs;Y`_?~o$(W*F1*&rx+PyX<*BMBwx#>=J7~i_t5r|u5nTG+2C%Xh{ zHM=OXP15Vjv4C8+@yu_JMLvh~`7^USZEst8=LL-X*~}U*ai;pdTad{n+mc^J_^~CL zDN~3^tSQF#$=vENUh}C{EA55b!Iuj# z0N{BX9rY4$ZFt?+ltadRkGr9Dn)%XK5Ygpt@}|ABH?cf98L*pSui|RZg#zL@k zWjJ58lz!DEY{XMuDEPAfFuk^V9%hEsYyXJANZB>!;W}TFs6QV5N2iFg>zC=o^CLyq z_e}~igUm{Y#m|U-`I{89? zwlNY=8$vLp{y{ZZ>AY>bN=(CCf#gyl2@;)dIgu5#ci6%MNFL4}$i?eO)cib;j7LH9 zd;y!x?8a0eam?FM-UXI5`(1yD+g5;@Bu*R@XG6qa5WS9wDga=-;)umhY6SX&exZk*MZtmhC9zBOE5<8*w#IyOy0b2@MDc+BN zoe_cD)7_}Duz$}pfD#GW>ig9v-GEOh%Z9RY_4i=zdlTNPac6<6GT~UVY2ixkqmZ{i zxgAO|P{DoFnc5c~-K;h51UTRal6TD2{fuXxSk6dY(J3LG=*$<5L(-`{nT23$1H$ne z<5UIblPV!O6;oCoAf#V}jfG)sL*ndSM33WFo14UoZ+lhRnQ3$2`)_bmUIV_ECZ8`j zbGu@2P(FQGZwWVgue;W9D;Xh4kc72Ik5q>r#U!g4c%?$Yc%!6%>|C6)S?X#UWM&5c zijfrD?0dDy^r<9KYT+C`RrqY_1qTj!8@mFRj2i$n2P#AsNeB|d2N_y;Ur)nyRa4Wx zc%VSHQyu}3)FAQqiIY{(c^0noynwLEF8(G1_l{|&h7J7-#OK^WP{{E#HX0vsY?bqO z*c#7P!a=ml@)(aLY*BTyn=Z5DN(ZYi9|2a297AX;ELBF02Hi-<=a#S3a7(`Dbh(x1 zv$rBUJr#(JM;Yt+PX1cgcaP&-X0jS1E;^1sk30Y z4)kisw5`_0D!7FF89%~{i_@y;`g;x$X9p<7bG!u7BZpM7v}bENo48sAvRJzSG;kQQ*7p|DB~0+GtB=?Im{2ym-!ok&W`Kf5Cjgf$SA7Ju5b$ z34Ng}Rj&Q^sm#*7WQ;$AskCec_F$nkABlIHt2KhqwU|h07ayN=I|e2(;3zN*gRI?9 z2H{m|B|qQ0U!|U8e9ekhT7Az<;Uh;8K5v0wwftNh+5(p^t15+?hPqdL ze+-R|xR3yStLVWmjSi>ABgF_MidIHRpe-3J|0ZX!+b~-^hf%2&O8ohK_aIDuET6&e z{K#(Sc*K02OnTIGplLU&OK$*%sduUA8d$F)g2HN4YS`;ni#i znuWr+aqECw^C%3E)@nF(cf6FMe#R6T8ykC^4IeW0E)v;M|2Fnnq0CcCAq@|z*Ko{j zomMO%4Lkc)zixn!Sa?oxmV{?thMRCf?vEWt75KXTjWO?ZfV5bGgpawc0UX9i&2po0 z(ClD7J>-%fGrPte#{H;xzbm$kxu{N(abT=x?X5i83K>l`Em55oM|^%0h0`@G5}qcT z*RJzltj3z=?}x4M{)7;a)WJI?t;!M6zrm$m_&WoyJDe4GArCuv;pqZ@;@<% zOUC;wSAUaVU%wn@!RlfNuD0w3IZ{dv9 z{}6%L;JKYz7DRT)RIVWL0M5e1JW?Vf7Tdi-n85{62Tj_*Ly5#uHK?^PJJNZ8NIbn{x*~luk*j^7f|f~NRcY? zwAqX8jg}7Clg*TfmVGU>;9T)e2TXE$E8Z-_T|gT zfNZ3Z|1s<6?d0mRTXHo?O%ih^VZ3nXZA2ZT=h<4v%8WOZy;R9vPcArC=Cvl`DK2L8 z*UU_dA^tURqx{e1(^K5B=u7eORQ5B?x4ga03PsJ#T_x6*c9-!4+!Re;PEn$#2_lQL z)^88KsC+L1ClsD1-_lJ@hp7PGP83fG{r7BIO;@95lP0Z|EEUYw*|OtlPQKm`@$-k* z>wNY%t0=L3k_M%fu8`(eHszcy>gV+*Ay~_))2dz5HP41ZiiY&y?P&GY)VYcZAE(7C z*YyI`y$nL?+G@(7ir*) zUxb~3TJPGE;hVSuq;EpB1WLF$eV?)f=J5zT*^+O2mh2M>ATD+gOcDwO*fdHfy@2Hg zO`L#^&ZqNE4y}o(9EQN=PJ)C`-NVfaN_u1AhT9he#|i?aZSKoxnZzxcVEcQGFJstR zN4n*Lo{gL4g9mYxhJKN)y<~cgNzc2hXc{-eo#GomG=W z+Zbl8pMzY@?e}V`_5$B7hT9l*@tHIv4C?r0-~lrx!6tjisiC0Hj@39T4=sA0dSZap zu~E?Bbr0WS%v0vk?a-R(_28Ih*0k?_Tb)r=rHFU#<>NqfaxHt#J7hS3Yv=U!6e8{G zP)VSrWN=Y3|3YeFZ+}~`m%{#XfcRd^CP^_7QRRfe@M>q!p-w&hd^qJS;?qGMDUx{R z)eZvMcqF9#{kh!z|@SE@LteR|M@z4{b^W;pu{<5q?%YCCHld!BuLAayd zW(QUPs+mRKkvK-jFDnQTA3h@nJ)g)`p?p$`d^bN?K78kI8K{U2Xo)Qa@ERYoR90zv zfA&jy%tUD8)_$xs)UTHnw|bdtGJHzAJazU97#XScpN{M2{l2ijL0S20;l45c&@&#y z>*F7u;PEM|?z9biu1r^_<7)0h{uf$foATFM?~BPJAF@eYTd>h5AD_=|kCGb|(YmqX zYeV{%3W|nZml>xJOkZi|$I8rfrH98iQuHBD+7HQud+W@0Uyr%z7n6(}I z8PE7JtShY*EpY(8VyWS&PxGsXk+r#B-<#^hi^o+%YeqmFG(G2ZSQ`0vt)?cDGP@Mh z9t1_K==F~rGIdf-o~m8yut0`#ra`Uc#co?z>oO}(0Q&u5tFw>h_)?3Q_=3(?wGZyv zeKtp3hV_qLexTLw)O{w3P2|tJwW}3BeRy+Lb#%R4_Tn3vEmhg%qk^qn(4~-nlYc{c z_Ud4haJ<_r5Fy!>=V*Q2`I#MW`_VdDh4Vzh@8EYKN||d_&Z6VkPgDryT^GsI;cVN$ zpkqz}UCe7S1$AgMJKRi4PMHky$%^0lgmLJPgKbqxvftRAw{;&9C2Gg#41?WDgZqoo zTC{cNfNyd9YJ-)n9eY?JKT{}`yrRtJK zxMVeFnBh|?A$YrzQ#(qj>J{j^6#?}&ApgFm>nEtv@^Tdpe-nhRt;5(eW^Z00Q>*Xe_Cn zGM%i#oUE-jCeU8EA~JR8<@`HFVx-4G2`+re#``CWyLZtS3D7rzqT`nJc3-qdz8E93d=v=jrzFc9M>u%=e&UT8*^3#?D>NNXkL1=kJ{GA z+IoC^jUO-Tyjt(iU&kd}+2rS+uQnJ4r=+=9mrt1`O68&%GJG zY^C7^@%o+4c|r$TFuY=HS^TLk8vRqoYxj5G$pfs`=a=77kcQ?i^SvkwT&YO$YTv$a zK6>O8azZFQI0Y7ps;Kby9?Q!+yv&qPCgOQ1W{;G1rSl-%VK{*gN(wd&^`z$~1j;e8P0@`hq2u(uW3VMSm?tg)U5Kp2uLX zx<(Gmp>kJD{y*R1Ri3XGD@$!%w)SR%x`C|T97_k)G4Onc+gX;&3GP#H^9AJ#|P$$#Ez`H{l=Bm-QT*rr==9)$}w#}P^J|r2fd0tEe!o9ZV!TpbIQj`yo?eD0jK&t&nieP&;UWsR1k`-zj|$vN*vX)2SH{a^G6A-j$8*f?%il@L@L^`l zj_}L+6zA1A;5HIIuR^z8cwRQsDJ-dw*`v3sye3YZaAu%N? zz(z4OajJf$Q`wra^aw3^0~GIk)s$07$3gwStK>l`5c=QzMN8kSWUJ#i80V7WH>7Y@kKl@g9|! zH3!MPKWO7_#BR=doS=kO&N4~!+ZnVS?NU5h6|XT=cutGIb5guJ#!K^in$kw3Dyvj* zTvJA2VWsD`wOuK9BYEq|8nma%y`DX2E0YK+Ftlj8je0?hF?l<`PGmn+?n-w?K67Yj zZM=-SQ1))%WARp|2lRwK^jG`wI7|O*`gJNTRClP*?LId4^=-5=z%;XYg8)Fb8h0$? zTGwldi8<#U4|KNS2RLw0Gs6#R6a&WVTD2x6R~|;g+1{5X-?{~L#kvY;i8BkclWu*M znE$x2tK*D3$&X1VJrooH+p_d5Z~8`V$8bK-vMe@pf_O2&=aTo$$7Xip& zb6AyMi-F?I1&60NC?KRF7kk=f^IeZJA1fXSvAva^*L-eFpFv1QPLuxEzE1&?WZ_r< z#j5jRK%;S%+_jG{OY23hEP>d~)kNcuwvHO7=BkoK@`8OHt(u_S(M(D`fcAW;Z0M{q zO`=2-8itj&hU}}E6Or_g^0~)D1q@)Uba2#S0Lo$m0JKA1>s2nO^>^o=2}Px~01qny zwr0w0b=a@VK>^x!hk7g_z4MtL_N-a}RimTMRDNldCKy}-)FbeHf6W0cbDes*#n;rq zo~_#5n(G@YgR)B-5dkedwWb>ef21SE4J=}bJ><%yjOnrPzVKlP8j_X*KtB5@i2KKuf)kk6-&#dNDikxUa#1mX;ti(3fZmLr9;_$FST9lC~WB6vD&{OD1)Wd2Nxd={kp^G zfh?Clu)qTSNvGMO-rR%&md|vx{AXDtH2`wtZXF$Mnauvt6yQGJM%ux1T1`AOP&gPXtOZiqGXbF_9RS=Sc=s9@Ne{ zvdLB~El#wYuzr&jJX9vbvPd`7BbCY{l44iaw%)OGCtZ5Et$cvv$whUK#P>n8J^ zrmHscqk0#x;jhghLVS0&$Q|ch_Il`+G-g6B+~sLz5YRSwVK_Y32disigXh3X@AR>a zs<~-+SlJ22?ys{xPRu(DI{I8ERSsqxWGtx=wa=`a&rKpCQ|1+-1+cI{cZ=@fOp zgE>s90!T`j7o6d#^qQK_Xq;M4&eKxYNSB{w4MS8O)>O+pL9iW)-8`$lLFY>Hl0l^x z7HNh(nr^Q^vA*!0>BzvjrBJjL#DefXu1@S&5c`CK4<-^OB*7nro!7oZfN!q)>j&K` z9`o^^?;;j%aU~wyo>UXtmNV~PoK$7ZtcK#q1EOOH;9*k2XqoiMTEI#vV9LLKhF-**CAq3E={DC%#d=M*)RP&R|&(ioOL&$j=NLM7Jlh&9P`@h zZ^#t7WMuIW%5X#8j@Bp9l9~m-0 z%!dJ?<_*At07{X3k{s?~&jiQHjVuIUW1iFKMT4i^aL9(L$EuVxq&AzK_Z3GB?FFk3 z%q(*d!7sRX&62LYW;UdS1d`=p{191hIkIulMPu0Xqp`?(Bmi4+=CM$~HpRY~fyj-_ z5(l9n=Xt9qUc@8S*Ex9kDFzvhUHthfcF^SKV_lI8+KX5LgXRqPGp+${L5nw)6MuT{ z82AIm^491vmVCCJZ=ShEz+dqoURuR<_G({s`LBo=Wa1v@=Nq8MLU?tXkT_77uaD?5 zNG@k-1qBF!l0#kG3PTX>M84($k8xy+_O&|V4EJF-4hIL*Rx(R1snYehpBzJN^n zc1B=_?*SRRsfjZe{>pL@xAtk;g~f06sE1B35nclE$6bsGupyyz|IXw| z=;+J?DlFbHxYAaM8zfyI886enltK$Ls6f4arvYiM0xgg z4HxcpL~N*xNa=7<57(scp|6|(_tcSuwfk@Os`>UDyUcXkmvxPj%gL@jakkhRCbY0j z?zTW6=`)YdSqbhax%Hq3l5dfKS6u1%vbO=GH;PxEyPB#y?^vw4PI~QA{OJxZs+r5< zieSg^^f_xa0q!n^ydz7Mi|etOk(b|7%hUZ9>gPGDO+5D!%Pxsl+QZk8Ho*!UJ$(^>e3acjeff#nWs)O{L#+=_?+% z&(MEZWn6XO9ABp+4RV$i?wOYL{yo8T2A*`DRIO4OJ=&FO&Zs;dZoIV@M-<7gsw{83 z_fh%Y?DKi#94fCceK1U`Z0c;^?+bbN(y^mRup&l1J)hOAe{*RSmFhcxKT4?rx~peJ zC|nY;y&O%<1gnJfny3YDtO)GJfIvT4&+xK)9m+544`cexu|-87F(t8B;4c#; zUVahIHCL>M5dto5P=G_~CIRCch|Sq(X$NRTdQ3 z1E=?LvlVaf4&IFS2C6p5OL5j1k0-l|n|#(Vs}xO9Pk2Oy%Y8RZmd>>^7$P928S}}o zXy_|aA#ubQkuK4C+?UqP4<=(@?R^TpDpVkDiFLC1Dl6?r9B#6)gJzSkTm&7hgWa%d zf9QVSRZE|#WcrEyqo8V|GyeBL>zh?MZTGR!FqY?tj|Bo3S6*+TJtOL<7P>$PdYJkX z*thV?tW#HLjz5&n%f|qZ6Fc`2*3qy2HBlKqEvd{);h1=;97X9DFU|E(yy>z$_ z>w2@>`A~)Ni36Hyg+Ys<^hl4Ev)lFYV=GTujIRLbdM+7Dj(K*6vgz!i(a=hhOV4TT zgDK~|zfoZh=ci5Ur}wp%B_WMb<_9_P@*NPyISN6zjcLby$CJK~3FIHILE`3m37AQTdN@ z3w+D@k>=N>2CP7cOu;m_>R1;;wI(u05O2TU`wg&F47VX^B3iV9wPXyqcz*vQj*6%M z!yb}SQgQD#Pqm|_7y(tCj$=31gumZPucr*v_K2ln*T!5sSZyD7PGr5#wYs3LAHZ7j z{C*Z0mKYu10)Z?2+f_=`taAWkqLQlH&dnn+hmY?n<}N`Ei^Qc>RzAsq9%E8O%LFf( z31)#qGt(&HZM-8h(CoY$!pCf|z-2`_$%GC0lf1@8k~@E3>He8 z@Pagao=RFMCvK3ozDX0uaWcXpGs)ZxpRI9u~xWaS@Z8x~~5iGw)CPK&0&R8mcuTDVE{BrvZJ9Vg&Po%|h6tgIn_4t(aO9o_MFeJz{ zlwWbtsweN~Nwf(o+1sF++|nQCKsI|#XA|a|$G^8@+noL};!~?~sIqmMnF*XXF}@(` zZ=W`aHjXII5C0|vJ8`y{9<67<1ypK#vfBop2X&=T!2a&<0Z)NP<=z2A)M|n(Cm`dm zBEDC(6e59jZVzn1(KWW0OlD8{tC8s3rKz>>Ne-I+B9?wgtaZT|>0ZsjJfWNR`G zU>hfH_8Mg^lMO(xieb~2SBD{D)taeRD+A8HmyX)J_({Sv16%GZ(T;%;1QP{FlPeVs zI5lF^G|zdD3~j5TKD=E<^zvEl``O%a-LUk%7!@6qPGm9Posm^i_0i9F7^>rnMS)X7{Q249{gj#AF7Eyk zeX3^9*%0`^vxymSgExCo5Ra#wtAI$0oRfvepNI1e*5p!uBb-Iw&jAR)5!qo6qVMSm zBg{KVszm0MtgM|6!^~47S8Wq`rQ;*~AYsI?#!t@H&5d_1CJhRlar@kP*{T~~$Xmou z4Ez;HY>{b@YZ4PPo8sZ+)0cVT-e=j}_$5)#tVf^CL}m!yD_(ux9-BArVk-6bpyOCv2T?7oYBf1mfid-tAu=FB|L%-r2QcgEGr z<4nUclrZ&Y?+j#01rLbSaISJaI|c18v$pPR=0!hcBl&3s!&PyA^0>;#u~FLha;KL~ zEb!M{zNb&>e8A2T*)@1sxBYB$%P4K5QGMG7R4{m?zYx&R7&%8H;xT5O!S68RD+Dm6 ziQL?XE-b8RXmPrORCga8JVEJ*l5Q%_Xo)Y=VeDA)~bjWFaTYAb<>!sx|c6(Sn zwa@Y6XhSlgM5tELE{8KCRe2-|ikCl7A>Vw!KP%UNe+RqdhKOK>N5 zXd*rYnGKV7OFGU2oQw5-yqpUN=PY)z;~D;QXycFH?=n_?y@GpQ5zrj_@NUuiJM^@k zlTCMT9v^Nq(>k(gi&vNYzIjiQfAA;muqi=+cGy2iZlbE(x#)DF%|qm&Nx1!-+Rk@h z+ur>6y%4>WfMZ8J8PtMB{%_s=#>(&}N%Q^SJEipPXh<+h&kHp&W}hHVl_)gd{`RZG zj0ngz7OHQ^tI=&GBC-Re+fDy-#NN~nIMv`=DnlVgY7)-L7Y)nf4g(->SG)5dNc0qv zVw&$XzkhaKYD*WzZYWV>yOaA|s^dJj&aY3ZVP$DoJ-G?H6nc)+W{MVCF8CVB#3qPu(M0T`-OMWkP&}Cu=oS}P6ogo1MG{?y1B)YazT$O5wCF`vuDUSHx z%&=QJWHTFr9&Rz|zGipvPp;LluT_L0D8>4^d*wi5NAJw8U!UBym2gDqDPmr9UsxpW zAPoE={p12N&%{VyDfQ#Uqg&xy%>K?bF3e~ceRNAp3;LrcQgkTmJ&@RdS(`wk(!DE% zvEfmpA7SJ^7k8UAA9pJ&E7Sd|_K+`RN;3gkr}3wV>2FG7t+)1r*GCxEibm2SgAOTm zU`qPyltNz*9AnliIHgo1|7)TUuHd~ z_vF1I<3%InX!B(|L}or#qxHq@a-KAZ-rMAO6sN8d59oa7%YPDZ+Cn2$due%vy`RkV(LFE{{@6;7Gla*`rHbP*{pa!ou$cwNmvDZ@mS%F@pgZ<}f1CH18fmJ!d zNn$xGnwSmi@Bid4y2Z2FSvXItt!>ARIs3cF)%tzR0zDuCPl?%#(ZUAGlGIk@SV{A) z7cP!D-za^K4xxZuZsb=kUo5N}wp=jWt1371jC%C5t#UtklE zSb>8NzbU=jUSsZCIr$U$G~3(%3w8Y4LM)Vy1}^wb+p#fNQEH^2P#%76wZJuW;w$zT zPbhI$9X*2A1K&uEVM>CA*UkT;66ffF7-?M3dcdz%hsv9sU)?Iol_56XH)5~Fs1kXR z1sVdcE@Q3(s-t@>Ke^_(h4!o$FZ(&1vppC#IN5qA^Ogqwr^Ti9d{(_|&^YCK1s9_* z;ZRvQURIb&z!6}{mRPGHtohu+0`^#^e4P{!^rsmjTH?9P+z`ZDykL^U9PTA*V!zo@ zQ1s(bSyuCY_`^;kM43c$HMqeKF*r+TmcG7X`{{F*roL%=nXOVFM`H!s?4(P7^!m(K zfeM1FBejs0^(F^A$l;J=Xn~0L_gan*e(YU*uU{HBsHe{ZI-W;QeZ>9U3(fH%94n?| zD}FeCN}r~@&R_tBH%PYDa?_mvoM@T%zbi9*y0V4F5Ps5DDqe>_H67+@`15{s4mN98 z;xmap09uct?e>+gYNLdB9Uude+y<~+@$O0Jx5Z~(OW3Hubmg*U_V`s^Ln;TYKoDOi zP}xn>v{fH+PLF&zZ3@_on^9j1><7Duwz-s{{&`ZUz~!`;{05heR?^1wAqJq|SowMM z)=DrWJ!U#>_F&s{-CN-mvM7^GHYDmKQIi4w(?|&hiVLmXpWfXYs+zCpM#rzr19vWR zH3aIizI9pwU#y6I4~Ddm%ir;|YPr>eNAvQGzowA!sj-Q6_h({xpth_w!YvaKm1X5_xS59i;UXA zUgRZ4aj24_8*JuOWWjP{Z&QN`1F>9>9pAVI@dRMc&T zS*yAt>oHKWc z;cAG0@+56&&cSGorY*4AYXjl2e`l6R(WJA>TW*X39Aw^2P+y4)cuRZ1Xkx2eT6agV zB;ouut*gl&5)H8dM!lfBpCd`Z68>GM)IWf!gF;W`sXJ>Acf75&n5+bz2q#w1Qkz0WBQON+$=HpFS)QHYEjz%nET zL;}G@iWTW8u+8<`EH69TgB=oCpVd~@kJxcnyx=r z)q;U}iMwmcM&5WvmwVuRf7{#bgHJNgMY*Tm9_P26o#=yMHZlz< zNsf;gbZ>fP=Gt%9V!oYyLY%a zaG{=;`_iNSXZmq^CV)=xs@hkZ z`b|@5o%7U9RMpDKv3f{}$XbHTZXb75`_{>EQB(jPb!Hick51;{2TKZJ*W4$rFMYCXP4BYC}WtG=9*Tg$IgkuPlTFF&c3YH)e!7t#Xl9=!dG8npj2 z;MnvvnrxBepLN@84L7&wuCFVJH(UKqKxZueN?WK8%aKMoN8ol%uV@EL5G-oQ%;12P zg(W-_Fic91u0ge4fp0d^e=A>~(~FFRm^jKd$bI8*#oBwMu+s%G zv(e+zKSxYV>?as_dH(RK9AzFpBO_#XmQRg=VTf`(h+i47edd>kTs$hQrtIkUG}>#T zw7O95sRDCZ`;ET}Wbf-)$j9%=Xgcp2w|}|qyS;ev{>RQqvE+5_^Qx4l;K6?UcG4q_ zS4*8>@2&`>up@eF<{wYhj@dgm_4 zj#RNSUvjSv>tp&e0Eh(4rv?SeonY&Dy+dZft1UL!W%?YC@3!%cTIwF&3>kGA#OZGmTn_!&3x*zULJbXmH>XEOl`oVLheLuUT_5lI=SQjXW9 z6>^72#?9Ti9tME9FyAUbytfZ&6Q;0FA@U`GGr!{M?=QRD+^mm5)6hCvGvIf_XMAWF zatmDcmg3x!WBDoB*%=iZ508Vchne@?k%RjihX3po3WTzQ!H8Cek=qvVf2*`wIq}OXimh2^kvX(S54)0m#&76hUi|83Rm;qX#Od7+z&l4{A4UX zb8-ND(t=4F7)Z~}#`4pY_hvvv!U(hRbTK4f^nCdkf&?F<`iiSP;2;N^i^(M5$g3Or zDV!?AbDx``I1R0bv^{Wbg_g>Sl$ZpaIr#SWjvcqcsf8+puBCvkUsYFp5vqqjK2K{h zw>A#WYi&7O&uoI%^h=gLvOI+8n|W?S)E=Md=8O5AnV4bI3%0_xjp!r4%Zmjp%5baV zy3xy8-^w(I!zLmR7Zq*~dlsS3za7p=1}qd>`3z^@+XNK9YqxsQ+**=vlyBRgxLvezReD@byWR{VYeeYpyc0^wsg?oJ&lhEIHCayoP<`hTCIAb=gx~F!eiL*eQc0d~1 zbF#W9ZVnPDLvr|>`h1dZ9cokbOdWHtIz7zFhf6GBi&t=)ovE{2Zm^g~uZ&8WV94Dj zmG|}&~gqU@qr;m)O2)ZbON#@)g_9I$Xo2*fNsyC}c;D^gf zA1TgqL;X2OT@*SC!=_G+o1BTp|ZKO#{Ri4*8AO>q4(j zE~=>guL}z!3A(ZZ`zy$T+Sv>nw--ZJ5X+5zWx;-%Z>yxGLDi?d3gARNr(3Vv7TOWw zz-5RK1a5Tt{JOM13BEXgjr>`;_0Wu4{Tm5V@XcHUmc41NJlLX#GzQZ?1n_?oGHrF1oHRxMh5Qb=#T-4&XvZKK}W6=p)|t z%&Ixy&0s}Cn}|s&XCw5p%u(LnK?xW^DR1U62X(mqWwz3GT%YefP5U$*7ZE)1oL<)T zD5JqN0C7-JPw=GCdQ(P7qK>|OccnPz?pDVbM6V~|(H-QYs=~CP{v}DRJQv>ewRp~~ zYe%2f-#wDR@=w4NB_v@o%?j+A{@wtww$N`P^hp^+FFTW+fwcTh6T4*d^?K6w0fBVP z>ZH1}B;u>hZhAlIOW10CfWjABc7@`Epo8WRcr6!4WK7lLlX+Di^_PsxqI+w;W06wpX64rcDMS= zSU$3MeepQtDt;vKcHz&2gIS`H=18Ap-~qVZmDJS`QS}0HM7t*Tn|Ds^w`obO=bw$@ zs}>in9~MLH%_q$P4ZpIFCGTJKIWPPhEqPObS607>+t|2`ZEl-=fJ<{^RhjQVNj>3J`CMeg@Snm2R>7cO^ zyWsPW$%L57<;jsU(x3+O!N{b~F9~`DqnG_jdwqAFX5hN}bLJwR@qG6SuycYZmyIcY z{1$+Fr*i17RqcJW^b!10WLq@_>+@${gv01glk<4*RdM>#Vc@MMgsISzdwH27p{uZp zI%}BykivJ;E!{-3-ELsXWqX(kmNgLh*&q*m*~02z4!&(D>g5vi=tkdP&0_?U>t$AQ zu+VBw9B*o4etAebldU)Mk>78&$Cd*pS(>P6jzX0qt#>=O%@%rF`=8IXF^<}{fwf{Mh;fQH5^^eHj z!u|9+F^kF1yZDcBwJjPbPZbM!IlBPIp~?K{klRZkB7HwuuVWbPV^{eGl8sTx>!q}Y zB@dWVbS;*yV_8Z0Jj%G>hH!h~k7joda(`GH%-KxHX7R@_z?bU=Y^Aht&NeGFc|ynj z2p_j`JtuMC^bnsytiXO<9w&|%0IJ=cdS=cLYKI0Z$tBR~Gp^&UR*|;nUTg}4IQD}@ zNq)!OSA8S0J#PX|u9vXAC_H7eCDiEaZF+kMtH6kh;jicgn_&)fPNkRU630D)7w^g! zP4!s4V^B=k%4VzntYyQ<5^xQ}>Betz{FS;ilEf~)MDPGobNf|X&FhICTxa)Uq|$2g{m>q2Z303-*z zM1()&sJHJeAHdm0Y`u$#;z4!EjvuS};0N9?j`(U5{VK@sImVlxzZy4-X_+~5{K03f zzw%vib@rn3ZZjmlv7&D+ma(;NotQ>(r4Q4a=o{%7?xKJ~l_36arV@X!`ERGmOx@W= z8I-+Ny}cQ*4W2i$`%w;F8bGPn*G*5y_ym%6$hZ^R&5$cRRtLSzgurk6pWQ(EE(hbN zMFnMGYH8!Jk`Ssxj^vKkAoar^J*f1;Dt@@2rE~f*ZJO(R{c(AN|jN&b#Q?SY>z$$ z>W(aIO?(s1hz9LfV2qlY7#eyeCcS?7E4z^pee{SIrOA@3UX%Rqr|Eo&&2i{fOG=}i%s40<2BJ2r%LX0wwx=B=n*Po5Ze~yB0Hr$}+N9hu-XFbf! zM~YICwr*(l3WJ1S#48ow;XE~v+!QkWKKw{=-|HBPxK_!Jc$Sr2B6>7!GbLD#8-VXT zH=1wr7+DlaWx>emb&s{i(*Ajd1Q>y=CE!1&y%=()x$E9+W!#WGikV5yrV``dAfjg8 z+mC!7<`eU7_IUu^{Hl}G^KIcY{0|ES3v0>ln;yuQ5_;Ay{Ky*uMJ{UfgWK-D`;YLu zbOrF$%jfo-0m(e% z18=*&mJ5IMk^~z-N24FGa!S`gnVV@+58nBz!Yxs=z<>g1law2diC=z3bTvT5RY1BeE^hxAc!{GoVsU3UwWnFJ`Q4{3HjPWmZq(#C|3O!iVoD{Uvxk zPB01JM*}CVMWgzw`#DfFAZB{l?+C7N3k{NhzEk^txDVB9qSJE9L>95Tf%bpgu2a1->_k{W2_tAm2-Bd<9GHR{`F(P}_2>#rk@oW^`(e zsREUR*u5osbRELC51(TIDV8*q+OSuy2qGb~#e_Ef785VR zYQ_m=B_={IqPxI?cY8w~wCuCC_C2}4B59cYp!jfap>K+FeCLsX$(IihBT%C>VW?E8 zyE!`s05tT+571&=ki7cxM7xP#bchVAVv8K*T%?l^8rC489EG_cAfQVUCqMa^(s$|7 zbAQ_mzOSIp;ZDr}s54+nKeuc#T0{C1gDzL*(J z3d{+FjBeyJW>98cZ69)%7nwZAn*cZN*O7da_S%}6Xk2dEr-vVN2c0OnpM6SSsb%S=V%M+;%R&FjUtm+w)5~in5OP{LP28s&Q<%P+>DWYfJ1*}c1VdhSt z0S|IFDg6+X@hQ@l@IwY@!RTE;b8QcqTJ!sHG9QVylA;%1vIxS9UEV5A8?`0w8DE`e zR}~d*NbAlRfn_qfkCIo-4NMyRexUhiZ|>Agi@$6hQxd5ITH1WcvQut#-zP)?Z%!Q#nHI) zLF@1NkGVj7``KxL%3$|<1Dl>uH7FQ9H9}2R6)Rg2_e|+2b8F-^d<%iSYYOksY@^XTKJI zRbyJH{M;jy0QAD<`h&(!J(*AeI+2|g%-x#bfn1}nWiYf+_kEs{5b!HBWUrnfR|U++Yjt-dIksg9Xrst zXwQbIjTMHK5ivNTw5gd>JCE>o(PI@;6f5`kntw!M0>svf7lyqbEm$BhpGWZu62G^K z&ZidB@xD&{@)}zMw+2obLD}(1&yT-fPYFpXnxGogc?mREo}N!)(5*WR%7r2S3K#hJ zqXTzp>Y^aga|U|VmVaPSJ?JLMA+h%(WX01`qT{pv(Vcnp7*5CM{qCP=<8B(GH%Tl0 zPI}GZrPRjzW!iuC4tY5NzlcqNKS2_q4Fn}L<6E(@ zR}4MN8U;>1#IJ_EHa~2YSbIC3*?R;l_@ju!KO6OYzcuXN4 z1y8wk$M+97OsS>9{hjl@XVRUEf*KZE59VyVhERDLSBGPO+G{AMzNbGT zCJ(uU)SQ4Z`?CGsq`Q{V7T(7a3m@-nJN@oP2$n#| zss?J!d-*bhV-)iN_ae{|0|LBzR$#XZW6o!jZg)9-Vmz;%vb#qc4!HMqrB(hJ`u85c38OLF z8!u9k8azO3#DAc4mV6G7&@)^IcwaSb-DFn?C5g7)BO;N+DRNM%jfn}o%0)G{6saCr zz`RD00*wwU;{I9=hMjl`J=_sM;_!4#)o~HwnlT1(m{%1dO%R8T|CLJPzn)p~ae~Y# z=~$^<;&^q6hQb6VxT4*PdtJb$cB49DC1~b+U-@ksF1g<1;jJjs_zfjDxm9{^!78%1 zQ+{hGTR*WtynrsCue7&C{*-f2cw5lg_y?rX{d3)qvgugM%N zUd1&RC4vcbrf5GxZ+Mg@hWM_1+^lu|d$SWc4{qz`JKYF1$wL37chTv%!W*^4R%ka~ zd@?|9KS`oQ>2avBe21LA#C*uCu0kpj)n}`}Yg`N>__}6)cBF_&zLNN|f@a38p(`Ms zALlVzI8%`8>vbiNaZbxqzKJmXSd1_BqlyB}BHPZXx1!dQEWwSP&}HgwC+~7I;Yb;oNXiK$V7CT#%(X|@BAoi4c>PC>24R)Tm zBJ}%bNP=ng`r;zudb`14H56StJW*t;c3`7@v27!gqEfZdBT$dUk)e0r0|khex2iwH zLg$g)R?l&UUeHd0IloiaFmYoW1IzW%cr=-1vi48-`;QGG*Xw5Lx#tv6O7&C?8(B+j ze5iyQlZ>cm&w_yO*K=59-Gabj;Lq{OC}*JBc@Up+UFtcWM0+ufU{L$paR2^w+Vl); zpMw4lhUbd{CsK)&9j^quCTGdfe*181!(K{I=q}2l97p~}K76y) z@EncIQ)GRd#u?dv>-SXnGaz(5Oniy5=v~7Y0?PaDB~i_?Z{_7qjr#74NZp&{HvgNR z5kks96E(3?1$X1XZfOfToAA=ki*o`U@@mB%<-AF|i%Of1NvcBFuz z1&Sg|nv`!u-;p*KvQu!G+_`?-&TRt^hD^k%((7APeTt?+2Tro=*Up;KzVr^v^ZVSC zD&zS#eCqd6W)mEhQ2qRWsJYRy^k4{Nrq>Y6{=eo!WL* zG*>?1MFU#(Zj;gRY_rIcTa(GE#GDp#R2=Cj!| zTAbP1v1<0{cDG{#bSiGW*0$*`w`u%)k{wa&RBSnajlyz#tx=*5RhTR1^MEfT=VF#p z3a|8STY^l}fYABsz{}GL0e`(?i)bJF={}|mf~tz@pkVH=A7}A2>wiPP>J@jxe0p9s zLY_+l$t4xlOA`4-p}Os!r(G4m&y+>z@6O(bElnpR+DuMK5e?m+WNwJprk?`Iw`xz( z0$yX3F*t+um7*eJPn%NGqg(J;SSK;GgPgmbczM~YRbtCKz1wvQ(4|Hx%ek6bGU|Zm zb-(pIm96K@uW{tVI~Tr<;c8_%8g+YNc{ferAZ8LxGdqzThz(S>CPqKpn=+@7b?iP^ zD0^k1+zfSK^1X9Lr+akr=1F3W`w~!h#xznc&?>I-!0YG4#)Cfjx~)+!CYxUSQcb;j z94nx(zVEb!$D`>RiIG6ijduhw&FLIG3Rt5xyI%Gh3=QYZ7W~B$@-sH#4n0AZk(6OU zgbOg2XR&Us3F08;0vw5bTx9b*~UDWNoo1 z@f(`S*<5d!3gZX8Pc&kVu1{cNIXo5_CCxb0euH-4qe@n#`;A(Nuejn+vGP4tQsobd zjE@Eo90^u-%E`z>rN>W%1xJEX3Jveag`g5k^UP0Pb0CjDFk%gLEx}W&EST=k#4*vr zu%53nzfoa)6l-l3M$kuhdHyW?QLOBf>#6mN=4u;7XpJm#k`E{UA@Vl3Ysls>8Un#>M4Ua|Vwkr$okHsszNx_2UkcOYVIK1PogKqK*8ePGq%n49lP zI^ur5A3mA_XQLkru}@PduWR)) z*r0g(xbAft_i{bDoa8qqejm}k84ZRWg<409vw{eSJG|?mP)RcQe;}LtR7I*lF2F8>d|GAFQ zX9_A7u}e?2a=!c1UUM7U#8>ND&wDH%^VU>GGnVCr6X(jl8koQ@+O!jBLk|(3J4kMU=1?fAD~+!P)fpW0b%bEWNR^fgwUN_rfu;6ZjI6arN(Muk;9m=wy%D-pxhpzn-%g9Y!p}(KglUs#-wfw962MuA4xxn=M z6^g$l?3dNN^5MHz%e`RLy~$0_`x5T__TH*^#IKymyaSeCEfn{PifDXyqMXywJ@}t7 zr8;?D=71C~|L^7wihlREf8m(4wz0L~`t#p3o{%WQ4-Eg-_pOwpAJzJi_}@kGKEiVJ zu={8DM-7Wn7%6doA!H@!>q`H3s8sUVlCkD5P>dK~b=0i>;fLvU#1w>kzpQV?p8ce_ z255QC$~?!UEsh&!duRQVTrv>JJPWnce8AKN0^ zKzHUplvq+NBUAr71NCf4i{DEa08onJhW}BFQ4#2qP5d9lh~vzeJf12cfnmgW5YDN> zb;x>8Lq=I$>&knFdOt1WMJE4D|8G>(YDATwDF4S(j-jrcn*RhvI_!V>2fH|WSS{oI zd|zlfof49B{uk}zq^4&WQV=Om2B?HGlgDYuiYe!V; z{58IkMc>B%$h+4WZq;c+`VZI%0csC=lE0+>z=Cc8H2ov^hs>Ae%3sg^VxY7hD=e@0 zKZY|pCsFbl%l}h1w*RpA<^S-M$bj%7tlQcyJYdxM%AJbc@L9|8v@Ip6c&g zF@L$Ew0?sAAo>4%Q#YXrUK$WTy;>{RYkr4qL8 z+!v#NTr&*;j*kWJ?XU?vAxs(|S-O|6r7mV+{*CPKQu=;4am?)^;X&rrhDA<=f5c>F z7Q)A&Pucm4VXTwk|2+OeMCtpf%<}4z&3jUel$pjDStN&S1iIJ*L zn(O9odM7R|RTlkAn!VlGHs(H^y?>5LA7dW*^FJQcyDTO&c}m>paz;5hJBmJo|KlaN z0ASZ)`*)9~xG6`3?%!bZdZzTLf&V|__JN|S0g=~8>wSO}w6>O)m+RbSaD|AhCU@%W z-LKp3;YK^Pxc%mD8x>L)NUIWP;*(Xe3?6mh_Cko{);Zsm&(tL&O;WVw%YWEyh88uK zo+cVsBHnB&0zc))TU^Yfe}0gQhgKQFMlzu%o||1a*jhgv@FYqHI2Wk~luTObS0Z8%7N5rJm7kgBC@N5>wZF|alT5ui(-8LEbf>0uIicoBPhKUem?h zb9#CZ|BX6W>$`wF1CBV}4@LI`uzRZ{ss85_c3gGSe_f1NS;^rv7Ig7nU0xJ&S{g6e zGz^hE4xdsFft`&pso#E^sQlH-aQp}M%{JGyM@a#{>9onrTd+v+_Hy*0?b6ASrw6`i z_fblQekg^DJPI=F4IqRQs>$;FUZFK2KJ`ygIt}^n^^z&y_#n2+xGB@X$C62C9mZ8{ z({BO}!;|t6N71FhWM=+bb+*(qhL8c)i)LQr|LM2-@#W$k7+|6yMUAN?@Zfz$!;_Wn zY#!iyje9UtV^th6NlBv1>AEj!8SBB-wz|&Ckmq-T>~|tKT4@?|bIEzc1MjDOCo4U5 zagN+qfD*^$_dB1=8U^^R*xNUv+xf;&?xB5vYm$V?F94W!%BwNAQ-vsNM;#sBy`eRI zt?lmN!CJHV*YO_{srL{8AB|9eNP^O$7aS-+ej<%Hyrp`q?Q}aT!&C``5_%gRZev_; zl%DpDJUM+M`UkgjTgwey#Sq0@zRua;xOU#A38t4oy6Q?6tZ&^3anQaSmV)PR=a2+H zs^EJm{478c79=wxK>j8E-p7oh2~a=X;01jh2{EpFCXVskLti{oEA;eYD4o-|zDY0) ziw_tLaz3i9GxG{NGz+Y8g>m~xg3-aPo-N@fCfz)VJlLzUWUAIXRSv8JJWE=J!586YBNW6Au)F0mmvo91ZU*{mM9=NL)8Tl$M zn>p0TH-~nRouK!w^=sVSpACUePI0JKPs=JDtTo(yB#t%{sY3!Tez0?k9JlK;yhN%=}^6M9+Oh{&3<^>IX*%zu*P{==@W8DZ@ zsv5ZuI%tFp?}dYR3Mhus$MVG5Hh&iabX3^axA3B;#p)mV532g}12^AGzP$Cy7xKXO zn3Z(tagv}>y<=EQaN3blBn&3NVS_a3j?}WhHOJpfdTkeG4gCr^;Ce66O18<3) z3VaD_vCW@%kYVv|tPmKcocmWAWQbT`eHu+G;Io@WmhZP7;j?T|Ydw(gR0ZgGINlP} zqQV8fnQb}JP0jt<{KtbH7#}B6&%B%(gSFg;>r<$C_l+0H)>lA7W4_2EqY~C45|H=F z7M?rE=#RWU>Hpkk_r~lS{vLg36X*XD`5P{>?S$k1OT{lV`8mG)OXU}?2~yktdx{%+ z#*^{yQSS@SJM?r4-oFX5$OL9tZg=!w2J=N*$SfWF|JlZAG4f%6Bsar7M?aupc3aN# z4F5NHhl|X)R_xpTLl`_`?bZ0+;3?Kd`@7zCSPO3m2-n=bBrd|j5QHUFsu*o7a>g%v zqmD-Kh@7Dh$ix7lsg)`vNCAvTP&iYo39hQZhxB2kD?m| z9C0i-cwT_efpBXI0zeVy>Z%6_%)>u$s_L#UF-D@>c3_yVb7*C{;h;oHk>hkmO*u{}FD%HjvQ?sUYUQrsC-;0Dmc#ZWUvd+3yj|gapKY-B96#aL86k6(TBvV2_B=_i};!5fNLe!86Fc3gREAx zQ0c7QckPg=ZJQ&EP)`(S$4!k@0@mw<_=KCOG~3y!5_dpDrx%JN+|aO)?NRW_LD|dZ zsXG*k$H8^0UA3_tGhH{MVQ7P<5?YGF(gA>g2L;Kg@Bl!c zARxeP#`IMVecn85CxRMd1Yo%~p=dq&7_Qt|i|nW;ZO+GIS)fJ7MwcU|tO}7rrz7ZD z55;(66odlJ*9Pcgo`zDcUQXv@yigwcs@&II@Th}LM&tn?z(lR}%{Z z3KLob4v(5?5nD4f?$zA#yFPi))Af_VIPAy|?uNqP;P*E%1hxqt*;*t3RwoL&w31gE zDSHC%&<{tvW@X+!phJW#XJh(}DagW5kZ5%>)%qfbA*VFj1K@E?MB!I;OI0YEx6I+g zqw4so6^We5O^wIf{yPUH@Dc?(w6bjU+Z0C5m>?!mhXU`XRF5MnX=;nXMgnsb5CE=p z9~H3@dy0z!I96+w%Ta zTtvVXMKBa))jN0ul>q4L(AKUM4n4CE(Aq-j(EKJ1sNbPuh2qg^NrzjXr&B2vppC!H z9rCQg$%;uouNIVQADgO_abvLYSnZ-Xp3HwlU}z|EnJ<_|BOS_{+OLreB9395=Kem2 z+ouh23J;?r00g7^Agqx!n3o({xnV2)aZ9U5bf^*#2{&$>=d$G1En zspo{`q3^A2b>{`c zhaWg=W+-TI+YU^GDg*QYY62R;Fuh_4*>3P_E9eLlI!`EpIXfNCT78&7_-ormQm|Bw=lw@RnL~t#nEF5B4>(F&ONsU!M-?5qxW0- zQm0|hOBH~5Y)}X4Ub6jrM@f*Js|A`bNnQp6Dz-&{A@5GJv!NipFy!g5&O>smDV`_q zW9If}Jaav`9(&g!chw)dmW=LSEYxpZTa7LTjnOha*4ux%0ur6=u^_?RL=(K4uXqN34!=^UZS1gJ!o#_2Z3Yv$u*AYU=l zDW05dLg}bg5dC63QLHcjW8_;N8ae_dfYpJHrJ)|<<312{a~tcZM35Pqt);N4^W1!hku~cF@}23 zlQWlw$8>Q3FQQgoAr%@3`AMjuG?jvMj7X3Cj%{;3*Oxvy5vwt8u(gPRP4bLasdXoG zBpYpaM$9j#6nl945>u5@;Bmb5PVri$rEGvOTKGBFXp@s+tSpiODcMj(B88AIDo6|r zi)=n#V?^1Z^f)exVDuTd;)Oac>XFQd-~jXKY0kKxrtKa;U(T5%lUgTOBw&3_)iRlT z$Uqn`Ct%`ZkKCZ-m`xzf`ZaFdZ8zOUS6_FxSxx%`q@F{X^^?w&XVRRlv7Ve<6v5Kr ziSVOwySJrwG*$Y#0*m!BpUn9myS0d`iHcZ(=vC+1OlkWv`AFmC_V?@sR2d>;Qc*@X zE*qByDD;bL^mO#J!*z5qI(hp*L{)PttR$=|I&wB?HcWxRV2?silPh1bkLh1sg>`hv z+;^K9?jT$ZMZ0QNRO=@OUQWr6%J;dHzl}kQQ-9S%K3MmYi|&=4WQX#6;-|vq?Q1pV z{M*_a;2kPaD8PXy&&DF;l&=V9 zmZGa7h+#o(30usG>W)(&)FDD;Ku4F6V!(R)>W-0K{1@=0oR0l2&0RtOGDnE9Ujx<)BaTjkIsL!c0 zMvaQ7wZlLz`LKwW=!vWb&|%*1I4(Rx(url>0Sb(ZC2nWgGtOK}pY*)cmKEv@;&bfiFTi`(WF%E{7HWrEVBaRN-TKMp|$ zzEm+%vh>7gU8qt|O)(h4Fi1mr*N5vjus&;`Qu- z$M;Us4qOfZ=Y4G>1G*w;s21Y|=&*N%9=T8b3n8Zyoir#?@sf&{iQHo})5g#_lJ|ka zdSR+|81Gx&8LtMLkBQ?0{JNrA@|wEbeKWdgYU&?(FhWHcC-$W2}@u_{;Z61SGl~uUOHW7rgDf^$x@XUHr6FtIHz@5?%7k4}SiB^fk{84NBTa zzFSh%jBWKwXL|Oe=wLzLEvZXHT6RXU7#R}3Fg!>o_!WLp*YOgKi0%6zCtl*y3>=`- zvGb$(%Xto)OA=IckW{$G8t$P;=*AE9;m;O5M2bEh8etKuxHvBeGK;=Dp@cR%$u!0_ z6Ic3nlF~_m)X*{MU#hq!63~f~%Ijq|w!LDZOEw2`tO)84`O)06-MV|wfeD@COshzA z%qitW$4tBbN7GwIwbgZP+rfhe_d;+l?wVr7iaQ00yL-_F_u^LEf)sbBK=Ir?fwf%-OoVRr zqoFg37znjFGxD@r5?IN{ob3ytbEA?e0Ri90+c*a(w%7JAfaT;ed(_E@b~z#+aI*4G z`aFj~gM+BpiFp|!WW%3(ytjnNE_jLnG7skhLAbjGJbX2rg&ruf^tY6OvOmHgaYQg8 zwkMl`5d2M4g>jplL2<2g6gyEzk=z23H3cl|RKZC3b@~le#yq|XvhI=u-)V4$3&cY$ z{MKA_muUnCMMufI*3M+;jDarMHk_}9fc{UxI_F;%VvGNMlv0})J&5sJ&@!vJ8Y=c@#$=z&WTi@hrn;`d-V>G`$x zlm}}Fhd^Za!jD8=mhBxTgq1^lbmtli-0rMcLNJoGe4wJD3hh6=`GktA+a z$dWTT{q#0K`;~WBYq^oGpxSaOSA(f&wvJ#jiCc$> zdNsmkG7>HcaA}(fy`nXb=TS&xR;t>)cc(&>SF+sqFZ|{^UjV3>F4kmPqt6evs0=(5 zPE`?pgQZG$VCs150Bs?J*)zWw003yu9+QYH@NLgS22#Ae@?1cBdA>9IYoQG`#EKGzWB1=q! zMh=85G$bdh)3O6G|AjLoLI?@1r=SBszyl;-N5c3}JS&j;`(t_ts6px&D%swXDo!>B%=2G^l;SGVW-&R~2_j|L zYHMp}bryH7MJ>tFnteTCtgY5;Fv=L{8y{1b_raa3iHTsS*zyOBvd&JUd2hA(xo5(I zuf;I)9PYNR;$p(0qsQ<;FIECbG;gjJ766)Tz-gqZeSG7`T6XAG{&y?XvreO|yc`dl zmYSRCBPv4sIjY?R(bZWn272aU5uXAQDH{WVAwYRe0kus%(-M14MX&_~G%{U3))AOf z$Kv$#~yo?m1j9WoJUrOu#jLKgB5g|_GffdA;ssllOmLWm&3dnAQEteJiKKQ zXBAyj2MNnE+`Nv??SnEGx=<9lFs%hr{OC>=a&Zm_6~OwIG9QNugsjVCGig;W>lJ~G z1++k274svB=C6#!48ugWQnZZbEB+mBDI>$vPAmg($0i4W=$+zNIBV#jRWc$?aiIW! z1pv<^TE~gQ>i6puZiaTEPqXAm$VkivJP6AM3?KQV4F-VYS&?n9QOu~&5&l3I zLWOGD{Hb&{PGgTu;lUkBF-+8@v4&=2P4ko$b&4q-*>~1C7>$n}=cQUgRELzl?Wp7b z-187;@koO*_=u9l_~8IV4sz-oJI|=6Mc<75(I&)tg|l+ z;Ry8|Pe3UJL zSBNW>5Y}aqNWfX9ht}jg&xZ&*Y)QR0t;u8C1*g2#!Nf8p+^NW#2V5k)&RY` z!a6~8VW1+V5+L{+Drso;l!1gQvAS0q01c7iLBhTBvf?LhiIy=~X^md8drza&1_FYL zi91;7$qkWt`{_b+ncd!8w4<^D`EtWF__%4os(ivi&zvBDLiv^1v#fKrAmLLx!3GRaMS0MuB%Q`U8~BR;ePI&ckAOxUBq(r%au}J13`l_5-%fx6O)eH0*QEPno^cMrVhX%&Q2=62 z;|_ts#n*Qy#qqD7^)d#i zgQFw4<*TpDhpcYXyv$HSXfk{UL6Nqa>Kgv?2-H#A$rJV1Z1`RcgLQc+r)$*Lm3NA< zyv7H3PE&hBfbL#Y16i1whMMY_*Z)4YI#*!OLbcT9b<~E)quvZ?)K4E@5kX{t88A6b z-2)F1OA?ZF;3xPg>03{FUz1+$Bt=bPh&>~9U1cryzwYT!2FWE&!Kqp2Pz`zcGG_|) zf25_vIAsfaJ{+;(m@)DU=`FHJb;sQL_t|3UzdOJ9uv?9gSxLEIj4EWdQkT2mC@@%X zw~y|4m;0VfWqP#@08gVSbOgwPyhA?`WC=N8LL@9W=t8y3`<=B{zJL2ZndiD--X1E$ z!$b6~c9oel1Ct!k58#=Lz(k&a(1F~u!BmK00eJP2NaA_pB7l+PXpN+Cw3Z{nx8nGb zQ0=$(K0nL1i*4dDRR9X1RBblzHc}?X|;v62}I;2$6$0^lG4k&*kY zLILie?{YBpY-czrgcJpdSq4W?g5W?$k%FwBz`-Z4dLON-xqWY-0`bu2@4k?2()( znrLk7z!BV$ySi^-pe$rPpb8JTFnbUfwxuJB%)?J%HOW~^R*sCc5^KDNZrN(5!Cb;q zE<^0Z;soX~kB5T7ZC5;fmZnv!-<5dKn<5)kp!m?D#nfq}ctZ#sGLUkzg9O3I zp_Q74HnYW$u_-K57gq-^r=bG!nlwbLvdhmr1n>RD%`m}vaX*jPGvTKf0nTvs+zP4= zra7|o3Lkc2Sh6trz_i4-vj;en)jO4YURA41% zgzoMiR2cvM+m)}ZI>e*KZ=ipCh4C0Bqjd}%pzw_(NK{RNLIedDX=24SBg9aE69V}~ zk=h#q@tr>@!E%~#AN$4OEH$9_wqUk%Zn>eh>7GZ2=jEly4#Z7SRs0Pu3!^YG&d7(^ z$8dguOsBSpwN%kgbv^Y8n4@i4FOsm%*;j4MBd)vP^!oabTH zb%GO)v9iek;jJWi5rakM!4@enm^u}8eoinoHGuM-gzpLCP%%Tuq9_f{rX6DS7Yp(H zPBbDL8X{U~{FZ5CBY=|XMg0z&%hUS=a8O$zM7799W$2GJ2ZY8XzI7}ul`#Q$w}Ge+ zy&!0GNU>1@$=%rnDfHxYBpd-HfR*?hR6^v+H~{hhXFVEV5GWcZ6q?g_!Ft`sG@Q)2 z-yL16hr{~jH@%&NhrJ&fa(_%ZG7R8G1ssGS%kU);g`#5AAld(d0HTT1O54*F2&H$} zD~Yhm{0htXwhV@JV3i3IRuUAW^ZDIiAYcdmkpAWsIngN3=UEQbjoDIvBqE$i9wHz? z+vpDY)8{D{dTc(i+-oTZL;}hmLS!H%4Fj+HUBR>PO~ zeSI}G62vtV(^Gr#qMBbIf4nH%E2eQGum$JPG^(6)} ztDqx3!imYSr-$+|BSJL9X=|#dCSF@js%Kh6A^~EH9Xii0{8Tt#$QOPAXRjdNHTx5F zr`)sj7Z=bG5~Y!Hdy(6zMowGQ9r7Fp2gEJ~gEu>ml6x`>h=ide-iDh`Qr$369lCxd z$XKe(vXq?2Lq;Ufm67O(aXzSCUS8s}u5ZnG?M{qQ3f0dPSbqxzWeJ(-qF94-!^0|# z&9Q2aNriSks#$xk#F;ZX#Zh5G1)-SAOj621Rfo}N07{35^5vxu$c3gysd}HF{G|kg zHptk;9LT_v%VGHhK~Qt0@GaJKG!l5@y)fRm9Cve;$Y5s!f^f(YVr8xb47K+YMjg}%i-}fcl(B6C*wr{+sC5A zfXKj%ihWl`hQfF`^^McdUbV8!9q3Xs=v7i(eV|5l5p zk=lpLuKH4So^PYN>Ufj2?(E5@j1?9h8VXpWtlj#iEUNaVayYlc7sniz4pHa;{^gpnn7raV}*n(~b)VJBhA$$NDr#xiq{yj}HbzxOj5( z4eA))T7pyAF1S@$mCeRXLHP5_5LUEMH&!U-*w{2U?d-P070A=1+NlEe-jV?>F#pQ{ zx!GvS0jd$Vgll%8u90PcuARv#vhoXII$lWSsvV2jZRHOVy3fCwYwcYbhOyr|W_zwq ziK*Po<7H|Dz__1BZN3OIv~mDlGu{}Xnw_VGUr~Vz&`Hi=#Von zAVQGD20OY4P-%0$^6N?L7$RuQuohE9I3h6CS4oInzPiO|ejc%jxwIFv4s;r^_-G3x zbgvysPI9jOg&DtjLuBG8JJ#WW*vZ>EJH?1`*eQsxq4vn3{B(d&A<@-E!4|0kT5HwM z=J80S%zoNAd+v)m`b;zrY@4e0Cau=~67S)y2wOtcflHm|X??J(r>D2Lq=WEr%DvfD zD7HZm1$u;O)Lm5YtVk)QgANYR0jzATi6FkWLTB!%(LGX28`>b`3|uNla85l*J;?n$ zY*PxOA6NA?muO%v`L=N!4_6oueV{q%uW9x5{;G#4Mwk7fF(Yj@F5jeuc4ivdv<2R- z1M0gVy71fdYxW>zD31dDUi6F?QvDu7L+V2 z{AJj`=QAJwb|O)?RFijouUKccv2l&}UCD@*kilYe>#4ZNlbtHi!R5z1WpI?#%DT4I ztE`*j{rv-R%LrAp)S?Q41BtJN{X5rU`wU9r!F(=2-Lzt%Q$%L1#3{%53(Vg6XDh$f z>MdW5Ei!<*01DqZ{C$C_l35!ju)jTy^nyADsAy3Th4Umr5nx4Xe$%G2a;x+Fg1`a_ zB^2PkLTX{HNwSmnID zeZA!s0d=ya;?LT0few56YYOX+K3D?m_ljP|MkHX_AHDO~P|#@X_DW#R$pOR->P9zF zAS5fWlFxfIOzzGN-Fgn~Gi)o+PETcFcS#2~oFrpDV6mwwbtSB{Fx#j%MS z2GloddCpkKJaOhAIe6S{ye$;nU54UK?0TA!$qJ&HZ?I}wTYn2Rn$Ph)J^P1p+Zlsd z^8B)p#IW~zrrA)?!{WSkkO&q07bADWfe%GJ$6i%gSAg(ub|WXQk?MZB)=a|YPXu3C3^CG4LMCrsH{e2DY%(U zp2!_m$)!N_iq0H012^}G&c%(LQ`R&P9?Ch#VkhEKsZU<}xdOsNMbL6RbhY^v-{`<| zBgm2aL`S(dcD>|T4=d0F~y5V=}W%!nM_ntUh;phn3gIw_zCZO-+6{$g`d z^Q5M$cDy0S60j%`@3m_el+MO9t226X>29@=y2(|On`G>0XXYU#B3gcv>H^~a8ueV~ zGS&Nuuri@3LH1j=JP5h?G)h6F6NzqqrMFrZg)H8(lwRknWzMbnIYCSEk=}VJ-@;a3 zK8cDRGvM?|FqOY7q+HpqGbpo^7FU7VlJSR2mqIXYB3n#by@5MylKVYr?*rBfMajvT z=8wFlfjbp8K{bBoOP3&~DoP){_SJHs&#eg)Cm&rsx!ikUIs2uHD$}LPe}^&kmw*+Z9o7S2e1SJC;hj&+ay|IJv_fQd{4gYlJB|r-?S}0k0h@06!e@iKKHe+8w|jB zt9<|^>g`S%#f7+K!acXt-8|`2S|j}pQF-`95Tl!T#JTXbnmmzmj^oeEhZ--&jyblj zspLj%L+_i~%+W^yTUZPVDZ+?c(CRhcDcGf(H9+egWs) zG+1ib0#A9*i9kB2QF3$Or~8L4BKUXiJ*Os-op^^@9t;DDa^Ribm)0JNpXY5>vE)3u<=lAk zDyV-s&0lfW@`l{MJt@WR^Su7i{5b9CXrBkx>Y_TGTR*d7{E(f&f7*@sSG0cxE-l-B z;%*dA+oiprP;OLD#^B{$83@FJE(5yL*dJts>H1@!Z%JS@S)OY=;8_DkJrXqi3>kJn z_^!&26(^LjNetGfo>>e4LLZ^AulSAsmO%#jV&7v34EQ3&4=Wg3YvzxnbWy~;IWcj0 z(Uk0&=MH(YZrjclHkMUR=P!|>sp(nkU}8L9=e2WMwVvGt1wlck%R3k3x^_+Kg&C9`j%rJ5lJDOB zTMyi$9F`Njl#kQ-vh2sn3|$f4LC0G=y`pU|XJiib;D@tYiy+5hBW+)A7d3pS+>ECD z$xZ1U2V!g!NAd^e32e}NV*7ef{jpk~4gr=umku1t&qKcxcL0(}?bu{H;d8ySNv$bV z;OiE7@c?X>C>)gOv)SKr2@mIoygHuv7=Yv*itV={DxJ9rg&UTPeCV&}gD{MLV=f4@ z3Hs;rbCRPQTiO)CD?p8-HGW-#F?_1*6{Iz9yS((z*39RA4&_*8=Aclr<3pnP-xRMp z+S~2hH-N>71}I2cy!=#jtzl)RFp#ag*t~${Y~|?jy8ILc%Ssu{u{Xa;P|NpyjcoqZ zU1#nHv4{&H%TCeEG5i>z^_4GKu(=7#<{E3w+B`V+c4L`u9Ci`+b4$hNBC)eqaV$NM z;evh4_Z_$qgu>BZ0Qoz6ciR#tju2=UMGY*gySvguo zUsug{pf|rYh8Jl-)E3H`?NRnV;uQ1tqz?bVw3W@SQXd#bC+MyRSe zJ+nYhMGb@dP+87F7~nR&{^}hgwGWPR!oF>DX`NBk&zE*Dmo#@FZ~8SaK+26UAawI! zv-+x-0FvScef|R64MHn}Nvoi6=T-dZj1>ATFjdNG*PdT-Uy^_vWF+RpLg;8~JNECV z7Skat$Hmpga;HEKdr$sT57(ErD*x)L7RStBY&(CPoi&Sw)UgsSokk)>MVox!uhJs+ zj@}C?8VsV(dF&CqBx??Ti_b25*2~oT(oggxv-eLXPod_zi-1ruif-e2xiVy7-_y>} z{oUZ6Gbb0Nd>1VuG!(XBy26-R2K$^S^vis$pC@ieeBWGDYS$xnio9Q?na=4*3S7z* z#@o-0sUE&^4QNP^#6xysB1}7-H~Vo0hJq$L7!sW3#lr;derSc=e=WY)Fn!fEQ871Z zXk_}f3GVAY!Ymxs+}(Bu`=;I})Kx|@W!K!J>+0F0S6zT&y|K_!!&=6G#>I zO$tSQA*$JGO$rPl96N*X5I`1mbXUuZ90CG5rfgQL6#(CP_M01r;5uJ5U~&w{;3QzdRn+2aoR4sMxJyk^YLWHLxS)TB! z&G*+LGJJ}3mRulqe4kF<=N!c)XGhQ5=rbZz-(6@U#G#%e6gyBi$RFBl&@tWTi4wsb zQ9HgE&b?@rGwUA?#{QRX;JIlQ_y_XT?nlUUHowV=sp0we8k>rkfjYSt?ullF!*bWG zrf4>i{a!uQSv%Zo;Z|=I(v#8wE~bN(vF}4XgbMTnrdoZRT6|gu$=IfSPl;aJ>IhQRD^|<8YjtkeEaR^XEUOLb zgV(+vnQ?8C1szbDw><26xK}&wDi6I|rn7aVzij0x(p$h=gMy`R(QZaOF#yUuYTtG+ zj@E2rcHf0Eh^%q@K5TE>2{=$jHWgZWygmSgQYKEI9RPPG`wl-N96%p@Q#pPSw)Pjl zm(HsGb?sP-wyiwl@;h5!gAegdjh+H(SND(gZI8N;MdH|K9c;oeS_m)<K0I(xS5Pe_$E_5Q;66Mt5l@fb|(ct@!xT|NSyP#E^2r4g96VDJv+S!e7AjdFjVV zUW>wZmu7STUs|u!S5LmiUi&X1EW9b8JS}CQZ0OC@ASdBl2B(4F&qfeK`c)<_>k(HW zXOq+qQ=>XoujWpOE6N3Jr=uMHiDuUd@s~kC)Ru#yaV&(b&Vo}InWD$A!>GT1&Ep$3 z4>CJt8^0119^Jpn>Zeb6BmhAwE$U91RX6uK(`#plGP&0@dUwz}Fmh^+a|yR4Oy7vf zLlGX|Tu=xY)p9L+V9Oki5YA0eM&wLMF+u@g9&mquHhl$a?B>^Jefe%BJU>*oK4~|Z zucLH#=Odb!t=5K-5xnJ4kLg^SGMDBNtCBB)HU~Yc1OR}@rC7eF4x=#8yj7c-YaYz> zqz%vB3im_@9C~?V@6*k?u_lXBY6x=WlQT3;slgAEvs)$&n;qLe^C~e0qJvS1bld_% zgyk-!qZrPe;Ehfb0%{B?8aj)HbEG*2VMl1(j1k@e3|8;91`ukn&HfhxaSfUhRl}ntF1IRBgL9+qp76FfFG6BcE+^ zC9Bq>mgXstQwOy~IHbhC)4v4|x-ilT}rmEj0CcYEq$ zHt&e2ZR;t%m3>aetIg7P2Wc~tO`G4>c5ws|DdxWtDmT~}DTOAz{-1-8i%LH@-o-k@ z#s5hl8doES7PCUNSULnmMuIXX-3qc3n^RcziOXiSOcK7;UFlmHWK(8;7CFdk@Ori1 ztm@m!GXiY_Az|Q+h0yQN%Jfiuv$qZy;7Yq!bf5dPXONnwsp26K?*8Nh}I!a7?ce~WFqrBe_kW;R?iu_E2_$(9;;RPVm0aos!WQxek%Dj8l>RwdY zym!S%pcJ`8$uYFMCp~T>s#IQf31~wUk-qflR~Q42x`P zF@X>}ttD|SxFHl^8IRC96)vP`y#7sP9Cj4NhT8{G;8s0A$)w<5!Vn?H87h=Ru(+%G zJh_JDVW_9mGm4KpyG*-$Xv6@3 z0|~Age(O$8a}P3wY%^c)Ivm8vMwOypaol@da&w&2p;%x95&Hmy@<2kv9((JM$W*f_8;1eAV$tE+Z*z>{@3P#5CiJQY7oVx z@_!f)CIEm;jECN^Wuk8VKL!@@9bJ_dJ>I(eKNK1u<5qO&f|GXAS@R#1gCP@ITpsrS z0nP5_YiAqPWYg2*znntagw<0$t1o8bR!H&TD}f}Xx5s_OsIyU2j>xV#hU8any^ z|2uMfah1oN5aQ4jMpkt1A>P7VS2Ovr(4Ki~>|Hsva zd)AoK=l=)gBLPrFQlc%DcN_nY(MR+R$Ws0f-y{S8WI#!BRn84_H1G}q76i^a_9CI= z=K7v@YI>^Ybc70LXl3*Ce^+rVIFe4FjZdiw*^taMm?TrS8nOCIY5Wnt4Tg7G)BcRa zIP!xJUH^gKt26&3zC>IdY@Mu8i<f{kz z(Wp>B2wkXmrb;C2f1L|Z5iQg5JAH=Il>QIs1prWiZLeiSEydY}D7?D_!SQl~3Lz`o z(E1}EHa!6c03BceO;50`+@PU;p#HDd<7+S~LvJ@H0k+}}vpGVxUj4pr1`j=EGpg2r zHBII(eh*Q2SX*I`%#OD;oIz;ta9o5aw$Ir@2su=4>LwQWW8chW!0CkBF7>!IoP@-p z}#` zF4(n&K}CsqmwVQ-M5!56{So~R>bVdyWP}iw1;Wd}^Z6Dne06J@`}?&$pr1jv%-bEB zvW4szCUh4J0FZLMu5Ao8#~HLy)_Xv1Gt|_Jc#7~3CIJlU!X0)PzdBP1ztwYCO4pZD zjVCzRnzAq0L$8OFl?ldc;e_*V-~8^M@*8xxICSII@$Emgm>o}!z(n6ttu*X#p^j5* z5D%qaw7`D;(X*Wwma*BZ5#=|Wh?SZ;`LlgEO-9xt0~-L?)-BVGT;Xt}0dhwlUEY~q zsi5Cfb1_FUui_1Lo90D$7(KF*8dOmXa7 zZOlZTkFK(UZ4G~;#*W)CQeXf8UF_r*EN0WSX~5^q;F2iq zOK0nchkMbu@k(QP1aPG75i8ygt*Co^pkOKRy+Qk`#&&hroWBN=BWWYN+dFi0?Y@a@ z3(oE=*Sb37GFh6ImAkd-z>Ho`(3MlBTQ(KDTX&omyIX5|7vgVJHCl!O(Dbg%^4Ywr zcz%l4J`3I%l`H)52Cd1xu$`gi<9T*lFKpff9_)WN*rYCX`}mNF`Xt}`qwU?xPIr^K z=y{Fy>+au;GyD31-e`cw-WnR|b?>w63d!d&lNM8BGBUuzo{;d@_dVW$(aoHN$wz~W zRAiI?EKCQF%hXk#&c1)X;J0yJd*5QWpoo1`|A0SEd&Koeu{Y$hJMQeUQtvhQ->PsH z+`oChP7-O-r!3D!u1XP?X)hKowPs^K{z`8p-1F$h@8f$ey=VA8{NB}pmi!(L@d!Gt zR%d=@FBVt)#p~al-YRX*33hB_2_Ucz7%CDZ5zkh(aEAqCPz4r|qYR=FDZdSRhXbac ztZib6H|^EEu!8{f1XC*Wq)#(-7YEA-;xU2^ZlA--+upm{L>ue7HSP%huozfXjshF9OqP~>8954~?q&~Dz(nT;Xsay> z$jc&>tuVVBSXEm1_B?~<=<7fG{+O#f!p3f2nlO z{wz9FWQ3*=L-+rD3tzBlv}Qbkf^}bQ8?ryft$ma8(&R9d$@xa4*kk@2hqsGeI<7&idC+Tsu)Sbt62HoXBD;qnz!*VN4l}ShEbU85kh}-z_ zVxD2yM`WeX?WCt6$Zd*-2l$p*=6v_-6U+J2_uoQ=o?Sv{{_n9Q zuH@zE0Ejc`Y63@q+D8)F%7~dQs-N*q2fh<@K-t-u4r#-c>tDGoPUSuxe{SJ*&6r8u zW1tq z$W0&Z`*XpZrs=!MFFmtjdmA(AXPBVs4NVduQ4M8Gf>vuJ2((hK-YZa*gMNZ^p;`R)r*Yz8 zobXp;Lo!=-oLZ{!;%}+&qBlh!bZU)_r<>Qdw?C5b=ekdey8C-a(1S&6 z3-6I#1PMk>llqQ-Qccew0f1lg+BTG7f5glpoIj$VyGNP_x!vJ2K9Fv?2sI==DBg96j1i2)#^o%EE0>6H%&_>>eC3hhU_IN7b1AsJ zY7?wcTn4W<+OOYx!%Ik~*;!q3zYdo$NB`cROKz)o&Op4}d``nimD%STIY7+ zjT8Hd60msg4yiJ9hdX^1EN$q29K>VH^sdI4-;K_^GwZFnN#5q1m_7^MjkxtPZ8za} zD8``mUc_br^oNttela8!J87>rlR!iHrk6A9{crf)dta@j1T(3- z#W}Xzd$SevC=nEWpD%+B%UotISiZT5&i3?pS@hvNJa7SuCGUDC--?ZIIZYpqelpB_ z_Z>E!B}vVwt!Yf+09xIicq-QmDd<$fTO0VYG*BYY(EPbeY>fRADt^=TRhl$)7=iS2 z)rW&K9TXf|omkZ>J5I%k@1hNREp!vWf4iqKst1PSgo$Z_j!DR+eY#*F|Y!vDXa3emdt)IDS~kU$4^^7bIw{q}=FbE8gAhAk1A_UNM+CUt6c$lsd>P zm>sCxkyoS+4sfTR)`@n4H#23)Y^>eT#I9Wc6*aotO+|h8n%P`R4Be~IjEN2;UiXEz zO3`C#C&d17RVn9uuQ?!jw~jA;Sm~2ec2&W-PUu78P5JR>)g7F4(nQEVNTN$Sv*amV zy7sFOd-x*Fy{X4|{RetgKz+86Mi!YK`*NM-sLv?8&2^RF*v-v&TBp)T%zknqotNW7 z0Q#4YH=A8?hMVt9`l^)KME%|Lh8smW#x)E5wlqiovKL|ovZxb`6`&6g8L7X0t9iI) zy|^Cf1scf4J{H40X&lNW$(Ocp5%|$nYPQ>ydG_zaxX&$tzH|s26EVVWT9`=hw*A*L z(Fy)ph(|-=Mfd!xkH^vnx-b8JNxpstO-cT0aec*K@$uuqr`LK|>12;j9S6@s2lKa4 zGXe+iBzl9Kj=stNvhF>5z5e(1BLVJ1l1R%{>FdqjqV2!A(~_-$b-agVm?^S~dG1~Z zmuCB1ws%paE|eFmw+yXwLrJH4x2u7hA=gu1@q4|TogT3_Yqy_=o_%Kerk8gnr2Myg zHRD>lFw9;?-n;onUGoOzgK?7)``N2Aw+@FxK%>w_#;J3>7a8HXq zrG(sixaN12Y+l=X;bu-}b#l7t=-&>SnfYH=>#o1++bI}Y$;I!}S4=CZ3qJEBzk1e} zUQiSI+4~f*nJ}~VcVz~`+o*gNaI>0=CDi+LNhYmoYGZcsh>`i1xy(A(R?T4k*tNp@ zLZKp_-0_xN$j)4m-2@iRO(Xo#$Ga^x)+-e$)Xn#zprqiB|3L#i0#Fb*^Sy&s(k3Knf|l74GST_2zsTcXT}OeOhq z4tCN8eOrodu)iC*84`2K>r6N7=!qg89k0&d%(i;ve>PxT(H*dp--j-r=~)o)2Nm(K z&3x=x2zgdp9t{b;_+%zLCqfx8ABg`_@{se^Rq}qIIcGW~#>?^g=xb@}*7zPvle^WK>E1_Z-fBVj?a*&r#9T`E zD1WP!3&e!(Nc{Ei$oD?MF6|O7V2kLp11UfC?fr*>Ku+SIlM(RuXeuELsH__}nbPp( zP2~&MSCc@OUO|?&tHXSR9Iv#kGsnp!Zh3(_TO`nDdGPlK_q90wP01{(eOKvT_k+Gs zyw0P)d8g76w?D~-UpndnNgHGUOWtaTb|e_8ykttcMJ^NZ1pIn_np@q8iZ{Puy0ry- z7S9g&%^l^AU)7a+(%1OfCypVjMgm%KK;+Upla`&{$0hGe?NnEZ{AsG^v+wU%XoGCs z22S!krSh(lPK0Uic9(}0rEU%b-w5CKRX!}eF3()Dd1|%u7-piKk?aY%dFT7S*J>xj zK$yeD1Db64c`3nLo6L#&aqBjzU@H-wWBU2HdllZM{$#E5!r>BdYG3;o%A(E{wAWfj z^Xe&hFUC}*FZk~1yw}i8@4$J2P_ak&=m8lBzg zS&k6Dm)a!hmB)}7iM81ha!iy^KLO|Y(h8Rlm({}gI&!g6$!Zu<_=z8DUbMSv<=Nn@ z8j-Z0ea_eben?st+^Z<|k7vw$Eii)brOa$1bmV`h@YhQ0%+YK8z?KEtp?y@!Eabbn!KNo~x+H2z>T9vv5@G^?|zii_U7n%Kj+51mNuDuydOI6&7Q9v9gMhmpA_^w zSl^gb_vCZ@ZD*Kj-i1|l{?)lWi701ShR~rlyWH1KFPEtRj8s^`kem_!Zw&Co5YwG-wx;%1gTh12` z%$dF~Cfc0Ny*KJxfB8+;bJqQS;_ll2 zQ*#=3g#O;`@#T7=3itRlkod2=Yb}RppuzRODDIxUPx86n-@b@ESAO>KmR;+zjpCN4 z%5XxORGa7FnrP;PH+BF}=|ZFBRzyxZ-}MIXHlH@J)FnB%v?-I2Fj(+1P{%n8lf4gc zqMa-*w>NA}=xA^re&-q@;jUt6SZ@RGbSAklKU=l+j>}k--zh)R6~jBz>9X4YoP(#B z`FHZhBM!Tt9lLf-N0$SY85a2=(%ANw$eGCBXU!|Jce%pXIVG3l!f1hy*Hx|uTscDL zQP}uXf(*PB7%WgXYx|2V-PXqO)MIo!pf;Z+1UF==|*ez72Ik7J5 z9xcJSdP6}~&>|Qn7h(Acm>l56bUTRbOLNOoxm50m; z9e`|N_};h@sEtdHnG_jgi~^QxhEN9#`&SffseCg%jcbB;xK#{9#C%)QJ?{8}C)LnI zq6`E8tfGbtQ62{G7vnN&VeHxgH&>A*q>w_twRCK~yFii~@zy9^O~-GJN6jTOl6QI2 zbq=3MO}&QPE1eXRZ=~wpsb%-=)bn%4_uhmoOFRugHtLpVh4bcSe`*?L3jbcHnNxD+ z{E$68VS{Lc!HY*OQjXQWvOlcb%ZU$^$ue)Mne%;|WqBq1gSJNYRQyH?^|b*dTgSF5 zi}z(?ZA-+9?>*CtZ=qm}`A-4|!P@Ts8|{iZOLO;EpB5>G)fo z8~KWuhf{?I?GT5E8H5gS;*)8$UZuFk6n_PA4)DHUn_zzDdwrHs!r?O*+Ilx&J)fDb zZ*OEZHr`lSw@c>k!V&rXf(|}!{hfkr-EZ%jj8?k7gfhXnPao$k9%phrk$VQbSO4p$ zeW?d6`DG*&JbT;757eRVsfA8cgJ4m9~Fz1$|i!vf3Q_+#3z` zLdgXof69_Jz5RWxri+bwoz}h;FxSm3cCKOzJHd{Y+IUC>$r02F7r%v=f>I5;g0rsm z@ct=D#!`8yh-O7|L<<#%Bm1$?6qWS;4wpj)jGeWEw9{M_$k6Wa>~)P0*1YUq#bJ0| z{v4Rg8K(W%0qkg);{0TNEwvlItniNfZtA=3S5dGrBWE1H3bEJC^WWiSZ<0td*GKo= zIfL&71!^B!;E0vftTZ<8Iap#{n6I|R+L`*>e>X>NpCYFNxEO7mjsBf3c)HI2s+#m~ zZAJN;p{($2o@?;)Sr?z$rdY_^JJ@MHIw|Hiaun1I3rc21C7uy91c!r-@spW3A*WCB z*CX?5m~UruO9unGi~xJAaDJY z9P$B~ZV_I^@wvoK_WX!|KXQxw*MEo5=QOxe1AcH?KfZV@D{c2m5r1(0e}FwZ81QInRQz? zZz+ujy5@HbsEXTMJ8Pp_klnql$F#WM%&@sX+q3$EZx)*NrpZ&+SJik51KbvX^ju}# zSKoa9Qw2w>XD|G1`o^~XhaH)-eZl%A72ZP*#-TVz004q>t2V6mJf`i|@jw2^4n3zU z3WiP21=tC*uxI}ApJtB#b}9EzZZl34Ajsv$MzrkX=f4Yiyr_20_=Rpy1h+Z%><8by z-8Fms`cUcx3PNGoOSHF&%b-`*_%27*cKDEWg3Rfxowl8_Th0qj-NQc zS`|AMuK8^h?$bGk*cJeQWf-Pmle>H@buF!eLViRo<|>PM2MWqr9 zgwFth1PT*A%A`UdWU3FJ8Z)bXXx_f%w zd-I!lZh8CE?unD%_~f5G_(%WHp4hp6&xXMDOBS%Zbu>@9)0vy$^lihbKj) zC~0M*_H%)lgkLV`#NM!B{CU@1S)?^}6^laEL9`vm^2V-z`OEDuz5dXFso(zK-z@lR zs*Xq&diBY>4_5!~*w)^)GEWBX(8I(*~35Bxi9x_sB6v2rY(Sr=Y)>GU_=dEc8qdIqbWWd(KbUmkhOk%Lzsy65*!uG@3T#I}Pw zTJQh0z5DL@klAwUm42k9Ef9g3L3yq%3iYi!b|xP_aMfi8KJ|04?gf*#-Ej+k`PhMd zd+vMao2#zAWd}aG=h96txOBsv4}Phq%8nA8w1VyTzV@2tTVHz3)Xu5Ti=8jNb!wfT z&i>@#H{7`E#vAs(`H{!8J6^8l7!_bf$MuT^hYbTj9EPQBFMHF`&0l!q)Pa3_Uh>l0 zKl**=`q$pck3Denu5CBn|5vMTIJR$9l8_XFjRB`v@H`u(>pQ}L@@y=vx#pJr>JM+9 zoZ9`mZ#S&53(vdc@?GoByyM``tsnTw__aHB1j ztgWgf4<32(C$gJ={i^vtIJ#?c_idl=ZolWH+hl4M-|BN_%Ij-kLvX{oXiNC12R`;s zr&}|R{ps6}Tz19wtB<_$z0+y)s~`X5qu+iqnf~rW_g#O*ju+f|_}J$jZ=U+;qksI_ ze-@5HaLV<1&1!w^LwCL8#(g*4bpPz7doSNO0rMw&wQ_OQdWWFqHoyGH!=L#4iK~vj zX7kV9erVU^XX0%yyM2E#>}UoPr^V-AS3Ca5k)2zQz5ho$Uvu9UZsVHjzkc!O6PK;! zFa-g?1j_bHRTY|G_o0i68#ZqgI&p%MZz~jF^yVix%+K@{Zp@6uq_#D zZ`=MCUEclJizcr=bn`oT&s~SFEPeIew;g`X2TxtR_u75eAKG{RXJ0jS-PF|&Jig{7 zho-8Yay-R==UuS=2k-gK`#<)0vE~cXv6#5&^}n&L_3(=)uReUk{#U>4FFVgWaL@kr zUwrfAmx{bzs%66$X7C5xfo?i&HJCuiH(iU(y2N;kK+C`QFbGvvLc{v>Im?5NxRYNL|~VyV-=;N z)IfgF*`O{kAqr*!0FxP~K3*;P`b+P+|3~X?e8sKT*{vsM=VP}rUUC&>83CX`M2QeL zXIo^KszFI%Mn-q$7i4Aim=n#+%qK<`s`ZKwQIr8Lfia>GCe=(}Ine8*wr`oZ8%8OC zK;Z;6UxzVE*T$%`kPtI~^n<{{G}fx%+rWkig`l|C=|u+6sZCTRk-Ln3_@C#f}}Guw*bPcPShOGy@mEdH?_*uO2Jd0 zJ2Nv~O-^~D=F2oq833geKw+zuTE%kFW+EoxdbUa0v$GvWA?!j>2?|oT=5j}^jg_q^ zOaW2(#pq{`|M>V5^<4+X!j`N|1d72H(R`!bO{5c4$IFm}nh*h{ZE@Udx7x-o*D5x% zk`Q&8UGxLb5}+JkB+W)M%+M>3)rumDQb0t3kbkXHoOAnI(e>`S|1G%ty1ifd^k)~& zHZi!4dun?62jBay=X<%c5;Gu*f$tJCN`bi_12bSA`(ZFCB{o+bAd2l?adR=cdi_t-_Hsq5P-=L4evJqrR+yTO-suF z2r>9A&muw|CWTbkzX$+;Lgqt*NHZ_yNyG&ChTVaX%p=as%w!mrwmYZ}i<(#>Dih`6 ziP3~ZG>YPVZ2<6+ePx60EbA;V8N(ylhIIikSEI6I@B5E_^wIC0sj2B7wXS)?{l_LR zvU^dkMrJm-wg=UvSkiqd1u|)Zr>O;&e+3v(A~F%75IG`$5OJ7{0U?2xTqV)~0s)9e z1{(E?%qVURO&}z)8Fqi5%tc<5^GD^`;XnSxhaUOcCl0^keFxWiaXNhQJYqOBX#Yyz z)&u(zQGPB%u9?1{^abl@&+2T8g07GPmI*oVw{zD8=@h~rf9pFx{jUpOcJCIL?`Ap5 zAB0diGWy7+2UcSyUSzfW0h9nmfBW?^@o>?t#Mvk)6s|pTRE1H9=a@XAC|b38_3cMr z@vHE`21F#HFbb16{@)+Yu|mHJGz@~v6T>Wxu*su%#Afj^E{n?m5G`3W8$~f%`jpAb zj)GarbMdel$hM60(sq|sKj(E?Hk1}m152lbLHTEB^y~`E|7*fv)0PYUZ~fb;bmP6h z^U4=)FV8*I;-&A67u8zU{bBZ;YFWg@^cy7t0A99enLp<-EmhBu4-M+-mpw&R+;X&`EsW-aD^a9cUe%mEq8!JYdQI%TztGJ}py#Ij6IYl(XDwPv>*ix+aU& zstYdl>cyX#<#)dF^-j0*jD=Tdg;wa< zL`>`y$Hyuz03@B6*;a(=Ie&Hl8;#{P>jD`z&NQBV$FC8i?YK&1aW{J=(9kcJe8+j? z2R^LSvrKs_v_dQNiwOm$VdK=`rdd4G$v4j#LaCrTd$J1v@NAnE06-w?G}0;j-^~gD z01V2p#M7U8R%nG*XoXhj|0fai+STU?<`sm`3a!uzt z;8z2NLj={Z`l#vrA~ORJqF7qse?Ytx^)Y~~fPk~e4LRU$lv&y(<`D+~0gG*hXRkF7 z9hYX|8GFP_8-f8E?(E+<7^*853Hk_U8Zr`y0D{;&t!tcjm<=&70t(STOM4N%sSnH$ z0{bih5U>w}=>skLYCwU*G!Itw5Rid!s3ZZ#5HO<~pz7kmn1lMnz#@I< z5fKetbAa|i1k6!7OvJzdD1;CwIA2xHttxON(;{miZUY)78U#6k`*h(pKAv1tP=T8>?39)i<&03FIvMSucO$lP|zKS{|n>@m}Dy`2F; zfMCcCp@=jS9$&ub{poF)%X=?E5e?WA3jg zhepgx7F@46cLx1hbK&osy=3zviYHL=8kCg{3TFV+=7d_hn|wv25iqQ=G(kab-!z@yM81Cy1h0 zC;?L(#{xj0h?9hwUB|H;2LN=Y4e4BLV{{V5#AI2vZQGXZ2uoy%HcV-fT9z$^WIzOD zFaV&W1jIB+&=^#*90Znaw_9y(GA6^owsNGDNfr|sL}4^Bk>k2bs?20*lGLhoA!V!G z1m;``%pd^bC`J^vZKD9A^AW;0c>URrgAy5l3=y#7+LrR96euJCTGEnIq*^CYA_Uux zg#cM<7=#i4L|PjFLrg@5*#Lsk#DJD#OOQg@%65cQT5FSO6ii0jwj~haFf^1QAQ24& z1IxB7X%SGGqyTI?4gvya45$sInFaG1}%*{2DBq zQz#X~u-oe`%rzRyQoiSxtMzr~Z)kT~&Bm->C=^OX00^Tn3}b0owor|kGtI^v3PcGY z@RH42YW4Bv%$d_CPUti(RjRAbTSIKRoo*CIVH`P*!+=3hmQosH{6ewanvbI}>h>zt zis$>S`T4oIhO(?62#leHg$37kQ9zPrwo*wN^}3N|DQ4Ej_yy0k?E2Wa*2Z(4D2fZk zB9ob$JspMNe6tnQYh$a{1eHpbW+zTO(VS^mQjL$*q>`TFCcTBQ7uv2xLT1J=k6lf-sC&-dae zEVxbrmTNgg1}()>piqwMSe~y9CRsKyu^JGKp`cdPI%}Lh;}`taT;r+Z z$2VNOSxGTJ*UT~;wh zU1h93A9lTBQ5!ADB%LlBPL0;U8!y`2U1*sk2|K-3W3Eu}i{-NAIlU-Kvuu29yxwc70LtWMHPwp^x^)oM08*VD#y+HGcvqG;{9^IPrK zTyt*yx(j-}?##^TO1TonaeZtY5u44XlBkqbER}7?uGGe!I{C!(^z_=b>uO`;GpD9I vt>%2A5mYLrAn;sIS+?uBg<|>C%<2CITId1gvpPi#00000NkvXXu0mjfzZXnK literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi2.png b/devices/surface-hub/images/sh2-uefi2.png new file mode 100644 index 0000000000000000000000000000000000000000..8dbcb3df841cf645b21d06a85127d34ed23002b7 GIT binary patch literal 76946 zcmbTd1yEhj4=8*tZpB^7#ogWArMSC07b`A>7K&Rb4lVBP-r`W8#oeX26}Rv9_m_F^ z&HL=#8HTgF*(94}vzwfpNHtZtS180N006vFkeAi~02m|y08JvnKzk6T3f7_jkRkH= z9sq#e_xBH!!h}u&0Pv*tT6&&(D$0VEuFkCHR<0J-tUk^VC^P^Fi}^szEgh{r!4}rG z_AVlnr|sR8V0$YON?jfmb`^+}wVl1ZpS!iDpQ@InpQELK6{VOcSlCApion_0(;V#M z?BwDh=p#b;4_-m&^WSbZO7K4*o{l1v5`PJT^;FcrQm*dSU>;Up7E2Cp9x$H(D+ezZ zw}1dMn3J7@pN*ZLjf0DYgIAE7U67L#{O=znl$yJhji83K?7wM2TOyQpo}LgvHa2f> zZ&q(ER#$ghHVy#+0XB9{Hcn0!CC(^mgB#$5Ia{-R}VYa{~Of*9sZvPKt-#f@?RSNTV9-<|4YKdQ|2vn8UGf@{}$Rq z%NJtJreW>j>g8@}E%O%2Ce`27Km?`St<61M-L+g@o&KXJwg0dTmXi9b7y&T7uDy$u ztG5Tk|1if|+T7Dxg!1n=3p+1VYg!!Kg6!;q>^v;&e9(t~fvUJ#+1vR3FQEK?K{>ev zxw-!*P^i^dnR}Z5zXDrX3fj23JDWq-Z0~GtYt066v84q6SCWEKu1>D*P{L5|xctcUK#GC+L8OhMXi=K}L#~Lx7i;g_D)zA9ht#1QlF7Jk4D!tret2D53IUwYRqt zG`HrleCqzvd$-Z|?zBtna^fkEXTTzn`4!!T(r{ptF2Gu8;*afm#X38;mQ|kWSbDY#!}ZX()#3`uhOoHU20VMi~sog@q0(u!!<+7$XhZY z*f<=xbZ;uTs!v?Z9(Uh;Bc@KSeA+!v?VA_mqw?t6z-+~ey8AT(xDGN}Ru$5eI0|;L z2Kj3A@=1dJ_i%%CrS>XuuZ1D!+sI#juc!U~^a+8tyb#RBCdfPMP`hnq>&V^p{0!=+ z>A%v{TzNgW;9+afY|m#g{d@8;@9E*%joDD$q-;)CX0VSjr7SASJxt>CyahSy3z8xw zo=2#7f>ow!_83C%OnK@GYxCfiMQ4mW^`-zi(&XHPE~6&D(Q8un{Hn?026GcxS{&4l zbvG`;@L$+O5*or2zMU@3gQGA-Y7D(pl+(nyWg}4|7aGN56rVqCV-v|}x(pni`%H_9 z#-w_;8S_hE;_e?FDp~l*__pesey~iFr?k=MZB*ZCA`{FObgQVSfCEONqWR-!;9?5o zBc`r-*NNA#eD-)eTSY80 zsLo?92hZAi$C_qC{nv+9f#)Dlubha-{`ZBa_P1@z=$|(fm7+qWq>_^k)`muZ*)?8i zkYp&!hE*|Aaw?j&Kn2UB%QmZ|I-{$-=!D-mLdQn8WKf7272~i_=B#Enl%hm1ZYn(0 zrV^18c+YZsk^ERb7XSkzpHye)j9s{F!Cj_3@;1ADsdAQerOm&?BxkQTKdSJM%8i&ry*W8JH;KC3Q=w z6f`K4UoW@w@$!D&x^+w^0zE&Y7l)m4Nr zqquu0jw&K0IZRfxDpP1Oal^w4)N-6>r82Ow;3@QBf0#URmkyT`aB5N^nSBTL++WQ% zQGCJ~jGuML}S5^f= zy63Yo`N1O;EN@jeRANU;b#duYfL+^bv!^${QA1yFQSv)&Xvi*G)%)(E|Mq>~MO2iC zP_vwz%mX64l~Lzpol1L4%WYKM#YmZZ7I<@Ob0S-WDVa$_lVs8&amM1(M_8jZ;H7F! z1z!oGmS8Hb26Yf!Wg5&lm!ziZ>R;999~%v7G4H9j^R7ZrKD*toax^bmb$a^%^faHgIR>6rULmP687Sl-3;Zs!F4r+?yQ}P9lM> zKlaBVzd}O15Ft`1cqsY%;2efGf5m^Ac_r)wy2IN4X-YB|ohSS}8ze)6qS{u#!Xo-G zNY^KFVg`mzeiJqH5$XFz-76CAZBg_KPMARt(uq3Ka7)7Qm3!&+4im6^#rTQvge9TR zkxnr|{=SfC0AWnO85TXV%rezS+3a5%_;w7jFZ~L7<==j2Qbx6$LXb%ZVW9{BB;mnJ z!Z=IPtvW+y-u5t%qBKtEoIOwGF?un9daHh8nx69082cG-emWh} zfQv08it_mY9}CV`SurXa`ujnf{OwEkRdq!L?jR&x`TC8K+anhh3{040@4+-|C;J9b z^ui*zabrz5G8qq&-E}bGEtsm=>hh4NSv-M4db2c6h9er_IHFr`lFo6Lk729*DP?9+ zou9`RqWoCG_4awTsDmc|faXTXqB%G1VOB0W-sjn-Ka(+9w}^>GHaiS1WiNS>wQnTtJcso>ie4==uRX1R0Dw-^ z-+B?XJMGJ#ZG5Rd8$KZ_x)88d zs*SyJj`P8U4Kz)j1=oDM)?(5@ZR?nch!WOWCb{RPBPNvkwXSS(6Q+C&i_3cIGnN}% zI8M%_ilFy_VLRW|4I&y{OzLdP_F-ppoNYPp_)*7~gY*=+ROxq}!g~Sc0`D1LHuDHQ zHutnoCRmS8Xh3#L`|n_a9;|G|(k|L3K23-@-9h%CJ75(lG=XVbqqN~#HeJi5{zWrT zB9}}|ojM7PWI1?i_n6^|L^QM3#n*BwtGiaNM%u(X#hO)A>5_DkBw zpXDk2x)4@+MpbKiCqmqxh1x=;MkfBY15^zTQ*}oXmooN=8FjdVtBgl zW)IeKTFqUrprFFHgPd3vg zat4DRDjB={5B*S{(#gecZQ|cFe?1l%+2%MlZs)b$WDsei(W{StElA->y3}OVyF0Z& z5Dkma#XZz@e{8)FQ?`(K8t+bS(ssG7UG@X-W@gSZW1;HtV*JtBMN(ihte*^q;&iAs z=2C7V9md4pIYu#7whcT4yLmd|d-*74s7Nm0&>&5jet)2JrFq~_G;y!8bi$+!06m~o zrWtS7X5SBE0*`;f9uJEHZe(7459|Ao8ua4ZD=L-Kt8X%}L&%@qB@q_xP1@h~YH_x@ zAtJZQbO%5adp20$ZIx2|^y%8XI`Cy@l4da5Y=PZ>Xar3`-mXQ5!Gb9$*niW*P%$hZ zC61;3p^6`d;;RImSoX#EL3E)&cV}ZGn3k79_-8~&#c3|ly`hAUJbmL`qeAps+u{6P zyaxHoYi-9F&RVT4^50bDksWz{9bFeh=a-Sk1A&2rfUy2jS56x@A^>(>`7@zP+_}>| zLCm+KBxPpTNiT*>GieuSk4C*XG~Xh9Q_5qivSbF&-(dDL^+AQ=>&COFdrWJS&12SK zRG;1&i6gH|TSaxNKJ>Wyy8FU`CJqo6#00H59xq)T2txW372V9}H6NEyj~8za7N1wH zY_m7b&X2!GtC_EVoc~tpMZUgZEwz^E&B)KaT<5>Kt=rrRTDu+iSxjJrhP)H(=R9)M z3BP!ss2HW=7$~FGXg?6)&lRh^*Oe{k7bn1-CH&{P=DeO0RK@(@bk|%A^gtY*9`_HG zLymp?w;#kzZf+7kQfGX;El~41&)5@fr9FS8KD?v&Lf<$Y@VsQ7Z=?G@JR-q%l|*2V zSp3@?HnE!l#`fHaY!z9gi*Bb~lIklc+b6+dPq)2W=!^N>WdXD`oYoCr6V3scKyuQ?b=-tc)R!qTL#J2L~H0N*+R1ki_4N~IKl z*GIz1O!RLjxtDJZcS>QCO^Jz7Ix=x=ZA>O>5i(bXJW^*_8{+v}{aeHU0JmEIYD$z) z-p%RGeokQYaze{g4igfoZ16P1@NQc`6+lRp_9D4dJQUYgj!9}=vVAXoEhONuM< z?+6aBj?xdp)!}00<5YK>@xg@)g^1N$n6r0lT*HH2 zQ^fQzi)iWhJKM!4Hz|?{bo#l)2u*e?*C)rwkqR$CX3ql2bRq=U#P<)MovS-9CK1U4 z7Ypn!9|W_m{1h^;UN;(Z$MK+l*9g2FK~a^CIP-bmyYDGP#&V<+z9E7}LW(7u&f6@OV}Qjs55vm$XBiq0m7C=n)oQpV8N3Q`%_3oOkH! zf(_*B{w2DT{8}t_06n` zxH&dsAjQH=76O17qsX<-x`4@kal$-kD37syP6vc(yK;L}0Bd>kh~#Osk{Mbg3*eu->g>gZdM;$N$>lGt<7zt9c*$i*<#tOc)@f_$OLj z8f!j6(;x`=LqOVyjquSfiMVCG@a8)HwgQ?J2If_m)!qXz2tbbobtxuD?LDt*Gzj>r zc8g=uDPw!N$T$W#WL2~}R@i9ZfB+u=3?}S{CQqnI4cDu^ zX@i{Ick=z_=J%`2rpSJaY?GVE+gh>b4i16V)ip6GWl7=47dLGXL(&7hj75k#_c3JN zH;zDwI@pLE>nNqLkhdP2+kQAmAop{VVJ6&<@w)FQbVylU9TkeFB%oypQr|%WV%qC8LPV#k^tbJasfw&%_jJ(e%^W+_`uQJT<49{*J?4hr=i9iDq3E7 z&0M7WKRczajngJe?v*92A1^XSqfx^;fr2?Bb+r?0Ad3^x_wD85&7FwQrM48Z!a)gv zNWDMW_;37T=V{yTnk?a-j}9BRbEECy;*iT)DnB>{0MJ1E!;9f(eKxwIQp+SJ#6vDR zmxX&xV6@EdpBEerC?_tu>Ji&Bu`rjzAi)7-vKkGhG;JhAgEC?Y`f%wY5&xK_MJ?`20rC zPsD>P&u0tjT@yv~lhuCIZ`nTc(w{snxORw?+YUeHR*{5n0K1!#$-iES%fm1iV^lpY zyNI|K)*zax|2jLlaqTt@KKZnojm;Y%V5Ot2I5UH0vuGhUe4ez4-JbaLP>mf5_BJOh zDyb2tEuX@7>{ zl2Y{T<5d2O9Y!b^ITQdgiexC&uU=k2%6aF}_LJ;_vgMKcf-P_Mw&hvA{W?haT@W4# zVs!S&pWePb`{ZI=V+a9i%WAE+*!<^Mx8lyg*BxS1R(C#m-ZbA&(0w8D4tA=XEI%u>MJl1P^Bo z{5VU3mBb5CwmeUy(q-nA)eQdmllEKCtB5}Nx;G|FGfly}VWnj9XNr%M$p*6+ztpf} zT|KuNZs*Nj)=Rb<;9e=vKT75ib1OUjY;%)3Z`9Hwd6nh zo-Ziy4pkjawlp9=lUw!UrQGp2(nXJ5l#L!6+nMmh%DvoFLw7KsvZkNpLw#|1A@=;p zlu_jBtWdfJ=4OWG5awHM#RO`a92W%i4o{5Zj~6fBz+v6-A;Fjt0#+>h0=KF6Lg;~U zHqa#Dwz<J3z{i-k=eJMSf9_m5|@D{4xSAa6-OaS;@S$($Y1`ISa5J%LBZMFtHZls z_m8}xV5AE%iS^r>Gx;B4f{cm`=B;8TzYw7JxjWbOj#W`hQ`*L^MKdwH2t_pL{1;#0 z!TmBuH#8}n6DnvM00_hPV+EH-eE^zQ&^8hfZmv^Lw8#HiZ6pNB7qHH6!;$VLUWxk8 zAaK@!Nl5t7gEV5~UmXx(0y47bOJ;*&)V~=I0LpKr)|N2a7g~hBDG&fc%EmY{===JW zvlMg)0K_q^+=<5XH({Wppzj_-!6g9!ZqszgP}ovhB=Klzej038MN%j%CViOUIQaC5S16f9Zi0D7WtMmJhE*PZIvp zdxHQ11|b@h2wExc|B|a=UTW}FB8@c{heDT`^V{$cyG5*g@S~yl%N!U`1Naf`7M=fD zw)py8$U3GlJAK;T-5?nuv~T;o*R3P31GiY3+reMxY9Y6@yr;n5zxVa+Cwer#^cH2-{#}iM~#-wiC8Q{$jN<`a5^}W_!;R#2sNX3#* z=hb5=g5e=!wLI>H(9 z-p|P`0}OG08S)`dpVCvWYDSUHmR4Mc%bJy*LH%4;G#RBBK>%3~NrE37DC;8}oQeCv z5emewsHvNu!Ni%jP|^$Puz&tgsNC3D=B}r5Rws7g+rH1dOTnlqUBwT z*bK~>JCf9Gtn{kKA|r<)x+5Y`QYhJ38@qycQj&M9WhEr%x-@feK-c zjyEcWtzn7xIeGxQGjotUZ$Hi4w{ETH8$2Dx`nF|Y7F74aJzUI1$ZzBoR4yo1+9oS1 zQ1YWUII=!51~d{UruM%6waErEVNRJ|9sDJn2Y+>_Bgb^3ham%hD!x4yv_+WOyU`)H zf(e)bFk5fu$y_klfN)qdLZptlt+xxLcXKYkjebu342*>(u(Nu6ja3mhEN&x+LweYiqnj!fQZ&X;g$+s(B@!a~>d{y+qCUn= zVqSkQ-{ZO{@92O!p>T6OYkdw?0BM_QbkY)zhC<<+Gxw4R8beB?JleCjqZnNE7*v}V zn^r1T%t#>{gmGJGJ+M&c6K83X`L(Vgrm$c7*aG(4&QKf9fR>{BG?JIM{=RjHL z$$=!SG*rO&L3z9JGcMktaF%$I^q6gE&!v%<2vRs`!q1o$fl9`Lu!|8Cr}?NPFpx%sN<8S2ivtL-nZfHNi;WGv?8nW`iz{ ztUUXu4!M)mJ;H%e_kgP_jw~>J2Cd5}Jp`?no!QibI0;)FH|~kc9wQtFP6C_%+_u#d zjSeXa_oLjjvIiTrgi*U+iWdD24DrTaBYbC0XvQy-44%$#F4h@q>2XifBg4-UK(hQ5C=h)tq(gKqGw@Da|=F(r-0_T5Y7UJVpyNI|Z$ z^d@0QPur1A*y?XHI8s=Nbv>Pg`}flJJe1gj;%9Bjc-A{QY_eij#kq7O6R4t~XX-)r zcp+-2EsBL~P@lT%JE6zN(}Ed!C*4FQen9xcXQUtb+(^};zO*1*wFG#}$P_A-l!Jl}Q zl|w0RBo$1EZr@YWP=A24qvlpvCk!_SLs&J{u4kC;wBLqOvIFb-vY2;r#eMzn9k(s& z{P-~Wn>qHrmmco0k`nM^A`a3F$VQY~aYvemyzBArl|rd99b@KeM?Ofr*~RsV+tO1l zN!eXCR-ir;9;_pkU3HQ5ndVWzRXJU*&6e(mhm&}XoJCC(UB%94nw_yuu=J(YC?z>l zx2oQU2!YClFHMK9rHvGQycflr`~KF()E!nu)OLp}w(t3P5 z(QfErDbFlwW43+1w$(nW=MY2hN0eE4zMAJ(qdfxy{cs2ad>6>*<@EGJY-Q7#ox*qG zDeN#4IPQ%Vl$VcJS)B3W>-?%_p>v1d@k~IyA(w*3yyd9{_ApcoKO7la0y@g_M*4ve zFh6N)xy_?_*zf2+t$fTSYfe%LtYibHL~2Tksm(4&M#oAL zQwUUTWWNcvsdkuHjfWX|&2c|~LV8+XX@BtT-}o9y92--`?(cIu^>*_i)G~C*$lkr4 zREO&*448HCMsD;c$9licsl7<*vSBkr8lLPD_B5_B*NX*cDdG)tFcaU$Kz&PCB5uD> znTyek?x)o7_c9;k!o#Wgl83DcSZyP?83HlBnMiK$0}dw7G4$emj{UQ1vywiG0`N{z zN@RWYELrtx`oe_GsmDnU)J~EU^GGiKROVb{o%ritr zK;TzhpU+n!W(Q`EX*q5q{7fm3F4jJ1S|Ingq7^RShmD&lD=VU)E5$UYvDx4YeRxnL zWCwCA^)a6XiShY$zG!W@)tXCmSw!`5gccy7A;#gsnUqw8P(UKJn0J>E2)1@W-CXpc z-~>2@&9o4vhK&q^U)<2cfYT&Cb?-%%`BAR+fPA2dFx*m4h0AB`bGr*+FMEeyuA#rk zMQbfb7X8pL1u{ykFZ6s#!~r0R%=rAXdP&JFIwhYth%0qySsE7{%BoM}rrt-`AK?-r zXiE3KINz6DP-YKr)+`z^<9}MFfF%PzA)6=$u7pD#UKna;o-3Wi&?Z)_D%OQ4Rk>_H8Uu!fhEo+3nV zCJ_)YQJ$g>7t>Q>Jlvsq4x;$_oF;Ipao_JQ6oJ#y<3T#ak%j4E60u{XQ;a${GQ)|5 z&ii^u@B;!`FJb)L{)SuQ#{naB0)@E|K~&PM9k-~W60r0*RxVWzM0xK@B>DYY=o+4jkq4}Wi-O+K_LC=k9EPnjtG8mXAtE|!e^BUm^ z)X*Le=0PNlLL+Gulj=-ccv7EP%NrjbgDUmO0yPnT(!HxqjbJe`4v_b_&eKiR_+^0} zb)o%_uEhcKT=Y7O?Jt#Hp;<-d{on<6CAJEMz^T< z*fV2Y;%398Z%5tO5P67vbFNS7+?NLM>)Y0PhJ%g|FBdVPpl z3LAc;>wj!O&xWN+XhsWR=AA#GN#-Q`3!YJd-$c=ii5K7$8s72j}x_ zxDdv1y^fzc+zI5NNTdiSp%G-0D}~wGOwQjS9Gu%ebAuuDkWqJ&QL~U&4hv7C7Aju0 zvxLj~T-HnV)T5(Q)~r{qIO;{=_D%h2ieHecdf99z1Jbu zZ&hgOs;O;GfoZwFVln98rR+PoV3;+~@(WTjvPvtZN7qM>juEQNlF@`Dev)SXc5Ybt znlK!hw3mIkJBuGFRGOCJ{NacK8ne2;;ivUkex0KgF~ImpC2WGxiweCFu;6c0bZ+|% z#8Se_sZ+C_u`1cS#Ocg{!Q5XH-`IslfFz|+o9dD-zO?+kIL%3$!^un$`o=4Iq0!N2 zglBfDC}cp0n4(Zdcg`g^Vh!N?+xbCM3g2Dm>2IWIBBGGcU_p?i?T&%v7$r(d9%1&T zE?WNC;~n@IFhhn#RP`qU*bn|HzH`-)Lw*#`=dWfc&RJ!Fm@j=AM91_j-fcdlFZo6K zF+F;L>bpExDY!Veq`3zK8`qqqfNE49_cwjT`YPLPJ^e?UW@8Y03|K*9lVqhtTRPi1 zR=Pmf`*<^bnK1_+r23Ov1*eZZRsaXC2RW+9{(hraosvFD%`p&`N0IxP2zm<+!@~8+ zrtKX6{l`ZjZVT?+9{<1=dny6+PX5`@VVym+r}jYGuH$X}!T}~b3_BWPjN9*vDig*A zB*wx%%U`U~* zT49r)7UB|UKF~-~*r7+&yV4fLSl=6#2q&@LF<4e!QP-*$N?mjCbzW7;+T2CGH650e zj(yhtmoCvVS_BSU+y)q867iM);ovF@n?P=rDZA|s7eY!PjBi}{&1nlxdHvmu zg>O`dlIg3eh+y~z|2s>VL3fz&WWG@l%tS3|{05xc+$ZtS9yewT?*QsE(g{>PI-N=Z zhKX8XXso`>8Z|w=kJ@~2&QZ}eI#DT(0yE*k=ie%+5}|?C?d@9B{yMA&btaa%Q8l=_ z7yv_@#^9>Fze62od6-crj%q@%Fqg&^Ya<=GFD6`^wGN>IDV>`6-@q2G*KPB(azL|l zk4$@kP+`N%o3f-Gfn+-1Jr=dsoE)JlCjazG3>LL3w(o)Y|fnE0j&je|pu zERu!_0J7~YSs?l+v(f`{O)*~mo8g+|4DJ! zU~@cOFIOv=R+_%N3nTY7gW^u0`yQGb^i2UqCGs8g=$QUuk2Q{Lhb;o7S`cnj)TfYf ze@ONZQiRX8Zfw#2WU}O6ecpn^6#b{T=7SdFAVcXNH$+${L%tgPBCn086UF{rE`t(h z35nGE(-QU8Hm-ai)k|0Z8MJbTXDxcM({_YX-xiZApV@rfeEA== zgk_!>ZJS(sjU-;$DJdyC)_8(b#~kkIhoUP1%iDok6ptP;Gge-lFBg8;FcbC5!Pc)( z-?=R+W&K!dklk-GhL`09Quui6_D^mkh=5gExQX2&}9 zW0z*GXnXAXq%PMKtfpI=801eug}*l@JW#jT_eVyd>Bd*G`3nWrWfdhQC7c2R?BvFE z*Tq!U-ehV|q|3nqSvqHe&a|UjnMe9&&KS>uARx<#$L1=soy6rXA~5k;2AWA5e2<9i z^eyft!*gHkY9_TPhFsMA@%ByEnx^*CJDyVq^%*JQnTHJ#5&w(!ZX@m|CW7`z4$`%= z>&5by10Hhn-Q@|>4u0E-r!LC2N2#@r?iB<8$oXze-gUMBKN@Jdq~!_umf4+g`p_b_ z&M$abD6quoeB(QR)v6T4|90kiea_3&@b*`O??WtxCuDzwVXAvA`(|CYdpOOzw(k$7 zw_9qcNVKgeU%k^4Z?mPKmBnK9uA5 zk5@fy7RKL*e*dycJ~snTu4)K5`(}w}d|jKxIGAmCg}7VwyrH)*1%GTR72St1+tZ`F zD6;sCygGdW1c(Rwt{P6Qm7P6YkIC{=Xv^C@uIbBU*j;So`F%3Ft2R2KRV=5jNPFq_ z8yk#p5I$;jg*$%=%6$eYR>xL9Tl8%l+p->lHP>z$iN>wDgvj+@OD+D%uO^A)E_)FE zG1s5S`4T~RC`Hq8v76d*6jW`PL4f`;aPcK8MhO)?r@24$dj zshzx0=b%p<|6WbvVXlT$YH~U(#S@?rmU!BKGR7n_DYKYqt;^?E7c=Sy_1cx( z;4WQCXqI~XgaKIzo9y;_E4k}wm2`f6{mo_2>V3QImPauaaZJWzKy*z8vdsHsvP?7y zYPxtLV9L@~DxZ2yh3xTz!z+T6kwBzrs zOsZ~*hkheTF;BeR13A69%!@^&Pv4l1sqnm9GrL>dPTo9R>S3LvPQDZ(8<*$DZgTlA zd@LvkKfozKuwCa4BwBhWF!i8O)N(34@t>7YW(3! z*6(8-xp%KXu>s!_TU|Dqi#^8leDXOo>G+bQW}D!Zf)_pS>-hKXW)wtZ1k#z-g|T#jv$~ax{e5{C7jCN+SR?Im&r_{Gt~5oLX33t?jq<(0PBLS?V6zXt+!W zg!sNhwJuFv5@}m>pI5(Cs=!f6&0aN+cOf$qXg^wFNx_dO8cr+45tIjs)35q3>xe1O z*Snv1dF{>7y&7U+jJ2Nc*t8t@_|Dmt<``NL#b*7$L;Q(yukNPGr2RN6Wn(k^hfl30 zuBNBe!l0>3n^lX?qx@4ii<~M^Dj2rL#DK@UzaKk-y6RBLH3n&LgSDx5EvRX~E~g;O zPfRS|ql2#dHbdx(*OWN4w!${xW+%zRPXcGjK|c5M;}ywbmx$z7=D_Yw2~>x@q{4?w z<%^G1)nkOj0I)tTl3D$+nt*H|ODvZLCFW+#q#p9*MuoNFJ(=05>C&I``Ds+_;W$g8 zLgj#~BenXbjix5}Frgh*NAs-x`4HoSL}hzp%s0^c@35vU2C0q|k{PdjtR=l^eq&U1 z;EL3!yf50F8_-jlYPRZ+J^6#^O97%oN~%cl!1R$Q(0aGg(|qZjGkzs~mBAaR1qa`g zi5gXZw5T%{1_}{?ro9^X`(aAjVzOuHDz95x6^%Duc|ZnbEdcf`<7T^K^Dvc<#{xm$ zzt}X=*+Vie>o`9S)r4A;vtD`nI`7u(;(l_u-yDU#b7>8JO4Kw_)?Qnl@igxbJ+0b5 zN~$@T5S^+!iz-!U*3w?6r7HB4%(nsYh>3gL#~m&<6#bHDTK=xgTjI3^G_h}eToM~= z+UwnEe;N$B_bWG(^!7XcP98rGVeA^+CU~G(MN!_Jg=e}kw)Ii3SLX`jG2qZIj;U;K z@!Ie3UAhnie+mV}Q@a8-;`L?uc+z`{uKcj4*oOUn);(4sj0)ZtD-j!&MMAf8J4cy`5N1B8^Z zkTVOL(nLqTiJJXL)QkftP6j_5v>zq3^v%EbxrrU~z$djiX<^K5bvV9`;RI?-7w&h{ zyn|T3eEMc8V z_PU$4Ti}770P8zP57zcai_NY4Eeoc2)-=Hv01;4Yv|Na~t4}3{O}3PJl%}*7m$$O} zB1`g_kN_tScjjK?V{CU|-G=+GO3DW3iNSKNO3IK&9@EaolRA1q3JzWhi9qM!PZOV^ zS?^{7($!n%-D5*e^2P4JB?cVe6Zxarbq8KI0U|ZEY?+Lgra_a#+#Flwcwauwrsd}5 z{v#QAM^jB(9>v}q+wO$FYdniEg{T(I*U^bbcFS*WGDeb4Mv^rU_mQCukIy-nK#!mK z6$WC=X4>!D0=>b{&AXK&4KN{lNBi1ru`jn4ApGnE(o@rpfM@^AdH`q-vKfqW<^#mb zUPZ>d`4|@+t)PtFe5BWQS)wEv`g{+Tm1dcoq)njv;_Z8J|v z_m8=ujai1>cGYpP0R76{%;4H-FV$xL7EWINLau3`{ox%W0I|t25j!l6f4e82kF$l1 z9X%KDI5vQz1t~{9{i7qfKX9jXZIs$KKqm)Rq8D)$$0@y^bE*?0;`MA2D6bsg89@2@ zYK7_4l>-FmT#UL#L#u>w@?#@WP`}Khjs`7jZv6RNaQfo1&~F%_OS)KZy#UGysmmYb zGpU#EqwAyYvkm65Uis=IQGp&Ae|CO_ff65!hLMy6-1*}NcYiC1jaQNXczyKZell|D zttH@d7115&*epRpl1oTLd*SB>**kp<9GfKt0RQKW)+vHan60f%9Lm6oHL<1O3)}KC z0En6mz8$u$@8-B2?4zM(9P_uCSapFaqQRrTXiB#dkQ}%pHz9tJ@S`P3Nx&tqcriae z%B`*gfX@}CqM1!o*wET?LNe%=9lUvasJXe5Ylpf~(ZHAA%@YKbD}#(Q{Ng+NW23q! ziG8#KG}Icp%>g1Wbg(~XxpD)78DC~4Xo_{1g|+?2x!5%oKOFZZ-E|X{p8bCBSKG8E z`n+4ri~;C0x$ebha>4_=PZ500xSJeq$Q)Sivpc0ivBi8_)7RQd9w71DuHW^?sXT7T zwaDh5*4=y$`kG9tn@yrAjX&ePy<<1JK$%L&MIyPDRsU;s6ff%UfI zFG0c9kN}GogYQOSf1bVvejd7gpVp#he7}joX9F!n3Jy3w6wBt3?x*Xc?OV9{@#ME9 zAY@XUAji;<_=|#A>}7rE_9J^GQcs}EF=8%D`B`kds(ef&D*xkiG*h!tkUKFe2S^^& zE|;^%b{?Ycel^xTe_70i_x{Qe2|xqZITe2%oBH#vacy>{f17E?eP*|xIk~mDB7Tr= zAbF6Lx4WvPiKgpr(47lL>T*4y2^yX_oi6tU`4&H4oQm0A-$G<9^{+l>x!MMwDY-lp zTRKEY9u;dV*#VfD(IGl?uSi$m5rM;B9Ar7QqV4B%-jfiZ<>L6q%;7}K68BWgNLn<) z!xCzat5NpV(7oGzhc;@o;Y8W}ZfD2*o|sRmp~`dj!928Nt@FZRFp`0|RCHw?GOon- zw(_~)u!JwLzn_SuD7MOwu}@MqK9)R)w*HH;6*eILYrwc{)k6qA=l*1?m&lErHCVJp zFnmuDKi>E0XU?^`%2VJY40W?6zDD8o6{9>*)6&-}cvts^_HOxV-t{Q^#aSU=hWrg$ znZlUT=O4E|3kMYw1GJC^(cVRmUZ!dX0I2Ks+j7cJT_c<6BLILS<=ONdS!589bXG-0 z`#wUey9NLBr#GuH7j@H5hk8`s-#`7nqjvEFJ*U;(Xu^jlj(sFR8!HX%U?y=20Sis zYJXPRP<^*{tAAIPivAwowNtbfbk}<7SL$8TiU{qzzAH$bGupp#4>VmvovX~2jSDV( z1%%v$NV8&1f6ZQM6l-;wfj2j&LIXVMMpUAzrby&_h~^GkXR(52y2E)-B!pP6PuM+s zrkgoGKCK|eyAZ>Gjb4HV^_j0?=ay!sxtuaNX#!3C!YIaE3Rhom?U0Q!hfS#3zhw$Q zHz}MAqHD_`0Y4r>~$@;vqNE``1Uu7wwK9 zh(=*zW<0ZT8(;O@cUQj%`Mb?O#t|3@Dn|3wyDF^Dp0jyla)>HE{$~U51j`~g{Qz+N zhs;;R#82B}?(R7uX?!s=`pVz;Y@QnchVJaRghUX%owzxZMGH)2sTHy#w9*!Pz67=9LVaBbQz;`@PnQLI%+Kws&<3Z~C=+aYm*< z=gGrygDX4>5Hdd~M^&BDm_Pk2s)2j|3ov z#j>(H=mc`h!uO<*-})d5ZA24Lm3cSk<_LM5?@K6UWamD3lv*79@g~s?2JKF@BI?w} z38w3LDVKAcUVJEb`9pZ=q>0_*xB2u+sO4>L(9h~3?Ecla=Y8=08dFIb??tep!3o?? zX2`I#-#YO24ZUS?IZWaWQ$6lKc?@L*@zgTP4ui%`hB`7R-Yhm>=4FCgAGf*C*NJ@-n;guoYQ9rAo*6Q=RGjka#b8*>Iho=eVODTO#HVmFQ^j_Sna} z4CpZu%9;uM-SB0}y5nb8B}w&i-4s8s1nuW0r9+)3SetQ|@sc?=Nfqd^c!9pse)y<+jD%`twqaZ6q*w&X)s)%%1GWsh1V&VFR z9U&|L{3<2^Mr+%oCDGKHp_bj{^&aR9C9}Vvx$4oU-TrgnPFKRYvBQCTP3DXBL~h3~_vt0%X33oCR@=)de`5gXpv*I! z3wq@eggxH^?^^@|KA7#|jTWpuK9hLIm#Y>go0#fq#DvqfSFrcz^~=UFFnu^%)erw* zZ2Xf!V@Rlmd1Bi|^yzSw0v8~>sINMyR8(DRKg^3p?6J4)PjOEbBw0j1UJvk+oB1g5 z45W0EVP(9DZ^=dRZjW`GFM4y+kQqG4d#SlEA{%lbuLmGGO-Bmfj}^5jgyqQqz|B1w z1i+js{dSVPMqVb?Db)b|rld`q!~_EmbG6br0~-h#Q(e{raa2X?0}8$ zvG*<>d06zPADV^P6~T=wjfW9>CS}_a>ZJ|!nx8Kcc8_(BvMx&1R`>S$jDYZXHsO+p zs3hFy3s^(m?K(=^;VZ{M8`VheJl*gK zi@R&lBE{XI#oZ-Had&rzQmnZt22E&lp=Y3bGn98h{S;_`yqt&$S8;L2Q!0t=NY1K;~VfNJ6Nsv1>BFdr8-N z95i0?I^{}1NU+?Ft>+REhmnjpFB*%0Q6uJOszpbQ{zIG3jPaZDWL|T|<4X1AcE5Kg z?Syd8Pq^L>f7OkRy4?MrMMQVJfkAY}?P9ic{)2b|{FUKz%j&Mli{0iSUUV#&p6JGH zHX#5gDe0p8c;MkWMi?XdC^@R=L`eX)><_OV>VH`SE@6kjfn~x&y_F<3MqHr zE^ZtPz67KSt-$agOlAFd#^>4|r@&5YwyeISPE)EjB&QHQ0AwU~J{u zW8w7vAWmH4@giCc|#13xhPVWZ)I6k)T1>Eem8~2SO_u<;3Y*pKvl7YNurojMsez2gY+d{?V;l0Z z_hSGbtFT`Cwa|p<$rpy&`V#l!Dz0V)A7YuS?BDdKq4}g={4fmKT>MmYdK(oWVeNBB z&g=M}P+3My@6U!K2I$e1manf?bhzcBUp_&nC%kdU&YOFUc8`eALNZbeHMQA*@~DTv z{+{JX+)X{wD9)0|xNjDBQ|rNkNSbZVnCs1Q<7&-W2vDUDqqX4VwC=(Q@m%n^Th0*S z@g8rZKKm#t#;{?K_K=zhi@#Y8y}12My?4!8i#AF-I|IQgj;~iEYgsX~K-k zG@U(-m1x2S_qYkmXoArYJAevYswTVsh*f4QX2-k*4-3e-w`~A6`yWcajsr;P#= zQI#*Q&{`T{fPl2JLBHEbLl+Wm;IUO97ae0i)bV(=b)oEXn@Hi~l#wZeH@Cm*bKWHE zCfvD$xo6bUYMij3?H_JM*`5xGDp+?`^SAEVtM;0wxOiWa4WJA4Tvjj>HydaCar3KA zk3$2(`|(mqMjQh&@Qd#W&57T<%WU2ben%LyjZ`;EebJ-9`$&>%#3*dm)tJ)lvh}5C z#6!oF$=L{_02-FwF&d_fXL2387gLXJCujJm@XsRek;7I_=^v3u297=SZtwhFE{NKf zY??2yc-<8bE(Kyl^@Qpa&@gFjTED}U8iIJ@mE{dyP6rFeO2gUZQ&t{uP_#<1hmZ*(i+p}G>*x87rlSG}N_`}C}fzip`z_g;eP+6_OIf1F6eyKBt?993oXM1db5}fK@&GKoYz8GHhz|l<| zEa2SMk+jd|#}k4Q+G+3w(`M!>UN(W+v@xZ<>!nd|!Wo@(xp%G%2+h%(wpuDTTAtNl`gb022bi+b1qC;i)k!fx!R_ggT|N`=i= zC%+s-?OheaQYXCDAJ6u@g76ZQ)Gzo4_Kd5(Sx^0zdp=!HMN9I#x;J3brGqVdPA;}l zC;F<}K4yCjh`SeuxYUciFzpn@tE1tXq>hnJ1P4u5=Aruu#bFC8*RP=h*?qQNem=nH zVZ%!FiVy#~L-UF^!B43u7|?n~r{F`1uW5Gv;}$w;-DQummlQjNf`v;_x!3Um;a$LO zoJt;zRUjvKkzX1jM5mi?#L3l(lA_pq?N*())doDvPF9l6s@BiobZ#r~xCWppj|JGw z=T0`Zuea$WX!UNp3syAd!>&6tuGnEZdx9!iF?C*O8oA)bAEQsxe2i1Vd*T>wOXVv4 zkNXEh7aW=w5rDsfUB&%$>WrT?=K{e8;Uyb_9&*CxO<Un#kKl%Oz z6)x*_w2_gYzu4aH%k)gw#I^55Ima8TT(RJ$p2dvXmG^S20Y`1EP1R8xxSF)+pg8h( zh|hN$gGf4DMk%b4;)CNY-1&1)CG*}VQkf`u>+Vz$eNcR*eyiv8FB%5a zmIsO#->9;$C9|4)2Ukw>jsiJ{_PpkjE3_FON_?^@4OSbz43xzo#T#mQkwLBwQt=|C zc+YWc1Z&KPk6sv5j6Mubx7|A6`{@3K_(C*t73X;Or(m%g*p1Y^Ph8##iw`-DsE zwQZB*E6ih9Br{Z@A16kVZ~d!Gor)TGib z@N)}yhf-Af$w!3+`$gA_$!I2Ue08S~N9rK(_3z-=9Deu5C(F~?5xU;W$Xk1gg5)SV znSW%F)bDJy*fuC$aM^2vuC?Wg+Pe(9?(UNq5>mfqD&}%<$YB5*B`o;`S%VK+gesRU zp5%CXAcE>u=jXqAeyT&ozO;lXBTw#f?;NLA{XDO~od*i~FMa3TiV)>svQX44N%;G- z**X*_vCq!ba9-0!2cC|W*4x21jk{J4w%+4$;!)7b!t&{|Kt`EN$a~9N;>(CAxe#v> z-do+5$0yu0k7$uWcRMV4jqtgcWI6voTK&Tlq6YTUg*-NR=cQMJya`DrpS`!0dw9ArY`+%Y9VwRWSwwW5DzETV3d2#{wZ??QHPi}_Ld1*XRURGZ5-RyU0y-#P$H$}N` z3rsEm)&P8JF182J>ic;WG=M7J8fSa`=_OGKbVn$sA5Xeq{Hc_LHe4-SML*r-`X~az zc740t{7vO_QTV56AK!@Q$&%NTx|(d3#2RVTmIqT=YlYzmVPN;=?B-1F;Di$KeD_yEp{-AmjhQ*{)V+xV7&m7tsA+JIl`4rI!G|Ia@Zs>~$vQ@_uFQ=TIT3pAbUKr3WX^j1<5}K6vzBPlCD)>8W5-~M=t>?DrR_;!^ zzr>S@?KWDzdfaUbYbUAcS8FNWLa0!c?Q{~ruVWp?o|HmtCy)VMH)5NY`?9K_i$ClhS#ag}`wAl6j{Xr)a$*t5*}a)ZBf(?)RaS-{&BU zO)SOVs`=Z{KEy-pQx--}#2cbt?_trlSjSa@QNh(#V%m^n$+JxLB~@LsQqHsC;5Np9 z*w)E2GWbmNrRCEl71PAC@aX{M$Ar5=IvK)F;lr<|?gjvYC5$_(dskOXgfzhbXZOLEJO*shvM*nbD_-Waw-0%zgJx1Eu3G9HFYCxc*l zj+YURSBuZP96*#_vj0Q=B-13qTuzKLX-J{K-XrDDsizGV$h-L{N$Azrpf7re_r8>1 zCf@|y{iYS+1jo(4LnEbZqobqKLKNmu0*#L)Vxej``L$SwozOdB<_;(?p_X+}E{~(7 zuwFiuiT67Cmy`IV^4Yj-(G+FAixYIc*9?bC;V&O5Gvw?zF{REh#NjV4zp^J6az7{R z$SmA+u%;5Pg{2boy#2R9W+|m#J#+K>AiSL|IwNlOK#`yX1xXb>QNUTL8!>M+RdA0t zLaUSd2u3vLhKHUNs}Y+EE-glnugI^scD{H`trWuL!=KjRC_Ca88rXvN=a=I1H*X`T zm1))pM}4V6?L>_4Te3?=S;c4BU>pG6>M`QxYQqv8t|;Nni#C0vnJv&*)Wzq12y8;~ zNV(UrB#RUD%*GAyvsFA(6+HflCZ{wPX+`SwGj!aG{tMczFm5{QKV%`DVAq!UoEJR% z04#yexq1l$xb6vchKhu8k>8GU&Sz@rRC4S)EXI3wRc+ljqp6?3OG2TpF! zbXYA*UBjN&xrNAmB5{{ZmYBm-QF+puq~$@OLFnDCX;f{tCmZ(fe(uD@K6j#k9Kaz1 z26J zWos2L6FevxtV5cH3L{_u`1=RvQxST!fMjm{h|gN}tnVmRPwS1_Ug{Sh5O0{i;h{Hm znzwD)AK`^(96k^*b#l&wW$)I@f&;7)U*KI#Mkk$JkPu;sYRXB*eY@z+92;SiItY_3 zuikf|l}UQWelpoB*8zI`*8{4%V}b0oYX}g?O;F^z*7xeC4|eZD0Y2__tl7Sce3^iq2I!e-td z7~xL%vijF|ahB>N-03@$gB~~Q#;hump$qauE@{4E82Fjn^R5T;^AwzB;j>agG5_DE zISAe%R?IVe{++hlDXvjWHM^+wUZp(kLKC4?|55*p5=P;wi_GI2gQ4C(&h3}*O9#(1M!8BN?ZD#dCKR@ zuYJWbdF!cmLlfEW|9n#Z_~2^x(C-AM#5(^V*kOP64_8lcozM4g!-P!XaKcA_yVrZt zalgihl~DaypYu626Teg=Yr!UkpYU)Sb@yzbCR>$^nK6ZYh@!updlWnHccqRdO9x(h zx9ZV;%>yoX+VAK@r+w{G^m?#vyFKXokSG6U2s3ceV<3_-6V1=+sbr8E!14y|z2cV# z@~7I-9)8_)3KaaQHs)+&H{R<+$R?y?Unlf}sQ6}YPs$UwmK{Iu>u|e&+&46FfJaw{ zZ>)Pi_WVibTcxfh*v2gvDspa2C^Nej1G!&h>QOAa%D%ye)v~m_%;sVPz#~Lw)c955 zhYne?p!GkyiT<~4vXjVXm`F3Z=a90*lclUQ{{Vi|*_#a75jX|w7a&$jhxgT+_W88= z_vpopv_?@@m#$i=!}W571VwIpjpLft$f^c|C-$*x0+~Vr<*T+;qQ@$K+u;izoK9fw zyw~b+gGZp=vYkj4LZmc|t|!YYr&vkfY%`LxaBj0(Z<^Q_r+8b2Dspw5^{&4C+9tL! zB9@C?hAv~Fm#CgOvn}N9U39nc)Hvdc*&8p&idoU+s3>qLG7!n3L&QaPK2~-Au~r6@?P!ikq^^1W=o&!x)+ld4sP#rP2p2%`~?7` zAor=z?Z8TUB}&-~^Wi-@%IZtyfHpVpQ=&^Oj~Qz`pIPtscUCCHsn2!Xtb8rgd9g`&RKq@Lbt>Zj z{>$V|22Mi#M$hkvYR2y8CapKCJdH%=afAt?HA!5YI6tmwO!NM@Gm>|s8RuZ5q=M7O zqZ1$zX|>JitU(3+e1a&MHl1@}%nzg#9wVgVC7BgXsSnf`IDw z2opEh@tT_!QMOjT*I5*F7Q=YzBD4MrZUGlb*^bTh@teko=ri}1L!?SrS;zp-c{QW$ znwPH?&j@D)wdU}m0ojCxJm59ZcE3ImLozM&9q})?`#is533Uc(tK#hDnNkc(fly>7 z{A%ay$-6f)xQojY-AWEStJVMJn4uu8ArFPh{JG8iQ`1`uv72sg$>?Ie`}ntJ(X5R( zc+HgeZy1!u=#S#pkwj3&hJl15NcVa}pY$}*4Zn9xy76?D0J!31;ruXdM7GfURR3Ek zoljKEFaM`m@!#~^iSeq8KR@Mgdm+zF8tVc%I00GomEEcHWj>#P8p`Jb16A-+n7$5W z*8EQApG#0Zq}lpsSxQmL=X)aF=!)TJUN7Rk(-mI?BPVk+ZtpKM$YJ_h05Ilkw!Q#j z>zZtNX|2|&85@cvQJsnWLGbkaXyzu6M)*_N(l9?c?B;CE+NI!3(B ze6ca~T=QoH%}U2xbJ&H+f^-}SIl8b;wa4`!f6EOgqf!hYA7rFWRmQhj^qxn-g6B@G zeUIPD3+AhZD*}i)O+prrGXW2dib+A7*6v|;(sGUxB|0EixymP7DJ#S9{0wY7<)>?! zw1*zZ7s=~5PXzEMP-)A3cHKbjGIky2x|ll@u_b^$TPd|g?q7dhNyu@kHHp*(-roge zeT4xszcBnh74__0{v}swlgPgO!>W1e{hG{Om0mVe9IKDn?h$$0-Alui2t%i<+k67O z`DRaFgd}rbjB!;<_F~Xck8-mW|K2VAcgW*a8yBikTOzmZksDkC0H_5>%OvseD1Q8% z1KBw!b+3{u??Y-%&+L2&T*zGDxNX&GJ`UVv2ku(~4zKt`$*J2PpNqhv&3jw*8Z)ni zd*l)n2tQ;$uQ#gC8k>0(tE70OuX4AXS(Y=`S|p{;;X3(ny43}(x#!EL8FjA1MXoJ+ z=&rOOp{9SO?a9dNdOL__=BwkpVlo@#0!*W3#=LVV0PLQ*?P9KpJa33=<~wfyOLr#4 z4ZpTY4&64*iX)pAC}TYrb{B*!Hx^j^JH9`H1>`G#>s-e-2i_cQl$3zifB_-5W4`0% z2hYM&Tn#ok=`TTR-5MJm*#>j9c0(dDLqSmiul7+#5y>&*JLF=1Z66@vvAZxpUpa;o zHewu!Hp8!8=TP{P4*#9Mr5X!$th?IYZ5Ztk6j8W!!xeY%9~FX$z`aS0>WTDe?wi~Z zBdu%OKVd>V4!U+>F_)Z$BN#ssd)_4iI_tfiGSvqEgoEgGNQBU-oK!63hc?metRB4G zEMA+8<;(uYW>(95SoM^hUK@f_6*9qk@M{pe3{@3DC624zTfHt;A>og|-M|rT3MjYc z0Yc0MPp%o@>Co+{`&;bBJ}aID!$N$N(0z>Q?m-U5#sRL!SuDiu!TP8l5Q_^Rb`@Uj zn?x80GAH?e_f|4QY|_HmyF69VSaDVxi+p#m5hQ~HilIM~)5rU86LDD>lzaSHOeGs~ zwPSbewf3G-v^0i4des4_Z#!8<8Z0ctv_;Yir$r~?&R1$2N+h>!o#yY2x;s@$er}Ef=)q82e3$jUL(41`u$niPns7?0Vc@@4-3jT{+9ee0g&mEOS z8+^EY*2z%k#x>Kt$CJH``m^o|g==SKB?E6%jFnn6)&%BCrCKa#R#>RqvPfax{Y<}0 zUK`QIOFNAE%~+sf4=KYWl8XeLu@}Z`(2#7udcLI0FKGD&PnF}BdMj+XQDC^k%~8Mh z*p}4K?mExM`-nhv+#=3aNk)8~wNBx(R{8Sj?@X=vzH`R$T6eyF;+b`hBiwnAV?JiK zmHZ@X=umYgUd`?yT4~vm6~8MWG##;IT8b&78zl#}}8x{$MUw)#~jQ zy?M$Y@Y7xlXgk;Md`#Mu^nG8U=1)ZKZ}O2349d zO7mj+sJsm$%rWg~&$~H<;EZCut0^uu?&vu^K7#Hgb=D7`x5Vex3^~g0dB}{e$8v?i zv*rKkoj0Yc)G!HA2ORbhsS!%JV4gENk89(vjTf(4vL6IZ_6lH^_N=iLaqB z{o$J)H06!@B$4R)I9SE(94&q4raD0E@juWP_5y_DDk@MH45# z>jkSqXTDlLM~+wV?#DlTri}heBrt^pK;$8+?(=y~PigMRxqfU5Rzh;>=G4q5zUM64 zS$soET}}6t50BlsO_-Y@Shen~V88+<+JyRtWYv#o*>8wmFz}P=-EDLnu~>2}X% z+d{V$DW-VUpoXK!H8xgFR*et4)R{frd{%CtL|8kvnjS8)Av2=jz7Ht3DI<9NA#hMm zdcIT8-O=yfwes&92!0}I^kqU<@!{bS-~3pvWCb6wk0{lm?0Tax7X4((??l1uj75uV ztzpZn>h>fA4%c4}kOlL<5PIEC+HKA|4e-fY&+d&yJD6=?`pg8acfB=uZXwZV&=dlb z?rU`pt-MgFS8jRdmpUq72o@f3PbZy)7w{PK#Ied~zux6fKefL&{k4H%7O`SW?+mDN zpT3#Sc%}uuZWb4vKi`dY@as>zuf{mt#YKwkR0&?JqzPcp{Kl{$r$z+Ma|g^&R)adk z!ZC8{uY6aCtvF>qGwBi@m)s7t#LdfR76Q;^lixXqHaT4I^L9J0<0ab57v~k)j{wnx zqd;4cbdjlUs>Pc$ zgJ3S)WTd9viPUam{VptEN=@V#kgU)_JKZg%X0aBBP!_e*SK)vcguF|Yg8!xOl-B51d_H^r>mYSy62efJc1pT zf4ruPCVr~{e~Prk3|qv}0wIT%Q%r#M{-bTe6w8K0;g)SK`IaM{1ue1>+dClhdw;m{ z%)0%{!UXYS(7)Z9?dQ%i)K{{@m4=9?o};lP559%K>p2IKcf>1J{t4Ze_Vm?cn6aWK9S1T(cOn$d1zIHj8jPn`>B?+f`IZVNi2MgWy z!%3^H?@|{I%RJ1^&~WK~#Jm$0x8ur~VOw84{FmFgUlp?xw3_{Af})ZS&QxIw@m|Ha9eXbNS-wMlc2E+PbU5kWpBz zQ5rm2@FqZLcV=zg#pb;&IxN%dFjm^hT1flbMD_FV(Hwp=1s&*lM&D3ZRU|t7v3*J-mEzJ?~cz!HKK3JJvqJf)4E%1 zw&n#2dD%%po%N@8-lU!h!Ow0>T_1h5icut&*3SclE$V?E^PkkUS{(dNrM?QJTI6^- zsW#VA#>FhPewl7VLj;&7m~dno%9ZhZd|Za_{jMZvhWrC)Si~y${f;-LKapbQ%_`6V zn{i*V=Ik9glxiZ#`bo$0{$Hq_dF;QfmTfgbF3&gr zo6sLuDHjzz_<1-YA`LFEA)8}@eD+t{GHd~BEU_1tQ_dMiF8PCdup1|Pu5PFA44ici z%giwdfGyGn>xRoLy_hO%1gS6SLMx|fJ-Wcp;TA&A34`lH!d4RENRFQs3ohnqPi9YX zlOJ<=W~P>ndu)hJ_FjY@qeZXLV7v{tkJ_E(2<><3@_D&8$&Qmct#PRi{TG{$@*U^{hk;z(4 z8YIpAv+b(Diz$};I82o?f7s7Dr~}9@8wfwukvgWIt{=HF27i%BsEbc>I*h3G%@&m} z&w($Ne;I0I{_HA$n|QQs{H&V$qMmxSL$m661dWx`ff4~r2c$;AVV1vyhLmr9=Ty{pYzLc%RMf$Gg+IK=NC zewon}4g7^IFJEzkseqz2hgXBFenLuygS{U$LM_yUJ|gBqRbMzg5QXM{+DK8#(W^G4 zueau|MzK<4B0gRk#wR~|HTc31OG)JJlAoR+Sp+*726Ss3ZYm6Gy^G zX$Ph3WNUfbfN7?OJYU*-2TP#Ha94Ne~~8!oIhuB$oa=eDAg#m$6ICD6Oa;fT{U{Oeby|V2$xq3 z>-uZXkrgX#rq!DAYkOKBK@K^3nXO4Lw7X6F(>rO|!a%uN#8*Ngzp=fPal^{nK1I&l8d=?3zdcxgMLSm0PqI1Q;|_JGNpE1oa!u>(eWrT z@2H&Rw$4fus6)H&Ckj?AsmW*;hxduBB%+%qdq1PKy zpi^eATVFd9)vR)Pi;k?OmiRT*P(4`(gM6gAgxgj07Ss@bMHsW2`Mm_5l7t)Ca9R^z z01I4U(LO7FGWv>3r~SV1yyfy!W*JXcphVYJ@I%wuR`vO6j+UcIa&(`xd!k^q26BM9 z<_6_Thh1#IdG3vC%z#9c7cn=BloUWe7s=3QugxYN*~ai9cE8qktGfWBa{B0Ty^Vn! z`aHwh@%S9is$q1PdE*>o^UC$`FFTJgs3hk#pg9VZavidSQDIP1EiCz} zmV=1NuvR5x$A`7^1|yvp^eD|yI{nQBi+$p9AkW8ChBw9!M*{(B*0|;;Uk`FRw4GN^ zcPYxg)=+?MC5-jz9n(xF)svZ^Z0`)M4OixWK9rp)8XlCHh>zg&;fvsnBDiJD+}DAh z+(*%s2-w4tI3#7So!%L$UzhAw_D)+(>10E$?W7x53BF8d~_;X%c zK0!?{p~BdR2|*Y-C2Ev#|1+|zSq`Mw=KY^OrMHI6(d&&b?d~%)aeEfhgPgrP`G*2( zmz70_T33ENfI+ zynMVbXa4wC{|5GnN^Wov| zB;iSb&rS9f)})!?X2sZnKg^#WqPL#Ugk=A_51P%o6$P7*zvrTv%sra-2wq>MIsTcq`k#iF3H#bMe+;Lki~*VUtf zG7JGvv0*ZtwU#1+;r{^OA@PQ%yLd$1k2{Glhxrf4^9<|at!{S(4ilN)M^VPOUgKAeUCzoQa zyLRVQ#q}yFH*8@fb)Sg-Z;$`&K6ag&Z?m7wwJ4WrT+H1rz`W#wto0ctrb9N@^4)@Xs+mc={fr4+i}3hb}=7Ff&II9 z6;&C=@NQbi^dPA3PXjx;Smyn}ktO zWs=8-f(dS~?|W%Kszd)d&yC0B3^!R#?;S_;nd=dy;BDC3hj##QR$k_}Iwpe_C*ACB zJfO#63MBEHo=hsDXu8LF+WF%6UWd{eYq6l!*#2`ieVa>~HLy`pl$K!hanLMlq!Y27 zVN$HtBF8$jk$^C@m4BI!c2q|i#`*VFhrAHOEiwkCDr}9`z`}eW|Mj(94hTcZVT+O= zKLrSGyphgOQbia-WIR6r(S29flZ6V7()J>R&>^CStNSChU?q|#OWgHBz8Tv_9?`Bnlx6NJU7 zSvTrRNra?Lhlg8Jmib3f{e7dCXZa&#y0nckXuQeFmfI?kcy~9R!ZsI!mK^h$6WlX- zA&v|L+brn7tu$G4b@=JmWArT$wgOZy$Gtz|vc&j&{+-w)@luF1+D?ZDSUQuv`S$m? z3^8Tz?>D5CJ)O-7v5n=_++bZ~bjRBZY^34(2(4FFE1r1w!$P|p)LH05{_YHtLmCo@ zUx#@kFAW|ycXP>wFwelOjGT|V_=KHb)&=jE9(4?Q9D-VhH1g~}0?tK2Lcas9Q$P9f zI8B$`e?uD~=j*)|pG4u2o0NYuGRsX>SUi!(8SPH6CRwZ<`AV1@u({US&9O1Q%-^Ub z@1J0l1L}{w3v|ecfMd@N2s&6v103yh=YtkOhlqg8s}&8X(FR;(eC+EWGdk7;ZNfnV ziOR@HGCdZV>(nZTIX_#vJ-t4EJ%HtZeXKE=2^wWx<};G=^frMumeKWOC0gL5t2NFW zM>jK*9$Qi+pYL?Ki%mEav>OL$AQsYnenQV{o#=fLGKMO|RIr+7B4Uc(bhV}n5(E63 zlWYYXKW`Z389dtV%v>uJpMLDr{0_0)7%y&DDZh9pPq)X~k)J?*KU0-dEj)KUP@Q)F zF1*Kxi|=H4j!%87MsH2I9HiP1U^S-T026cA=suCl;UFpegwj64_!Z`+8{_<9c42pn zz(KIX4Z^m)9KmJOtcAn(SRA8MufQu>t@kWhomXwg;9uvf9uPNbb&?BX zOZ?FgyUUSP*kr7U{do^4aP4!UE;z%6ag7G^iCXOj{`DHyLuBr1XOe_@^$dnqnC_qu$Cs_^ zoU(iMd4;PV!HW!>Jc=-YaO9_3*Wa0iUxIpAmVGbfaR8*Aclu1BWlmyiPPZ>i0SjCl z02U=208~bG>~%x3FxUBYzVFh%TS=kDNIV*Plt=y~E3cl6sX3~D6%!KO-gGs<5yLLJ zfSv-0H>_{8tLz}wRzFnGDyk;pIAYoTxYqIbxts$mMv9<1dQDcSoV7NH1l%a>v(|p@ z=x|$l0D^tDyWZ@F#;v;bQ*KQXb{hEU0K)HN$87tq^HnRql6c1+pCW!a;;^u`xSFb{ zWla1NX`APoVDbHh41^CA!UVUEs-RITxzkiC!cxE@QGK8bc6?nGc_rU>%I1Iv^1&~= z&l9~0gcW8+{yP1B@2uZ?|H#?k6^{9OETt|HX9!w9iK)(fh0e`8#aA>RrDy(ow#dob z9qp)8gSW|W87ez-K2Es7P>`fem&9#wCK(2josurhCkWeJ2J6#x&Mo~ryl@3tdSEB1 zW^DsJe29Tu7iht1un9nmteResB=ORaz5;QPYB#1}zbxczRGDB!HdzSa2F?+B3@DU? zk7|jZB(tJ0<0`>5aHkw76j+ixh^5I8d~xZu7q04p5;va2fasOpSf<{cWJ30U zUgtXOofmA_`-b77zLPs5kv{80`ADy5>)X!X3p)Zc;*$Y-kJn-3OjNdb<<(=j&dp|mFEx0^+?2`F|8{IQzu6P~P=g!b@>=c0!3vN8x(R)!oasaWXGK7w z=UDZbFAcqCyO)#BeA#}esnME;uaWy{R4}xO+T1?0b%uvLI|lfpzHq@d$i%hgFfM#KipmGk zUK_e%q>ML%>ca@d?bED%AxA|JE05z76+ihvP|%+;ig{(Ujb3(utq%a4S^6ZDhEbq) zX*{GF{t&U%)z4%fk_+=v)$Puni!XlpTku1r@9-Z!3>XTP@M!)N`tf0XDB^pOEUrtCi>vHpq!t&*6$W7nGE^DMfT8WIWMe0EzCLZQ{b}Lpa-8g6; zFRIa@dfFkNR$;;|jDK<3k(=j>YXJ=UN=HXLBES|&Ef9dn?Hk11!r%%0Czzvp>nE{x77qh1hRBu z{2BW{fA4Z+I)a9g%O0u>tsh=9csq?C?}se;06d)|m=YIMF{h%3PCJ9EMVC)mMHuZA z;O&w7yg$GwegsRhpbxYr%HaciNdpJeUK@l)mxdFKP7+VSyVHdMa$8RX9Yr23ovp5J znY^D7dO)`;@fTFmf`GsNKB{uzq+|>+`%b_Tz@)_UyY?tPV323#gVe)R3;`A{0I*hR zCFX-Vp2rn%x@=w;?rpZJRpAlg5e6F%u16oNGKZ|CHXR~w?Ft9UrIS7-PFn5Egi!~4 zh{b|BTH3tq%PJYAKS0~N7GG`^($;-CkAE-ENHN>yw?H4rjg>smEZ2SZ@puGqR{uVC zJm0CrMXA2xyTer}X-*N7tHa}ebU5Vz^6)Q|lXx0y#n_%U)Le~7HM_PA}T&VqAqe>Dq z>$)Mz2q$wFpU+}}=p?>eQr!hwV~~Rd#2@(_mJC=n!a08#PBht!A>BFd?Kgr9DC&%k z-xnY@PfqK~*8d6Ix`opi$7&0 zkS`kzWR)x0`=9G{8F5rAsd}hd`&dI9*GM1L0V29BO$WdGDnf&OR_IDO==^@hsz#J% z$Q}fF2_T<0lbXtPcN;q?^JIP7?teEHhMBjXXhM2nfnhBL0Ep)eAri(n$le?E|MgG7 z+#X=tOX7{%{xvRP5))5~`)tGKXZ4A$51A1rzv|L8o-lBv20xt$+s7)WQ8N5|#5H(_ zGQIadcDOZ&f9MB&&e^Z=_kX$t%>lHtTK9%5%C&#Rb{*N9U!Z#GVKgDx^CJ>az((KL zum5_v2s6zyk;}zU`i@z_h_~o;OK;w3|MJai_re8UTMrHY+fza`wbZ^vNl6Qz*f;}Z z?fc!JHS%b&_5Dry1xUgMdeI}D;K(+y_QrI|UK+`2ke#u{RH-59J=pp6+{3Eu!{73f zL%!!l?~ej9P4@B=_0I*UX^ZmJXKS^)wufRqaYMmeStttM@*dRm-cUdMc!wDmAGq54 zfGRn)JF+yNxn4Z}T%J~Unma_APx5=Uo?+YqJlEvPpyDEzI|UCk<+}|jTZv4D`WQ%= zSUR?D-XXe84WEiZQ+H#_lze0pEJ5EjUIXsxp35J##z8?`5gBQ&%wzY9Gw$2Z5vCXD z-;)xo1GJm9(z1+uVZ^7FXo_QAuk;p*Cgi|PukFTx`j8j46;6dWQ{RMqy9I^CAWzp1 zc9u^WqheL97GnbYtlFC}T_|#uLsspnflLdx8^{h)Qbra~G0u&S3dO`M3=x}Ai?rSI zhmip@hAPn8k+XJQlJQlsUkei(nNVf{#E&=%V&0V-_^iGTUR|;t{Wt8>^34Sv0NBZB zh~oqP3q^W$zx$1(&1Z-+wobC)Zt}y3)CTta1RHxnFcLlXpbwIM4~Xm zm)Nl_bC-;SqdR-m(4mrgXF$ENI~Fm7kUgYU$lgd|uK>qQIjMIXOFcqfF^Lu?d%>2s zT^Ea)n~9OGMtGy5&(w|m=hZDfF4au<=YMoPKBM%ga75Co)QN@ouG4m0Svh3N&^FSa zL!0ZUAd#9M2jz;GxD%I?q(?oK@gBGY3XKxB}G8Gb7AR@r59LO z-qp|d_x`t+dzmvcckZcq&NE7DV%+f&J39L9T(2xdo)(*@r15WT>9-Z0sSx+r;j|_^ zNz`GykI_-fH8Mw}`65qaG(+3*3@`sW|soi5LIw$>ILhdC&OLhKW5Uz+-DxLfq zQzMZCCrOIp8hb(D78V^fdR~YBp#I%&f#^juoB~aj$8-{zncpsvPx*i##HX*6yd=y8 zl^+$o2n(*}o^a)S$K`xs^7K&*1^}<7R&)q@XkBN6A80DxL7hIf+u0q^=5A3hOp#vo zr;!b#GjL3YF>YX&HSr@pdi+noh?EcI_h{|wT&a7Vr}>m3y0@fOmp|@BY5YB)cb4ll zRrrd)SIu`ABLp4Z=yRD-Po{K;^!3NhGjZ}Xe*8vb7@{#>F9-LQh)VKTzbh@N)x+Bx zZc$&4addG_dYH8aSnm6jrc*tu?!L-nrL9r-R z;4qd}y&cVfk^Hm{|2|H};tyB6?}}@j?15`o(eCql20=+Lonb`8o}=-f-WsV#%Rx$O z6w8`b_0&MAZykP>?!`%KhIIGEn|#*cHm7GR?dl?bU}#9u+02RWxKK6zu4!6}n?j1R zweQuNNtqIz^O5gdV$APYi+~o&%sHa`cjay8%}!-{RbqPOk{JJs@7~%cG=(G`W|p}(9Xl(Aaa`F$F@ugzknWxbXt4Zx_4c5{^W1R` z+v#x2K?%%|AgX+q9odHFLD2oK8Z&2yi@)>XxbA|m?|M(&aFLc&kL2%X=9U!{5!3a# zyJqNqtKXd#G&taHi{DaKeE&UUG0B-lmaDvNYc*$LhF}r@Zn>uwI>n{4DZG^>?Z-C4 zhNrBzSmz6V{XlnWCl6Zcl==s3ULNI@nrj=TIMZ%*!$j#&9tEJI3D{; z+*P|hai>L`)WyA z>!KHaM zpR7Hn)eS+S<&^{^`vK+~F)mq zvlJfwW^YFmn{vKheE6_9+jnOjAE=7w)loJqyc&(NC4OSBD!p|=%bQuupm)B7*>@8t zd9bOw`K9ojQ`GaRhL)b|z~GmKVPQ^$+c{J`Mzz47$nvCbx-!<%XQxTsN^69uyO6R_yD>-aE5J&V88C4W#k{jvS+?l> z`^%K35Dy+b)ZHwQ;r)Gq$}a_KZGO9>aY;c^TSODP8n_zM-LC$&hF;gpKX&8`4V>4` zT|b74l+TS#S|TkC>i5&;Cl6Z{h@a@X-pubMtJCY;4F)9%#R?htEV{d{zN!r$*SGIw z)@dDU_deg%&y)(dB^oGHrwVH)q=VI(&+N)P$QHZ3e)M|peW~brhZg@zv-$hIM8BnJ zEiDEykss7t-Mf^$t^P7Fh_r^Zuf?yxwp(PH>DU$jBrGw_fIva3+;`*Wqo0{|M%MHo z=c#!H+E));9a`K~{|xOfHhc7{asFznx9ONe&3v2&cHOvusbNz^IAH=9{c#j-&bUR zP|1I<%k^PkUMV`S0zTfIS67qOyGTM>zAD$s_RHY$8R+^Nw%CkPsr0bm(tK3XbdjY{ ziT&ol$9jvbh(}}=R<3`&47EVUr)T+iYt1YSR3*>|O=%}MHhT&HXZGI3k%Lz108ORW zM4lEh(`ffm_ zWnKV2%vsT#NFUWmmRuwe9^1fn@16LCOnVKISvAXw={uUcRp+ z`xs1AyET&KeD&+>J@kT&rB$=5pq3UXBD1Jnf7B*v>GOF8;i=upc?hxfaTqDlz>S%n z9E@e7Tsq%20cM+4KU);>#2q+Tc0%DTMQImhekQK8TrYhM7}U2~Z^w#_Ja2YJREPz* zJ?(H)LA{vgI8~ql1luG-ivLdCHwVklQ!Psw!XvgtwLzQQzED$e>sl5*K45{YXubLZ zWejj6HFDbOVY7XUCUljSKn{ToHL-!V4gBX{$=T$6Ju0{5qmp@AH#sJy_xij0JBGDL zOuBcVCpI+!JGY*ql!Gy#&LKx#VA-uKz#3j%JhSBD+RWDEgd*HJnm)fi1510=-qYNR zp~pq$o^nd%v8QB;+C%3&StSu|o=f~U!jE$y;^gg!F>qL!DXnOer__l7<_{1&%ru0e zAC(L_DnPWm3al!P+&CyDJ(kOG9npO%X88iJEVOnF#ep_|e?`*bo+aD9H$_Bn=&K-& z19pYB#kl=iaBGzGn#ltlVA@Viv@03zAI8q$-~~2Y9R9{uL1LlVzn2Ax_&9aU-G9$| z45mmt#>Z{gC9h0b#sog>R%FaK8GqaO(dZ_ei^T#MbJW*b%!K!ITGM_gG!P!xvr%rb zx#(!<)WcUw5ijDv|26N3WaG9M0_4iG`Rif7@Gu*DMcV679f8XptMO8^bsn2H=(Bro zOx|@HC503kMTY`%qqUCR670^sza)S_KSXmPXUvo8fhlZav0ol`Q0(PEHwt0KVJ$t0 z+N^s(XyI^Xik%=tU~IQIN1Pw{Sr!#0p&l$}CSjm`Y~snbO`3=CdPFx^&dEZcP;0o! zL{$mV?2e3OkZw?TE;f}~-11C^EJi6)h7$`Q&5+jBK87r*D?=`>-@hm?4A>bgrUv9P z#XT(=B$q6&*@l0X-UFn`QvtC{<{@@yl;v8sTiSV7_Z{*JQbn0D5jI!i6pV2|cj9PA>m zRmnb`LQzeB?n}@8+8;*L5R|o7NgDumL{*o>2De z+04exq-H#TX?z*sNeE1$$=cm&xYb&Xv_E?${%Y`*M0lPf=$-Tu%$cZD7|v&ger7M9 z3+T_dP*(#0X-`KGG-hp9go*e|4zUNFOX-&3_$Lu}=b1LDX?VYx54Syv6*qKGj1IU) z`p(B32IN{xzDR`;rmm(FQ4}QVkutrbW!vMuT?dC#8MrUDTz{196SDJEk2QxxOQ zATGh@HRznWHXBKqfv2gICHe>hs7MusR4=+4TVeZzMvD3pzIcO2U}M39-mr|bv30O@ z@Yx)JqN|$ueSqgV3s_$~kpTb!)0Hz*1szc0 z>xUr@7usz{#-35g#0zi(^uWGd&nmxCCzdZhf!Y*f{?4@hUW0prxa-!u!vN5`Hstu{ z*~c$9@1IP*UM_gTf<O{zFW;4 zk9=x#3z%E2Pcy~PI(bX$7lz>>uoYS#TtgZ0U=ioT^Cw?&B0J9t4@w1cyleNgmsS{< z134q`gD?PR#wUfrn9aKaaN-C*wmfX1m%_}#Q|EDf54=2>9z-R=I`L^~ z8Pmw-N3(-hlH?YbCTQd947P`mJ+z8IUmRS~`0}v~4sg$ng}OXl;8nNY&!GOmx#rT( zsrLYkBfa4V7=#_-OcX#zAHs5xt}dJLh#|N#K;fo*m|D z6=J9qbF#7=XfAJicI=-{l2$)~(UfG}toZ$oZgg@;m>JkW?=Mo*ZOE2=x+gUV^Jz8B#=zt-`iwMyQ{Mf`9edu z;Jf`pLzqR!wr+obGQcWkgHJO3eQLCFNqOuO1U;Q%6R=Rd??TSApl4&$QTA>d0Q$d& z^;fXGW}-o;R#@?WT_5x#h5#ILd#FrhR#jEisdVs*(+5H9;7To{G`4Zv*t4mTEY)sF zl68E2PH00@YQsluvNS^tTC4ebTT&=cVLx~H&6_mF9Ahn5+k%*?pg|8Xsz?N5e@>$@ zMWksUsfLcC6eor|zwA-2Ua(leOwbt}ZB64t-QGdn2CafUml=~ev;GtT2*);q_^51( z#c0I7offpAVOwuvaO17X>sLlg4fT8HsZ(Oqa=7Rn!$?#-;uk$X*#+uA6ta2QM{m_lQ0Hz!id zXtP!ILnLCJAWwKg^*9}$q2tE$q&P#uGx)Bfd9k!<;)jkt)We;tZ6$2ywT7;w@^5mc z#@))N=>q)wuKNy;Uvvog`^S(Gk&dCu#?0fl4ktSB09k}RWm%mF^!+65z6vgx@4m)%*pVYM@@Vr=kB&dCP1;h!lQs@Ry}o)<-W zgmR0AU3>Gnf~$%3S6oCIztx{leUN)}EiBk;5`7M4pdK|%Ol(v9Xr>?d!fmepgiQWN8D&hF&kE=0k$V@H36da9Q42938=gCsXKxZ|0|vCW8Hi1IZaYD^4kjX)>qu zB+_2*!im!5;bKfqbXmhyZZZ5~O~?3aO1Zcl`%+zP{qoV@ob2gk>nzrSHd!!t>(In^ zGtY>yqo)@u_pNtNR8nQ@ODdR|PsAU_XkDM@)Rv50zk_%W6)u)5Wd_Z?=d~qd84%#F zc*E+ZNM0W_J;V!_nKaX6HF@nepI?lsa(C;RmsT2jH&pgaqn@m5_%TaXgv}eVhL=-b z@?g6MAIdKZho7@U7hSfUkW5*PUOvo=4Gy={rUxG+E#KAU3TQsZCEk}BUF+E;$N72O zA4z_DMXw8{6B}JuA8z$I7Lo-EdUNV&&|?9j*+E{W{-4J|M~O<3^B>#Z3euF8to|M} z2ECHn=hchN9LaHdWnM+P@Oy>E(4u$#9D+DpoRRpX0Y#GqW>8js`50)_<_b*{wne_W z&GOcrH64va}Ts4Ta-KXD zwD^lg7R;4CE-zJa&+|kiw3PfgAnLgKhO5Nbc(C!_C9G%uE%{m} z&{+=AI?Ms`#m{t#4M3R zJP&Sbao&od4WkJG-*Nk({W9qQxG-_}+%`F*5z zoe+wvEc|#dpQ>&#lB!pkXQwq@QF2i);y%NZ^1&^dSz3=)P@VFr%;w9l8jn|_*qND=^Q!wpnH3dAt<3fP zDXd`)<_K8fL)J|_;gAMuH*fhc=BDU&x7h>k*FL4N94ywFNvsAEhnl*4MPLfu9-e>*FjIJFTlR{sNf7`XDblw*MB3rR-_ARqbh}3bhrS<53aUfoCs{h)trOsDYMwLoF7yR+lNVpD z_h7G{sRDD{8&=0RSoii%2h0HUow$c9_i(%72)I9^f4||OY&7yJ>#P4K0jFC;Nh;-? zfffJXOP6Y+RBx`|;`&~Ce`QoYA!VB_vSH_WioS>!#gS=egu2j${1x(r)#SciQc_&} z8`cMXv{{NgQODaGp-=uPRnYDTLC@zzG6o@G1HmPvqJ)W}ak z%E^AOM)VVU)WIvH(nKobxTx7`({n&Rv6fdAd{v=96L5JkUu#(VSBi458;=s1#Kz~@ zl9&B4jXuiLew56clDGt2Z_#?MuNw{a92P_3|C!`dQ0>h8YCFUHiE*G*co{(;ll=2n zOt{+b(VBKE$s~7&X4Ps)(DRoogW&cW@U|za6dD}?{)MvI2ebhft=VPP!}?aw!&W>T z@2(J_o13;E0`3U3@4t>sOejt4>^GIbD8Ykxez!_fK-CR$NI#QubRwE@-)Daf&G{^x zJ=7#eOSOaqGy3V?isLzDFcjM_fqIwjmSNcoZs%A_qncZzDyTKkG?*ygRiuzYOZH?8 zu_$os_bzeiVohP`uAZ~4aeXs&?9|%;{f>1MRMiQ$hTB7!61M;&31;|_U@FWP32!@E z%)asKZo9Zx908$B5eA;O3Jv-~YxU@&~Ap<(Mk-{Zw7j|2qF0J}_Dj8W;R7ApxK$lb5w@avwDbKLVlsYpDZfvJ!groGrOH(zTR8_%;5BuE@=O(^ml9k0b!$!XfSk=!-lf; zWn7PuAUn*!*5jA8MI(NvAh&ygrzcB#{Cjb5VT_KTUfEi|!%66p4_rEVC=-NSs(9pt zu{_EvD`Y<(ED1x9+?{_0-40zuPeE2f26i{~Jr-ZW11?z%eZoTcH@`{c?%>ItYqjhQ zC2Mwds^jT^ZgZLhx0X(_+OICRWRX!ykG5scWJ!23KvzVuZ3kgZ36}mxcMVX0z7mB{ z2&lp^Is)I_Y?1`PpHTg<9inn*x9Ed1dRtu;oWic^*~iiQKW&FwaJ|{8%PwYv)m3ktHV@=QZ0GkiDu1CwVxNM{Ys3zx#0uk?!qctY{!0m9)O)MyPp;g-;9ci z3IbIPer|JT1L!?oLz(01@Cscq)A5aL-|DZK*_O}Hy`KqQVam6e4t$3N^OWsGG%RYr z+K{ehq5G8WMGWul-reHDxJ%v6F*Y&)1q1nxSCgP_Z?j=S2-hK8T@mSXSy83j*3x#D zu6C5ms-*~{*yME)uQXqi$DuuVroPh8g9LZB)?0&8(f0P*ArO;RG+hJHW|`x=ZR^>- zk)W^Tw^Bd^(QG|yPnh;c#6a4l03&(K4yYPA1FDa_GGJ2#%@(A8^|c&bG;+VkGT^BC z%Vv3I;MX{20v^))tZ07rBLql$rdUrn8<@FA-5fuGIxOhTMppXP!BJDIv8c#fD0%v{ z!@^mug5Q!C{OjHANk<*n|JL))hrDBwnbTDpm2yg_z7{;7R7MB&?Zk!2h07fysV0m$v@ z!kf-nWIbh2MMHa{j@QSKV8gqk`s~FNTz%1CC%apVwImYh>g#G>8{!*ixNPf^MEi&a zy3hAxReQE8RvBas#vGHYxk?R(w}}6)rOh&wJa6OmyWt?5KY<>lp_yTq_IJ1ckXDW3 zPHbP>R`O>povpRsVqN!++zx2~o3QIrma1C?#;b?dqrFSMvBcjRPlqDmcRo`d6N~jZ z7t_8L7jSQnMECnGt0FK|%xkZ!$~M2ig{q5cP*w;P$^J+6#JL(Ya z@FA>@d1N|c`3e}c5etVn({wEGf=)4I+pcL@UNWSFJp|t-gOG)pQzk~eYqVbxw@1(k zj0+22*AK`Q#NvHmzhk5wdAVG}TX_c(9RdQw1J2f#P!2mI0j<~M@8M~B6qwr)DiyD( z8>DaZgdg3VY{`P|$lu~GvgL#AmL^)Zkb6H?pem@d3LW5QB@Pg1G#mcV@V4$paK|e} zAh%PD_3r4P2q!7PV@Savn;0PRhb!D6k_%*SHX2m8FSOtO^x3Y>Zm}in$c>fZI~Xyv zmq-eo)7U!id&e3d_0_8Ep5O%ywO$}8U)C<1vh#95<;G&;y)1HzW61A%!gIK3brEVb zKW^)oVu0bzY5VLrw%zF{GIm%Onb&S8;yrA6SEZGGen^1}_PZGmV)Q@acC~CfueK0% zTFZ>WY~__ch87vx`1iKoAaz&GX3`k%Hs@j@XOPF8ezB7H&80I=A z$NWThVmAm95627y{-n?iR`;({i_s|y_3)(kE6_OHE=}>?+!Wm*5spn24=_GKQ1En> z2E~B0_u039ppNNjD)&Bw%>_>}i`X}f>glG~aI@Tuj-W*a#s8qlT%$W>e^ z+#%IDns4IqzoZf@H;Vv)pkJ%qMzW_}j2_y6X0IdYWRGX`9t-QH!+ZfztlwIbW!7zb zrQiMq=Pm)1?4FZeFE(JlT2q>PlmHK~_M`-U93Tuqh2##69%O(R59anBT#)`T8YfSD z((B`Q>d+3Cj+HrUC?F_Q?>4D*(0drT)s8CAc!uWrhC+Sm0Bk+}ZwK%`zD~PvBY-_S zc-NMaZJBE6rc(MX5O^UALKcfOTF>bLL8M|aT~f}e1k`IYfx4>9aT&TFcb;=(2%d5Z zs*pJ|J+}%L1 z1|TLtt>>Eu?`d$S311kh&{+D)dY_(4k|&E;h_rLq$lT;Wjh0j#efL0GypaC+qsB^) z&ZUJ(VA*#-KlygTRpmkth3W&Y(~}W5P;!Oki%RZtoWLeHYQa*={%*!|$N-VIG2clw zJv(u?HFGC}-FXpX5xAL;u8~&aa5D=&Y}tdOmg-X5n>PxdO~;4?y4hM>4l;8==gmbC zu`S>WxzfPG{NzR*=L7aOMBhQ|O>axF3QSO|OsC0m98HGa7hVX+bqgc(?y1}kd`-x@ z+k#7S9lw0d`YX+pKlhnNVGl9>vtZa06R~_R?}K=Ew~*Q^tD(#J{W1O z#~<{kFCU#uJdvPo%Cc};D2tYP&+6!<{x!a2x1`-?##ec#D%TzxbRDbDsT=4GJ5~-S+a;{+>B(?+9GN+4x5i4Yo3nv1SQ%XpYrjOh zb7MlGq5Z3s)wQsvUaOUIm6^;3s}&{3EOP#D@r^6~*;mU4agoUjF1O|cY)>*e>o!Vt zPhh;LT|FieYeti zY(D^jn)<$Q$%=Hk8hdr{QF%5JrUGvl!Utv>Cm;U3h2rpB+L$!NJdjc2WlgQ~_Co!Oh*m{hbA05>D?|GUVo#_z3`Zj0?|1L6} zN0*k~_oZ6qdKH?x2~)@APCdrMc-aGS8U&ZzJ}sFe?59>K5XXF z>M9S9yH!ADoO(1XB6GTWgunT4j@W6#u>Tf+^czm*ueS?77|h80!reAxOO z7D>^oGD_xwte~(3Bl63P)>aEdxguh!s)9X5=~u}MwX*-HB<)DK{8lXzl2_Iqo#+{A zV3d)!9R3-V*|=}raUzYpaR0qISgDF3moIt2cz9|k0M2oTp4xgcm`3m!4hf5LWiQLt z?Dn10ixUqj4eADT3ym*KE{QpA{>iU9C0Wf3Co#UupAU3%c?a`)dg(UpCj)QPFU|HT zR!DER)20h?im}r}oV|AIjlZ8}5Bc)P{esoLqKCHR_UTfZg!KAG#ghzY>msZN{!aqm|( z{YqlA#%uqAc!v^*KU3_K5%Y_ixNr6s9(DOms;ZfIWB|M9=tR2PH-_>ueCyeI`eD~w z>9^@Pdp0I8-Cu&z<^JNU1iisB8d~>(k&A|l{77B{UGeYlxib7fDzTb&PS7h9EC2_< z^taf!;k3|vg+0yu+z7K(yx=fxuZZ*0Qxv`l!}h-NOcKvKykY&BdYtBKE<08mP9nnP zb>C)4EzgAl2e~m3FleTwGMIIg`A;MkwdtV&C@md%g1~x*N`O9Gq{(-0jjO; zBiQKpd`#|H+<=n1y$+&(tl~M9x-`G}+*hs7l3*Fg%BbAyV#wLaULJW%X|*p&nO}fX z@=L!&!6XCO_olbHBJF!ACJ0$@w1bH@iWUxSUr~ zS#4fd@pI0wnHE%HefgtwlX%aN85uWE{RaEJ-Nf)_y(iR}{);C~_gk6B*}jw{6WaJ)zoI>x_tPidtw4tt8#IIoz!!xgw~<0nz(tU(kGyOM@4&McJ z##4{ywA!sNrhq=B5l8EtOfs2Ahy+d9;%e_jg7(9d>dXFaHQ}ms61wu{UDVzKz~Qv; zKq=CDW+|FuKlOB1K_kg_zS+0xcvykzH30muv?MP6cHpqvnZW3ECIW~xxazBU4wdyk zn^_dZ2AVx9#JpJ5$irJ6wd{04_QHv1`a}-`+($uIx3NONkv=Eml8e*PE|x&~s1nJN zhSsFr!r>Ccy|Q_IC|2<+8fIpurX|4Ve3f2NR-LX@Ddjh6pFx#XwLN@43izFstR-YF zFHD%$li>?*i)KSeL443`tEDwiaPE5tkdX=A$8ZLaM{N4;j+Mh0kNYRXPfEH7u*te-p!$dsG=9uu)8*r4j#Ev+?) z$to&UYjGzxwP4jX?#p0+&(~<#U18xH?8Ev<=j@LpI|krpFFVTEgd8)+0jh=-RkG(u zxF!~|1t&0nY9M6f%aDqDWrnyH9cYk z@A>BP#K^t}J&w~cqUcF{?clPUtVXZFyXAd3JRtD(*rNg#GSXm@N;y0XYOxtxs^JsL zX9QD|Gl<%Y{IyvNN~ZomqojcgggiU<7vJk@57Z!R2vZ7Pn#G^fLjt@rdncCd2D~}x z=+}Vy45=q+EyBQJ>jRQGkGhMOun>JhAk>5p(USSJL&o0)0%ZuFEO*Pp_5~%d? z6R%oJvzHb#1|eR*5(%(A+7u3!(UV>B`6A0_&%B8YUL_O`3E=vSzo<-?sBI`~wJr3) z{oedaEo#e+P8cTET1^9Z)$y1R&I3Zw29K$ji97241^|V31x86yp#%b8B{xT3)`K2#UowNG!wfyN$P@syS zP_P_cM+qe!4mLGSC)4k$49niJRr1Y|)56p*iX~BWN@Nih#AV*rdn@_xofccTgoYy+ zypBcN7h9KmBrSW`MPi5@M#Z^0uUJboJhAi%|PE@OboI6?58itRklW9SoHlpVL={MMJ?($ zr?+$XY^2YFuA2sSOQ&VP2XB1EXiA-IcG)$Ixx;?$zqZsN>#X1NkEUMK%+BZAQZcz$m2tYQKE&kq1o zIz!bD&F9`&e=L4bOwr`fI16C%V6_q$MKJyT49Ll8Oi`(y^iEgIbFlHW*)&Y~fRXLRu8pyzNegCo6g)z zdy&8s8LqKvfrInoF)<)Dm+buPIW_q&Qb5Zc`-`A~`God+$hPFfgTAIfT}q18jE(i3 zO9bSj%Ara~U>OU3?c+=wv!09+Q_d`331Ls4Z-D3g1;Za@J-;W|!;2{YQbQsG5pBXc zFdIvh#gnJ-ZEFKhG3WZEjfU5z)jdfEycM6qcTN5{NU!!#^>i*IkL*;S*=yztyB;SD z2!I|!jVvXgNcIu=SrKl}Hwt8}xz6vp@p2Z_EnPihIn|k6cr=8$bu{R09Ro|HHkhgn35i(N-lPgkK$iPz`r%xh(S5_mEORu=G@H6Hi zHm40wwyDqOehSzU44W*d(Od_Mz`J*3i%N@g>Cl2zwZ}zyAmibG0FL%i#V@ zzolRQ!n-Bd*V1W~Qj%J;y_E~UDPfAZc`r|e_6>El7wU@d2_l(U)aiTord#rdf9AE^ zb)fctm)ZbyqD!rwYZB~aE1#lfL|#XvGb+vze!*?FfYH?S%WpJQNb4F9tGtb{Q>fK< zE!f;2;HQ})b@zoJzXR3HB=p-NAt<9ivHOP=n5m|J49OV+y&Au&8<*rV_(Pq`EI9fOq1DzZBv#}_h9csdUB3%Dy#_&2t#WRq_FEVF$e0Gi zM(LJ;2xPiQp5xU_#Sr8IEF^4Mw|ieWt||!zv6d}~El5YOYYUM*t2=l8QSwgZ5Qd%) zDfDQGHu030?w0eEyh&qaSVw>f3|LQsdqRN9oZtw|nFk zliPt`-$?Dh1QyKmYaD`C>JH``AuO+GEO@Pc;#tpjw|(NuH(lmo39{lc&`Ol8F-PPi z*|Dlp#Ar-SYOs|g2Kn!a>`PCNWnqBy?aL-D@ib>>LvX?SHoLoES}KF~9|o9AzYfJc zj;wsOEOjmC4F#(O-sx>d^}fVb$#Z%nz_HrxeWNFteCYYG-gG2OM6}v!=T{0P-c@EE zRFuI%C7gXIOH-FI>LgEB)IoAmjsNuIDj_1X7170ZVo zxeX#FMj&&0rdr>L!|4hKbf!XUID+|b{!P?xPQOt35}QxZX(eCX8k>XtM+qFI|#!IsMAit-58*JNtcDr zx<)U@gfBfmF6Ny#Z@x!Id?8LvYw3b~s72;_`Y6yeMvzr~t%HbehBk36LivDPdw(I0cSeaQ>?OaLoNB&m_y=XCHG-^kfYDXU#)0JaXo(e>T3w7#cN0!)(!yyd*6%daVEU zKg*!rbEe<^xv9b0M5BO8hw!gFJuarus@$Ld|LSJ|=9cRf0e2Ys9vYvZ*U6W>2L1a6 zK86a05p^|=nxI8QuA5*uhuZhH{NGh)z5ag6@Mp@Ge_N#@`yVnP>-sV3#Sr zex3Et&+;;v-^2d1bvr;-a~=3kCjZUj|GD`ko?MD+Ku-5R%e#Zu#Hjn;p8c~2tC)lG zMPcbb2Lo&mO}R|}3xQ=pzj405Mw&(F@o@g`$#ywZbk2ZFS=sQfGe=i~Q!~Zngz_b1r1p=YDCFB1Y z{+K#23?5P5DLZm`u{#HxiO)^&x8L(aZukxq477@Cx1JJ z{D@72Y0t(V%YOm0eX!S+R%rPDaWaxT6~z^;{}+nSHPlP?dj7e-MRogN$5~%gQ#Ge# z_jA(5S)YaAiwHR;uN-V~cCm(6P^d0%9W^?d-G|YX40lKAhW3j!SAXJOHrQ)v%?xJB z-u0M+rEaz%Jatw@9V=b92>2p&YAUtQER;0o!_UG(kNN0F3G6DZqq&(%deGNeOCG(u zMOlrb=&mMyhCSnS#P8a${qkxg9l#)rO4chZ*+mN>0efO}WDYpojBB+E`}YhIaBtrK zvvtZVbGP4fZd;qGsQ=Q`++6s@&(hMo*7KARxS`8cqUfSulyQr43ora~mi<{G<^sCA zYs!I??!iPCQT>J7wd^7RS9?naE$b&A#G?6!&1+lzrL(V-L8vSE-OKytBW3IaC=i=27Midy))mxoNQCDtw9$h{a4S%^+3@M%r3dyF+j#8g<7K`#|;XbEPAn*Mb@6kbE5We8P_f@5>aaE1+?y^_r_?gngYpTnEYzAKh3qm)k z*19+Ak)UNJ=)MY`>3+H)@|}ujukNA0(MoQ&Y0_Mc_XH#8ZckogXbH85E0unnwrS6J z!72(>2LTZa!gA<|*!(RZ^Y5Ydj%r&_Uze-UAs<&#_6 zdY%b7pUKjoR{Qfgic#(RfloH3EsYWCT48ewO(6Q|Z&*M8Dd*v&!to!*9JgALGNK_L2iMS`$%HSJPSs`p?2+h_50YR+ zW@=$U$d80^7TNCzx*pJwln?`s7SJpcSF@*3oU+;{Yjf;I)G3lK^Y-X*Iq9m?vke=_ zzMQmtZ3l<%A;a6RN=X9FSSl+FH0CcwK?oA}>LWzkx%-6B0D&WNaSL<;(V~*Rsn}?% zzjK3{FX@Ro-6UL8+;t;B=TqnUH)VSFw*1zv&yV~22PzwD>f-nt91hYLZDt%UtWo1x$?-_tv%)M+c=i9c)x71-U?pS|#Z!9>SoyXfl zl>!^0NP`}bT#~ep#|emzx8nzRc$Y3`;UM4c+@_`L6%q_4Rc-Bg20X0fMZbZ zME`(VUam<$_ua{87yPbc@z25bA6F5l^{Jw4zl&5V@V>({<+~jrd!6Hj2^B}FaV7F| z8LKk9(r?gq_n|aQY0LZtJE()qypZ=vofGTF`3U}ttJ{O}Uepo9P!_c%Yf+mzUg5<& zCT6@E*A=b@ZW#!Upe)M}d-e@>@#}qf%F$<&$WOCBumGlsDVOch&S{ubp!De6{9-zq z=pGl67VBPjUOy4$ zmK{OJCvkZ6yXUdm}=2t1hH4m`#Jnl17thB8Pd))xAzzw~KoCA@@W>q?(H zgnlDUxt2HFdp{yI@gU~c;q7g5`-Z0bgdxiB$F4M^fBN~2D5|Q|cxU{R?(4|irVvR_ zA;mKM?B3%*^xzfzZw8TJ{u;~r)S{yNeD;1UP0mOD$AgD+wU+GVN|V1m%I7zzU16w1 z!vGTp=CX(jS?OCFM3Q66xuIdpiX_xPr+T%Wq3Pq>W-J}hWg8m$_N(3y+Po?q_0rPi z{&r(jig7gA3(Q;pzM!D-ZsyRQFUpXs=jIpV>6;oP4qn$AWt1NxVtjQpQJYPLEj0g+ zr?(Dh@_XOMpN#>dM-L=6Fla`IfW#On(xIrt5Rh(AI_5|xAl;?3($Xl6gdio2bclq6 zh=6?O>;3zE{$tzoJZI!wss{GdJjVak7tbFbm)ADkq@t01h^)DHr zs(zsMAQWAB^d5>4%8+8OXxQpsTrAHLexO?PWg^Etir74{gQot&-q>EVZ4CXpEaT@H zbh|Ddf<==&Apu{PHBb`4;gjzDlHAT6gn=+W;=%u5y|k>t`TLLQ56+IKJ;atrO>Mem(^yz`t^ zy!@!H5qw}LSYhGT$?W!HAm?H|dA>Qrf3$phfr6R)@++(8`=Gxq-+q!VdU15ptd)1axASRJeNCC- zUiRdAv&*LS!IAx5z~&NBc$tX5Y`T%HalWXoICylj;Q#IU+AL#Kf4$;j5`Hr& zAutU5UBJ&%9~&F16^N^qLdq35yutVM9Tlr+p4U_@{r2RCCePWgkMG^|@-Npl+{`bILGq2c<3gK>w`Y2W zvO!yOcP5l-4nHl$ICXd3akomXk}3M(ysI)f|8$_gC|kz0D3ORQhAHgV?_ChVeEToB zFONbaxY=4$#Ma-xoqhPoR>!5-wRpDHD(4%w^xk7Gx=HWgvoed_`I?oB%l+7!@81L1 z*2KgyNJ{;b~%?BxzR z$r$mMFRT1DF>%tmHk27s5p?L!nqdq8np+2tTzT<-*Y7L3+Pjd2h`s9|x;vM|!#U#h zh)uV`7svFh+x3=$!3)Y)h>xW~qnQ32bN|Kgx1O}0eS13W?EH>5LL_*}^V0poo4AJF zXB(F*67_RWdr9dJ@Lh~iXIueSWxiZq>;Zg)ew!b|yRM`%m5oT8Q$iKjGm%a-p#ATU!cWN8|6%>7+@m z)XnZ41ZY=~DEvC!%PUKsuUtP(5&4G&Up*ci4*s*U7rc={PRFHDByJi~KGI)W+PvpG z(0jS_jdx@$mM%wEdgIF1iuw1R>K@oOZ!tARnBY2e|Nt)r^|HXDonFA6YsjLPfZuXVN0=#AIFS$EkzzB`glG zmb|IPXXLw1&L97Ok36s3g@>$H-d*XxkHsQY^5JwA)P1pe{zK z@~9yI{4;<7YPr+^4Q+elgFu8V-;wS~m7v9uTn{tkY11oJK~N*&+|1hGs9!2bC;(cq zVLn)9MK4^!Lr9N* zbQ%Nzyj`RlbIqDawbrn(3<6Aa`$I~9(k~u7o2NRri8NIY2C9%u0x&OS(%o)_fsv39 z*a59AA?g03IXVChwIujHf+PlA3G0Ac;lD(_r|c)?i|kEBTgf?95N(yG!q>kYkJio1 zPOmXh@~T8f#1?;LoGJ^h^;z==nqPIKn|$t_&5iO+zky<>;;w~Z=ec+ zxsh#A!yyE~=dQoi7h^Zl1{MI^1|59>u%0WxC_?~9I+*~jmZS|pfd|MW=#)5fD+x?_ zxeRWk(oz5!0J-4bxB7D4Mn##ZhX%r)ae-Eyuq?l6LU2eUJ~(7l1WFbHYYl;uQ>{^B(-pwqcvE1di=0r-FD^Mv+#h72} zaHlb)-))G^DpPD8C3n~+b7CaJ^ghq|L3F7@`g&HAQQO%M*_fTFP;?xuL*|6`XEOHi zZJ5<8CKAiHYHV(RBmSIlPcv6lE#mFR-xXAhWOv35&6%{ua{Kf|gL#zZ z$>$o-0{Nu3@Yn&HtUl9lEtb%_4FE%_E5!IR7@;TorMVu*S}F7bmVYH2hV#9zUUDO3 zan7Bi*WFvWC^32aS-XtDg4%ja?ev0iL-`fmtKW$-pYV(qEK9OW1LZ|c!%)?ZUB|C^ zc;f%S{DZ`f4(K{FJA;a4;iL&EH5vtjfYHX3&WD!dyx1oXOZG!WyBc}$Xebmz$&woK z4nPd1ks|ZMAB(^{)}YUUH;kbmY6H8s;?F|vg;&yBiX1#_rX<4v^h+K9z9FI4Je=XLpKq{p83Hff3>uy6#Z2Lyc_R~SU7g?Uo#xM2X2Vz4PC z*lKr%&uP@I>wU?j1qdQQ23qvdg;R;dM}ObY)IfpYBq6v^2B>r!1VLy>Ql-4%7vhdX z{k*CVwc~)3w`oYnplL^Fkj0bA7=Y4qOG|91=935MoWkl0^S(Hx$|H4qqW5354eL_m{?d3%0|p zXty^VB&c~gVtkHM{E)=W>h9dz|DO} zD#A*QXHF7N@g;51l-|I-@Vb5t$bZGR(PGrr+*!UNTb`v;^t?Uy8+WDfEMu&mfV4Wi zF~;%Xsi{ax4k#{@Dk7dQtHziI zJ%Xpgc@9As+8`)eDUx1c6H;XVUl8;AjR9uvG(RHnd&21d|vw!h6#mAMF1_h&yjVIj=x7wYgwhvF` zWaK&D+4~`2ZE*J<&(j}^SOdeG6(@`D7tX_nQIru=F%x6+s(kv!%xEluKA*Vo1_k4H zzHjZ+ISaz6#ZxQ^-exCf7i-xCUe_lkCmrEI7>b^*jYIp=q3O8xfsE6?e-$b+FcdV9 z=ZSig-gx*zs4!0KI-Z3)aLc9*Zi%@goAs+nDC|X3BobOr{V=g{C@gvP=x570C)?(5 z6J-NhQX~!t^?r=~!iNGu+m^7*XTH}iRhAS%;8Q$Wg?@@Wlj2s^NT3m4`bi8u1gTvE z@1MfZ7^uW0^cgyhx}{1$pm-n$9L}KepzUU;7z6Hh8o`B6Ltma%Ru#+Fwe-mgq7Q*o24xZ#Pfsvdr(%FgWoz z2C252e4Yk_L&O*|Z?hTF2tWGP^cjCVbSvbr3^W^S8ZUbe?JGpl|BryXkv^9@J#5^ zMU0`m?Z~E2+my1XH<*d_+`5jc9C%_0GKs|SG9uBKhC0FG=r1xyJ3OnZ_Hv@~0?tCu z-uTRXtK!TV-Z&P}RN&A(eT?z?OhnOp&(oJX=nfG3x*^&>d@%1x-PkNj^m`XnQCV2l zRp2}3W%>x3b6-n8(eiys?sk*&Y{5eK29rRR##k*Dk;uWZZ`26G83<_P_35I%O43+m z_E`(f8r__5=g=&OV;^;uQt`~^5-B%&C~%1E0h-#Rp{^lGl!bYGTZA);fY?URJ++8#v@9Q1u}uM>XX_`ZKd*K`ouFc(y4;Hnz2>qFt6n=@8z z&_BY`@sKC8sjyIH7uGA8rU0}DvVn77YQnf78vv1z=de#_0uB2Qx3gV5s@XcU->`A; zx1munVYyHz^#rb3lZ# zoC<^3^>CRb(m9wpC}JS2aAbS?Q_5D*6B#JHr%i?h3?lCe1*FT}Os_V;wA^OjFi9Ig zlrhl75DgP>HKeuU0lrKUFhGWYtt^Jg zgaIxOF%7BM_E&%?Uo3?Dp4~f=XL!^Yo(B-XPd+E(fmto0hL0X64_hVoLL}}Z@&Q&H z?+{3n6D$HDZx3xoKzv47{!*+S!=+i9}^_YFq$WO<@ z5f8JStJWfnL~@ZNdQ+tiL}9$OpX-n45X1_`Hx5q&f+oG42c(3@_6|$Z?@>x&2{fJ1 zh)xW&*WII0s7D$G^*Q#T5Blds=We_cKlB}_28V{^^A$wa=JN%8{I+q3#B&wX4BAeo|6 zE`mO?+73OD7_K4s9Vf{O)AVFdT<0MeGvH6NBG5=f7M4#A*! zF|=4rRAnUx)|4*HIYYLN24{tXFPeUUl>_)jE5Rn(hoA1u&W%mut%VlDAjnl&Xrt+I zMA}P^0nk+#n0%$>0Rsuu5dXE*5UUw5zj=JTmG2TU`+g+Gr_j&2+r)ta1FQ%~O6rhT z0Ay~>NI!(<);4et1|`F$W!qB17&_KFK=Z7tb#6ke`d~0eh!%2p_PiB zsrgJ4jNsoy11U`JX>@ZA)o4Fl1C~tzH#`L@JSv*0`!iK2ev)PdO0mRGg-)fs%NLYI z;_f^cHfbtwx-28`^d1m`KtnShztDsdooHu|z1=ArT^1{tDME+Y3Pk0{jQXqHOypd z5i1U-PL}(9ttesgZmtoV#xKY8b$&ZODk&c`8dYQQX)l4BCi?WEQ9Jg^6+5wFby_ou zUy8QU3+)ShqE03am&1oQw|3N^*BFutjCgc63^YL@u=oKRf4`-BpVtA!0l$lmc&%+Jd_I;9u(~1zyx^2vZ*JDyOd|y|0PkZ7#6kVdc?w!%n zOdM#!`RR$5b}Fh$&U)v84e*6VK4tjV$#F^a_rtT+{?>Bi=?6!le}j-JHa5%x1Kd{( zes-%!YL=X&_P45K+n}K*Cnrd}Kw0S*)hn*BTm#Z>hq4L_>C2m}0cucm+lZ3%`0y)7 zdZLj}6NIvukFx?Cv?9+fZ*e0*nQ7ONA;kg^5TL2V+XgWqrV>hVJDHsv8Fq`Y4v} z9Y9aBQwfTP1qg{!k%!9L(gSY#8Wo)3i^OyR1Z0az{PC^QiCeTsm>8%-%?%p|H9=%?m3QU*Y0p$iTpI=*ch2y1K` z!b9h$0V!&L3=D-9hRI=H0%~!hO@AA9D3^GMzDO#ANC-lY0tJ#HA;6&R9IPb}dLf^s zWuEbDdZi#`naKxtVpgb+=zx$ydracB3`~1~CBa~ekW}CC3We+pfbtqW-)>4Y7^rp{ z=z$n&(sYL8vk0bwhQyF1?TM4iUnRATC+L-2MVFn|wMA)79S)Nz5qN3V!ZdPV$mh

          zu~Cx5ZbO~rZ@B>@myFh2$)2gFLYhqTUs`9)#mfe5>a5tpE96dUt%v(XOKSr+1NoLo zzgtyBzxXPJg{j-)e|IiXOe9qZ-)8_L;AC3T(g=>;dwldJOCkV(G%1K=XoFLr2R&O^ z|5~b`Bo3$g3_gO4PSR0$#7iDLj6?_!OKEgo2wp)-c@K5X@V_z zZ7x|f5&%f9X%t0bS1G#y5}@9Bv2OVmBtP5g!%@XlyeibH&D??{Z;2E@5}RcqH)Tw3LyEz2)q%5y&E3N3+sh~SR1d7FcF9!TXx8dQt&_;JGL#XcE!66RJtQc445Ej zR6fKVZHmC7ctSFT$gcQW%4@a~ypwoZ*zjdEFQC6n-3@`3~nF3TD)d6b*o!9WMZ zU(kB#vv>>D=89d1BG<*W$Cy-)6U!$BM0*|g7%?}ES8)DHGw~8#V|CH_FincQ?7LT! z*u6Mz!>LoYy@sn^+sh)S>V8;zw4tcYZneBIKuQxM08B~gHao@+F+H5ReZpF3A`KA_fr%_FZOYTvG%RTk4gG5(L>8j?oT8=p{gMQke`2d?lY1L&GfkSsyj+Ue6 z?l!m%E34acuyxG!J1B&CI?y~cpX*b_#z?>3E|z`oNoedil%oAOT(o7)aaMWo&gzCX z^@fj4T&1%nJ?p2>G9k>cMV?)n<%4(?JnR#Fw2s+*w=1y60G4)p4>4qlVN!|9s#0;M z{PyO-Q##msazU}FTcvPJDzFGe!(f0E2_*74n%3ZESmU5Ky@xck669gGse)@vm2gOu zp;AIz1+vyT6|U)7ZYEED5oz#>Zh8$)DBmFE#}G>&KkplnX01!n#vh54X~!d zZXU6r2Yv0!S)UB27v8J$jI_7Eah{FNM-ccib=l)oMc^ZQ@{2t%D>o0HdV5Lu=y6mDDv`}Cd^YwD3r z%M1&tM6j<*ZBW1T=7&n(VCR8wBv2^zhg;Cit6hapv^@IUnzz(hwvSOX)u*r}Ok)sW zyHCG(T(P&H`9MBAcU6mfVuH?IhlBF6)x$OuGYQE|kyN=K+%dagKpzQE=$-qdt_xoh zim@R^Z#H=uumcVZ8qi!aG6=45krKd*Et~o%ll3&qN|#&mF&)087lqu=feQHdK-GSk zhFgRJxeJ@1QZR~@uOk|a(sHLl<4C@K`mIb_3Da=X3-D@TrABr%J}c`Drl4o$h{G_E zsy&K9T2gizQ1(IKB(f#-OIknY$S_kj?>ag-g&SB=J#E5*v9MpK=h+|25q0pi8k4V6 zN2ZKZSKh8Sl^5Ednkpo*OHy~bXI5)+0Q(H`-e%k!TI+|ts`{-X%;s!E&J_EgZxL6qmFs5!_Yfg7l}!cBhJ6 z`d0^RwcXWYC_ZQ?L7ndZ*p4VqyxXo8jf90JH0N1CEcBN;WgxumrY;YmWl%<=%-_X` z(M>KYfV!UYb%nF(BR7n{$0%ZHo&#xmy%N#HLqz&0yne+3?RlTE0jcN>i7Os^7p1S7 zw`zL%6^2Rkx}GxdC*ZHxDt$+WKxutFs}%!n1RlE*g%@)->m|xv)>7vz9iGbAu7Sw# zmClc#c|;dU)`gG5!1(hv;}r3Lt0Tr|qS>C=!y7Uy?Rt9pMm=-!YWJ8X+?^_PM2m^5 z4-=7_Gx#)q_&901A%5oI;9l$Xj~i9|b-58dN!j$(LR3J@Vprt7r+3o)Xba*qJ{a{h zyI~?Xcm!4Jwzr?Es%FCC@7O|xk5o0I-qqRM zjuA$yycQesB|3rUatky+h0<&u7A8&J5><<@8buHI zJswpD+x^b;Du{0?C+QgU?hn3cPE_Fbq_cWkUf#Y(*HCU)UIA*OQs0v;MUj`PTX9Qh2yNd&Pa(l*tVZT3YLx zX$r>ce)kwzdrN#$M57NQ+xGF-_J-aV+7sL*Sp>PgecI93b6;i*U#H8{Gj`UdYFw3CX|HSO87 z71`aP5&sDEqPy&)ja4t@k@YI$j3QGqvUni3G`h${ZE~f+%r9?TOIJ3H13oZ{mB_ho z)Xfd`@~S-}|0Dk_qR5)F_h*dw;dSHUZ>*oJM+*YJdbHG)vZA>-wEX^P5QbXhcIAac z<^GiFl8MO`9bQ!mtMVx3VcFx}yjwuVtjfPN7T^Et;qJu5%?px?b}TfBCY~?HHcmj2 zBkG9m$X7&MM_u4utn#vhz( zk&0UqQ!!}hh*$@qsQ;(VPOE*x?^9|g<-HEInzP52U(s|={-SRS>a^9pIap>f1}fW>bar3>S<^}gNtfQ2lswTA;Zu9#98|x zU%6NN@z#p__4&4ZW~ zLh&2ymHzPFl((wB_xTh00JJ1abEU$yc3(b@Lim37p5{R&*x7y|iL`?gLFr@oH%Cm_ zd}Ndbf(VyG+9f(m+vh2vuA7FJgahp*8@-w7Pdba77<4kHyHrPFy)^R)P4@Y}*^&Z( zQ4;w49;fvbSx3hqHqWO?MGGQ4msGiXmZXswdEWHVwT**uQ@%I8HvNo`UPNRjK3cJ^ouU}XR0H+88yRzoF+b%`m^d4N zAD&W{*Nk{4zl~H}wB4P$HMi}7#JBkMB);=f`}oa59K~z>E8b3&RaZXY6@~Jwg`M z90e_}SK#qK?{$NK`#v=zn7$&hCINj8mK)LfM3I8~ToA5=gvooaX%^CqZkvaWk|tC7 zyq4GGl7e5VFBR>Jwq7qg#>yp7#~ireQ~-p2%-i z7d8|)qJ4yERahrXkm*>2bI21QxEEY;4#X!!1R^KUV;5>0Al)rEla+eGiU(cjJFLaOG7G zC^BOBj5T?Mbr_Ic#Z@9!i85(^LzQH71Jx~2XzXv&m|Y2_X-+P)VY`#@2XD^%lKot> zEr*`eK=bsZ1C*RddVbq^GBV?`Y+Zkp;DDL2x3^-U^&xyATfV=$Ux>F}({W@HuIB`W zM0sG!+@88zN(a3$SS#`x(5vdNS;*rM4u}7>^s0B7+tg`v<|hHc@WYSx8>M6H6DJFP zEWG^d8{1ITdwCK2)%}L&_)kZ{3Kb^XUO~SN-J2TTvJ^r$zSP~2yt%SyQ!!I#*3TiV z`1)i?lB?I9dazI8PyE1VWg<51-5S;7D=>tJG-tAq=T9ZEtDfg}lo)@aO?ERy_ zj_gp&a9;Nh=1!vL12XFHc4>uE#;M6M2fxTM&8^U%SB4S=>YS5I7j9TY*=oe_-gWPf zdqwzC$2-6gyk`=R786(`O}I;2ASQY$ZOr+xEv+`Wrxwi%9$B~;eo}*pJlr#UOwdl3 zO-o)sX@Mf)rq|OAcx)-cBywj?Jz<2$ax}&Vx0CjmIV`nF5h0p_KY`5dMWsdtPIYnp z!ZqC}oTapFl>C}O5|vC-3hH4g{YXTfnGHG2b@lM{yIA5GPmf{Ajo+5BukB;@lw|Ly z`ks^YQqFpWyz2a{^C8}ylFl)fz&6Ik63==3L#MjRV*h}ZjELe2MccDXB)s~SSpLUa zKn}SkI=s1vPx%m#eMSQY6;KwWnrF(Bi87Yl>~0nhN&8F>4sGM~2w+y<023zQirpb= zpAur<0whdDULvcPKBYB2B5-AzB?*7q9+=&xqu8~9Gt`myZ!u+d&)Oc&ja};Iou+w`N1=HEFN%U;mw7ONFL?BQ%o9%K>4*k%TYn4UQ08 zG_q?g`KD7W(;ZilohM`n}ln;Ov z+iNe29aJXs2UNoA!%-eGrdAPMgZkr(E+hL68DUOV{9Ab^Px$ z?tW7b0770l&?W_|v;-)Eufn(;U8GmFsm*?iuXb_;l8@}~*iB`xZ0|^Tesafz1GiQ4KqfyjU-H)83g!Zfn9@Em zA8`UBL)>rd-QLD(0jc{&b0!~)YIbR5Eoq9}9fq4wm}ZQq-S&NY7loN;K{-RV2OUr$f7gj;FF9CTKOhebI0ux0&F z2KoDR>lOl^aB(qiv)e5bA4-us7kxX6+BWn%6vk~p$4k@sMNP7$6SaIj`Jrsfn?*gP z2g!B&)!AlSmb^yi5=N{7!F>_8JYG<~E7s6GrHz%w4&LROsOG8w_-!71ft81e|>d+5d*I;I_2RU983%Toq`j3JW()x^1k6*8k-D$iII; zTnJv|-g2j?^n z+&yYr%rYgk$DC(});tQ5B6}FC=S;KA5g?i~;Y=ng*>tsMlP#zy`*i3M8s*02L}HsM z8{;XPzC5?mBm}1(N*8Z`$|3f(?B@A)>J@cY?uz)8aW~DROx~VX&ZeDib);N-DzA4Y zBVTs+okXJy5P_BMb_Ualh#N6DhF$}IB#kWfa45bZk z3|Nb2E8BPdCj17xzJ9f+A3a2aI8voj%3;+$sZFrg1!gyd%z0jTs5mt^; zzIF`=et&o2j#NI7t2IVYufi1J#* zfY`3D`haB9raN9CJ6E|k`-f@KX2at|%EZa7)AUyxu1w3Ow@TFXG9!8)Wmv9usH!?k ziDa{I)osS-I~)8z{t}dym^n?I_-;H|kZU*5ZFFijnLO7eGv(K<_B1p#~W z+P16Jhwo|*62coe*1KeMM%jI@r?T~i+%LT1$AqomOoQgXDjy$!Dd-O-Sq zLtd=j&l}&=+1}0F9aG6cxo$`@c!ysVN~t?%jno@qmGndM?w@;`H_{LLX<15dBnqf% zi>pbEQmdWusz!mNii5`#uJ5%&kpJ44=4Zpz=>`B z`0)mkaM+kiM5q6G4GUf;N-36azpHz?u&k@PX717aa*QBPyEa5*FPZgji%G{AK2+UJ zT$Q5BahCWAbQLCipR7)MGqF@PcK1$M=@F^62Gg6D-@j1s}A<&o2_2sgU+>$WVFa9Q> zeCPMh@=s~Yw1knCwaMMjsjF*&*#_`+YXQZAgBu^qocvEKohgBT>CH9m-9R1FI|w7? z*MzE{%Hc#5a~A?1pzsarfk+vKWe6nt>2FHBt+RvwPMyBs{W>q#_nuLQOVxN-|D)}o z0*$~GM|pE>Kv&NS6JNcEc|(}z?r{*-h_2)+34zf=`t-~#^OU@|rQA^5BNaR3b3KEY zwS`lX`R->>$e%+NI{=e8}5 z9El&TsWczhyzN#;-O0b?+he{Bx~oMjRTFF4Fla|(6cMFCos+|WF`up1K%T*c$5PhjnxYd1Rg-Qg8E8zK#n;je$o>F5dl2aLV~F#*f<%TI$2^rH`JTl)1(_gqe{c^-!WVxNCDrc%qnkvj- zyEaBh@vsHLU!KUH~s2^eo{{kKemLAGSL^9Ewnw<&y1?K_Ro!-&>W z$KT?~{&1*8q~|8v2t+Rn+f%L7SG0Z{w9zX}x$EEB=cd`LDOGs%zNOSMIfQPT1wl}I zn`u~{rCz*u04^}ge!r6GUxQ7al;}VaO8&^Vx2&ZQwH-Vb=y9Huw*I@qQPy&(9z1N) zo3pn{Ye4caW(Cy)w<=#*_mIgMzF*#}E;*6sR6RJ7H-AuIFSiyGRbR=@KHrDHCq5IG zW0v!qJJ^i*w@u*uiOFdXUcbxfG2Ul8yZGJRKsd zdxHWWmv&2Hni@caI7vA^k^+e8K)k>wo0=yJazQkio|wo&$L#szDgRS_UI8{^ zVUc&LhP&%~7LaR)KVsc(`I@~% zBlviS;}2tDattpGjE&b2WPQFNu+g!xR_DFHecltt$1j20VoGFJhADeLrrFK(b2(ph z`4v5_z0j)bH{eS)>`R&l$!v=R|0;aEj;NE!*&y5DUv9I!XH6bwtH&6*;(VWN3rpOH zTZ^)sXu=7z6+w(Ys11r#HIB*gy!I-S7n=8|&bbH}710skxH*&h^0&Y{+$s(sT~Su?I!3Tp zj5sz1n)8j7GJ?1_otw!V3`@q_(3j}oV5NG4@7Jy~W2gu(-4@#_%K;!!(jTdVf*|2m z-KZ8-(v~_oHPx3oa`HOSHc|Dha_4#u?J2hoTVo5jv`X|X&IclbIj!twDHz?Z#Z$fL zoKt-v`g(1em7z~2Ol(~>gOpYESsWTltU;6n%~orEV0K+w9rX|+5~um{x*UsA(g1^l zP9JuTmtG45r<#-tPE9fPrBwEJU(}t5^t2Q`%(LA&HU8vn;uIK__3u&RD744Q$^zee zdjoB3Co_Dnjb#Xw;<2=d*k|RV8%6Y`#h#x3YI_yBk0>baiB03mNWiIH36 z0!5?+tLqsTjPhv=DOSH1d1YGb7Fr3@B4Z=oq_Vu!#4!-{KNdT#RG=sFlX>euN(X>; z%PubI!S}!Yk0VZuZ15h9KTJ-M|L7sU$~c&dt7GqI>_6@~107ODlIfNF|HKFuag#T{ z4kV%fJ={PAXrQ+GA6=gUV4CFaDqk`GN4_C)QS{qL=~Q3;?jrq106*vfcqOG%yB3-n z{yqN{fFXJQTwL%!zPl=(2$!n<|48(iFG^Lev3SJz|92GtU_R9e{g@&mDgS-vtE{BZ z*T3qd{>QAp1H!wzK4ZO}_6(K| zPyXYVLx?bJDeoDt@6tN9>bDcV{u2~f*oW@^;+D}86j%l7 z-Z0G_>u0)O+oA5Dzb4LIfSW;9)*UrIvUVA%b6M1E?VNi~%pyh%6QnqBRA{CJ3&CP2 zy3eIk1}uZ&1!oc>nIo+XnW5|zW#jEXh;1{wD^H@DwJ5F$@GiWT^1uDZ$z7*53x?zK zLpZITkvU0!HbmeLp2Uog-}-QvNA5h!RYpBgYkK#tr$|v)r|gC;OAI=4_ClL{*2ku+ z7mYv|d5#6Dr_&x{&El#h-kKkz@l!ZRQwP|qxSw+ z(#PL}MGBW?y4&BM++M~<87vIjOxrr>o-W>B+nnI}-8_&|95X_FC z!dYz2`4FharEkL1?)m_1#A{=!eZ5u{XQ@nhtrVA^7n*F=TyM=gCcr$&9Abwa-ZQUy z9Y!^JaFD6fXzzqAwmkIrN-8wd}E=(f@oUTne4f$I6>ze9vD!!US(=ikRPSdp0|6$oAf+{TzI6X@ zt#HwAX1;lcu*JMXUt6NEo_S?`#0?@#f5v_7%^%9+&3;x|TX;9ra@=<@lCd;Zwzfq?0@$Ew= ze+mzxbmaYEipA+z-k*|oPF;n=(R3E!QeH&UutJNc?p^;O)&u)eocPtx_he5Z*yl%-2n#`lSC))6k}vFb6byl3R&6KlmlwAH3S`{L zIKL8tD37S1`4Z+b-|Bgm{5L#}(eNxg@F(_TIX?mb$a!X}Y=eKT>0XYeO9dM^d-Jg5 zwhdSqK|01tyVaG7Pqg^SU|<+OOZUP9vBGG~ovnym*xRt9_Rpdf^X^x{0n2w8EWJs5(*dTvDXTZ}Fj`2V_SQ^8-i~$( zF=1xp@jL0h>_xv5eP-~yabwGh?BbJ$v0fXMq6S&TU*g8b0tR2|X5|*8)4t!pv%hnA zOY5lfp`x*1Sm|%+pC-!BE{abpMLPpurH51a^{#6V)i(eAzBBn$;n(|(U+u>d8=@#^ ze!9!49DD^3s!5v=SbKWH?vEk+3G0*O(DYj$H!kklzD_O- z?2|Kmee>o>rIM=1^wT$jch9TBXEYs7I2A@ekDFKpnsyJ`VBB;9g3JntwwSH>Z*F<& z^=yv|^2_gmCp`c#>VKaj(|tfO@F>ug767(QPK&ZaLwFhh6|jTfjz#vYkM-z{;G?{0 zV)Iwe+}pyDH^0m*WPs(3%)Y_VY=*Gribn6YsCzfR;&bzTKU!0drk%}Oo+$P1?zIt0WtF2H!{(k`vNB$w+XHRg{r;+nA-DJ7v3`M#n#TH| zt~%L)V@EqpEmmJ!6(Dx^(f$3l&?_cQRa4t{98FyFckj6G($(Mj__MIAA#!Crs31&p zE!$uGMyAXZmjX_#4#AbGT@n;X%Zx@yfSIB>`MWeUU4$>f(=jTYVYHb36q2AU9Y~fZp;5~@4Lg}D$c!U=Jd0D zC9S&TF1g}@dyyNqvB5T`BnA`Og@lxwTy8G85Fms=0wEX(rh@~x0yegBmkY+-mV3A5 zBFXA2Y5Sfw<@@8TWZBq!-}B`8o_ooo-yhPM*{SdQ&dk}F-#dG{I-GEKD^{vb?b*9- z@3}e+r-x3iDLZ!R;E}zJR$*Zf`j1dRQqoA&QHa#_xB>J8hxHHd+FccP6a<2cUw`_I_m}Qya1QIAUiR6%58nH#F{8Uw z{`ON(f4X_Y@;$NaiDUaVZhG(87vI@%AUQ~#L1VB5Acf!_I-*1WNB^{(R~dEm``9mcs&{_=-;pDo={?=Klq zRKIQMTc0i8cd*J;G@x6COfW%$7`u2f;tXV`r}3Of8jhTdy1VDNE`GagcTKeF=&^*7 zn<0h{lzvs#kf=O*in@JPOMP9;)4zWfGa-mpA3b-W;I@ay2jaC2;dnf5i4It^Z~n7S zyuN(hx|N$~Vab>w%8pMy{A%&*pDbLm<8q*1FTCW%KYqPoOI2OWba2p-$M${vr)OUJ zs&xC_)!SK*?p*A|=2OlQy#rR{$TvrgT-iLd`Sq9HTw0Af_x9Jn|L1qM@7bee4i7Xf zdvWd;`w!G+j~I&%z463T^EPi1`0+=Jw|j@(HYAsiMymF1JfsvA zXSt32%U9Qdw7h~0fm1yyIlf`ZwsPl)lDz1x{4jX%O*K8}=qCt3R%lc|pm*TuMNC78=P9JP3>fcFH ze2R7YP|(WAD$bNCQn>nKWxKz6>)p>*e7))$`KH10r4tR7oZln2`OxmY$EwnL_3|L5 z*Vh_+wAsuJ$V%rTZ{?v=^%WIn_kmp;o|YpU8}s^l>-YZszn=Jb)w;8M-@*Ro(og?5 z?~6l@y!>NJU-|3DOSi0A)8H8~wpUvDrg#4Q<|k{;3u7k?(D%Lf{BK`bwQ1wF^YOe4 zYr|_VFWWtt{jlGG$~QG|ak+l?!Hcsz+^RjAnc@l#K| zxUO{V#sjgUiMQuet^LQsH{V-!!ke8FKKQ{a?=M-i{PPWG@W4sqGpe`#^*{e}{+jix z)*ti~PaM^)Y32Nd3*LP9uzJ$~;m~`pezJMTQCFY-u1lNdzWULggBP7$yClwEPVbjf zvG&a;e?Pahbmi95u-`3{eW$+o@QaV$o%iXN>-Tzl-a5R8tn1g`r{xhkUR}%U$;AKL zP9l_?V&nde+jgDF8aUb+I<;@(hJq*O^y=57apkp%y7EKyodUt~aQf7H=Hx`mmYmXh zP5;$HY3ElgJ5pt2bQd`c03asy<)&pQr0RG}QU6eRQ(EutxG5r-XAYh;`%HgySWjow z`c(%`91t^cBs#EDjU8NQsQjASZaq{S{&3MeqrO$UU2uN0zF5II%xOn}LlP~{yU-!Rknm^om z^0QA@tlo6MeW7viV{iW9Cqu#IHBWC0-u~j&2gdvME&8N%^`%E%elPD3H+tNl=(c6U zs^O?Pcl)D_x&>L7^|h!F;WK|+H|W7Bp4v@+fB(z; zryuU&Mi?-FWLXqoYKIF^21Nlxs`swkd)f)zv+{=(brVCEc5FIy&H=I>>{?tX2yK$V z22oT6`ou&m0ucmIbgGf{U#?Sbd4B!RZsiXyo4@MwZ%6)nYD0>CKcW#huG!P zC-h-&FMcq+Zm;GLaTPDvMr`&vBjl4FPVG^qWC zXG#d006}Oa;@C1MV3x@gm&!{VqYMbL8b7=(*6qF}iym_vSpLQS!_8@0MUAsZlmAj( zRm3?iPck$^03;ESdQa#g*0)qQSIL)yHOio=#kCO)Gm#=mFW<2C?12AR`oe?)fcVQx zpV%Gh^vp+ZI(NSEvG3uHyCzFbCq8sj@_lFeJhtdhcjZM+t^QzZ{XL6!&g!Bb zU-_pswaR^e{a{j~I&s#(^Q+(5AxyY`XkMaO6L`RQD0>1@A{K)P0>DWwShex1{h_Dn)j^}n@#SNWhP=FOSf-xbO!xux>(rSP@|TSmQn=P#ZPh&{%Q>Ji(ywcaY< zyy~R*`24-I`Xx#~Td;BE(R%|&PSGLn@BSQo{r1;8mz^H^i+mK+uXhT;022|90AM#} zC0zl893qjZB;^INlz3Id^z^-XFsL}XWB2~5W+S2Nh7~mpPoIH(-Ch*c9G!ahE6fLp zcvhN=*I--y%rwN#dES`Wbn(c+dYISAD-aIS`jD^pkRp#G7Uqk(W;itxia5Fr9G0io z1|?6YbQf-_!D4pLUfl%E=wR3W%Yabm_xhY_^vI4K=cvc;%5fo+005CdXyfJD;=4y= z#Wl?|G3Di6vmYGltved&clX%a`uf8$DYq!2SgDB&nLeUr>&uV*Zo!c%e!^WPBZp*% zBdAw#UZ>2;W7Pmr(=-eVo0f$wi!xx-pO_If20ilr!e=JemuHM z<&GZQ!>3YA89)+=o~>vOGlq~T!lbDxB&MN)k^i-1$F9=t>mM1J)>s+scFXf$Zr@qD zec9{*ek+l*zY8&T`02>oR&yoGJJE_>DyeuM!L}bPdtwl>4Icmn# z{+>ir@aU=!Hyk)w-xvusL=r~aAdKKxeM82~X`^~(k%$o(P?(=bPS(@z_x@z8msu8N zfKljl<@6fit3O`0zgA*GdV$w1g!h&%{a|JM$MasDH7FBn1^|HPrIs^GUs-x);QdcL z_0!?FzU6984mG1;94L8V#kOtpA4iA3K3Ef1d`ivseVWL*GJF72003jM*NK?`5if$c zuF8;;CBPU<2H8z>X5Bi@Y3NE$o-ap1g@XdRe)-%*%AAA8b+#e~0{{So6A4eh-k{># zk&|be8ieBB&Un&-5D2Q$boi{hIMBDGht(J|^iWtHb;qQcU6dAs&%Ec+5?Eg!6?%>> z4%d4MMoqmZ@&4>z&0TPW=JXu(=#&Cn7YwHln&fRrgp+a0Fiq32EX%S?i%MbB>7u=wj86|qn-7HU3g_7I~9wJ5(!F*sCCMm;cnxSN8sbf2$)h2l44VIjm-Ra78gpCaD?5CKXF z!GsXgBC1H4klB6Qte^hdqxa94&^dJASR!NaoW~y@S?D&f#Rv~&f;h|&0stU`0*I}v zemaz4Jr1*ryEugt+xIBFy7?smYbMA}kDT0nBG@d-@ndHi5(=N5MJeG8=2anfbQ*ly z?4LdK=3rff5oqySKAanLInYd_d{ z22x^S!T{q%hH*wW=kYJMF56QniNP~R>yL$9>FM3>eeO5+dE*C;gvg1F-){cqtSp81 zAFZft>e?ruB}@tc1dL)!H!%SK03--zxT!fvDn9l|ms)C`WaOI)RtCw7s zJfb8($N&QXFhUqJqGt~75huJf|HF@d+^0~%(fXF-3%)oCRY(Xnh^OeLyI)(fV$q@n zFFicg#|#TIVzEFc^_wquUuZI%sA9v)lgX$%!;g}o+Dny9!ON9Rag2DNMH;Fbli`N? zsE!$+n9$Tu?mD}d^h`gv;+eO1C!7kj42=Z3s|QwXS+~AHma7jPZ#-Au>84Bu2_XOi z%dkw7LdXcA3<5?h3wg4Q?W+&f8!lA2Y1y|IDu6>!qsLChc=6o2`P=gi70N=HVt^30KP_SoyMOznc}YC{AImCmLP-yP>GgZ0;|iW;iYtm1Na!-n5zY zpV1XYViu(gV8aR&rJvlguXODR>fotGD8~a1$|^GA4NK;&k2xGLTvmEib;MD2$@Hh@ z{Yoy|eBo^Qr9<;qoYY)0SGjXtG~4Mw93c!q$S5%l)8>N_f(nXzXX^W3dTK?~sX}ZT z7Rt;@?%26y?T%VWik>Y$ew-F}^>Y{lMxoCY-M)R@+TFE?#Lw*bs%g+rTDp1b+MP+6 zyLjq+^$AeiO(Bf&f@+lSKX8dWGXL|pU;J4C02mWSuxXf>QjGbm+*s-6&07yOi>&_e zg>&anug+eCO#lF}Ov5tB_Yj#m4qdu<9$^#T=o@EI%WjuTb;*LPIvsAeTUHcVQ9S-Mx1z|h zEX%SYyL@RLXu13L%F5``KSxy@F2(CrWq03ELj%>@znK5#2RkEy!J|hMx+K*p0;cpC zKH42S_>Z|S&7J$f`op!z>)>v9RNjFf5*S6QOC_dQSdd;=GQdGH{k)D;j|89~iGq?g z;hwvNEx(<4`;_0kyFR97`ebCp6aEpi$NMh4Fl)rbsXsr$kC}5<-+h0*d*(0ao(G-# z-aK;pgxqZ}&zMv)@zw3tD1zb<7C}LckaUyrPK6;qNnGpfUfp(SxTiuSB{1 zN6flw8r=NzX;UWu`okT8!M6>7YbFl5Y2=_j54^D{!Mj8bG9&D|>7j>*w!CofEt5)a z-G~NGyM1J?Y&D%({M$Rm&zL#wxuyHCobK^Dct98cj3H4{ovO$P0{|Gwq_fYAU*FYZ zeDYv#KZ zX=Ky%QZ(^YR`QA z;o6f(;vf*+e!riOZh7yKd+wNe$DPkL^%&K+FaSceNx$2fkt-44Q(87IUbtv|&CU1x zq-*(~XO5k`*64G`9b+7c7-oPNrnA>*Pu0>nB|{&dcYN>z5BFpdnB^-kt<3C|&61Yw zFa>x?b$R(DaSfT+)tTR;ki(|vcB&!|5g<4)>cM-59DU=CX_F?txazFpafm!Jh|;g* z)?V>NcTO5V^PX4Ph`Vnc=-T|Z`)57=Ze910BSwvzJSuP9&!$YBJpOOTGH;(W(yIuP z$}@m+@^g;7_SiW!%)) zc8arRk5CMYaU5VoM>+kw$UEM;f6}cpOYzX#Mvb0$$B5wSCvPtq_0!jO_4?7A-m*m? zqEL!{aiuF)UiaEyo{z3IMR3TNne-_FuAn+8Bh0LyR&67z2P&#sK6+p6cA+J#M#bMw`P?9f%H}-^*j& zq`>Bzx8}9WvqQupqCdmuQml=C{ln3miT6$~5hIs_VMF$$yCjZcOjGn+1cA}g9HFAa z=XCK9Q;MVE80X1M6ZK$I$RM1<>-Q)?*RjoXZ39G*ScFj^h#-+LL|G(8JgHd}K!_x_ zSH-%{I9UW*G;UDF0N_-YTY!d61cxlxM>+^nU5h3(0-)s2@N$$Af~n0m1pq>#X*xxc z%b_r>IT*1VzBHGNOarI@xp-Z( z0EE2a(8`aVth($UJT^TU<~#ux$AF0RNOL4^a+1@R<^hI=8H50G0?&*@BoZT{%kP#L z<2ay4!*Qs(6&?XjRFD~JX-Qg8ai{qlNY||tllLk+yAEVgcy;M=IAY@Xjmy7^#S`C6 zAxTnQUG2dGWs0Hz006Zo@mBIOWt1^!yBAQ#Y_4oO`@YhED}30t&{Yri=!2Z?5W;9G zp0%zo2qHi*7Dcg7znlDN>DKk#@jCDW!}W{+wzngQY=0R_C~JG)XpOa_uS#?6XYH&H zaU4uV+GQY=@;@T%s(kk1)MkBckFE7E#%Q~mu4+VEy=^^gEtb(#rc|}5n0ED~hU(Sa z@wRfWspm@f+7ENafE@uL$8(8;YZk8A-{|9Ok4A?){vSUX*+ocd)D{S1SM{>Z#i6zP zh(nN3Lcw>$a!mv6;RzX~47SqjTW1`*fK~^H)>ujj01(=9Mr(=Jh`*ghq?832ZR>uk zFxy#?T|VSxQ7ilWy(L?!CO!M&#BA9xar;zl#&(s_rNV9cq_p*3hIV$+CK%h{<$A`} zZqh{@0@pP1isEmS7jUwgJhf-f*@~{yAMOc42`eQFgzTB|JJqDL##m}*wzWoC+k|TW zq{21%u4iZMp-AHM^B3^nvz4UldLWQ_*F8U`^nd;h9YRP6)iljCjDP-ejt=~9K$~%1 z`_LAoSH2rwG355K-ydpc{#VBXc8yKnFkjmv`%Ve%!qWB6rPmjr z{g*K4?o!-Y*;QU=6+ZOK`^NWmwbV!1)jP}Wa$QqyTkwWrX%|ORmD1Fi%vB%T?zh** zww2SW@N4CFRZXmQioLFw8DpvP5dsikQ_miK=gk2Z!P<2TY*Xmf|F70(yQ;4i485`G zU8&)_&Ae9e*UL*xgU`q>mVHhungmx~Fs^AryN=vQYpIXPb(?qNCBX)SFdB=(p<_!n zull;<7u-6~fqx}1#zaSYx>o`K7|~!;M28&rul_#82!Zab95<&mH8lV5u3uve3Zf+N zSW8&{+|^D03=~Ox{*%SLB+LJ|C8Pr#=)eyQ5JD^2T$fA*5yyRR@_!9LjsuBcZ2|xQ zerT%#002UUEgf6ne{NL(000Jfo;C=VEOx;^dApHoDD)@Pd$W}on|)|=w(L^jh7!qz+UZ9ZZ9uOJYD>z!=3(T%Pg zLfPlZ5CK3_g;NESCrB|b+DJ7BB8X7yAth_$Y@|p;j3I=WO_feXr&@cZNdSVB zPFwk+ZD)V5RgkvUZ5m68&tj_&wk1gkmQs-FBLnP;%`wK>k^`2KJf##N2q9`C+q6}d z8eagUSVXO&VT?flAcBlBj^k1!A4&-&DPwA9Cbm`B%pH)*o1&$(b>F6~Ua@XlgB*eg z0S4MAOb`Of7)-Gq+XO;eiJvJMLI5eX>82^IvJ_3G&HQbnrGT;4DpH0)DW!~|){9X= zD|Z(H$XYoywtN_+z!ri{hyoBoKnP`&A`aOGW_O2D${4jZWvj;S631~ILWB^;7{~Jf z07{8%x*S4;(pJ?##%w(@N-2T}A;bWnltKtNj%&xmOvyE6$&^t>?dy84Oc{VdhyY-O zkd*PHbd>7fmHFVxFa(s^!wuQb5W#liE2U@KsO^cxZa}JQ9A^ubF@_+r6$D!yI0>N$ zLd0>*rq)8}RMlWZJxnhw=v+`pD7Ez{NCE(WU;-gT5LuRmi3NGy=T8#_F&qj}LM2h= zc^>gd*R*6jjtQoe@*KzW0xxi)BuSD40W>Xa=(=edj4}J-U&Al~fDWfBh%&JVr37-2 zLmZ*l&<)eHD8&!}QItekWQ>`H#V8O&9&w20cwP`O#u%F^TLb`cC}m89VhdwzalGJg zsP^c?4`enq1_5J|BAeI(1Q1G0ONRh5Ob8~7QosnM3~{_DiIh@7k`TukrXi~iU^}aG zf`u)P7ofm#0w)SG0w@v=dAz=?oZMJ4T3cV&($eB`xVv@k>hXGOYip3mTNb8-D6%Yw zVpA~aa=9`yvnwkrcn)Qx2a?HTP3>im*Xwq>IfNiWiD;~@x`r_(hB+cqN=j&RGpG2GLBD} z8U#QVWy{nP@i;=ro0h5T1|dXJ6h%=qEy+RXcDYSmi^t=pX&R=f83_si z&+{0Qw6qM2aZUAQkrxGy0}wJo6;V`G2f-u}i(*V9SvD+7ki^{VyoScwP)o??_XRRC z5d_Jk#sGtmi)#tP&@79(yRg)e5cQxOlnDs;k?}Z&fSVI z#t?#JG-g=@0B9LnsHsWdxmYyX5^NwAar!*EWibd<)!}lvWJLxP=$dBg8sK?|pk^2@ zk0&dTRZ~&XP*)2Omyw<3P+XzrCWjvOB#tSB8n343%EY;<%t*sRW(dBeQ1ocEBCnqZ{ zJ*_bq3^p`SMh(*d0JxkkLpNMbC(jFsXw)=}L^6?`n{P234u^d{UpySqVsS!9VW+Oy z`MKvWoNK79MGP{)FvYpK`EIXA*L6eF(=yU6!&D^I>+_yIb@Fn}Eby6pxfgY1Rhh8 zNG1uv9;e$d3`J3*@o2auR9xK4<@S`HJ>48?$;-=6PtT~YtL0@emP}f@rb-F|uydEL tp_b6ObEiH2G`H6skHtKyv!bEl{{Z1Wl^BD5Ly-Ug002ovPDHLkV1hvdVIBYg literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi3.png b/devices/surface-hub/images/sh2-uefi3.png new file mode 100644 index 0000000000000000000000000000000000000000..f9b0fdb754edd77e97dfd425adff068e65ee0a9c GIT binary patch literal 58665 zcmbTc1yEeg(=U8*NU#8bV8JCJxVr~;2q9Ro#aY~8u|Tj8+}%C6LxAA!zG!d>?(DaD z-sk<-y|?aXcdNE`=FD%pd)m%S?}Vx<%V0etc?JLgmYl4VIshP|0|3G#IwJfD>Qvqu z{0GBcR>uhduz&siBE&OclL7z=nWg4O=Z{K?0w!Qv79&%zu^EfItvwtK079bf_C_Yw zX3mtxX6BZ5!qg`%9n_STrozk0S*qze?Qc4ZjPoP0d=YO|MG(OgsCl@ zo$Uo!S>4>+Sll>Sz>emu?EL)vtZW>t930GW1hbQeowJcUvz-&oe^Zb$b24$Xw0E`y z+fn|dXk-j_aTcbAOZs0+u(kgWSv#kH)dW`!iM-ww?SGbroe^+BKAn9mk+L?mgoZkEobIhcSoXv!(|Bf@W@xZO7$<8If#wNhd#mvSFZ~PZj32bT!^7vn% ze1D-FTyQi0Pf)nmm>M}7{l9`uO$0z-M_VKKnk{XO%*|Ns?aZku|D#C(Nw5vr5zZJc z9q0e}TuxF_)e#J`w1E#esmn-E%1KM|u=DfqFmtf5|0AxFl7O6@le3YXiJ6>~Fg091 zES8q00^FS3Mw~{x+{|Xid?03aE-nx=KRYKIGp`vJKf5U(8#~C9=fCGmflXZgdcl9s zH~s%PU&YZ99)(6W|HpLx#^zu55sQ|U~ zc?C^^0`yAB`}TZROr`I56m%7=LCVTLN-k!sG)^Yf~ds#^M0e-0|iu=}=h z3z1$Ti@#%Lj&zvk)?cZ0@L_wUnma+g%y|n=*w9#oIGv((N?J$IO`c}3y=TJ9f{oJ`sI9b3y2vbp% zuP80ugDZ>{5BkIRCRZUDmB{0+!LHcv3*yJL6yOvA|td?b!NPfMGB!PQ~3^|M` z%+Fp0?FAQ;4m#E1r(Mu;NcFKNd-;N07)){u;)~Ysk>}|yCt+k&% zxeg6@l^I7npe|`*;%bmVJHV~=5)?~zaogqpbKIy~S`FIl63av-r@7U5Bh_O=NXI@K zpGEo!^a+(WVt;?Iy1IJ8q>nUhhI^Lq<&{pIO(^46MGak&)avKYf-!}yeuvSy$|#yE zD40n%tsL9aH5+ekgkV$bg+=M!%k| zs57A_6TWY3!g)N%)LL?Dj8T_T!@PL}wTv7be|7k!nBiO2caZEbTvkM47Gbu%H41^P zD3Q+P7nsS0asA#Up0J3sP7&^<8o+z?Fr*@S=IUy2+CZwHaBZ_x&&|TZLd9R#p8Wy0 zr(heT7B})?Xrr=ynDreOX1(>?Ro+(KXSOV9Y7dkz5j9kSGTVd%?{pp_=XT_j2fhY% z^OQzDlW_5{l$0!|9PEA{>AGmkK01FER=p8GEjhKnzh6!tyReQK6u6+n-{}WS=QTtb zH765nIq~x!N?;}Cv-nz3Tt31qmfc+KeYorJA@wo!iy_PXm2M%YYya05A5u*ga=y^? zek0{MWRx%Nyy?X{;NNjA@)T=^^Xo%TU)QxnrUQi zh$ty38G7Ft*%|m6e;ORM)$NVU)Kk@*UY?(yT$U|X{ixaMxflCDK;e~B_=IFTW=D&Xj7e(Y{bROvp|0JD@ZDKKwU#$M@u6)I(h_)hK8x3 zq@*>+8~g#J?4_&Vs2;{BKT?F3j7zXJu!jC@Y^8^TTI} zr*H+@UbDZ&Mh>4o%$|WeqNVWjyGGM>L&&*PaI2kmX0K*v(;m9~AJKGdL78LS zn9#+^nD23M3DGYwZeJmv`rO3;kp2zMKLiC#e1X#bC38&NZ{$xng&1GRGN)WCD`r3M-LBZ&J z5)>PWDrh{~`1+V!li=6Cy{?yuQh^8%aEL#y#ICHGuEzUxSDAl%M(U<1@zEpj&McYOm*kFy{F$&{7y<4zKQk;;cHe z-qXrGfD6Ck?$ce?ao2Hkzjia1@mhL5`qMO>NT`=9!s-E|=Zc`3rAb zGY|rU$&Bg6BPZ(X6Ec-+vukfhqKGOD+7d{6Loy+b$D$RF2R^)do-1G6mVHf}Onjn( zye~yTW~OPiqhnX#l80+KlqQYDJ0zx)j_q#{*3j3+dN8c;=?=)u54Fv)TT^pg8QWZ5 z(?eK4y34!P&9XOB^uw=3ACtic+?#!zq4nObkGr|O=~u^~u`wL+`-d}5yPNw$aRB(} zaZRUfa8p3K4+GmnlN>h9RZ{IApAS7w2=iVIyyms+I<&-R@!2mOJPJP+eCiy`@VK$= zXun>LEmTSpw!KK^71lkuKau(Exf3JEfKBQ%`oKK|ZQncrvx4t#qbd5|jZea9-IJ0#Y~&Ru8rY8}D3M-+n=GKjF5KK2=EFi4iY4+x zQjw2a=~VlWQ^PUg`_qz+G|_xU-h(|CQo>-tjUX{sg@ZqNU9SpDWz@SjJQ~``b6SD-=gQ zI~9W35eCh-N={4F@meKs{Vr&d$A1Pita1s@{jgtV4Wojuf)LA9zr|k0$vT%8)4=V= zTC+-rNUkic=GWPdDME7RrE1o1D##LFMn@{OwChXmujh23ExyB&%tY5^vp*SToXh}z!Bfsp9Mk%zSq0J1mi1__zK3RSTnSM{T$I!iyQ)uK zcD0K(zN=J1s87^8hK|X`Jeh1>cYTK5Q;@YRg;CL#rtH(99;P>s#9Gf?y&@O~w=-p{ zJO>$W6rkblwzT>kDR*C(`a*MWt6vP6GT>xHElML=HD}-i+67eR=t& za5$oPzR6|pj8183kk@8@dSboh^0Zd4;sf8^f<5mYvOyFmA$f%cx6Pwxc zZG(Yh#KOEg?927Bk!7I)*X_P{2mdg|=6O!@c zP-aDFrae@cNaWX!AKzXb^t-axl+XC`InGql67P zJ+>2AOCs)RZ&M(u{2a@g^bvM-Z+&G`q#$y6rh&w&54&Mu23;`21O%&ZPRBYHSh$12 zGu%N?S=cNu*n6$}>z2^H;h2hi@F3lgYnfs7Y`S+h){dZwecp444%~Za?Dcg6nSpr* z=a>zLp~u3P$9o)2EtjXA=a3J@03hbSm{zsAdK`6jn|}xnpPymcB-~D;&P!q9fjrzT zJr{TzkR9xqTib16Ny=xx>vlESeROJ4nTlBH-K>vh0l8e+mh&mR7^)g%vE4a`UEi1t zNv`=^Z|jWNHJF-#dIXg`rx`#-3wwxZ4!e*jl*x6Vos8fvbH%t+?Z(27t zV){!GPg)+BDSmFCnL}HCrpG78lbACsew!O@_GxL${d+#@zWav)X$PY|gi8NaLQq$-ozr5z13s$r&Kw@QWE$+sBrcCPm2SpFI zm8N@Q7@v^*`|+$@f#s1A@#2U{h3|JZmQM0vBoj;9?Loon;j(u|BjpUx`sZ2uGvT8xN6BImX@Aaj z4RHmG^&yvLf2DtffLqUu!6B}E>Gp$`F^s}bXW_gnj;XYdAM*#I?zRuc;CWY!yOmnJ zfV?`+{^7Is!G#e@6D5dc zsq}mqf|fCp$Wlw(4X2KgS@{>ttv(4{*N>t_(c2f8{OqVNOZ9k~*(4h7*skTQ$@bid zJ#ajBU(3t!5tm(%Sv?(9=+11uzS3aDgSI++ba<~E@)G!&k&?Riov(1Tv%Avgt|ZlB z2Mw!~@ZqS0bJAZLbLv~V?qaPgBrBFU)zD)ea+P3K$bbll9Sy;5|1j~r=eX$Q&c1{W zu^tLw?@ZfpyXiZIDh#vn?M}xD+CuB_)yq6ku!VQ?M>kBK93L6cXfMYSx|lAJaGw2A zbZN_F!5rW8DZkrbKND$*yE^Dwo$b_J`Gj257_4J6+hy$=c$LUMbz>?v{uQ8VtX^GBLy$yQ2lLPt zJx`3C`q@$1WOndPzS3*#b@}JB)?68ddeVw?!OttA$BcD`RcEjYv_{tT+QXN&yg2rG z5vd+iCJ@2XohNxJXIjChUmAViQZF8ldVKC4P6BU_^cvUEJ}4jEl8T*`}|1Y{8k*a~I+2(rk?iY?-sa%t|#XUm3iYHE1FPb~)Stg3~ zv}iQregq(kN9IwD4Rc%8J_!jhc2N+!{KIbDF~uT!#0UUiKY0E8z_+;^ z%b*VUT}Ar8MnN*gqKJ9;`K95V(EWPx007|HAABa{vwsF;;j1|_0x{oJ@l*h@A4~Ws zbt_Bz+K+-a03^WQg)JNlAZsoRPNfC>dz*&w#D>}m4O+~XMWNoY z`n>lJsI3(fdwmCR}jA)K%4ErYiLsS&w(3xAkY>abO{W`Dx zz^(brjOG~3CVRlf&f25U9^C%p~+#YvnAV=jVm=nnQgZTrYWX+Rn-eBL-a1Us(5s##$ezd5**w zMUuAfy6uJc<#jvNy&QP~_-#o|Rm)VgB(3_6S$5+Alt0evbPdYF6!2VG7aR_CAmn`S zTy+NZAx#@8YNvuCCB?+K{Z{5C`YtKYC`*pFQwrG7&=&$G@2+1re(|}~iQjbYsC08rnM~2SoocaRjYBt4P zC7#5tm!?)}d2#(BwpI9%1-RkkyN-z$W5SO?^|SS3ge(VE+I;3v>1tY)*Mbi#Q6lhK z$siR74}TMH(y4|;zzrIek1M5yD-C=%(@`T3zwuW?y2o|WQ}0xhbUep5ehy0WT&`_z z!U$mL0})&hPcppWVYl906Y0@;G#}17AUxjxBk)WHhk}ighPTDk!U2=}$vAfZ8XmR zD(jS#zblZd78Ze@;Hjjsy(WIejm}t?=x>fS-A&3_7F&KX+3t;JUYb9o5B2H8A{E}h z$X(d}-STO1#rQ61BGA|r0H{3XPjfl1%T|^_rjM7I;IwINKs60Cv1G8ice;n+(?{;2 zY2a&j`rSAY84xp5Fg7rn_*wSoB4gRDoXor2>OR0zX{hwdd9YX}pAM71?Psgk@6q5J zIijb7;5XDovs-EHxu^wArV4rzPio!I&NX7E&hN09LtjdpJ9sCoi>DY$>Nn*266 zSYscxHSSOVU7v7r)9W?mmeCpA<-29NJIli`wT;y$ezfm}%F%@ESP9M@($PFQ&ZPPF zNTYP0fmj zmr0>N^3&1MtKT8DDZh|Ff0Sbf*D7t!@q4$ z3^_Stef>)`a7U-_5Y-|&Trwg)6JnhvT6#M6Im?Mi3d0Fhc)21oF#El^zI*vAip=jR zxF&0)NN^5&?A;dDmI4+Npue<0LEo>gK9pFg{men23c>}be(jv9c7OJxgF~qR`Ovwe z0>AR-a1H?A$DWavCV{o`^ZIXP1o+HG!&~XcfmFEi9-Rsq_{ksT(9CE;mih`_H9-LK zYwHUFILH=*aV3hL?|f*9=g|B14+Fq{G`#{j%qIp8b6F>QNB>2>n)rvk7@UR}`kuX; zdiY3ZmFa(Vk&zIrICS{FIY|C9dU?M*ZOpU&{2$Ri5BCp_6dJgpDgOwAlLFAGjz@V& zE-$eW!1!QUQ_C6J%t^SqHpYfTXn_aGz)X|YFyh~2Z2heG9 zr6QF6l?h?DS;YI|W0=WbqzhHt&Ek?J8*Z0@++Q8|A;|*MKwATiI69TH)LKM-zWFo$ z9y)fs&O6$_I?;3dr7o9HbwvDEm8$Xw2m2OYUQGFoA93K?Tuaj(CM3bU@f5^^V`Y#> z-4(sb;-#DZi<&8=)SRX~|CN?BT>NqFBUcc%S#X#J9h?#(An}s|TSF(#;Sc9ut58b8 z4VYIg*W2`uzyKBQ*?qCmE50M1zoP&pCSPO_&Bu4}!V@CU8*$i5Esqk$iusTHPFZo! z*ee>hKBD!ZTEHE0iYCZC_if}p$!K#Ve7$fjibToKYW`G~L(g7)GwQ4~^$LwLhgN~Q z^M0YyOr0Qlv)?>ue7zS_e@e60Q&SyZEx}BVHl!4qf?H8aLS%bt$xa{5A-v({)g>?v zZOwln87`%%|6Pe*C+H;YEy8C{S~B*pHar7}DA>qJ+3&kk5LSzu*2#((Qwfq0cYt7$ zZ~KQK*o=ep(s@B_!X%*aLkq##;*yXT(L)So;3a0Mcg;Kw4e)R@=ioC=5tqyD&E zm!D;{LgSFTL)@!AaVe_^pMswpm> z>H8A+?2VoM+rI6seBFrA;Nb17X9Sqv%Zigxl=0akGI*V+(Qz-`xOnSI#W1q3rUM>c z;r|E>OQ|Sbgw7vESq1OPGP5{_S$X-C3!V)r$VhxG`%3+i5!+r8o&5FkcrrnvMp|NO z>{@jyT{Ipd5F{V4*z9pRiR~8mY@@Qn$q8gXkuq~qH~=TPdWJEt2h zwFQl5A=rwR3(Yyj*|Eg}^Kq z{cE?g;u)s)Y~xA;<)Cp2gehmdR4on*Rl`IA%hIK`nqrzVb_wZl8j;TYB2<3G@D6(r zZcoDZl#NM2Cbtu)&J0;r3^kJ@xPcv45(^Ef^J@vD!4B?1z+7Ob7#o=xJcCja@M+LQ z{}?l@uc>9uJ2E5>Q6KN}XN#5sP(MrMmXPe0E$dJ08U?toeeo-9$HhmU_#8~~48>B_ zq{9jbD6phqP{vJHCfdZ*-WNxIlvkW966R(SW&MDuX`|awlOt`G=A?{HHG<`$39RLK zH)e>3QYK49OAD;{f2B{c4U=8F*1hl4f_Q1v=;ljYk0d!!#;M9CH8*Ed@GWTncqE0@tQdN>WKS~H$MVsSr8%DP+Wx0pR3ho@d(Kf} z&Stnc2nD6q&(E)nT?}f>2$;Bfz5YtGTN0}Y=_%T?d^N<@!_G~Jw zFN&p};?sS<*+e*KtH)Sad;-e^;NBroYJOh-K1UwWtoH`x3x6m1%hw}WLC&i;*X)?z z$t>vt??_*+Z})Dqom70-NyGP2SA%sLpKo8Kkcblb`5(%%5>GQU3znr!o;?fSG&%G< z4=yjKWd-|bV4?=9{h%YFHBFV;Wz;n^)WNBUh}jU)8E^ne6EMQ_Id4~baZ5e8+zJ~# zMhx)VBhkh?M~fpc?ORkd*5+7y-{>>etJOl<9p{KNTr5r31K*>SzQaRA=F@PRdfNbA zTG_&WK51kjD*DPi*zOhTiQ2YzN6c4F(5n>jUq~b9AuaTBF~3sx zub++6{)O{aj`5XH7hz3dS!?l3sTIkKUyoP?aCvgp#eRO>eGpWt4JO1!{q?oC`A!#a z?LF6)18Kol04DTPv$14sl!N4yhmTH^aMS1hEJTZiCU0|TF`_q9+z6&#dY|MG-4boz zRyy2ME4tT9k!xY->{qa?E_5$W;!gkbKQ@Gj4^)NAq7N;|VGZE8&6J4;~L zuVkIx`k-PlCP>x^&K_D?od<3x4za#@v&;FlIQvp?S&fBaJ4gIG^M~-aF4}Z25YzUo zG*2dChWXK}jjI;1)b`pFg6#FRxHs)lyOIZNUSjpOkPP9N&!T6G(!7-$)~|8GpL-Ve zd`ewDxMgxF_3aQ-sqUiCTYQKb9j3YBkDmDhx5`!hMcm(r`I?k^Gq12p)9}V~sXFEg z<*I3M#pz2Lyoai13le^y0%>T7FIz^~E0Q$L)258}EvB3i!@9R~7WKrM_l=qgtM@lDYU^{86 z)}0BwR8v^e*)6NBAVq|ocA%)NtSI;6$K8nT^{fk?95wJWQr28SNm|M7eP$4!u2w9= z;2OhHD1=bn{nym;i*YOoMgUh{90$3p)%=7;e9g!$RuFf+){8S+B9G?JN<)QV2ohhq z^2E3c*QxJD8ru@q4A>+P(2Y`YbV;cp_ZBho8ylN-FHP=ixKJ|+*UUj_jKY)rPwn>)Yhv&q0Fw^1?^9w&XpJcV?hV z<}**8lM)Pv^RaNL9;#{u$pkF_rU;1Mv0@$Zj|N(kve&v%D5?6NFrv52e_xXn%SVj_j^1 zTG&o`f5=ZKiAqS%0kJkQancRp-97)}5;N&`F%I8_2q-gVi}G0`Qw2F;BW6#eC^0Fd zN+Q0*Zcf%f3@+e2?c0y$+euSZBb4sSS@kHUBr{!j=P**qF+wRNaMO>NANO=IZZE<3 za@VcdgB+w6Bc&E+Kg}tz%SH)*OHE->4@^EKzxhgup7y1+{VTSsS{@=oZ&S&Eo+d%^ z_-kqZPQ@^4^}C@@>MoJV`1my(F`+Hqn<+|4zJbr;IJ*JT?8zr;8D5F@&q?%r#x@+b zryRIAo|cqB79}Luocrpgc-UX0i)BK)u#`+RsB7qf>;UHxfkJ6vW+h*c(#U9NP3R}h&6Ru7l#>03uy<>FhY`Duj-JXn z@g=CvqWzruzv;CdtGnOBZ7zo{wWzz;*38es$;6<6Y`W;Q-CJ!GHdUC!Z2ZYG_5uecS4y%9X+Fum9S7MU&2tk?;AVuDOIq_GqC; zG8kts70*1;OpQkuzxp1NScIBY{A^l#n%lkKt;PI>8c*u5@RQCvP!09N$qw??vQ6FB z3$JokbgGNzs$IF!jQA!s&ru6N(pp+3Waux=VkPRtE=O(6W{!dxL*r_`He`E)9S_&? zhGW)Gle1+Bq-uuS>Rcj;zcf|9`|iUn8uTot4EGf6?M#aZV)6ZeZd?%j&q_0`z;eEF zi`~YEn5<5Cmh!I;Yqogu!>kd*u+Pe|C`y01#QUb}`*K`YXVqTM1iFdTcLJS=54N^t zNTDUigXw|QY8^MynQ_6sT1!1VI+BmbfjVgd7ry=Fp;T3)TA zmAbZ^iWSNLF$~}ZV-bQ%A+H6lJccUeryq6BO9>=6HG;!0z`E9@x+wlYv?5QbG`cHS zo$H;8Z&qg#5;}e92z9W)r%!@HB!zL$2s91NTSNzo7{3PD(@g5M`Sd|OL1A@M_6knn z46o<{DAD7jy=_NEpg)wQ-r^#r6;r85x_Hoiy~Y5xbWc z_L@^kMz5Nomnyt`8b0OaBTzOX6!9tno1Ddk$;mw|r?=jfEATDpmiL4^D~9$v#-JF`G0^)xi); z2)_4XlR#Pb(m-^udnFKf;{7YR^VKSEm6cn;@HjDg0Odtd%6eKA(wmm9Jc+1w`7}-t z+b9lgR-W}nq2yl0An}Qn>0b0Bjy?)tw<~bp$>1b`EPnW`iRs15Ulf_d#Y}Qz12VoC z{xK^f>D2ku?eLQ|c5KB{Tu8>5pw_~c;3F-@%RGwWV|ppv{1YFkB1%<0cg`15P1Xug zspPlWacDa#Uno+_?!V(o3}hRGPzXdK-DJ}W{Gtu9-7>(>y>)r6Mh=*S&@n7`zxp&MtNSy^2CDbg`eRNnkIJ3FobmEciWhu+N` zXO!smFemJ!hgG*l&~J#@29!+nr$k5nDS;C~8Wf&86dC}q z*dXM6G&9Fd*X})}`gZ=1F!^cpLv+FV%3vd@@?IPzps@gYD;DG<7 zBmXjdS`dGsKqnwLX?iA(0CFLzqDYwj4EUb%on|x7gRTeo?slNRIU;(V*ApZqciuD{ zA`GPo=rN6~dZ_Ne4)R@fE(oo@P@td44Jebnw}YJqvNYaw>4M$uPM9SXu%9&E-fv9o zh#1Tj_bKvS2iNqOyV-6jm1g*!&6F#xCoRiqL%j`1juw}%7CK;cpS^NRFa?gl+RDQ< zfLPweCK`oLr8w_Sgvfo#c`s~jnY`6?4}YvxZQ=!{T;OQa@mbXZ2(Zw9oTRDrJ>VqJ z*j7t?INFe40{jXce`9-$<6b9T3q7i}fQVfekBF4y&|u%RGa6x{6cCf*?hFSu=K{5B4-cv7ibve&hAhf;Pzmk);{#CLx0lS3G)t z)vSdMWj;EGxGYtyn1l@TpXNz@VrA4gvxOUc`E>G8rQ9-XuwcHJ2+CzHCM4#*c^}o$ z_Srgw(Cy-uH=Uh@yYaEy>$R`PWixrGnK=Wt(E3T@u#y^O>rO5j?9n&ZZj{{VSZn9o z<1s5?>62BH+w_lzlraj3<-(}yFP@|7du6if6H{S9sQ12T>0nB2+-c&9d(Y2f^|#f> zbuETE>N3M`G*}z&8aoF7^5+?iJKfyOLQSv*-t@#;5ZGKjGdGw40Hl}*?QF*eDb#im zfg;`d5@}fy9(tUg9b51aTpdTC-imBlt1OHnKme${Iu<`uBvfxUwHTgbwOuU^q4fls zPm$sX-Ir&^9u5$Ft8Y?l)BH{|-GWT5DlUTA@fgz`lS1|f0YCxP5CN&gj*}R7Uc&9Hw}KwP{ic+SyEplJ#wr7E z_nQ;XjUE+OZX~gtS?PvMhw}$Q;ZinHCBjc1T74IE8hj4xUS91@HCUeRREpT2)SP$N zvd70=yeam+zJ;|`9cR7eH&z}VR8Uc|FW4q}Y1WrSC+Gma`?E(RVmb8oAHJKpq^}K^ zumRwSPUX?bEVsDm2UyK$umr8*-dXbUy7JGR_G{m}5%T0OKH&;?1$6URFU6Q3=ii7( zwuU!y+NCX_iFS=($#T@6^}hEL>E_UC;eE!@A;+Znq`cPUi;vo#$_@^`0ZM<$eGluv zvv<<`B227QJS;5S4V1h?#CotjFO{-AWZ+LCi|556ET}q6K1}}E*`!$@fIQoAy}uDZ z5s)L|6SmM2wR*ZSsXURQ`8_$7fFkwNd;=r1!3&R(l4}ZYBe191>c+;#_-F&{bbRt; zbhQ7iq1Q=1ME?}x)iv7H)lS!AIdsB*eoNRG_dNI3#GlKK}G!o&F_ysnb<*edU4RPseE9lH5_3E*R+3V_L$52>w zklzrpilXAXu~X*K33=Uq*%|!krP*fxGy?my(qAiP?UU}cI-AnRnsTSiv~yG$k>au9 zdMWnQSwAwS=ey$xdt%NXgE|jd=cCE2Kkna^vba0ySdZB&M9oF9)+)y?{GHs(Wea=ab|A^mmv3jqc6dKl+&G7vQCAOxx zUxJ7%H$x<6bRlgwUzpR*$DTMWuWocxy$)X+c<*&2x`8e3;iWT!+uBH{Q6v=ukD)2U zFMK<#w^IzqZM(UkQI8pGqRhLS#FuE9A+sMec9yP>G=-gx>Uf{}hWK%2Mmnx1_0yb2 zbIVCHo(}X6B=6l89)}|f+tr@Z52_vq)sRNpj~^cyc65E`mNzMi&>db|R@%*9_x!m+ zd-9y<=&<;`Umytj=6muJj51d*>LO6S#nuLaTBd=4|KA#dD@tn+CXb>wR^sq zcH(jSO?OQ9)tVMK(-kUecz(D_ReK379c%n;&AQWTUHCHX?wY8%vK5wEI@)xXtA8(P z-3ohn>ITD7XfAe~4)@GM)5Z-|bCN=5Tkir{tF5`X@hq8jn>d{BkepgdvA^0Nee7`9 zNjR#HLCLhkJ^-W$nXZm^Z7jmRDaykCDHwUw3SJAgyF2zbSw{1z~nM7)nn(jNq{}BBeJSMtTA>!0WcYz);cl5;LJ!!TX zdj)<$pTXffaUMR~G)7E9It8oEmFaPVtSM4(OBpU>envC&qI_j%3-qI;hu0ni1PK+> zZPG{VDwCf{4*b}g3U-0*I+~@sPx?LGu9)lTNqjggvist{AZ&74TknEA90?QyxK%wD z!e*mujmJ2)7?NmTNxOkm=;CaWo#DmrK1DMiNFwAUwRt~Ph17KMy6sPWzOLK-`v(_2 zi70Sb9P>@}Hx=l`jCp);Cjv4==%%(bDGhc8eY>h8B3MKKU5Q z>-iv3mHUDcCnpV;5>ad_#a7oURoBXucd)AXEl|tT-1bz@ z7MIkiUw_yw;C5C0xT<}A{EcTU;Tz}KhUXUkXUkYnrhqMs?A=ur(Wv*;tT1`@@cl>`$=F9dxpFfo&P7B4#=8vq#;2ZPmt2-CMt@IT?sHMq z^ZYr-=RMweT^B?!vR+~tgu$cmN&fI@L~%1`kD+8@diXHt^I7|$OG1oAjm}j*&cU7> zMpeC!WwB07nrIWj>xPetw+o^75FY2qeh_hO?+>-R-$ci~k<>dtmgPIxZWDX`YcoIS z3-z3Be;=Gd73*TWCEfO?EUT7yd+apnWXrp}cYa@^HR56jaXJ7Li?=4-^pK9wT+d6Q z)iS8rA6e_8S*-ASx(xdZx0Ey#H>F%~pJ3&*E5y)h9-s4JIIx3tTnpO4H#K3R-Hn$z zeuyCtL@J0rxtqIikyw;3HQD{PvtF%1p*-y~bTpsQj}pDReu*TL;oSMA`%7b$w&A$z zb(_kHS9i>dsWB02&lh5u#Z?VjC?%3!x{=lOCU!!wnI%G0nb{ML)(on|`Ohl(Z0_G~ zv#8Qo@L~zy;Q)-a5Rm6}x1uEf#etiuZcPCa+Phcdnb8H7)Ebb^EF@@WdEnF4{&^z7 z<)1e6JXTd1XR_oqf zh)#GkmC^6Q1YI=FaR#zq(TF-?{~S<(zUSMy>$IkJ7idxjZL;+~jp}H?2R`2u>3++q_i4V{lJafeQ6Kg< zBtJSF5go0$XWtQvO<-3S^NUd@9Vd~b;2I(CoicIb<7HhKr`thG!}9(9%H>u?YJnLA zH}65v^Qz-xUGCd5PRh_YO9iFtlwti&+DVOtcz1|cC~ECi`^cbs5rL# zp~J;QVa%3`+uU^RGAhN>=Ix`WSC#-olNz}jwmDOtoPD6U-wcVNcpFS@r1~BU`moJV zc_E~>DR^Sfm7B?oEdp6uamsa`=DQkArKmXa;9FS(M8~y~4%FyfM0w6BDC)ah{Bo*# ztlRabT*t5Oq=#mH@$)*zKl@48dbO}`%dQNp1y^t`U;=A{Z>rj^etv>ockPAp?NzI^ zueg7XGu&B>nk7&o1|8pc>v(lcogBY?Nm+e1L-$Np&0!e<2s zHN$c2ap!vVX2S~gGqH=^equOpA}faq1q#p|71>?~()AhX*9ir_3)=4caE z4<+6*sKkjK+=|8V8js)A}B>%o7748cBvYF57!!r@lW-c1{SIXh<33{z=IdsKN&1 zfM3W8IaS?(fK*$1mKEUl8uO<0UQpt+hR-YYD_@v++9dr+sINX&=>p>i7hIFbF&T2&gWyRd)!Y(&Wogg zXdRlnkOtq2;hpY~U*STydd@FRK%ZGL#iH)+r`AIjt#(eRmvh4Xo-w?eaI}W9*DTc>&cnFc1vO|Bs(&O#b zN|!|!fM_kMo7c;b{N`v`li&M+Z)U31W2ND}O}%uO-ReSys4Xf2;P4qi|7;A!M5H+b z5L@<}z|w}|!REdw1Ax&5igtO&FhW3@*lfLrBfGsm)-TL{dfD#FlBF{Xyune zCLeu+b(G1tomwG#oMY{0(1vhrO%ggzm895X0!LIFo&=HGUqcjSP;xSlMKk=n#kg9v zFBm^=SI{y&u8zP7b}mXSyMs=BvO%U%DH)qOHzzW%8vEa2k=)Mn?0q<6KPVoA-VrJZ z(P!@s5oLI6rhdsRFXzQdVPju0dP5=#{ctzBsnT9+v2e!BT*a_@F-H7_5K#3QdF^ys zqlY-SN1T0ws3}zN>(OXl|(cQj9|logu*dXHR=J+;n&%3Q(8|q9b>s!N64d>R{D*C z9^1bs33~eJ555vDZamy%$b_5>#fNLxFNBN=*y*)8+KVhrdR?}Cd9FQM zQ;QLcHou9cL{{egxcqqHTjky}7%9J=WrPo1QIcmv-F+9%iA0~xHvkimM*%h_^X0};Ji z?uuvPnZf9eN)|j6TuoHFni)-+GRJv$e^`|Wy?5_nG1=yZxh=900V8DmpUNKALJJKH zn(NwNp*v$Nicyh6!vo>P1`qJ+PHVgOt)tth&i_T!Rfg5kGwp*GhvM!o#l5(@Ln-d= zR-6LGrMSC$akpZ{-Q69E7yp*NeXj4{?%AA8GMQvElezEV)McWWLtSNly$H_wVs{_J zQ24U{`s|AKidf)f3TXDd6EAV;WDz0Yow(DKyyhssW zOI%D@RmHu}6R*;&uL0uHe8KxKJJ&i6Bb=&muT&T$U~+UhY#$J4L%7<|p6%@Wfek(X7f+v_YF?M|!e-ZF8`|wu7et5{(YL93Ke>4e3G~mHo&H+@Z^ai>V{j85!#BfjSxW0uWgV688ICBA-VhE1zBQrMGB zmb24rMtFDM_QyCFI6sw172@U_xw2h8MG8BXBnzB4k0XbhF|57;oc7O$fvI!8zkxG$ zfCYi&wSwJq8OdG4yXV-KfW7WKIVX?sIbT*l+s6I#>E6w7W4-h92Hk3dY(8WFnKhefJwl>+1Ii3&94bLwsTs&*KEj!ze zMB_Njwd7K8b?)(j*s!@@{c=8$ug=$bi!@su^=)-W_5AB~@r|cGDntV__uTb+)^FeAA&)X!4oN#0oRMzGjD{HYh(F^!4)QSSIZW zDsCTrA!12x*mcH}fqR?sc78RZ!cbVlIdy*eEYU?ISn#GMq4gt`p{2K7`Hum0a`pf%kF3x(jRMm=UL?KaowkA{1Y)n1FGmx`}Orules$BC6T z(Wws#nS>gh4>ua~`4O!LJ3;}_y}e+fL-QY~Z49IWOp!+8LEsp89A`GydkX0)2M2Hg zVmJAn9n~iX^f)00l{R&zg+oDAB_(|+x?Qfmt!*P%N!!0FzX%7fc% z(Q$WJ(s`%1*)2O`8!kL?pGg6D;7}qXwUgF6xy)G0ypABg*3zfSPp?H)zNtq7Ml0Dl z6y5z|3Ia;I^xURPJ5T9sbbjicwv&b8PD?+Oy!%FF=AChGyQd33xqfip&Y1dX^nuq` z+v9jofnzSlKSl)}wH3)~>{QD-v>u8UlW`qKmXOK7zM-Adhr&}osJLX^`-33N^IS2X z`$4`1hNlLDmG#gGE4S_V)%@D6HeVbIbi=yWXduJYe01wsgzD#pFU^bs{C^f-pRbPf zAKa0n$D=X2Cm063qj44)!5-=pys#~`YhAk^%Z6rz#C0zf&$p9wTW4lo;U>)=cV3Vi zhOnZs^UgfBm&#rU(03Q4Y+hSzZI`v&R{s2^}H!1dMzGC2OyJtZsfFbRGY1CB%-xDvxQivsJdTQ6;-cZ z1YRC~Fh37XL$|*S4q+s;3WsJ9W?(GVI4Z0r>vwuamFQmH^Cp~nusR^Xmp@v*c-|_m zcN-e6h-#QWYt8H4m@~IZowYFTb%n*S2e0w@`7oo#^jN_A%;ZkneEGUti|CX^HUKTW zHn?yRtV=_WGJfUHfdxcMCpqDb8soG5%R4pxv=~+DMUGYW^V^ngRx{*XJ@1Pgc2uiy z7Zc9%=Z9g1x%&Nyd@y(U;P9FDmtGe}dgNV&4l_mdk+AW#)n)Ov#N?-;dU$~+k0gtg zbpA8D4lg^gZ_LE0nLe_ii>Bb_OAWQmbiArJn@)@jmIPj!>$;5C#(lDfo3_B$f&d&h zX)V~+{jO*4$>2EwQLERNe!azfH|VkOfNuW7X|`(&I0!=w*Y&Xn)@l9o?_14hQ4pwh zweh%}b)V2}uEflS$(nb)_pw6rfez zO&4VZ;p(;?m+1R*eKHLknqxk$+qntL`bQg!vE86%^Nz+sS^z{7RGyKy}9@sGT2HcS1L zkB0lX33!?O47S5t6lr*}W*?gkCWmaW29j)V&ccPRX3rLyOokhRXqFpV18ahVJ!Ft*;X92VS;o zDd;#qvd!L2?w47mQ~9)8^yHpa$qq5Ka&|gB>s&R{@l&>3Ulggk5-=>R?NCec+C!0= zFs}LRCfQt6Hcf<&x78c!M7o@e67hSU-(#)c^~z*Z8|Cp!QORpy;i7&6LB?H zb+4vzl)I$=o(oIB)9tWoVf8sE-t;!gh(XrXX5DydU4Qzr`LrCp_;7F^U0L0_g-^uy zdKuPV>5~=+n)D~oecVXnf8N{McJkTQYkQTSc2PokQC$s&!GK{J^V#pA2ZHbY0>q*e zWB8)=oW_E+oF9SxV6*#NwCf|Q)JLoSUPbw^S_Aj)2yFn5fE$~&knfQfh655L2|}uD zGT4ujUFgIz^Y2TTr(&4@Z2xrfb(g?MUQ+G{Hk;eQZy}LT2KI3<&|zHBwfk`l{5kJK zdWqP#W^Y3<5PtJ^4X3wZ1}`sJI0zCS!chjx=X1-M3>k%6_F$%Y;&p&;MiVaa;(q2D zBP__6f`M6CY4^q>f~hGzp#KvXXvAB*-WamX`jg>>-{ffi}>>`myzVuN|(0^}K9D zcScw~Hl!3q$c#aT#Ks3MC3v0Hp~8cH=jZM1Fs?6fn=WvrrViDHo5^A?C3No@!c(`2_euHTydh3-j)wffF8?Al6{*>ST@3raAe0h{`8?tXlk@7v&PGyP<)(Cy!>=9!E-HU&IN^Dn zm_r~cSkUJwG8hh=sYhQF1qv?60Ay}pmpsUkCI>CY>hsVcT>|QgIPddT#8pCVU2AU2 zIqZMklb3^Gb%rL^Kd&N-i+8-{c0(Uy$-fqwQlND1P4O0mq7GU17%%Hz=`OjA!&3hKy6Q)2(4Z z0r#^n6R`QT{vt=$Zb?1Uc2%OmzzV%|OxrjF`;3uD3MO zpi6#Nt$4JHIsOd9_H^f!7J>;Q(y=JkYbF}TdZ)_la17Gu30${zNe|9_#Q5B1laSa;QBA8}O+j})GD_FQ14L(;# zz)_7&wnPcBqy^dcf4uQL5*wJPW&BuuQs#O4rzd6XMv$!OYK+ovIgUp7k} z=2Fv2SWy_izL$5`!f!*?=Cwk|t7qlxWLljmz48|+g8#@jUW$`Itjo`2X;+M|P~ILZ zNXP-;vlHfKySJCuD6(pV3$L87(nYgXT_49N% z7$P^Vx2eio!8cOMg#_~giK*or1;;;v3h{Cp_IgM1%=X#rDi;@^r;$ItyM|U$r#9;x zOdVGxw){2ySwl-pMMq`+0RAxd_v&()foM;T2!Y!ucTtU$@#b7mX)3^HbM)Zqi`|iR z2o@+IlJi3zN($b!q5hsb=j-j14W4uw4}kwW`)>K2sB;@l_zN3um}o>+u@zZhu(wTQ zJwSQIeq-~V_%+RgTPm^L#bq|bRwwpFwaT*-&%f4qr+OOT5ONoMP{3U6HFn`jC-pO$ z3Po$=bM7v{O0NytizHyRybd{W`@nl#I#2gV;NsQERogSUT_M7@m=RT6b^LDlhr>2_ zRl4IzJoA9wV-{RyOq?YIC{Fd_w^|baqmS6-fs%?DLb>lRz8cK<7t0~Ca!bt9j2LaZ!cwkYHLkGdUfcBR^!O<##C~UeQ$qX|AOI`VMsd5 zm!-P8u_VU!jdH8?YlUQfmcHFE2M~xWcFNEM^n;SJj~gAtBzXo4#D-|zS7{Dp-h{b) z(MzIR*KGY$V5VD=JIH)UF>QuqllqzjH0Sua|4GUyoPPCdXjGtT(h3GNdy4;+UHirq z{8-EVJ#wRUG@;8>TkQbGpq!RARfYuSic=pHR>vO~D_7mpX#|kJqz>8`cem#Kq^3l) zdwb=1@(FtQ>h2GaA8~kMZc6Py{vgqs=l*K6_Zs;E>ZL>kt6k@FKJ$P)_g+p_izgAR zLta(W3(M_`JHRJ1SAezBK$6a9;*}NYCeP(Mlnj6VN^dNq5FQ5xGA|FPaR2?P>pEau z&_|a`HdsJS8QhbTTqB;D*1Vr!1$3r6x)5AhanOIhuM8ARV*A?#ucn{{n#bT zcaH`DQ##B0IPT8furrh{nr`V!5B`#oX@J=Fr&a`S!JT!^y=vHl&MT(o#fLjmWf`s! zOfD7AOC^!6k%Ur$WCsd}!=OxxI_u3w+1Mt8k5s~JbZMz3$K^fBS=*#00s5l-UDJYO z3L#WT5P(@z%Yct9r$#mKU_&(#Rh5OK2qIL&dEZodm@ZiZ8C1xOLJ`WOHVxHBA07`r zpEp@->qk9In&S_eloTzB6-&g3)9$p9iL)M)Qix+eRbc7Bm*CIS6T7SOe(f8-ZD3{` zrp9)gDj3+Xn~KKaw2H!pedTD6ZR##&&+~nKiV#JOEN-cEVXKo+^_20o|D~Cmm6wsVduegzApAjVnRHOI+2TTdcBAIZj=IX3j$0(i zR8v&{4W_{gTB%R7!WGsZ9vznpWp-hkea!tjC!ZK+e$~J+>#pV19dRwH;e~HevAnu4 zm+PK%v1P2~*ruj9lHHJaN_`GPH`kQDCEKl4T~@Ax)!TIaV!{0ND5!nZz`nKTzE5*c z^0^`M=DnfJVO*AZOfwK)-QGt%crWs>zbN&?^6HF(O#jaPNP77Ryq*eUx1c{HXKqNx z^D~=_wYpSgM*XR--tM$4>^*l4F53WAZ-|Gd3ViiI3;l+L_0&#&{Ep!6Z5WasHa+aU zySsecrbXqI=+o)xXL+ghFBJw(Vi_L>q$fjYiW(p5NUnKFmyBdrrWF;o`iX)Ieku(8 z8hj7?BtE+p2#SV;;IEQp3rMAREUs;-lN%cwo>&>3Rl`(qjiBo<3etwXP_L*55IOis z?}xo!66aiHs^@go)}&%tYRhZ7u!~e-TD*NMKhO-uIadjQ2Z9u1pwr55c?m*OE-Z_R zO5|dko<=beNGK@iw5lc5%ld}OFD|M#Y|2BaKbWPDZmHQweNZVbEoG--pI=qhJmlD# znnM2oiw`+Sm}CrI-Cj^VWIA4_mBAk~(9bOe#9&ve$d60uXV^qWG9TiEiQcm7IWcVA z-Q!$9VZ#VQ4HBkN_k|JMR3I|Q@0nZON#mqks4^YL2s&x?rY72wgh6g5CSs<>;?FOt zYhp?f?U8#}g%6}+P5&qwkvo;bk@|Z3a9NYOwS})BB35rJGd#rXY3bJJ`gwbr-XlAw zSw}|UG1P-CaKa6p!1rc*;La7L^IdLk2xib`v$$`)D-GskYR1=aTtd{tmKR&bJ2OjOpPF%VH0mS>md z46bjoE>hcyEh=cCiA`om^Me4uFmCg9t4rbtKX&%87Sh%A4cj!>N1|?*h@(^Meh@Di z#!Xw-;KGPHlfqwEl)#y+kvsju`VGs|$TCEXzA0Qz7v-i3Wmx-wN%@&P)^@2SkN@CS zxt6SZsnNHi!crt7FJs9qQzbW$ALgK>US zab-Y$DKzJzwtr<18)@=LSg}PZ03ypdG>8;yKUMP)Fi9Q5NJ}|VitD32nxr;LM*$BE z>$?74i5EsHniqir5|$L@B<Kgw^3Z^=b&@-Vb2mAvhGVLP5 zIa6$EFD%GT8f5P9xwlwggj@=8PFG7)XMG3*&A>knRc9X2*1S|Y*K%Q9xxGw&8`O(# z7xK7CWIg4>KT51iQ(Mw&~i(gx3wmfuW<1Xgy7zYO@%*$D! zdrn6?))a_ zIu#LvMbb2SmhMHXNd@Lyk}OVZg$Oj?G2Iauw}xQDxGkTP6cOZy=gkm4{>|XpNDp5B zpuxkME!N?4^@a1tQ;&LkB+;5rHm<>=mI+Wp+~;Rs#=*EiDEdMDU5ds@YBiKQ2t>RN zTRSCjR8eCNnkl8XpQgUzLA&%)Xlh<%5-@0o)@zPp)`lwEC!=dQcK>pS8&F8+u=p8* zP_%eZO~#4Pj~JJ$c)4nuk5DXDGi;#XBr)@Tn<-#zQb}hP^Fs=o+e0yGl5k2lw+4HH zbgbqNEdto)fFk)cE{CB%7i5lx-!dU!U~>G4;UN8v*IL371uqx2_actcY~DL(&0|r{ zIXLa@(R3`$6(S{|<9q+?MKHIuHWf|}udi>;!?be1H9yUGzgMTZP0_P_q~6Rxseaeo z-a(yw(uHHz(r*)r3dsX8vtutfvA%|@F8~~^k_cVc{qgwrYIfEK*=}vsqp&h7rdM2< zdo2NvS71APgyAV7a8-ODNeT-dDe9BfZ$_$&S-RfgaC%8GtYKGd1D{Mj^y%(7p4rqs zSJL&Y@>7eUQCDhuWxb7VoBd!Td}8I=)cYM4it>T>bUdCUf<^C#Pd`nL6Mb7AbTn~3xUD`=tkY{f-PF|cwv(XHIG_I#0vK&>j_2(du8RFZ=@3l)*zdqsCfF^j z^QrpX8_KmC4EtI}J#%Z=r9w}%AA$23t)&25GJp2|UajHzsuf&E3ZCA}S@=$!j_c(F zt46m2FJA$TF^_Vd?vla8+~Rt?&IiN${?hCZS|ytwv^qD!`|1s3T2>1=Pc>h5i|~#D zE-JBGA&RLbgNmC(HT9Kj~}jbp8jRz0;|0-w=Sm~8kDN;-PVUZ(cz|{CSr7tr6G&Q?fo;|O#Kg7TN)<7 z4O(K>*4AEoyS;2CkIjAKpY(i-?fyyv5o6xhIL_yIcnwQd<>f?&y|MW8z>Y=e``X%i zG|%VqGcaa4y4|uF4|l!ox@LGk^X3i;^paGS$?bXcCm53*!q0QD2e6&Ft>)MpS9l-& z-OW}n_e}j#B^0m)JeRob?4m(}i=J5H$xN41PA{h}yZyrgj!Or3#Heuam4OQ~j2+iM zjEhPw*>LZ_ym+dZ;ak=AQB$U^nzCx0a0tH#Qy2d^45rpTGLu9_+#Aq-J=Ay85?e@GIGfvjcdw{7ILHWjK~B;cT>QE%-r zZCoCq4DYdh!}uem4{@}PQqoXL$jX-YkjnV?nKq`;?AOd5#miFm9Xc<`s@5#%TwIKO zYMrH59K_8^Oo_3^qDdIxXr0YZE|2<@)Kg+Vd1AkC!co>o?}}&vfkN-vDt8tZhen!g zqh2dYp`vXm?xCE%NKR);7h|kpm^*B$E^Dg!UDjbR^aK1RfRlEpR{!Q`TGQ9xn@lr_ z*o}*46(?IWcp@z&Csn6{sb($Ts+k+e+_wi{S)@3)(WV?(;!Y@kzKT{Mq%%t;jsl2@ zcaF({bn6}GN9>{d>1+;7o`Z0bj5NP~1PRC1yO#}^TG81w++}fjUc#u{T)K=-?Zn9w z8oHfV+BNP|m3uwC99_fWoGqocRLCUGP+n(!^zk~%JXOOLRTp@w+&7AW!Fd-3%uP)Kt-p{}+T>ZSMkGh}3SYL+FSnel3Hs>E6pMX!`( zZ4tlih{}+{Y8qMk`Tl;7ug%yT4B338c%jMA<>zEk1QAa;HATPmIAFv@3~}le*X`{T z;S#Li3=i>ZukyPtjaZ*ouG(x(gohSw&oKC0Gg%3)Cl7PVp3bi zx-gT@WH-{8`hrow!HS^^!A(ziF<&Q((KCv54yb@ieZzIO z`NlH(L)H@qDdrI~b$TfG9tezZT;7H=;y8stYCVlbPIhG@gmkBsrY&s{c8j@EhFSD> zep)4uoAYW*)s=#e^(DwpvM07`DBx=<-!Ml*S>n%?5wN_ml#h2i{Gf@HKQB~Y+j0iv z(%tq#*v}t7w3%DF;)8nIIoD%nsn~B040;Y!k~*r3g=Ndl9K9mr+3iM}f`cO)!2Oi8 zP_ov!o5;T$&t_Gc$ix4k$jk3EnFz(wRf*s6=YH<^Jb3~S{>k&^Ay=oW z|LS6QvJeb*%UA@&GOT@%U!{c)HY>;v#H6FrD!|TGA#qe$w=M+8Y>rGtxCNKi$6CV2 zzEFn{18rXj2Ng62pdDVVTY0W(&W^$OST|(_ zn2aM)xDG^2@tvh6&#_EC7q`#BqaZ74;uXVtwO7=PZ|gAziH&z0S>UnkxA|1w5q&w! zb7JJ%E*y9q>%4026KlM7;s8D^RCj?iPic3z&Rp*hMwV*xLb3Ky{fOZu%&lFsK7JG9 z!R7I><3g({E@n&+XlSk7 zsnt_Z3DvKvxw(bJ_p_a@)-~OGrTkpy)B zZ>{qn#3MpVzU@X{@=-ahs)c-Si{R#`Gxr^Jfutv3SYu#HA^GbhyPC7+*C%OUhX9yez1# zdYDg){rFf$6~S}0!=0par>krb`f$^hr;yHfo>^sqdw;uDYwOWmVJEyB>C~U)ewn_U zsTu##`u7?@+~TlxA|u~yqQN%Te)v4jslLrRa;|D))c!p)%jv=$3qSEhRShv%IB!59 z-ei}vG)LI?v+oZMXr1sTUYq;-n(S-d(@S{hJ&K~ml}Mq1K=?`?+ar64?3~GcT$ZyY zrRV&hnz4lwW~V|-YH90kKP4zB=E{*=pXNi?R&Kj5iF2FPlt?KqTZ0g+C$44@qoy@f z`^F|It4am-KU3y21eUB>TsUXzziIY{obEeL>>O(7@{v<@<6sfl)epxW7k_0QWe_)f zxmHog{BDznslrygqmaf*K|+cBUi*;yIY^FhT7ZmhgBA4(IvP*Om{ePqI@4}bxQ69& z85u%unjzMS9(-pq{dH;ZsKW>T6isPy?jR_P?52Qr9o!2+qV&-#yq%gd&hTM!xAZO8 z;U3ixwWM+SKj!N{ZMwK{n{||Lu^CW8Mc{ojZa^uQxD$2D`#fiaH~8XlU+;j*;?pwy zOaQ>6?e^<1BMle0){{u|y-fWLK?vNWfMLxzJSP+1yzz1$1tbbvMPN$R5Mx+yN#T^GPeAX|9i z>;Xtca2;9!ILYcEvP;%EL8GVlvIsXlfb?I(ptm1`#h^Z1yF!WTw7biazpSnLX&?xk z6ktDQ5ulJCyK6$#uXH{10cS0;_=y0zAp6m%goVihe0lBd;j~YfRHh_YavXZGaZ&>sRFXvVa ztr3(^6H{v~McXJnp{4yL#Vmu1f$LL=Qa~ce&3~n>=|bcyJ$j6mp~fg))7I2nUl|e;;xyO(Y^x-m zE+ndn{uQsK&=MMpTnd0oH_Mafl+?_H$PL%LTQ0>Ti%Q=bk$2;2_@WrJQ&m|mCp#Kd z4JY~?3a;zAxYS8VnH=D+(J|_Je!=Wi7#ml(efKk6no^3mOI2+eaZT-0NbHPuLtaZC znY6MhXTd(EF~u?zElfPhn5x_~qP&0W+BTa%=W zoKYHb1SY4Hw5)VKCZ_YF+Uook^Om)ISw>w$^RodN3Eiqe)7{AlI@(lC+)2TE2C|1 z#i4Ez}(fJf(()sOnhH8jYC ztWjotXi+va5jKgNB|rWuD7Zyg`%U~Kfe;DFB93iIh2@n5 zq>Pv4=Tx<@KYY5Yzd78FN;IM7B%Rzv@R(&bi+8^NdaXQyBe{MwbKfi_qcS{&ak0qGQW@~>8XkpX1n(1FT8~q~)9W=7IO|FSQ9;>|KZP2p ztj{@{ew75~;TlDJ&1Uj-GBL^H91+RLV2>PanLVmptTmcn1K{y4a_r7J)7a4-yvJ5) z%XxuLI%;`5ckG<%jbF$peT~E{T*52Gb4$m#?M1>%TQ+S<%ZrhM*(VTnrhk@p2QbuQ z%o@y2@E+k>@%9AKpLi-$iK388#bSs7mdIH5gz6|0&yiIr?vk1~;5Todv}em@>3^yi zwVBMuRdVr*3Q85vvIVbqzl(Bo1Hse*j1EFB8Yh+3hckkAb*d)}cIskQ5~Gzmp0sQq zAbD|zhK{`r2oLNzXIyb>LeAj<9X8|85(^PW_U#9UYK&%%BTY?tzcJxrm1|j7J&Q(z z&qmrUlw9R9Ja)vPHi?LvmBMSSpV;YhHC8HbqAe7p6`cR%%-v?D5D)$iPTFuiCm^ig zRtGWiqS-r&)&a8NgYH@4Re!Ynowc6I8EfoztLfw>?wzAh)caY*y0WD#$=tb#C2H>J z#~TLp=ULAo%QW5^ax~_Y2gI{93l!22+DRi8C!Nf&iW^y}5&9k71oXSX>p5q2%XD_m z#&?&GL&Fl9%Loy^l??^V zm6Jdy$D6C(xof48`d5*G$AnNSx^Y=A=vYj&6$KPt<7s`TwjwamYMgJV8wjVIG{pPp zA^CJBSJs`%>ZPAk%x=5dBBpZT4MuX!D(X)X^UQ&P7>FttY1u_xpbw;S1E=3eunA>$ z{B_P=jJoakNmv$RBdcXdt+5JK1~yK&V;K9&y2CnbEv zh2@!MF$ovB`jSi>x}wlE@)ZKKnJtDG83I0wLj{We{=I)@EU5jMmoB-mbR{tkA6--; zVi-R(=xbOI=Ik}Vr^xJw^3#RA+=3QaLRF_Iw+q~siK=(GWc|D-UKy@?EbP=1k6m*n zFIH`*wA8W`B~;XVv$(U?T22QlM|RfOsoal(Q@<07d2gDk)$Cbj zdXTJPSW$gN$}(&i=-2v0EJ{(tI*55>9bul>l#h*h76G@i85RlYLXU$Y92}*B!q6$U zU2BV7328Q+nb=ag@Z#N4A9j#)OhfpoCQ?D`Y@G&36$nH+9KKOOkI4n{klZT14} zih+2k-H1qCV18)OUD!seVlei^rW8UGcPAxMXKDMW&0}1OLy)9>g@wDA#)_2=V=&(y zOvhl4htLoLzUERF{<=f9#-6d{c7ylWfFQ=9u;Ih$#K=A`eR$#=#=^QWw z@Yc|UjmD_QX3BC=bvgGVtS-!(sMj^2q8b^6R{YUzayDea1``LK%9%uB(T=WoXmV zI=UaZR3kev#I4b67}wXJFNra=U5tC-`Ee#bL=9kp%XTF zvu!11*5T|kEu=7Qu}*8WTRCwI4H_rw->0B6Y%axtrV6wlbJp31bXGGeFC$k%%$A*I z>j4SFPP0cIr=xDP6k4#LfUhXldwVl;Z~HH1s(f$q+`pB}#4anhkPVX?14emOWvEA44khNPkf#tTmEQWvt?c~mO=+`7Km!FBMCO;Sn!10JKQemXf^cqO=a5- z$*PUyo|UX`heI#(ij=t5h<&%hyDKMA+zG3l1Xl>bVPjT2iO6kH=`yputyaINaIMv31DlOEh>1l0_ zT6!&GLRbk4Sx52QgvLjabUflz0@pNZ&^{;~KGv973mr(uGS)n3L21w_V7{=;IyHrA z9VWH2DX-UcA}tplU8__-y8X^d_OoH^H{8^6E^B7_P}KM6R&CSdhci2l+(L*C0jV^U z6uhi``4WQh^qAqlQU(v}Q1~{k&}zxpc?H%;C$o4_cS3q`;*1v~Aa342M7IB#<28Od z*-rGioHQ8xuyNPQ%i9Z4R$>qERm$kB9;8%?s}U6EQv-B`BO%4K+rT#Mr?Z?{ys{7q zf?QFJD1y$uC@NH;Sd)3~$V6o2QofV8EU8aNXT{hXjyjW)`)cgC55Y1PS?A zKXNI6IkUGhs!IDErY^B-1y@&%MWFmdU`JhZ;}1lcXhjx+*=)g_^%VW{jv50+_?0yf zZibZZKXb6pvf#*$E9zUVr+C8KI_^t$1xnEh)vPVgWpCG&tMPg zB+fg>*5~Mhn`xlWD3E=|sJ_ckgcDiuB)GZM&v(uM-H-$d#Uz&(@*g0!-mspqas@C~ zpU)SK(u1ohVc#ms6gbEW)F1Q%n2poARZCf)JE;J==Ij0MDJdeb@89qc0K0FPJ+&m% z$sv#!$~>!K4)X{Z((`{0;G|+{y6iYZ2>}?vI*t@($zUMb3Rxh^QQfFD&e-uk|&;QqH(_%K%{%;;{{|zryq8(KJ*H44$MVcspGnb?;tDKq*9qvB^K7$ZB zQk?9+VYaSO+-Un(M~H&-&zt|DDozi&IHBL#DC!U9^(HH4zrlRP{vVxxWr7a#VI5$f zJ^(SG7RFNl$5E8-WC@bb1%MI7Y1TFRYN&u@AlT%3&PoC4B4x+xyZsfBqEbFSFC|GJ z$`TbWl1e4szlK1Ag)zKgK5p~;1!)?X0Rb!xOt{d(aCHHqSLCc66^Bwf_$OHG{e{0c z6);P3X`DA&U=n9g&Pta*K!Oc;3NUH*n+O3O>m1woV|378`Xd)KvG@BuZ@oYns=jzr zX?}j+@5*6}h;ObFsW4fvf&bNL%(5-a_txAHakhUbl{#c9RTTTmHxBAmbk@HuI}$=M z9;&8&(^!5>w*O&OkQB+@)5-uzQvT|g5KK;NAYBvC%OgsyQ8s*}|766&N!@c{^VUxT z=seT7|2UzD(-qai{~I6=)x6KD$N%fAkUjoeS0KvO@e)k_(}j&LhyVRb4dgZZtDB0P zLMSxb;{R%Y5BH~}u;ia$p&-QB)z1G(&NxmO%wGO4Jyq^kP{T)Ha_|tJT)mM$1EU!? zDougE0Sv4;QSI#4|KV%8zAE;A`uE-(3tS4Wzq89bgkEK=y7jLzsG`smEcE}KvVDdH z@o@jG64cn)=|+ENlkG(%*HE>_n?iUSi}e=p0YD%EMfH|MCN z7ZdAO{S`OY{-*>$><6Gp0OIE9 zns81RMSd&Gkrrtv_g3dKz{F*#diqZUZMKY+_W*Hu@w@&K>dXUnxoP( zYQ?|fP^@JZoQ4_(>=obCloHJZ9}8ed29}e?AK$^p-ehA=)Mr`*{o&2KXP$K%#ZgKv z{oi1f^2kZa{a3NECZ-&v)7ztmT5~(AS(nw_usGjw7mNyq(e$g{d}HAkKbyMGY_uF4 zGjH&v9D%0#GL4R_y|OgU@-k{h6*YDWiu&~~p=r~RkDhB{?F38Xzx$|&y#I9b@;2C% zRFv$co0*y-61vW$H&YR?9yhHao!U>aC*ZSNTrSyR-MEqi@1*Qs5U_22(To0Q4Wb71 zJl@5b6tr2}RWO1;tm2U#Cx`p+;g8p@$**ESiabQ$)~CL^H7LI?U$0LE{FGa4hWC)5 zK}_fQafDy4OPc-!>PB5Mac`&M8C=I(-~-?`2!>I)Jm@4paHzuzJ)c_#Ppz`j(w54{ zwzZ+ln(4hUNT_1)^Y$ALJBbICxk}v>LNhQZAY+35_Cq~kqt-N=-1JA=yB78`$_Q*2 zxcpvfyt#_QQ%U4#_r^7_?ZUCYgX}9iO%(wNW!rw3D#`T}0L$<3s?!Qy1Mca1`iE%1 zH6%AiQeGN?`uE6o^wXzQGeX}$YQ^{zY&huG;GAdmy{BE}FnC~H@PS8Oxf-vUFLytP zYCU_H7YQ4@4zP&gz1UGZZYTy}Wq9%kT-u69R9}tr7nDw49WE1TJKoQN^sxngU|v!r z>G8eZxZO6?>3Z(!z08xmK$nkU(@MXsdk0Kq^o*^WmAw7e$DX5djXtl_z5-v?A?}`P zk6)jm5!zlGcoXfGUw*PG0I@Ij(`7~S1WqIQlLPXP$FWBTRS~5weR)Yb&Wrv-zeo!8 zo<{vS`R{kOrpJ?Ao?vyfjx0-G@9&N+OKCgfF8{>Ib00TtXZk$XQ-ou_D9WE!y?W18 z$B7d;U7tL5SVMw9HaF86FE?Ql$DnMd$x$=8EY|aqR6S3h;NVf~Zxr zMMDP;j{eW()w%V#xm~OAT1s|TdEUV3`oY~j>gmty+;V&B8CHkBcN!*|yVY0%PkUvI zd_bb8b8D;D1f^3CXC`X<0haX~@;Mjpz4&TOD4>ORcJ#}w5=z92G`_#b($+`49yt^@ z>Y7i`=IKQA=<-zD%a5D{kacX?R}ixp@Q+ z>b;)xWAi!uUELq@aF(bz7im0K&NA`VeIFysMR}<~a3j1|`I$r+?w9zA*)27Oub6o* zo3NqZS?(;1)-hKV)9wI>Qf+kSi)mjaWuz0~sWts_wM|c06&C$xO{M))`TY-CFE>2O0`V#bC+3Z`Os3}RnRsP%bS=2KLSLN} z1ag{7s`rZm!fFgLxSE8%sdc#WP}|>d>X_(WRRs7UHFqp-WMw2}F2BasTM-@>b@eWH z@Wp?B;f!ki!$=xHR;i0ja_y<1r-wy^bsiCV_)uM)^AaYrH~PAlMkJG!k^lk9(YJra ze9eR^YiD}A-oDjvg`c6;dfB_utJl=RYM=gSa}_i%d;V0vafJMch?_T4wSu1BQtZ;5 z-+-YJiE{^iDnMMcu9t~h72obP?ZTMqm_f&{$@84h-q_zS9sH4$0pO9ngK8k!*G|On zLjkq1_`Yal`95^zDP%f~-TM=R1igf}5|40!&qQ5`=sd#RI=>9?cxL<=$JDL+dDA zxIN{x%T)gHeA|4b%Q(G_W*CwEI+;eKx9!^Z$w#e>cE4@kd_S?c!R+osN7Z8bQ2pE8**x0=rcL*Qf`Dh?5 zuT{gD_t8tRk2Q2=;vOZ4DGk}nR%R#{VXl0^g*e7@w38AU+jZB=p(`FA{AG;z09vp- z8v@%E4pX<$#!9Y>$JACz!^2K91sT<;1`QP&KrcwZ>+x`MuWUpU9uX)cnz-xfKfV`c zlRJHQ-AF%4Sf_8_e~}Qa_H1T#GYiJaK0Y-dDtOJFoT&DGUOP+XsL+Kk33#{Ay^JqO z-?mYYZ0j7~;c=Z{caOwezOE~0LcyN=m(%jaTs%5WkqE|Su`Or6U#6@`K=Pry+k5_BSlLpd|vutQ@FipIs%cApj@s$8zGEf=B1RYhRn&C6qa7(R);X48l$ z4*cxwCMl3#(~X11>+w7L29NWW9*=83qXPt5alTJjuUz8tIQjETq!yoG%TSg4(KdZ> zrS?xA#8~HD?nojXP5r^-km-Eh^ukEr%>AolU8fVqF*PDp5v9j4}DOt+yjBCcg+^*vR z6<7>M=g-!abz9uV>OzUyU(fE)^ql%Avb!GbIxiq_pfq&cye@u`c#9)rd#x@PL^zGj zGTQNbT*j9TbMLP~?MF))9VxF8i?*s#D=3SIo8h`Bz5G)kI<; z{|x`|&Wlwji&rwD$BA>_=kOARNRpQh&$E_|NHa0e`t!xO^5OM|A_qKs?Yl>T=5&a* z)3*85+oCiu;%{Ju)Sd%Ay6NlNeG&X@n9T!l#c<|*m*P;ZQXU#|7rFPp6{5v2B$V1d<7 zB^mB(i$t%##cq}$gET)R@ZWaBk9+S!S&8@ic--6Fer^~)%XNBZxEb62`?pcl7wh}H z*0k8SDtW4J`(}Nwl88EPD|x{-icLI;UQ+XHmUSPuj#|xejGpZcB;2nd`r*sZP_ z+d>SVcivU;KfDC%eHsPHb8r3jz7zP)+;DkFb?)H>1%_X5eSZG3vp<0E_VbL=X<*~L z^H%5ML;f~l+vCfsoRmK#tnO&j(-e{Kt8ZuZ(PDxLB5oJd!69|}>s+Jni$F&_qw|UF zktr0-ZezzofsF6db7b0M#M}l1y>8v_Tx72um8|=86V29?4uar2-?OVP*ECf8U-tR_ z_2*%-(S17T<~UxNfPmnUz<%P4a-YI*^a$(Wu@NL_cb;D0$q3|vIQf!(7ZVNtp>Q3E zQwV62EB)SBnt?(&;6wV89A|Rcxy8l2-N4?W zJKv2M+zZd2QIfsgqn^-wdfd9QHa8#s|6hJ#@hqgWm$`A`z@h?g(O2l^UAyv095r$M z|6eK^SBD^FkdCDOR)YBPe#XdpI7se)8bL1kqe%b7zW~A5QBmQo7IJgq^~u5Hxn=p} zzs-2D%VuNwDM*1U^1rA0tKn9?zkmH=;MCPBn{(r2W`su|o?=oBrVfjFpDiaHEdT*R z1To#@YZ&)p)52y`5JOm}YxiQKfKphnNgTrrMTz^Oxlt z!*GL0`cSbU#t`_@!HB76)w4GKk5n*tFqhVN>?9iaIz;MxdlL#Cu|qpb2w@+B-IqebF%V6plJ1Phm(>@y}#b z#M79f{Df;=*eGB$#Nxlc=Tm}<23n93!@U0r1A@hwYSQJE2l6!q&o^8QA-jRP#UV z(YW>Y;-aS%byOljg-`0$kvu5xLGR^UDbzfxNB2P>ZF`D@W)Tom%*TEl(xER8nx=VP za-V4|sXPq9E9&MvTK2oJAwU%_p5qa5VZYKAsW7ZyIClS!sJ9MlE7-b+0|YD326q~y z6ff?S;7)Oe0>Rz2#i4j{cL-A4f_n+>POug$#oA(}*q3|n`+L4W&y(bwnKP5wd)BPA z_PbZE_pDF=ICs;L7rru0p>3pXd|Nw+oXFM@1{lE8$E+xKi35UOL@~7AgW2jJ^Xfp zX8?2n&>UxlbwKr~E%2zekwnux-~-EoDdal~%%pG_80~?XY+# zAezJwp9Td5w-IGIvU&rPd^n~%me;MmNdrPsQlc#hfJwhiYg?CNa~`IJ^|jdK2tx>V z0utwQ(s=oWa_e7(0)L5k&`0wh$z!PT!cbK@0CncIL43Rb!d7M_5c*$0Ug>fKPJH7s zau#S~S7E>?0pN}TKyvs)v2f6YLncCSsEFzKiD|)M6ksejG+=m47%7OlG%!WhWvYb< zqR-WA{;fo5(B?Ddu=`m%U*z%Knu*z$DvpbEG`>xmN{g7((PfTgMw==P#|xYgz8xGO z_-ZfHRyOuaW{v7IEse&>r_hA(XvKP2`Lhz)*Ma~PVN+;? zkdS!*4QZNePHC#{JigNo4Mm6=7!w2)O`LrpTMUL;T#`Z>C_xaXEpA3NXh#0BPX-AZ z6kyH+!jBGTfJBK_7VW#eDdkr{5WFJ8P%7dF$izaW$0RaGd8vp5`zY6T4k}xS5(zdI zz9!)U%<(Cc_^Ak?qOl=z4Eqxl+4*6Hs%kh?Zx*BJ(7D%%(TZq)OOq)kG2#%9uV`#s_zuWNLuCf?PygD zYxRT=v%TaUry}jt+7fnf2OIRNZFohHM9QqwB7%`6da=>U`$TA7B%&=^TC8&f>M^RC%oln}r>9m-kCi(s z?;h^i448TCi{%!P6LC1wU=rt4H{hX!&RR=KAHtwP#enI)(Xg7u+W%Kl318qHEL}Dh z7fmq*e~3kkhnERJP}Gv&ByeG+M$Z8Hp(t-b!YT^^gO&0elmA#pFyVq)%2{wq71^P$ z<|2%YdrQaWL$QFfMGT~J^13qGac)53#Q6A+z*Zd#meN&xAtt%J(tS}jEKW3>mM9h- z_ZlX8J1_ybHNOcEiO)}nUaTkj%(AL-j*K7=!`GCwbQu6FV~Mr0ldY1k#l_`VLEqCt zS?q_#dr`2d0V2xqt41SgEy2?BMWn;YY2)1Ji_a(=UZ1k!D)RuafV}f4~LltY~!88MB}2t5>vtTFiGRSIT3KeULPomkMy zTTlQIiy_W-5Bzz50)MjL2f=c^;( zj4+Oj*d>SI8|^6dS`voNx?FWz3aC+)L#?Qwpo7@+!@L$j;y-DHe?D$o#gy2Yn zz@5NT6wr9vd3zNcULrhmb8~R)5UPMh*UqnP=q!c$mktePKEx z@HGo~72s^;mu5WZX-Y54oZ1=@4a=XRm)6yJmZ8a%Hw?Re9xHNNkpWO|GTJ zi%6L}E8l}*pz%w+Czby)A4ZW?EkFeF>=+p!EW!bSmqCaG4$eE-T}kvo5<-u-tQSTp z9GRPG;BQpc`Fx|I>Xi*dDfxsf+*~U_Jh`_Ouh7v6{|fr)m6L>FS<)ySw`=))z>8E1 z8HIrTGRPhA8NM3=fTYS%DPm+rJeMK1d;_Nes^(}6NeqVi857Ao5T+}pRw(MmAwQkh2t5e!(VJP-3Knc?OHVunmoM3qT|+$9Jm8p0$+L`p=$sLz(K zov`AN&+;N*-8NF*+-_cz<}NCRxY0&3_ec;r==~s^SeBNmx)fDw0MEB@vhy2NMa4jA zoHf;u=)_|;`=#S61B6ZNxJa8*ptL>ww9||vlG8cdvkuATVIq_|mY9%0rKc`C*krW+ z!gkW#6yXmuc|JJnlP4S-VeL-evYh9sU3A=;c)WZpP>Yv?gXT2CFc{@Nh>Y+egkNSQ1CE+WIIzat|B?^^&J|3{3~ zOCMfD#H$b6?_gS5<1F~c7FpLHk=};df#&i41(_53F)WEC4z&o-!WxGlF3O3&i8nib zSJ>z{pocEPf;k_~F%gXlPS%E1I^#Fm(G&`rwR+7Q6YezABK-NC1&7wnBD->xI_ySA zI&9YKasXvkB>W;WtV&MVkS$ZIs>RxH^)d}?S*)Q5o0lzv)#$J*SE({Xb86D0BXro( zr}iU2vN|uQL}NwB7k(LzxT7NRZaV-p;@)9m8Q)Q0TXU_fjPNg>wO9`u9Z&ZFEq;`= zt}#$nhUvV0KWf8UeycT}JV!VJr(JQ@V1Vs*(nf~8;wbgd{gTd&uYJ_wFJ#0z0r$M^ zJ`9NZV$`Eol}0;apP4DFB#FvVWI~pwep`f$3fJq58#$JColJ(_HibZn--CpwR8P~< zqCl($LReQ|GDWac3Pj6ZE`;Lqh#G(QLakF-Op7$w3LijCr-@*Rma-Sh{cK72i7?5A zhO{A|Hu)LFf~H*u-RfF9N%FE{M4o<*wiz&ur)1Gbw8AnzoFWNCe^6uQ`jr-qTgwP% zK=|ub(yU4F5ug}iln)BwK?iWQHaP9DRP(sug_1xFgj_Ho z@+9`L{c6@;s_tM-H$XHRTc;)=I-wmGkXX+|pGq}}sQ6otaxN>69hXU+z*tgJ?jLV_ zL`+4pyGAT7UL+?51GqHGUY22q1CU*mRMS!&IuU&=Z}L2pP{N22TC4w+5-cdekN|!e znJ`NW45{SojHd??I#?LOd1jM;>+pRi;JZ|(@F$+*KKg}AsA1FVRKQm2z3?a8W^meI z=*L{15mj7jLrtUBoUiHo=yHr){0ca&LMl&4b>nvf=1j-Nij29jCJu(C2ntGCcW1G5 z^|l$?sXS9<`!$~qEiST=&dyHbM`uQ;Y6TBM7Azn2$z;WwregmMPcQ-T&4*y~qL+k$ z0RhIvvQc+KgM_LirquQ~Ya{QP~B*HQa~5i24~ zQ@~`Vdie_@EY?{J^*`{FQUy?uhedNBebT6C*$ES_ucxIZ9DH9xF2>zxEDRBRR>o^Kh^K{cEM7eiFm{hXg5EOL3tk^PteNDbsC zt|l-dIh7i^iuvmtGI+4Eu&kuW?wa1@>}~ zT=rNvd7-vw=!;MdKtH8Y)lf8Ulxh->NK2)i0EAeI&(c;JWW%S%2)9*XL`fG-LBNDkreVv90Qa70VQ?D-v_BanfrVd5CXlOKRDvT6{zV4$269IPEL>JV zl}H#5d(TLEP&+Ly(e$lrvQ? zIb?t|X#xvuH>eRAuOhhRmcA^>AGfGiXyrBf>;f66Byb5!g#}Xs>^jfXIAuu|kE1D6 zZ~>?pz`d)t;y!)cn)6$6CA{C8X6DBD`3G%uLfvXzWK+vBDzNvuGHG{xn-+$NKrKjc z>BVRGEqP7UJZ&8r$HHpSBWcf7=FCQ3 zjPt&t2iS5`4Spev-JK;0%Yu;t0Jf8G4L5UqTn$1&^l=ax<+Jji0%ZD;=izRINuYL! z0+@l#5?EQ5am7oX6Zke10IH6q6ZAECvH;BNWg#$xyA^_1&9$Q$#rBNMOY60`l=R^7_6qo=mCEutu zPe&Vy`3M;ltU~aU8OJC}*xESv$aWQhdBqcI#}Hx$TaYg0a6Fz>JZ@sNU>GBXOf;^5 z3{b6==ga_~@>x{8V`LpffGHQMCDsLQaYBb5Nq?b(po~Oc!{R!)XBxv~i>gX>w1>4t{WW|});`BG>X+5%k^@mZ$ z5WGHv9-8hD*>bI2o*1#E?^L%=|mS@#+ewnRF!p63}4t@jg@7u&b*l$75)gn?&6PYYRkZ4eHIy+lT|YkLIzS?v_UJ=d>@Si zZ4&2#*5b}`AhL?ii}X@FsVU{tLn2)15;0G0z~$lnO))4XOEK^DYw&X*NC^TVh~QbT z(`ZZ~;#n@DN3U${Or=*EYa!e63!IgGdrHJtXYrevqshBsGX&}ki2>DX(77jd0 z;%H40ISV^BUf4b!ZRb?ewia`@O~00{ZDty8VoAnx5-b#gkpYs=@tE%F?5bXhU0$yg zkhPi@o+5*3+rxAu@Qr@Pv6`rxn6B3Gx0ngF)biSYV0BiGIg&!cDZj6-QZV@Vc%R!h zg+@Q4#hkqH%Kz{KtsbnM60`kYKT21IY8Mchkbzm|UD>ilCI+@d&l=V(iZ;*r8VxZr zQ0&(!W3Cx>=Fyf0*x$mRr^n*{^%5ZBM%%FDO+q0}G7JoxHZyBf`KNk?N=KFH=r*r0 z;4g8M4dQXERr?Jl{6q^v0F>^Zjuagu7X&b+99WRXVB>G;SNd5jLC{Ao37047==<%9Upsq!Gs_CfY;*yV{9;EgHGHL$!b1 zQ}0l?AHS&h-fa+Deufs@7+OxYI;~)ok;jcw!orq0vF0S0I+b%LkGnJF?O=gIU0NM_ zmN%E2msP=*fmARZlBi+JIqng%NSiI^XEB4^u_dU~z)3K3YTrm}#9*?q&0jM zH%2W61{uGxMy5tzroMePG}ov(A8^)vE5E48XEJWEm7b4}K zw}t0tN5c~1AdoNSZmsTQb?<2 ziyZC~E#)I&^;$i4vbcit5lw!xXr2xn3u#|OEc7a1v&p%+bFhqOB1_4UKH^w-SgX-Y z#W2IVMl`%{|V5Is85rmeiRzd^pr*Sv;~8i=N@HNol)IDEW(9BOlY*c@Pu z9234hoW}o9JB`CTO$xz})J6))Rj3^ey=;dG3OZahX~hN@IW9mDs1$^aOkpGzx@o$p zT%||lXE9v&az2#EZukAiv)83awgFfU@$g zICs!`Ko8fhaPGufA~dTh`zWwrB$9ih+pOBYmT#@b8X2|Fng?#8Ba+wwD^QuN{y zVdj#=#ODk4<%P*ScFIlMI6tK}JtcO*p@M49bI@=sD6pg?a>uBA)dQ)tqX{WeTd*%| zpsb!98wF5p>5@6G&kYgH*dRW3FaTp!D}3OYdu)lrww0`C)%vuh_hi}5_J!UVdsVDX?5Z^5f%!Z!qk*N9Z zy*U@~(aOr|Tgh;|l6I3tT-`C1Waw^ZcsNFU9J^WC$CWV4!aMr(T8 zEb)d@XhN&U>e`Y7uec5ySuH#glQYBF=FGEGR3Yk9^BM=7GsTYciJ3tq+Jsp^oOjXf zMCc=5ZKoAYg|TCaJa!h98`m#43ozr82iH=RZ)lYmFm`pdzbcw zWfw$KHhR>z|8d5+Iv`B@#@c=3x+X!361C`CWMwe%7C1Pig-kv3X_^noJKuO#Ugc5p zv160FBuyE%VAG|Ip!gm?xft=gy}(v@Q>Q!zr{ElqUKRM7Kc6NwrK13)KKkR|mysi@ zDmDP$oqXRgJ6TG3D4ajfN8JtdZ|Ko&v30ujM&&IFM_!KXgsJ7G>W;NtfdTVJEj%x! zCVnq0(+@TsOy}#@uPl)S>f@pAkt-yLFLR;A9D^z&s)CAyi}Tz#--Qcw6jcOU7)*?P zsRpw=t!lKmFd)UHo;T}hipNfG-%vD2Y^Pbpqvx`9_B}IEuo3$~Yx&AEW%jt>#Xlw5w4M{aGK&xFa{l%0f^)G{XX9r%6~%rZH%zi zdtp>^m0h)`#L@N8 zN!r$I%1=C(*2=X|w&o*ZTB5UV+@)tJc}!^^9unCMP*mBmyZw1BqIxXg3UEoOv3(DE!boLn?ECdAz_ zx87&O>j{7G8M0u8jybcyfBYhaCmlb>k4Kj?cdl!J%XmG+=KQm1=^K6-?Q;JK=Z`{H zM`ekd|G?SfyEdtg$FNp%%Nk0XiZgrm9J%Z_k?~`fZDK0ru{moo?8H4(k;TXUeEAXo zh|EUxfRiUYru+l#es+D(>#TLoCNwkw*13lA^C}QN;%9&wVQZ`igIgfd-$yv!DI^Nr zqJa|@s>q6P`sz*@zVN4=cF-?(;b$#L6!9a{s7c-e$l~)atvLU#EiR(!rY&Z<+M<$D zX7JP}p_@M|-@W{bw5@?aPvwm@#)|+YdI|1}uZB1ldL>hcehJ;v)n}Z1$)Yhxb#=a@ zBQLyRi`W8-Zgf->;}~03wz%LZwLi{J^A*H3n|87{!sQiR6C#@Z!yxIhxn7jTK;-rinNUwfCkjS$zcEK$_wgycECEm z@R4^BvEPQbi^$FA<6f_Fc>M}u$n3H0=<}Iew}RvqM9m?MKa@6GrJhG zSA!{|(yO{-l6qlz5tKVtYRaKDsJh{|>_^%8Q?_|>qSAbwx4iY!)DKKMsN&-IrrsI9 z=MZi>fAIIRHnC)0py#!qOkzJE)F+v=YJh=Y7q%wc^_pPkG=+GI$Sfr4|JP~_0# z&+@y44BT3wMpDoF<>8^lOXD}r%o5=_pI=LOeC#u-%1Y8(+8A|}-dd|7_=}Tut;_3?=C46haWfi-D%`wj4U08au(jEr7d(is7_?1kIUv?rRHT@Xp79ZKYws-h9h??B z{PQrn$^DFcsd;e%M|Ed!16^O<_|@FmyNX0dJVS`?Hu08QK>QV^~$wb z30RAslH9enxC0jok2&+UFf(qR(G{dwP#LZ&3OsxQhP7{9H6v8-(?brAh4TK(iVjSYh_#K=y%vk8Pz?750{OWJ+{58xbDfU<2S%Pkx7xU3rb(!-; z+zMZ5k}P=1IDVh8cUA9^)TTFPwdi`brj!*5r^FmeWcDkMEg!E}5_)Z?u)6$h_i!<(2;qfOf-}J)R(*Dc$dA5k0&u9?G(+aJ0k2Q+4%e23+-`&on zs&CdS6yuy@W1TIHw2?Z&GVJPAX4PmA=G4uq%}_E|E~@+6;IhlK+)jkL1);trqv1RRpn?n)bO)PC4`DvpHi% zFY$Ay8`0s~lsV;Dv+_oP(ncYo)9zb+r%R+c&GESJ z+OmCf3x7LZem>1vah)J*T)NaIa6occIJnM~KiMiTbW5^d3)L<;ID}pEPPG=~WBYv? znry0Wbr57UK-!8wmbblb_tg5Ay#VO<`*m05|Bu6q18%V-J7qHNYtdAf`L2Qt3eN~z>etzMLDyyp_PN|jsoWlxf!2tYv>B#Ghb0FZxooFt z7cRw(Mli!fQ$*pP8=c7FP*d?cl_c{(i^<+085!PZ&LhsWZ6cgLTYfISrY_pfIce>t zbvX2>&CTejB3CBgA?B3M=!E@*;6-nQ^Huprhj>K`P*y@~TM32*WA_QH)Kq=4h2cfH zZn2HQEH^7T1J+eQs}>5i&32Kw%6x(F+s=49K)Id%2}N4{^;2f(sis)3TBV9(Vx7Lc z*sx?^+1RFyvK(P7)zyd&n3P}6X%V^i2vqZYv(VY(9Lj@dxt^d|dz^i3@Nq2bn$uN| z&Z#-C3ajLL^?ma&{b61!C;!?vNJxMLsCgrl2}OG~MuXBoa{2g0R>YXR$~yR+sa^op z3}xlDRWFdFzS{-z2p(unSGBRD^J3)b{?)?thl+V|PI$JBj}QDeJeM|=O8tuV+w_|J zi26}=?V@n0$84Rysw#1m1qf*4d7f{njNbH7pQXyihmsk^pG87sCHFrkBrH3mqp(kv zlce_KHN2?&0Y<0No5f=>xIvaw#Q?l@+1P%utSCR5sKqz&wz|cIR+vXg#$gV?*G^;e zMg`7=Q4V($eAO)YQQ8r;IfJGB2k09+BUyv&_!VdXlqZ$xbP1TDal^gDYTIoxfXV}KT}`9yFvSk0*+^NEF5cg^jrmDP&|v; zkBg>;=I_=sFrW~sw^9EgTYG8jM%1Sr-Y$MUV|Ktc*AGzkK{FG0V_i`Pg?!bjVp*l5 zsmlQmu;bV)MC!Fzhv^HU*t9LB4GY86=;+U;iLp^EUoouuL=pS2HS;dLgzhj%j_4m+ zCvq2!y#KM1oxt4a<>~925&t7CO8^ZxGb7`@iT-n2_2Fx-hyu0lVAM@8@ZIg)G!#i+ z7c>EJZNk@1?D@v%*XWeDADd4T3ofHQEd-ZVt+AV#6lc-V{0m-}r3CKPA#sT&{ct8* zkO(z3_|)A3mwS$p$6Y|B(uy`QDA_QY1nAAWzxc3IPD(m!GBV5d$-Q9Aig+!_JQG8g z1~=U)CfU4g@T;$So~#fT+`oH=Lr6cXQ^qhZy=@|@Dy7_1Ckt=WYCHAdad9KD1(OvP zziXc$y};!KW&m5}VT2em*c$3Fr>X&E!c6fQKxM{VuCEjuR4o2Bp^$DUA`4W~YClkB zr5&vP{Uo*g7uIP?ISjj{G`)Oyp?K_Js&&n03MYKo$K#YCl=%z#sr7o|f>HFM`h|`t z!MczJ-zT5B#MRZ;QemfZ!KrODJ&yX-Bhf2SfBhsAbi;G&n^|$Ol@D$Du}dzXYwg= zt4{nQNIv+xFKepUFdSA`uEpOX1}rb6omTsNA|L z%CDw$DkiDz**tmu5V?Na6>2dMr43CLYh$O(^CUrE_X{|l(@ExD(92xtWSDI2u#1UR zB7v(~rCJpf8?urDrP$IvXoLvyaea7N$}#cCnNeJEQ=lwLJu6eEdSXjPqj#z&T&i*WQ5obYu8U>pwiO=BrNJM+}HiMl;l*xFQRxx)> z@SoQNTRub$cT5h-#i8}XIk+O$OsL}B`#Lr}n5SLP3^D|cSh#XVeb7S6|6(v3WVb9w zeWd2v-aA52Skv?|hb|YPwTPS+-M(0VOCbX*{)}OMQ3$Gm@qqe0eR`i@Tvf@ z;KHwKBTqc$@rLl7JUn_~@~Dq|2z+Cq4|xLhQ*sLr+y#Cg%x0+6ZLD_HqnFEitIAt| ztNaC@GZv`9YZ1%?1#t#rD>R<>&xNB=ngv5?R_pF5*}YD>y#%#jj%PBp0)(;_@i_7H zyOWk1eld}tQ3{m78J945hQPp|d8^~8F|mgA__k8g zjxO%Na4I_;Vc6?K)G*80-82y;?+SY!Ocl17)APUJ3ptv6!#zAEp1X#x_WMTg{72P) zG!f?g6vkZ#m;;pW-X;ONusF|;RTi|{IzXbR;PQr=$w`4pntq^8f!Fw5lKJOIW-D1< zci#UlZRi-R0xE*a%KueOaN;0s@QEF@{;PpN`To=f9!y({$Nb-?06<7|t3zb#Cy&?v zRdPH{K&)~Foh@T%Sy4~HC87Xn((C)h5bpn1q_MMvtrjp)5;>*>{_k}WF1kieqb&4) zA`pQ2^vifCGqj_N^?!nmKp_8-lL9uo;82F9Cg5wk_R{v9E004lm$&HOx zwErj22xBRn;X@E7(Es<*0DzrZk3>&=io_Z5f4YT+YP=;$6i4Fs|4C(tm{u7>@P%Ag zlY|TZ`vobC(bb)PG6ZMi|K9)*WF)1^D%AM@dJkauBVH({ndKDwKcxz)_W_63ylP51 z|L^^1D03oxB?(77RJNJZ6+iu_;eRDx%zIc};gvL3AG=CktbuWSge3mke{-QB&y(PX zwHa9jg~Q16rzG`^j#sFr4m|mDBZ9mRO{J9$S<}bU|D2Vh)=t#DPHf6PzRBP<-1(1W z3W!SuR->iGJXj@zcy!wSuZiGa4Q@s2&_RUFPBV?WMy&JVYuUR`MA7^zz6Vu$ zb(lP0bPzXt`qZdpvMnD+UAhX|v&W{Nvq?Wu7NwV~8B@ATK6>;@L>(PH{=g7(s|yGw zu+Zl+IWc>MuVUeI97cG$-E|=#naFHe%YtH}npFMPSw7efJAcCj2si#exT1o1N()B`3vV`$4R1^iOk;vM%;SiYE}P zq}MxS+ZvF5D^e4$!_-~V%K+;?%Go}a{^)iAkuB-rr&VEJSxCJB0E*r&3en7|fAf+3 z$|;n8^^>ubu=^_;$gsx@imE|T5P7`3TxZzfuRR5Sf6ZJI{pIc7lUUm*&OIQYKaz1I zs=)vIT=8n#doparU$Gc%J-=e8&kcI2B5Z=+?@^@dZTURN>-zutBDrLO0Xn3jY>b=q=~f0Sa z>p8$}A~dw?aewe)%m1F+~sm{a|XlF}rX5&q2mWpL16BoA`)@1ZNINh0T+zuxPU z@bw)1X(fOE_Y80P;|=Dasn;BK@b6!4ajB$DxJI?D4Dj zK{t1g-zTooBUF)e5YQ;k=AmX3yuXZt9ZN#xN{uew4C)qPn&o(8K+T} z$}JpBu&T@6`}<0pGm9nMQ~f+o+q+)!>R7{u8hU0Q+j%4 zce&eUoAtc6(p%O=XdO#Glw=`XD3(!le4Gt7n6TLYIE)blb`&QbocNXSuFh|-_**3Q z8_u_$54AH1?TMH`07t&3;D+B(=F@GH+xAc3oO2J=EcFEZMa87F$aGRDB&4*DQ zVwDManr_3hmt}z)WF&g>*ec`7`_KH1SJ;O=1ZFdGr+xnF=*MG2_eGm8C|`fkRY?!o z7Zsx|7a#=i2%X+pULGk#WzuENNtwK<3;ZLJ<=IZqFR~PcT^-uQ7iqFCqpPo#sqn?c zw}M(XN`d`{jpr@Cc5=bouk;;KUb>_P5`Hsr7I4 z{l7rx!psN>`hH3GHHneE`3cWXiB)twgP9tG3GH!xM0bs)`fuJ|@V$Ka+9ihaN@suS z{#hjSczpQwH=G|(Io0;QgCQTTNDO|5gx%Hk{(f8vd^#j86ye4Mfa0$+V?Hrb3le1X zPfeS)2q)}^awB%1q+A^)yahm}o z2QPva`g-@Z?IS9J9oI0-b?a&r0Z#Y?>+MMnL*%>z=Ng~y&cj{ z4uL;|3s;JF7i2TUQnc-mDEyXq^kLIX%cD0UieD!RdygZDXO2BE>i=DyzN@3rs_?bN z!=|}J%-bc1X>2su6p^g2ZEY2(3(;(@O6C=G@l(I3Gm?~^%x|;OM6~XX|M*9Khh72w z7A9g(N6`KE#7)*^#q4esHu5sq{jBQg9OFD_YIFOs>-gJA)xv>p))){5nH&7cW&gzWBnH^V>466{F1af{IW*stccW4_lZT zX{@#T$nbpiI=qkU3DTIufja8lIM#E!elvOPLg7|%$2)dm+H1A8b?!eRRwA6kMbLKo zb6wygTmmKBZkabRw_Ymsee3o_{Kkc9@fH?nJMj)xuMgveWRH7G%H|0zf=@xdIoGPZrvHN zySD#~LKX%%+!D{Mh+T`ey#BCrkbBm5K1bm4PSoIHN8(1Z(MDzL%tZM0P`Wz0(|gRF z3{%4gyH-b+#%^(p@)_1i9tLCg7)nWal1SQj+g5NzSqE zaeSt(*Ks)7cd_wP#h~q*htI+H2QdAOwH5#MG3?7tpJAb(f5&$(O>!l61SSH+Uy(NF z&HsEIceLfdnIDF9m?(Xh>2WtX(d~Cvf3~S%^z?U^G+3%l;?HbCpMOJN=XGO+4xEo} zZ9{*YHt4HKEFogK-tRi{mFvIN?4I(uuTo2@IR{=^(2yNl3= zuAuwPZ8P`ZuO#no^N$Z{f|9!Lw;%Vv9J`oxbx>3Q|Kfdnd>QoET=?{$*0$+8b=t5U z)P4W8cBbr|c)JkY$4mG~38wnx=oIUi<|Lu_GN0e)m-WGu(rtix9&rvzT%m0zfBI!1E@y-EEsNAzYU!F>_V~n)Ut4W zdLX51ok`QQowpu-A&|TsVEnS(wl7ZO!=Q7Zyt|26V`fO7%WCo zwF~^4lo`6C?O6OR+Wj|M0o&>(FZ{qS*1!8aX5aVW`gpr%??(UWo8EaeG@rci?>VCY-wfC_ONk_p&6FjYi z#}hADZ}?lB&Ua4idG(bmWwj2Qz|p_u9I@cPNAI4Fy@kv?cf(;1@1HVm9iRNhVC2Dv zEAPA}3ni~-Zyt}uGM|38>2Lf}{jf;=9@+D_{Pgd*?{Vy9eb>)_*m&68k9*eP`VW8S zRr;<^748`mn_m8#4u1HNAx1Yt7a(hMrAGdAb93%*=k2rBG=6d1`69RPV7>lv)3*1+ zLPB5P6|2u*>aEq^mv4eEC(a+vg@XU&9-kiz|Jc~Q@ebEeyR&|VpnKn@1iborl1K8R zEH89lXv6(*!87qKr^KJjKh*W_@86wE{+KNm4RrCezPNaC!+A>iA*kjqfxI{P@yDO{ zZ*?VpaTY#mtat|hy(&EpJNrmWj|Lg;gj(2su3oOCSbGv+oFVX`>#V2YF#5*#LXwj1 zKI0u-u!hZpxBlD9J&(Xdj*N@*f0=PVga2-Ci;D*A@F*-7248N8{oQy`nER4bjr}W8 z_jkyo*@qq6CGxZ5z|BuT^(B_P``=Exg&2*oEI0l8YuYxt(CdB|%!x<3xV-VJInd!{ z$DeCx;r+~;jkYKK^T&PMs@HG2_S%BG{r!D(pXLhhzmZG2iP!WU@U7hR?X%wm@6-%p zWIpX>RKLF;6$*my&m>Xy0cYnR`^B>zU&m<5q*R=&UEL=iEHb{`|fbC;aEne|*xqL*KLi z#$VmNc`WzbOsj`^u-k{^Zf;eDI`W=c}PnU?}UQa!}LAgzK`}+CN|Vt$U*Rr!FITSS&==tvq!9 z7XQ!_=QvD8z!0NqMaF>!iX!qdY2k3v1eTYoJbY_;pAY>0cb`Z-_}kw+@aS+?ZSBVN zenTBE_N^_Z&RSpx^~eTQEjow3ewnjnc>VA?XZ^rN@96Un-ZWO1WNYr!p1twfl}CT} z>My-^5io1RFF$$L=wAPR#ShYVe({Hezqsw;H#$R4{P?RkKCoiw`Fo!^_>;f?@;et5 zpSt>ow{E%c%17V2xBtYI|8m`C|NYPyUx% zKYL>Rjz3=h_@8cCv+99mAGqXeA3DDOu3!D?nqRFr^4u+VtvdD}esa-yM`lLnpLzD0 zht`bVdg(1EfBl`G`nO(t|FcfszjXJlo8whCU%A5m>nomk>*1A~FTM1J-#_-g-bbF$ z$6xZuHE{JeuetL#&m8}^i`YOgoqw5tY;G|CnmHC43add7Mq^Q!JNT%>ayeG2rGb>C>=kmL6+q|0M`zkRyXff_BQmK}BCg8IfmH@~baCkHo5XTbpn?`s9q zwk5$U5=yg#Z$t6ex12I^^A|q&|1N!O9e@41&OGVZd1FO((Ef{-%vrl) zJun?cQ53~d9LrcL0u%m3VL3SJFE0Dd7tYKs^C+W+h?UA_F#+m~N= z;gKD2rDk+tB64$Xy%ukIW+>I^0Rb`#`d^5Sd+VuZp6-v0<@VdR>%hh99(=L)bsso8jXKk@XM&gm6Zl zx#Ekzc>0(R{^LJ=@Gi8m~Y`vyn5k2)vcR~f5S z;wX&5D30SeiejY!ff%>JQ|ng@r}Mt?C9t@EFmvXqXP$9Hwm6Cl7aepYd-RFQF(16( z^-I%g<5=(c=e_Uz*Z8$!+_U7k&gY-B&wkxWXC9%(irtGB%|Ak{TrsfsMISxo;Kfeq z*&A=T><@RYDGv{n%UedOQp-4wBc*_IwPj1;oY$Rs+>sk7%8F;UR9(?EM{6ZQ>hMvf_B!so_x{y~KK|Y_4qs$f>+#FvMhW&1pq61> zbu2vafTa)q&o>8`9e(%`^P^Ht185y_>~O-XzkA~|s8uW#0SSww>e(l=;#YtA)qQJh zd+?bRn;#p?b$9LazW@Bp2lAEWkB{i5uK)9&{=Cw)$Cf|#;<}-I4(Y8`BMpE+T1G)A z6#xLUtZ;O2aA5uBf!LmV?4n@Qo)6Ej85|uPTl?@$SO0v2le29Lk$?bzlp+dCD<8Sr ze%-~FUv|ZN4_lIvr7a_mU-GNR(MP3Zpz;SDdEvMJaMN#p_q&TfdS-#bSdxmVcWL@h zzr5>(fiTV1-1z$^YQ=0%2dj;4esS&K;QBQ~RmlX@i(57fRLA=JN}(dqQfYJKZk*ot zw1c{q|L(Kjxu=r$Fb-;}XFvbJEB}1$wf&B>@!=H%D>p4Uat@(V3J~Hj3L}k3N@+qM z6~`<$FTDK^k8BPyY|Smdx^4A~kh1)d$DS+;>$z)xaNEk~VmHT_g))w6o0i`jUwG+F zKl;{359+N9loY5i2w2yg;VZAc`Jq)+Cwl(gRckl72Q79K0Bac_Vsd(NJzZm0{%&)6 z&cXw`SX5fG^6^#liSK;#oV{h=reTGsHE1e6cK?R6KKg~vojY&s>b{6`ASE>cFaRxM z1&BHv+qiE1mU?bk_oAF_`O&KT*V^5MedneksY&Zl>1^JA?q`2^B$jJ$ziajINNP?_ zD*|*otQUU!hwE<{)cD-;$DX@;-Q2@YKC!UzvDHruq>tQ(l>#!czgov56=(m`=54s? zrkm7}Z`~V<Ys;xLjy!nFqkgKw z=AHhQ&;R)E+y`!6{p_kW5B=~DPt`ImUwh9rrTLi@<4O@Al8&P=iWLEXQf$$IhxFF( z`}a@(zLfSc4#SxB&Z*sg$IaK>wb8MQ&pyB6F@3l<&n?T>fW9KQPLRU03N{rB+|Y0LJ*=k9;_1@#wKT=S!^{>>r)87q=;6hu-h zDf!&_r5kR#>CcZ0+tl~y^Utng2k%v2G6DdIqc9HDRsxwh=WAYgp2=9wq%ja_urdqN z@`*ct_tPI-^84!^>pbbKeNr2L^*^8g>c!vs`OVKBaLNgtgUi4Bl`r12(OuZx>1Hz- zKjYf2pUGr%S=V)4-_Lb)WqsduUDx$IKU3(;VVphmz`5P~9W_7gr?P%N=efDVPCmYO zDRtpyea>rOxAEpL10 zr4QR@ee9id|Cir<+~Mbb?#kZRfAG}qDAb%WQVN`O%JXa#j&E}XmSc=X(pim!TG-T~_KZ;XcjblESix_3jkY5Dg*`TC=dI{K~WedOB5hBrNP z)%UJ>k~ti~&USWoh~lmP``)*_@r-lN{p`^GryRPp7sfW#I&$frg^q@TH+<92FT3LU zjYq%x!}~q=@8=wU>NUY(7rg!SRIMZlR1l>PKD~48+}yb30bv zu%`E*c~pzdf+-M=pXm@al{xP0{nCr~UCLx=XEVMnkb#nOPWj;bj(_BT&VJn~C;rzWeebd<|=RM2uECQUrXyLlks_$4@-%#Ml4yx%n5q^B6mbfiqGXY~N31ERZv?QLR<)+TO)~-v)z#JEf z3`r9aU}OCffF>eD&Y9L^BBiw^0<>(QgGx1!+VWGLZRt4DhzP)h4RNhj3#3LTm0G%Z zvG4mzP46~I@X7*d0z}S{5Va(RT9XDe0|PDFQRV)jinQExI_)tts4Ul3mEobWkgRNH zSH{+r;%KQRZ7-Y8`GU#P@K8A*H&ZC&oVXqmGC(E-2Bp!Ov@+Qg2Lgt1rBtqkz};+T z-XdZw92+Wz;1oIwmX4$eTm=B2MwBK(eQc-{id<*bwuE3Tt_%*9q~&J{`3%?9q5h%- zu>5SscMu4GfY~A(MR#e&zr=gnu>V;crW z125m5ak-XKH^OrnLNGE|R8G1hlMyJjj!PqDUYOHq*9Qki1I5#Y&YTZH5CcwFh>8qV zBuRtiK(!p%zNPAwT0K^PjJeqkPu4=>j*UU794I0Hp2}t|i~=cAzHMAO3{_AqRq6`R z?d;8St(A&3Fhs@x5M{j@YG!9LKGlW?#-em*SH@*gC>z!eZev&)8Lcoklk3RkySsu% ze*XPi?RUNZbYHjF9}#Il&Nv695lIti0t5t5gtqTMX=Jce(@r{<@htP!ElWUD>L02A z^E!G9Hpp7JRH}q_u8>c89AtT5pe)JF^%Q&_$8jUd9;j9vjYK+^wn-BaI%qa@Y40?9(`)v`i^7H=&p_NLT`o>*enrJw#TB;;o)k8ey*#KWgyHonIR z7>|c-{hDxLzCLV@aoxDz$YvfWC2h+-qpx+@tcQqnTTK&)Xw}(QFp>S=tc6Jy6)k+xWnw?r$3r zjhBU_Tg`8FX4@z-<)d)z+JnFN-^*`V|Hl9L%4_F)VI7FMhhbDhfo;;{DyuOkAqL_yl7T32hCT>8&*$t7*xbStJ-BVyQHS zM;?F7oj3g{Il(PKf>#rW$WC>2O9Mk=brj;&KA$2bF*|pDme+>*hhBNxuMweT zJC>03N(|F)-n9$hIrcyQZTbG11GDkgO&Cifp2fUA z^VIC5tN|El1&uZm(D;}m(tv;_B{h0pYsDBMaw27%tgXsSz_y7y(I)P%`7xr21}Ea2 zn>1Q0rB!1vwG9(f9U@?(&#BQ^A|l;3Xc>Sp9+-$4%{W8Gfq+Q0q6Rf-Y(zb_Iz%-C zKO23BfLd!nlY=25HNs?C!`}>A1w_agjDNGJwbn$exiKm3-&cTL1O=Zq^QiHHje0JN57=yJxDR$6PuurbUC2uN$q zkTJ#xKx>T%oC{-gX$@U7LJ%2gtx22hddFD?5F!WAN~y-+K`?hr`^Ndf_-6=OYcq_^ zH8NyO005C{y=U_Y8pdJ>Xf%y;M5eVOB8JSoAVfx>0YE8jc623DhVr!M5BB$Awx?^a zB}Rgxwgmu6DMVz*;y9KnLSYp;I&I4t8yV4BJC-YiU=|B%L9JSnN-Cu-!G*Ae z#ckVlTpIzSNQPk$MIn(kd)S6y2!N?n%CcP*E3Gwh>;VV<~0Cg`Gb*2cXv;%R@=03eXdZ*X0x0z zWUN{$_iflnM3yZUFWJkoty&n$C>k3ZEtku#=h~JX24N5ei}zmIQRrE>{)JR3Z3}0x zzrR|kc)mYp?p(n|tyXhA&vNX(%^L>?`nj;?^v>miXR=u$8W|l8qp;A~nMtKLZ`hDc zWqi-CMZxIEP(27--}hZFok}~FO+r+|Is&+k8;3!)QelkcI`W(gAW%w1Q51xslFIQs z&-d!J8b{1#^HET(R4P#zg;7`!sv1BDOG??<-6LbUX~Q~OI2PxCNJ@K-?Wa;IQq^)v zO69n27{``t&!4xjf6M04;o(AOXHRc0L#S2j1cb;dwMrP(<49*a^0`96^?d-agq_P| zm69Wa1BF88%BP>G)oU@y1q&A~-RD3V$B0lXmE$-D;BinL9Uio}D3?kj{e4QRbRi!^ z5h41ibS9T^T@N$_^;*>2l(Zg&nOuHO@0?99uIb;r85rxH*PZe+qeFvQM!9UhR<4wa zV_XO+V-$97&b-dv-Y^KO)e181a1p6+(Yyuqa;-Qr6x7N=wd&cnV_QKG02d^zNRuSh zHD|7$$!^}X$+qoGCWj1zN_F1+Ii1}-0|Q$IxAbdLVHg5HCX)?=Ad|@oE~=$c6a>{; zb?(ANG0Cx!(L!fOWn`>gt|+Az@3n01!i6uq@NEC4O^lF$q>kq=Se(u0f-necL1#}_ z97LY$=L;PxpLt@#`t{2W*uNv+@zf&^X-SKh?lph$($%Y0u3xuy!O|rQ7wz5Gx3O3% z<_jH6Sbi$CV9}zX!GZN_S6kd#xNu3iQe5@yGig691TT(`dY%c64?2 zbk8joN9*+(X+i|cc5KTY9O$+H%Fa+Ojkm&&Z& bvgQ8+k;B9DKUE1t00000NkvXXu0mjfspVgh literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi4.png b/devices/surface-hub/images/sh2-uefi4.png new file mode 100644 index 0000000000000000000000000000000000000000..ae6f427772f74b68824c409a2592978474e3b2ca GIT binary patch literal 73087 zcmbTd1yEg06CipZmjn{rEpTyncZUlJ?(QDk3GVKa;KAJ;f(8$P-~@Mf_jmLCQoCFG zY^kC+=S)xAO!xG3H{l9$Qb=#{-vR)DBn=T)0svTe0Dzf*hlPH5J(<4>{exf+(R2a; z3VUp>P2><|&&{9RiSwr?Cud$sCqoIkNktw6QjXe|^0QiO6?G25sO`X9;rskHm z0;DHxoupt(69H0n4q0YddofcBONghVsj{b>im|7)F^>tUkRX`fofnG0#?;vm>~8bP z)`{0$fb<`{ywK;rpP5L(|A07K3y_NZB?#7#RRD|GIhukw7&#e?S=c$iTs({{oNVko zJoI2zW)^NHW^N`HHU<_>UUp_)R#x!8e@LO!98Ju4mBc0gO$+)aKx*OaY|qQYjs1Vo+B*GPO;Cj~xf|Luu`n|K73m*96XXBF*}FJ?`iHoQF_Y;hQyWuT zXD28u%YR|*E$p1_oGk4AZ&3et_ARqX6O{b!*R{=+g@OziK%@PMh+Ep1Kg z+?;6shdHL=hR&t}q<_a5m^q=VrozI`%M4vO4hCi}=)=E2W$jEX%{=}WQ0~8=tn9pO zT>ld&bk~>|Ivf7K0-G4~n%Ozp7(!*Xv@tX{WwN(5Ck6jkle}VfpX?l=grVHA{g2jgL+D_Lkc zZl!CiiSFJ#j(d%uD9o%N4kOVg$-*L{gc*mO-$o$W+aFMK+`L4UwL(l#4f8r8p!4Ly z=kC1km%v$u)0j7JShnl&??F@5X;r?)PkR$B??##7Bq%uB^77l+*>#FkicQc6lVS3gCi+{ZJ3gl(q72 z@9r~YKh&jFbc>KYcXS9oKMSMtxqfO&V*q}%)K7|qAX=jn)a`~+yw3Zk-9$vBmt|Wt zvQ}M|Gz`f+{?kAok>4XG7G?IqUSYi8vTWy9rXuZ@T&P&ZbiM8Tgss!3k9>0ZXxEizZ$Z7~@FD5cNv5rBomq+9GzzXnnIEhrKg}9U^~YM= z?-E9~RIJ#~WHI{KlTk6m&^NEj310xAghKgD>AF8hL!(L>F-slZ>3v2BCD& za2XGWNhMWvf}H_<(kMJkJZbb8Of4!rcR&XmpmaaxiU@L&AzIhN=Bx~=!XMURn21)U10^7;&QucZ=uB_S84u zdO$3SHE6Fc$A>o^Bl0&Lx3)%7$FhY|C)yEeJiFXWOoB`m>S_y%T3TA_=y+M!+y9woj{x`dh+?sNsJdKD1V^GL zrZ=2S9S_DEt3|d*M5^eDH+Nf5)6lT(BC*J(RcEy26e}>Qw{rh7Y${EnO~`?dKnLj+ zC|Pq@`RWS+^-c%Z*bHfBggaYXYX@6R9+QQ6Qn9yiaKWHZm%~NH0<}z@OxNqhd6M2x zHgZ!pZq^C5dMy_N1wW93eGLUQO@9p%KDs*HwrfQ+H2wodYHHrk&-Bc>U0vV+asl=~rNeJSmr^nk zbW{{HR5hj1QQyB``fhy_FKp;2@ipZ*CG45~8N2qBAlGmC-Wo%Uq!>fsjzA z_vah9H*jp2$%)BZCM`b-!%0ZGIorf2Q?mtpJF1JrHiC0tq=>XxWS%FM<4p z9PaD;_6;^#}hug#7yK zLbW)_!vjuHQBkfUX zERGE9toOY$DoHA|*_#%L);JnTJ-gGNQ2hXe_msV`DC`22fgRIyP&v; zu%O-;GfzoK!0|^fGD3(U?llAz9!)m)fq!t66d)274l}bzAh+`laBoUS4Ih$hdlw*_ z5Hw=t;IC1Fih%;2bJ0lbrd6^i_$d%jT*dJ&UnMVj($^mS*QaXcw+%@oF9ri`;4B>Y z1X2V*7?uf~kPDyXGWW@qD;76gh60DAY00Rr4t5;9K!%bM1hbFaEXzE*za-48RH1cE z)eF{$GSi|IlcR!cvZA?kk_<2(t|%%gS+Rb_EmS1ma%_2g^#1<6{Uw}E?hE(XSMw~( zrBc=2=tMpDZ(E>Hj~|PA9;FSwf^%?Z*;e-n48zGyAM4~>Z3QrAlDs& z#FcydY$O1X^SSE3Oy$DMIZXUz({}lu)p>CIt59}Lv(t+0Lg|9vH?dH}%=3+J?bZWA zzK(`^y-pe<*FJn#;Ur?A$avhxf!QDEeZ5qF;KlyLTdtfPNgvD7yP4lPkW*du9kk2- zsimu^YmM>jE|1vz{5G<0ed`Dh6LaoVC|Smo^C?{aL4Tsd`+-JTufuC=xPpP{W0sDR z&P2uMCLv#Rtsmp$S8aHzO)h<0Wxk6pK0O#mxxKKdI_<5qmZt?a-P0Tl?JjAONVDy~ zcNto0oK5@FODcK*AZPU=yJ^b|E?JdMvV*5+-ztXZ`1;fO)QzwoLcBRbyIF zTUFK6)o*$|%-v(UR52b?M5(g2V!ASjtEm!q6$vE0S7l30Gu~$ReoWQQ%eSjZHP3fW zh>Gyj78fH!z$P#Kfx(g#*0XN^zy8?B~ugP9b%zQxklBNFX0*d2slZFXFCQgh^=ZAVs21HeE>cH?>JQs>o1RqO%n zR+ZP;`J>Jzm-D%`K>E}QD+6|83a75gfeZ!13j=E*MciZrPo7 zy?u~x;9<5NswrJRkM$Y%W{+8H%%iQ&{3gjqH|&! zzkN^?lOdUz{Ym-!;F_&vuWvc_JNJ*q!|$d%<)vFwT>Z^*^m9(+Vk*aB83H%qm>=#7 zn|6*ICWaMHe16ZrIgiQiaNV2Y3A~x2A)DS8Dvj%9KIDS$$uvE0YvR|)lZ;7{$)D8! z%t0c!eB@fC{e8Pb2@Y80&Ppm#aq~5B$Qy0xiOTD-wj_EZ_B!4tq36=u+E*ZVtZ9Lc z_EtwgUw46B@a)$l&!t{P_5p~XQGWyGQpm1kA9X>HM4WQMe%2?e&HgtY-xsc*_)V8- z?9|MI+BDm=*Bwubn-!)VdNKnunt49lFe3gPMceIn*JJ7*oSMcK6^kRI5YHx+;@Z5{ zn;C*dMErkl<0s zSr7NIEdUT~ZRX=N+?8^YDd4cbsI}sEYtMwhFym<<0fGnwkmcoOSRQnGdDr2sp0*ct z@Eak%MLa)KK>c)Gy0c?Kn@ifjrDnVAD539L2T$T$=Me%1P{V|WXNWRp>g+mwVSW7C8& zh-4Szeg04;;@|TJ&#vQh^&Fj`xJ2ZXo)(LWo!3pIH%~}uyZmc)weapNi zuqWhIcRRoi6brQNrGF(r5@6|tI91z%}k`_$dr`Wyz4Le4*3bE9P{XN!jlPDoh&C?dF zB6UM_m~n$ekD(X}i5d)?4nCTU}WjApy+qmD1c{5BT2m}FI52AW5G?=&l~i7P%AaZUX&d%qz43jOoz z+i+C?JaZco)C@s2=?Iq>d>L|j_0;Y8y`7e=Z2VJm*2un@z&uTIynNcVMq*vIw~Oxc zG5}cfa@wF~4LCDeED_ zzg=wgxT)W(@;U8(U`XTYtm?JlBsi-7bMh=Kjy~!gPL5PszS@WG>yKEgnJE`q(JH8L_H%%5){z<_SC(E`<7WUnAe3uZUhiq5(O2&?^s_cBrAuz(X} z^R%0om@$bYtZ+H1qGq5en#I4pWY;fAOJI`qRpEV0&Hn3vW8m27D^JWWf>t&B#GK(6 zVtHAe8`f80qTk*sFLLC7@TjSFU=WOGdf&rn`t$SJw``Z|k_SdaLS}MUaR9If$B8}s0_@TXgL;iQyF&$mGGq7$=J6v{^)!i#8 zczqYuG1*qHB;`slIht6)K+CZJvnfkVy#DNYzPWx~`r)(U*sNqI*82ymCFz-O$m$7l z9;-RXec6baF8n3ykI!@F+pb7K(|sPQasWV#ayHa*@;yc`{mi|V3eaHV>ga5pn~WUh zkDs=_o%>;ymiVkM>*1|tT~&Uh9-$qM*Yqtne{c**xNS5!I2jqV8n>_)nZE7Kc(|gS zgD)zL(a*o*Q}r@;Y0F!+sfY1UgnYnncl_=o$?f7z=k^BC$uScg0NG!ey!;WhHc6+A zig#f1M{^^6au?FQC3_-!ZM!8)jqwl#$z`CB*x~>L0U%>RP1&*SOcR^K{_$4VSP$QT zaE1#wWNfkBj2uJsA^9{stGrSr$H4D0nm2a9kmD@o8b7xR3m9u!1~1ZprBoGz-@^dr z)U>rc?QinMf4*D>v;3jLDBoerKrc&&;FYIy94s{n?kYOE>o)q}A{fv!uXLq|}R-AtOlZ}I;q0@FzW44lcJDf@!ak5GNBwM}maQu1fx~_zt zDUZ}>Bg@lk*X~F}kzGO&0HcThFmhPx^nFG0+jCC|os5*f0WCB1@(2@WU;2zxR#@Yc zQc_hv8#fIJBQ5neZJcIz_7MZMU9I{sJ9J!p!gS0M5(*Z9&yjCq3e>r^1o)o%26A)G z_n97kspaJu8td;99T7~HeZP8KCU{-AqHTv{y)97}W$vuwr4)od6@RAU;FC;V=pAXm z1CU%Ps-CQ5Th?0eeLo+%(5XNys6qnJM73TM|CQ>&_7EP*9XS#*-R^MV<}AH=;bUD=V6iFAuj&XO~H zGyvF2oa!_+_|+0+#dzDo)j@#%0VYg^wnkIGkV_jhw%a(GNY*2kmq;pr3jj*w7jNIi z%E7l@NrE^(9}bzV=TWiBs?Csfyll|;EK9#~Stlr}9r^wzHjSe|0Liw*4U#z3EX+VQ z?J1s5E+ut)cN^MIA!TVPvv)*Hl#RMjuX;hg*HBL|5rmzF$ZM-}Q^@ju>eqTyyVXgh z{P%^hGGDaWZYLM+}i4&q(kvB7pF9?pm*J^g_o@U|i^XQs`Z5 z@|W&tz6Y{8?qg_;#2YiYd*;#C{rE5HT=Lx|upx%NiSwTdrD1QR9#M<~cstrWF(UoY zK2x9k?nHz}ozF>0DdSTov0nW|4oQ%bGxs_FF6P4*l+a#j*4zi8XFup=|H)SZ6*RQY z`TFk!N@6>viDOR%rz|7f5W^P_)`EZ}&MbHoXv*M0Urk9%gf2NPnt&5HP7i|K`h`$P z*5=L<#nVN|?k05FwcbHf0U;p4Ru6*K_HuFx>Mt*$MeqZEGX~zUW7bnz6Q(RML_>dx z!hp%$-96&jMS#`Ue+eT(5@=~@$t8?f(4V`9x>*o=t6xw9z>s)|O4Hz9wAVs0J9oQZ zzC7qq;QwXjB{H|TOuZ@rxd@|)#Q@4HAervP$L>PrmM;iVmgx z8t_Afm?$NH9l~M$8O_1Fp9;swS1I|SZ1fLh0G>MtlC^=LlMGc#2#h`9LWh`CLM}u{ z?{BsQ5Jn9;9ak7;Fv#i%Ek-}PdAY0Hy~jAmoESeFRG!zEge7g?_^4tFu8~l z{tH+it5T*1iouV3=v<48X0@Xf3J$dmsARRO*664`Wd9(8&R+$^kV|*{`!$D}mX0kE z^Y`U{ax=p49-f}@AV!9NaqEYQE=`_489eLN|Cc?0I$@Y@kSf!bifH}s`oRFCsIrRW zJq%<2q6UVsoWfV4jR&t8hQdJ=@EN3lnVjyHnNRck-vo+Lx&56t{@Fl?0DvmGEGU>i zve*AT0g9d(%3W=4d&VZuv0*6a?{s$5prKEt>F9scP`$#d&H4Ez31}Zqb)^3x2L`@= zltafvXl|qZt9z*K^z=WVH!~vqqk8Dd1i}VdgkY~lK-cg&FRrVGo(c>E7>OgwuBM%J z!XZ#olZO>rp#R+y*9Hju1GVK~b`6d%IpU;fVi+h^B!&UP8R-)Bi<9~c-=zJWw0@dV zz1!?P^pQU;pWNG~iPs>_U5nAC06@R??9V`C$zjy!sHosm+tkD@e+$A-L4Nso;TkGU zU+_;{TbnaMp_yA>BI8+ds}SwBlG% z7)*sBah@QM`{3dIa0LFlTzm>8h;Y8f9>FftMpQwvsw++$*blP3bx@Up%D=*lPD%Y% z2isesAPX)54EY+GT_p({ZEO_)Mm4W0DX-<#^jEtF-In0F$y%2DzT#4n3gS+tIx^z{ z+kb_DatU*m(d8Z_xz`g=Zxx*M4H5tV0r@m;N7GJ4SCTl=zkP+aC1GPNG$9`yy_!Y! zof+~LyBuvJ15t&hf(PQd=)B1i*1yxSWngW+77xc?F6knRmS1OT6&`;Qe}y}#9|!yhAo1Qz2rLgR6JDvTT1p}{Y#s*b z*7k?{TCE~sbl)>PvLOC;e#`KWA<9s@B?9?x!OPmKh>F&~IVxuy8LedJ*6;^gejV=B zW^lYfDXn{l?k-Axb9pvt-@ksqGY^-{nSd7lBR6!ZU-&d*(yXqnxotlL@B@T1Mhu&H zmSAB6p!-!gU}4Ky0<3WTu88R#LPY#HrlXdu8rO#pTSjSqFZN4stV=4&*;}Pc1!*PW;S<2p z3B~EpX<$f#z4n!==@uc`H+*b@;y3f9q6#Wz+Z?Sk7Ab2g&^7FQhrmyfSdzqAv!JD* zqO`G%CaZjvO+pUur7Hk0;@8#kUM?l451mDf^Hc7YX6R%zb-XxfE&v0=zvDV{M3d`2 zvt{N1HJ7(M8MX;vT=W{-qDd>aW;}AV4?hsWAjm3r%7$&D7Y2E6816k$O-5H8{m7Z< z(iK8NF0Q2b(lXi^{fJ|Rf-im=8p}_i27Fd%u~9;i{OWVf-?F1D***-%A)VsT(f&h_;tF!x~il*mi?krU60B8TKfRgs++>|Zp1abf%@mIO$3cnyd z;-KimLiUFR|47Rj6qfJS(9*C~1c~2!6nE)q9svcz$^}z#3e91@cpuBG|`|QZ5$jab^S6L#v0PMAXJ*C zJakgs*-YDT-(tC)f&`~&SZ#@*kbz>F(9yNmU)9||<^+ZO;cv{(A*_d~QDpJ&u%Z!D zCKo{kftS%XQxoGA6-@JRBLKkPIDU?gl#!NHfi7{}r4431Gh}hZypA@5Jls9*R!TxD zYk`@Bof>qDlOBJhJSX^S76h#UZHf(6j8`HSNLAIsw>M zyD6uee-e@dSP&oF;@C&itlwTlup`7n7kU(Hf05u0i^Gg-1Rc}6tUCz|oY{ts{^H|t zmcn2dgBD2sbiZ|3KoD+Uu;n~M&$fq~SmFL$(nAW)!cveH>6qXnWg$T1&G$!_ zHdTtDJfOWsfQ6nOwjClLSVe`ye<%e9P)S^kC4l3)YHgoILIQJZD@`Yq;z6mn&@&4a z5`q@hH?NM0gN3zykY`e_0N00fP^gI0Y|LDG|h3K=dU`cVIcj*Geao^WI9KtC%x(IfB2I`*^Z zdqfeIfQI_w@|kGdkdhHPvIxqOR#&Zne2X+mb_sL<)4G^?;*~Ti=(HVtN;t4jS9JBw{bw1)tEdZaz43gC7%xPt9VSJi0Z=Y@Bg&B>Le-9yuKUJfkbEi*-<6jHrLN=LIwaXcu>#SnH zG)3L6<|PMq=y8&H-;UHUO0KrhvJA1Hr&>S`o@BM^j@gu2QYzf*;E*5?sK0PN%xr6@p2;%3Vl>X6+!KC3X3n{XMbBFPMXXdrBRU!63wy12Z>MA%M_rW z&HTZCH-eVbyhei{OekMw;>Z*3UZXB9Gcuk|))&|HicA&e9cg${uJr2oEA58_FuV!V zNQ=^3P8%%{M=p^FT0GR2m^7ei^WiB9F#gemjtC1$APs->1sWKQ9OWKy(#3VSZ`(jm zH*i8c#NTayq%!?-x*=qa@;8i#A`A9pUpe}l)~XTBE2S8oMQn@zj zvpD^ub^~*#CZ8B8x#G@DN}KH$F#P$pZIjrQA6i$-61&8T{(dynO+#ZXXsm`hhBtif zm@nfZ`lWwTnUSeZYyaY#+kmBSnHE6}{WthXnW$M0cusFs59x;PPjwoEglojh-4v&iJ=tP+NgA`4~-`;xKLoY5&f?edfAw?wyi+ownUqmmc<@9`>4ofWy zTJJmMA4EtH<+7H57WEr>q)}QV8A-cIg*VDsL{Q5Yj_lv%%g~c%aK0I3$1RO^Pr-s{ z{b26oxOi>Y#FrVCP?oF|Z(xizx`>Y&8s|rj-;jVtkKHy&5{C(cQY-X3u-n1wVfBq{JRO@m&y1 zWeR~b}IGyTkRTb^SAP7jVsHAY_kYMvY z9!BrZW(vV!y-r!A4B}Y|JnRjX7RIq;9QlFc!cxZS-WoA>&KN_5!$s7vI?fXLN0C!e zZ{+NJKMqw)9QFJD*FhAV6qP&6#pBwV;t?kM20~2LNvYFc7^Y3PIGz=sNn{f}6kUBJ zDuUl=<(?xT#Uf44u`=qjo(0|Nxd?)!9k0^@dK_bKt8!Sa2e}*9+qP{tfs7T zj2Qh6QxO`SK+?9CLfU^ivt**K6D+G7;OsfR3(K*P6tC;s!=mVlvo+RpZTu3BbU8s$ z_H-nN4I{#0^i{=#uB@65l<-(l0w6@JT1D1Yh3`=scEH3VER!&D4ZMnDC&N~3FQMmR zV;k#<=W0751;a-aT849ywy0Wcm_}Q;9W{*LoR`AI!$Ts_!uLIAmf5}u7u({5+&xTE zBf!cJ)$56LWWkR?Z^Cmcq6+NINBwE|flGbo{9|NL^E#*{po^&5G1*Gq_Xx;^!20Dt z?6qYjBVVCm#tFlAYgu1Z7T|o1m!WV-w<@!Wvdw`9Th!>#6ul1_rVUJ%Y9fe211M5T zHlrpLbWNG-!pNl~Kr^4lwU@#QEfdI5PfBTqhX)xj^6`1LN-N7b=a)bdikLLb^c>UE zW>oUOF%`LP8b)fA)(Uz;3Cm59sPXni3kFR&qTu8rTn2M z4eQ*=b%0)fZ;C1l31M23A1K1^ZByLD)ru7bctxOx271_zyLjB?s3U;x9s})*$URO& zhbPI}0X1(x)f(VuD_5@NtK`1}%At;E)x|8Snv`nVKSO{fP)bGgDS|-$IH;}PUrA5N zK3PtX6@OT}JtF#CdnBh!*Q=ktZpT1e=?;cpRpL=*B2WB67cxy?m;3 zHY<8eUg;*S{6U@sKH;`*Y)!Apf#9Bv?`cT)859(!R7L`)=WeiZ15E-{zp!TQIg&&M=8{{V{wfZaVk$3YT*Y&eNxeW6K= zhwOpYCCa?`>#KJemzNlFO%H~lZ~o>Q2H}G~qKBvrW4(HfZx4V_PfQ08_*nJKr^ zi~Ra8t>VF9*Slxed>nbnL`zRkYDzn*&s}RUYtHZxmBsngpq`a}`tyRxyY}2bb?Hq?&t>j@ z=b6e$=)+@Ml~?O?#F>7}oNW2?k1FDd;al~pyVL3&->(lnMWM$x-j%VTP;;O5{*=a`l=n9M8P^?qg~w;}XUbeJ>uj`! z792GX2dC<$Kb+a={%axor0gyaqwQBk=EJ&qC^1y>Sh9-+`Q_*9;xne~obCIe#r?Kc z&;3}RtBXGyZbdk;FyN?S!Si7qWuniMhU zYi8s{vsblDL5{MD zWNspZaFM$I+D8mp3rj76CHa=KIK4GDWWrjgA& zeXMc$)Ls6T3xn&^M3CH?5@5f5eCPN(Mn(^P(P%K~cg2a9CiO;3d0O$8Ah7Ic@a5Z@ z*lg36^)0DL*fbR1qp!B;&-ZC|KHO;=@RmZ4$y9t0n8m`{sCR`w7}qT6Iy6(&x@Dg3 zWxZPLqAs`hXkFEgnB~0N7vsg zWtp;(V~E)-bq;dw^?}x!8}&fDrX=#wQRkVY&W9WlAA1>Q;IrovS7#QD!+E`3nIW5G zlOfk{O!QCNw3{~l+kvAQBKqGD6Efa-sSSZgD*+G<3gv1Sz==Wo6+Xp z=W0z#vittV(JY0-q~YfEC)?{T-8B2I<&ZxQoab-P2{RdYpA$Q*k9s&TkDP(~Nz*J?f9rN;^B^T1&Q7JbujmRHR>~lHH0@=X3A6cc+yf4SB!ZmK>LO zFx~VSHL2)*BUK@5TPpohww+3la~7|6H51@>&>t*nYVt`O_4Ari<(&MEhxd~k!NjGC z#R~${O=Rj~d+uG=gdLau#0UOdVuIz##8J+>Ya1MUx2}EPy|3CcnD-5P^R!VQVF{^D zo#wNUuWvss+YR5^(iRKU(+e2cA1JsyRYf->71)eL<4^zIIlh3_xf60N3PpawAcQHF z3j3Z81h@U#YU^p0&*mjffmKCr|gy zj{4|Ab8HHq4SU-gsH`ifYj+Yc-W0HB}}QlqVtfaUY#`%=O&q_tgw) z8<})GxkIsjR7lEQsehK)m5jH#O4fbXnci73?s7JlynU8Q_3>x}1!%y*9@9>>aXzni z8w;N#5En<$m$gCK^FdAAWsxa~tr~>|plL)>m@aRx(b@{jZF^m3m86#ftas|RBOpL( zufS!*^__p~U@^pD?+j&S(Gmm{FW(QXzvE!dWaJg4Gt@-}sCk+;MzWn=xhTfR^X^=| zCm!YNUUpDjyN^A%Hc5i@d)ohXGtlv3O@oGxg|RWn{rx=M;{(^p_g{OtM!8W^O^h0z z_%Nt5X~x;UkMlEq=1bkJ#l;YzgOHPzG~Z!Fz@W9!y+1WoH;Xruk(9K3|F*~SBIXT@6t7eX72mNUwejAC}sP_3F}9jE2yXhb;?Yv-hij=?u|y0Ne4zdD;~DXf7OQp z5o+EyYiV@rVS~j`nMNB5s=OKwd0{7Xyi6v~%NLqVc)i@m8rjK!B;vcrB|G&)`m305 zq!|c7QN7O9@m&?e2nkuPGjFDxO10fgl!ONW#I<=GbFKKa&Z6Vyy;B$w-`bgNuK~-J zL`Fr0A&Q$9#eDX>UT1>`=+#pyc(v%>MvhBJ{c-!wV`rKI2k7ifsLA>qmyN)Qi>rLB zciUUP%eMIiEjC^BEEBtK!}$H26#9sR_3iJZP>pN)Ww!~EZz9<(hD)tFn$3*7!vk@R zmrqPpXW$D&cw~fgg*!>{0gwj`&&Za`J7m=h04Vsp*wAsKXGUDVllq{IQt zIsK|g=kUDlAgDbpF8;E+&Y{n+nA8ud&$yM8$4auvXmYk|Bxj|ioKo+bA9YJ2kwGcf zx_{DMAuLCV7?%*2z?fB+zjH5wf%dmtEu?te9;?l;@$-*|u2nH=c~|!gr(_7+Pok*X zz1MTtTumt$0KFZSqhGNfB`l4clGt-hX|K7SLn2pwBN6QG?*8ybDhTdj*uw8IaOI_4 z;^bRoR7`~Z`%Jc*op*)(-yCL%?i^-_0;Td9Y3U({u8FJkiw$m1GdciZ{TyBeZ7EsJ zi=2=Mv8))$Ccc_TEh_~8nOSdWPbBfP#s(G<7FGc(p{LtSmKF%;*A=q)&}IfBJj+;_ z{d{cb(2m*aw;#r_lhV@iMzl0qAGhmUiI}vUUPZ7;G$GSUKisv|*FJnn%T}bd zvAozhVrKS7`&|>iok`4eN3j4Wta7;0WNXX`yE>ufTU`(~B_X~qx|z{C%3|f>#@%R0|023pPs1*tW|k+O`MxkJ%4-@Vq#RQ*M&?laTBNF&ci{)8ip@zbAmd5BL>%Ae3>TTu{VF$|{4i=DoS0 zo@zVd?u^fPasJj~y-J0`9{`cHC6hYg{3^r&T}!_PkO6p}z*3YK$I32_{R+z~ywqHd zF(x6@Y1YOT&gR}Psj#mOVi+EL{**mfKOmE#__|2k`t+5ZT`}cA!|21uEzc7-eM`M; zzMuN62N(Lb^#m2xxNpOoinM59f%qC+@%`QIJl;gWfagkOY==R9Rb)IF|S;7 zo|$hg=-2GmD`}8@aW!((ogw=?`dPn9LuGNhp_Eu~G!mEV;I8uO?j>!K*r(CmQZm$h zV|wC`Q-ic!=dDg^tGs8F*SxZhXT{bgOZ10e@vcFKc#L0qOvkv;mRyB))6~)(^-M4M zs@r{g$seIBu@_|{UrtR|gWhy3GlQDrWItlGseYq$DpBJy@ zs)%)(^XvE8H8&m)CL?R_?0g$`cNWL8qBbQOX6ct^J8#>ufz|$0I~_R>!+s1Jm!0aC zDt(RIR0U{2ywCDj66e?Y2chos&qKPe_j4&(%Uls4ixt<$$t-f9>lc^4?1Gb#fiqu& z=uuuF47hpPuSk1ZcdB;(djLx3XIqu1w>qK+%VWszibrH;em$KAx(vt?JL8|qd;+!_ z+s~D70DF9y%`6!fB!xzgnXE-ud7n!a$EUHv!IQ+VWiigOMB96Yymt9g_3v2)Q(%B* z{+sZtBBi$aPgx*^cB`v`fTGUFO8ut;S92%!Ja!_!l4q}p@oSemImU+z8aB1U8xNZ9 z-V4XZmWyfxrpDKRJ#q3d#UNRZ_CsTlkB$qP_n#=hFHISX(sY(4T&Y^>%Dqsw+HI-o zTZQ%RF`YLbBGKgp-QJIQJu%6`*Fa9jRvQyqIMeq(9UWPQ57umx$T|?h1kn}5sF5!< z#w8we;nECt!DE!g$yxQ7fX=`yLye2)LuPlpOLoSz{;y?7Bn&{Uw-@&hlIaPF-}r8Nmk;=<1%gJ6v(yJ-a2+9GJCpy?lJGfOgLU ztAe^6Wadrl$7#3;GZrTO8$yiS8sj%3Ob>8_K?(2LVu?|{oLauzbG2MfqNIG{WieQf z^6&KWou6lufdvfs+S;mb>Rgznv-40*i3h3f1^6z9pa=P2_S0t1yV2HxdPOVMELR$Y zxHe-S%ZFFQSFL!1{j#+|DwWr2BQRi_K1u0VIOY4$*^`;(C9Tayo~!xVUv=5iYOq}; zSa!+z?YBxr_qW?WnX(xd;%2=924bC%hyMt27>h3j29IpcKVc!l0^u`a40a0A!xmob zN-QwoiDCg=BOvFJQ}LVP)5e>;DZp#%cdXkPhENu&R#V&6qx#8!OEr2bwp)V;x&yAYx5^4 zlpK+^XqS-k7-d!E59mGmkYae6Zncbs2J4$+8||jYTIc1$#F#avtCCn%1WA}Uhda-E zj*Drr2UqC7M>@?OKWX;yXquWP+iGp&;TD^fy=BVct^Yj9C_sjb1nf62>ut-@Ay3a_ zXV))tH&p!8aVk7M)&1N^JjStmV?OmP>3*oA@o7h|Vn31lE5Db)N>cvqy-=W7{_{kJ zBjA6D_=zi5|GWa$@?%pB+S>LAmV_l&+V#oon(Oys^^2H_wEUwsWMLL(nNZvCCZ?^@ z(i!dO=^J?Q12l#zqTy0&m)6IFp|B}&4%#*iO>Ew4gidXiH(1QB`R00xY91U{>9Q=W zvImv#kL9p{xu1EnpOFYwecLe6#yf2iE~f+q{B&rK=Dt}kp?vvXEkM@sWK7fai{xZ6 zPa9XZ7JxP}fT+8*Tq%xz_`j0+`5GCQsLS>;?1aBQduQ~c=mn-PQt}p%1M!orv*bbX z=GgiY$6Ovr4ESkaV6MJOSufj(A)afX8=)+UW(11MiyP;zT#iOzMKC}#uc!s>`3$H*(VPfEqs0bQw^sar`6dpL*y zYqo(MI<2h^kLzw%3?kbODg*{7rN>s5)z!9Io4!0$R_)ulIbMdYcxC2il$5WGo5}1} zzp#fy6SVl;82NNOtuY)fUKW#;XO*RpquQ^e6Xlk);R0U)08QWn@-DIO1xEIEiL;Mt zZ(Ds@{qLhtq|>&mAoM`*{CQJIvjgWz4b{Ff9Dv&Aax~7`weQErjM?hoJ}+N1qTP9} z*$LnQQ`npNCsmb0JoTTUJhZtU3EH=k=GERlBEjQN&DZ#v>weAid_bFOw;p^_XXuF+BjrK%ibM}j!$XRnH_cfj4kRH+FwmvF0yoc^MC5TzbmyW zH*=EZ0fdiQ=wLxntzT&YKhm=y7=;XF70(?-l%cNYC(G20s!PN~ps3T)gf8)|h;c#!`s_DfYHvhOJwSOl&wk*;($_ zg4l;rTgm>QFNMj_P88M(Ucu(I4~+3`ru+MJc*(MP0h>sZR$6rLPDdDEPEq^B-wayb zVr)8mU%>0&Hz6FC_iL1XI^`Y*g#e zh9g{e&SI4!ZXr03ME}}eV^I67OZzJBgHbN*LAJ1jp;~>VO|Nj9hW~4E08lx+bMdX| zwk%;}VruiLiHpJb0BCe;=S?hDZed!0B{r8jvlEQpb$q<>xj6WCr3vXc{F$|6{sEyn zWxGgUP?^S~eL&#N#3Z}$9@0wO>7Zovc)PlVxMeWfdR$XyYd5MFj75Oieu!Q~!m@kg zO*s>n_ucZ>eB0iE>#&Z4&EGZMS{)tO7=XLp{>C6109c{pgHzf6%u)bo(<92?AAV9c z_HJPHef__9I_sdezAxHe+`V{l3dKutx8lWJLvh#QTHIZV7k4NcT#CE9ySw|#_c!mo zKa-r3xicrZv+vq#eYV!jpZz)jXc$@T$Y4eoOZ3ev=YG!>7|8-s_ zyv+0KM`ZJ)iJBi3P&tUicUOTd9lGz%ZzYAN!7-_}l!abJo3TSt6KN15n5IPc?;AzQPJfqaBA zF;=YILcxV1R(`_J?qvdydM*uWT7Tf(xOYV>Wm_AafbYwpz8xyG-|w8-C*1L+hu4#Y zX1u&CLZUTpwo%#qE6q&1*H4x*WhVtXTpxyx<@YVZR5GZ%^f1qARDz3k{QD&#)( zq)~^$W2EMX_QiaJEzl*x-O;!YspbWJ9@PO0MnD3Y8+z!Jf6UlQ=`+!8Qy^jIO<`c` zK1)+AOiK0>JjW6ZdQ3^10S7V|v>hT{qCRQ6Iac~C1a%l!ewc5EA343cEv64_WK8TF zT4eL{9Yo{d9+%)|Gqz0K6wFH&ctk*L>@=rTE14je2`SKPCGX@7vu2#T%l zA5@&OLmz6PurXOyd`h8NR%}%y5iuzd0sn1HmArgikeucaOnmVC36H_gnjHJ%S)dLpHhxwyUo*uq`A{In(sRVMCFvk*y&|ZM0J(beb_8oe&4Abo66DT z8M#;G*+c+9G<5rXaaD)mexR&kxAXdrrVNV0>JPp!VgEXjevYa+z2ymXbLM;zAr>4e zT5PTHP96pJW5_zM2-Ty)HA8i@v7(7MFqWNkLwAx!u#?wgV)`T3dd5Q8F!f=5x=~(^H4R-`?97 zwPX@%hwnNb`V7W`Ww~%|mvKGWT0BYO8NG64dOO>9ZBJ-@_Nu}QZ@Gg40IhKi!PC@^ z_hXj5HZZ1XG%?ZgUtc`Y(3VC1&16^_{=21rMQ!KYT|CVTgG-qJSAuGqp_D%)PqML^ z(IT>-$=B}`MRk+j@r?-RDeas|Sx;Mii~g5z>zG8kAd%@LP8t8OdPqG(#3ifx8z5SV zGWdKqQx^{bvgl>=`9?#u?*cOdIR9z;dvZJg5H812CGn!Kx%X9>FsSXk9xxnhb;;Ww z33D!iPU-Mo?n8~+nHv_XCwv^5hcU4zLQjX*_OR7go&Vx>?RIvK?t;w|F5`M8=-cu; z)1ju*R_g44I8Ev!zZ=K-T~_p#l|~Hg&j^@CPhs>e?&!vQyP(iW!kL}UV>=V`EyHJ6 zXg^9`)rq|-zB%%Z%2g`{80xMcywy=Zb(?3 z*q2b$5CS9v{4BSYiCi;BS=W|2O|pa%hgD#?G0tjSJYOE0RiPf781Br}?0pyTYtQ^E zVT8P^2)K8fcG9_GEai<;o+I6=nAL#kL8fPygCrS9N_+fTb=4gS6Z68wZ@^Xr|C()_ zqnN@W|9nxTmkSrhGiG6XuJ>3-=0xc9I7dl~7$X%@s~KPaVgsMg#lyKo2K{hI^1_* z`p*yi)y#{T_tY;Z1?~xy=$WnPoZsRBem{PiQq$u#Vz8K6n$Mdt>C^FW4x*I&bXsU> zy{8?x*jeNI`AcFvBpiUn-v=xl)`PbP1(I% zTcrRZnv%vRd+zico)OBu5FGarsNG#m*q8M&^4U*+cFyK~C%Jk`9d_@~0*i!G1$Z}% zuP$GhV)j!>Sz{DAO|#iywqbOeAC#Mp&^n|OybM6E!n_03Adxt-EjDat@45$A_+Mq|b z-1p_m4ll!_AxP>wUkx~4?UBE?8R)d(T3We}{+!?;C-dsKRz#d5`P-j5hx1-nyL!Kt zj0VPU)w0|Z@?VDXCR2F0eePwTxeYDyE3{6TE0{HJ#q|4JU*@@*lkMHZWJ1~e@RS;E z=|s!{Aab_Mp0#?Xw{~0B%3=Y>b*UeLjrPWqUBZxudm-#87LaKi5Xi_)PrbNIYc%~& zC2fxqYjxu*s^ zeCE`Pei$!fDYGB8xK}tO+qs|*)<3j%iBTON2y`JS_H-S)hZ=W{#R~lW#b(V5s@3Qy zx|Zm4<&+)1=|rN87=VQw`A-xeaMiX}8Jr!vQKMx8jWE${)WK9MsK58F+Zt#r zEkga}$Es+F!rJoeT@ztDY)01eQp+>6x^1RM6=~Uk33zz~Ef>1WqG5?>uSl0BVs#WI zmb0aINEyJTbu~dGwWJe2QkbXVusB@&%qd}8G-@mf#CjhYgsGIPho&A;Wo^d&fQmBI z`Q@q=#Rbw5UGtgP=+5?S(q?6r5mltt(Naeh(R-q9@W>gDX7SN0-fDiF@|XIo=Y7C? zh+c%{2U^!Z$;lhmF!$_LraXJPMG1DS#wQ2HOu^iXI_sjZDY-UFHo_-5WL}rYiOfGj zDcu6vOT(o|7dcG-C0uE!v*?^o3eF|uf15Rn&SYrHY4Q9Ru%ctx?)GDyuBtGn+5ys& zay?yE%eFpRXZhAcHRSDao3lVlwG=3Q#(zW+H)O1;Dq2emf8ViAMbd|y$6jOhqE{83 zS4aTIiGdLt-nw*SZX(!p6ym&$kuAlrLFFkh$0j8nL`!2&o5G}7dp+VTIoze-9GVpI znkMPqwL2Q&quIVYQSx1`Xp$vL#sra)v0ml(<-tpD8AgVDi>6HB&*N1}#mUCZAth}j zIm29UwaO);7W&VuT@etq^&^MG9ACbLwO&ppSS?jCmYE{4YG63|mT;Z@^cm8e;Lp;h zBYU{Id1F-u4C+{I(xfn|wCX(W!=`Dc0~d0t1gFIy8Tv{(=V11ztJ$>?nuPdR;GCGj zjD`0wRNe-wvMKMeD^o`=p!F%rTxDG$D-pi_95bu-wLdA{g_Jj5eRtO9Xv86o650>h zYEDeqqNbWx+iCX8MeZ|x^J5E1AfV)tN5-j zf45SoG|)yvV$Sh%RD(j`-9v9VXfQek8aJL!D9lQ0=w1wSDOcyTL)c4AKD6BSM?G>x zho7L(%4hMrUo8x>_4-tJI3FfbGOfLw#&l%0Y7;LzeH$u$-o9QWtJg2TJN85AMnn(?Vc6-aPNbzD=;vas32QU%9h_1GJkKI+vF?d7T zf&vXy!RoXUa9yp}G` zQdI&5cc~0{jd;F_=iDhmCs;MOB=N_L*T{0+%rk0_#tioGE$ z#7;DYyUyhD1?^cuk1mf-U`{|-pE2;(X0lPeS6y!iw*RnIEp6d!^g#t7;@fC^Zl2E1 z2oW=1-J9z(F*D}9=6H`At16Y**PemaV+rNC%gd~G>ZyIbmd%T^Nxn;c69i)p0y=jC zudUHzhvcudQuu_#UbP+ry4rLRQAqc=#Fk9qem#Y2-!H3^)+;o9PbN~Aihro|-(OiK zHer{WQqiKzM@{}U>G#!b{Q3Mwg+JPi#L_lVbLqox#Y#l&Q1S104WY?bxu51=biuXn zqU)3H5}H;*wD*#@l=MG_9Ph^Mmzn}AbjYuNuup)e)#TB+!6e3%ls#dBwfbqNw7{x? zw5895fVD88s>oL}vDkIuv*1afM`j0zV4=(` z@ckinE94Q?L20(XoSEhp_Z)it{`~&f}ywN^Cj47SgpF({ig}SC-U8>J3e5L)Rr)N$NdLv&Z5yV+mzjUchY3H_>4}x!qk3baW`_CIxf9 zy*L7;M}>_H&S-4e-yK+lZ&uurYFa^)pD@Y4(64`4N5H;yEG)gE&qF~ZCoqxveZH;} z7gs^Y$oh+ta^^YCEryJ}r^OnbI!Tr^6ZutgVmm>fycw0u-TpN#garG)&}Q6(^Mif7 z^Lr4KEyPB*@UEZ~$NJ94g!7WK`fEC1p!QuII>NtrrE&)v>A z??P<2CZJ)a=P0GRcVbBGq4WNazLa22(OwGiHS}AQe_P=S9oj`>)noG;e1qHUO^iUH zFB|t$m4fue#=$rlx0>m`yZS|#)inLweS2CzQ&7>q_swjW%u$$D1f*yksH85eVNB;| z6kh!!##V!$GD|5g9GYf$3s=Nqti6H=wY4I3MmSw4miRI7C?g`JMpo~G93)?+Vc-bf z`%zjtWLP%9CHj1?E#Zq|SXNc}c(d({->aveJtZbnrcD#{?$q{IE2Mfz2F?Q_iY_uR zXH}t^ugxgjU9>clJM~5fWe?MOO&@Q%{_cD0X4Y$$>dveF+xB`jq&1)B%azmJQD2z7 z;ljHpxixn^|NeKgXHhqzvj$JcoGd&4GudPIIU7YHV+MF}^04gG$p6i4|M{oa^A&Tg^NPY+7UA< zcG%RS!eWs>Qm_4HI-$$X*5j%R0ULNo8&MOovEVi9PZ3dUINzR^m!PH&mVK*cln~z= zTYUDyYhNP)Vjq{9#U-D7aNj>uqe9q`j*c->`WVmSybdojAl>5qUn=H_$`$(^;3)>G z+|O57<_1{IqdIQ?CO5Cet5%y`H{0nOr8JUazRli{h1nCPK2`oAtJ9^~7l#FYe{0t> zZRL0mXMXr&W*lJiIXihEY0LLWF7KO^F_HojG=O-(>ZBIqd%$~JM=DcN z;}fhiRdsB}(DGJ0|9lPmO|g-T=Fau;>3Q;Ee=o6}xKv7q`#uDQ2d^hIP3U%WWNmA9 znfaMs?bGw#`3yqq%VCj?S~8XFKI5`$N!o1PNA|;tB5f7G4_0NYOI)a2(7Su2m@3=N z=+2Meehn_0S+jvA6KPEEkoK-Kf-tbYMtC9kH^%b$G^$@JM6op9U+V@Ko9 zw<#*ZPt011@6zYrtPe$65$tqPO)u3pBigHHzgym#_CNU(4Jr z4vg}ikqmj9&4vv4>MXN|!Q$sPHo`cUiJAWCELeb$cdOoEevqXVYwx&YKg3mgneCOy}ht8COG+r?nj~Kd%QF zFV7-dLjy0#TBqmo%)4LUbmaA1l}pvB^gWF(M(aV0^S)ZG_ScIt>h`er>AarSo=ARd zuJilrmHgS~ia|y4ZblyaozG?aIl}e_!@!voft0`fOmdR2aktKE=E9JN>2^FBXJ+-^ z*3ZT3>15GXlrZ*q5O3%0U2Tv{&jZbk$K&i}wIlRHX##CDZrQSgZrc0o-nF`g`TG7^ z+6>)5*4r>~wwLdQ`DHRi(^Wp!`Q5B>&Or{7Gb->`tp(4gY45=q=jwpp$Ix)oUE^q@ zeKbi2e75b~jB2abQT%OmvcBJ%wC(AJ-6V_0H47P?|M_%YN0i3vz6;2#c<9M(Vo)%h zN6h*W)A7|}RGk#U2DfUy6k=K&0cIg;_|>D*YQ>2=~nRUwQRp8JLP-r=zn0vneq5y+eK5=@k~ z@{(4A`ggm9vDGZDX!trZmE~GB7Z>%|C|FMmiQp_NUnhZswCVK`El2KYY780gm+Ao` zZ*k!e{O3Rb*df!u9Gw~!x2^UyeAmz?B6)px{7ZaCTv}Rc@x&5ERIk4-=({=iH%`TL zDg)r(-9$3@JhE_gUA>XYM$@)=NGOu@`ZPL@OIlIX&eQqn0)O7_9OWF!XO%#*CEnb=#%mSGQjy>n-ME z^jo(|HlNU(GNS*%^t0fc(zdh0BH@}PS9$sdo!={nD?OE^n}Lem9ECdw*`5){rZTNe zSuRq!N>Y)_i`rk@@+4Cx?NF7;K!#_Q#ve#Q~Ug5eTXyLeqxEOe&Oa<2;jS_ZJOVIWZw^0ig3Gs;;_iYCUMv$g%0P-^V z_ZtVav=y_XW$(6sFdUl+S=`Wk)O0u?+im>(QUTWksW97vNai|&@%5+SBBz)AjwNlR zxoZ@&DwAe(_lk6AisYn+Fuy9nmd*Zv0y-Sin_ah@otr8rGd_?z7`*P?ipn2rSg@~` zjwNcCv`=EOV`n00y^KFDDB_xRrHzkHk(J~jT}a+@*VLSyBIEA9E=8IS3mUV*c* z0R17}glvos<$(V-3XA{C9)r%h@Ah-FRmcsT>)q|gvDH0w@)Pk?Es1wqV59l%x|~F> z!_8~Tlg!c|MkKrC{QfOIQ;*RW+my_j&7=g>k@VCwQb>cj2bC`cpu5+nW zT5)+T4^W;iyOIocZg=hu!7NOG#p3(va`s&NW8WWh;}I=L?qR2&O;X;MxT&H)x$@cL z*TJatDY2jxwBp+)-1;t(SiD5*6X&qVZ5A%dTDkjC#Nerv&SqRUPc;nagnBP<$SFeb zvCr%*-KNdrILVo;oX%$5PKJwPygK8nV(-#N{upCqz-)IZMsOH~WMNzZR`KV>hMIUp zkr^swQ<~Fy`J*W1vzImUc60UnHk^*vbNkhueKg+XqL9Gz)8U0Xi9W0_p-%E!{PFEg znVl1~R;s&sR}sV7%K=@sWUeXHGuMOL^Cb2m=(pYKU(Z2_%ZnH?1)E0GFg1^yp^n~d z65e_!zgAGn%s_%Z!E(!4?aYU}`YM(z2x^ssvHV_z?Fc6?(R6^rd0FdTGBcN7=UdgV zjAi=L2cTTCqjh8bIaB0T7PTn9Rq2a`nfyCmSSh@gwuO0B&i3I`hPjjE>B}o$Ro8GB zp1jx-XFB)iBv?R-;ug*c49c7-UwsS`aw?(fLoK%JmO>(OecQQjokpAZT+6I7DB|LY z%0!_~_W?O>IxEX5^-Pe8Zg-Bhfr)_`*2T@xe7>3Bulx0W?YcCd+Jvc_TflXRe>$3X z4xHY7giM&J+&CHi?;F*;-jIVHGr^B{m&fZq7yA8`-dRK|4a^0U1Yx=*mR~eelNolu zVnO*KkI+|xru$pK#m}8oJgi@K;@R7s4Jpz5lszLYystN({I7>AQvNuHsH`(r+6tak zWZBrh*1^5blHfZTX8G<{H-B=~&Y$3rMXyje7AzReCKE1)HS7ANc3d#&-{}IB0d!~+O8n_vtc1+E%Qmhh}#&t|d1pbr`2~#SZ2{oFmhI}qv z5B>erzsTRa^K#SKHRRKstDWBmQSmtK;!uHB6zLh|YUn_Jj_a!Ckaq3@SE*Nv^fryx zk(2G+fZW}9;<<^3tW!^LEabAtrwY%7yeFsH#RDF>ke0H{>O)^zqK@?5ee%DUR8?rU z)i&t)#!Re@^SiRW&qXqOT}e?`mNoI3E!Hpe>l3UD-p@(HwqYgeXNit3K33_4xqB^5 z$GAfQfj7hg!IdDfir$+D5E-A-F9i$todagE2o0eF?T%oFsYdDLQt&0L-}Tg6ZOyzO z5p~Doi-}Ns>(vm>bo@KYb+iG7XvLavLXY?Or_R|dKD9L;$7??Ini}3*6`i`ubhqK8 zBv+&9!n)EWlww;}n5(`lqpZ^wC*e>Fl}e&m+XcH%I7sCJ1HnAGAhs`>)%jHfI0$A?Wxm04nE?S3v3BfU)MOi#v} z{YEjjp3YDCGo7Byo@)K4SUc+l;-Ud)=ySbO^2B~bet*o7KL&-MXEdf|c~S^~@K_1| z*n?aW#=6ruM=p?_N?$TNl4m9k`C|aTZ*Y9k(k)iH0NOhI&#K!_xWFS*3LLBqp7X0i zHjk`*-TcHD^Lb8DG~u|w&8Gsk(CeaA^)i3ilNG^lKH~-GkF|WYOU`6l>lg9K#Nzpa zhCjjZahQ|tvEy@2;&@i^{1i2M!pk~E$f}lYx4SMt)9U7yW)Ye&5v}}m0Rn+VmAvB zT8dD3GiR$%q}oP|D1$j)2jk&O_a<_EuZ!g&u50a28Q6ZmI^A_QIF_9c|GHI_pH{{= zVv$byp>H1#IS;6d=_*~mDSy55VHFm7bW}Gfl=rW86e-oM2oqo zrzB>c?Z@7(=B#@)&*CEwUu`P_14?LP zWH_by;I2>dsS{s0WKf^1%2FzsE+XwHQ|MG>QX8MnxVtq^OXeml3vz8|L0Kwy-fbW@ zwe4h!9E0ijY?fuwZP9$kAZ41#`L=#`5t-CwPh@}`4@y-dgkG%_-bo&r-?wUwIJD7- zL=)L>{u*=LVPv_`nGf9Y{?BEV&8}nRyLEwaAbY2z&-GiZWhXJ6UN`Z0*V%~dv&AB3 zyL3&}cV>-}Pw>}v6>!8eyG`dUH}AWzhvy?|zVB}b_Q5nn6~wa2)LP)=W>LmFmDN?; zT3gU-T)oig=)F{Q(lD+}fi5a4jG_|hZiyQEQIb_{3y+zxpJBG7jDXBlF{O{9qKLIZR00G>EEVd1s1TmM|(2A4Du6e`(0${&JB2>@8aifA3X zPa(r)`BT8{X^25ngU@3cBfa35N~vOrG4`{am*)q#KUK2>#$8c%5*6sIT1@i7*b>yu z-sPPtJ(*4#lp>5NuqDI|{Fnx=jpF>!sttG7WHN13Vm*`vqD=VHk%$@M8w~LtT(-EB zpR0Qk+Zhzt+f^_+meXbDnKj*4&v0=+Ck*2vSBFx<(%Lx@H9<6V3lM}dVh;0lEi z*g=Mqj)SoE>TIf9R+lW#ypI>&C8?#SpjTY8<%Xt*TQ(%n&?urfabSm6bpw;s?FHLB zVmvOx_+)UCjdXn0y1-tp_U{BtXn;lfnhvPLfTj6X=ki8ubgA{qy5;XWx<8*y_t~qN zK$f?ergAYVpbV32Gh7P|u}s)C8hjNcw+94$;MCwFa5wg}Z`cPNT=$2izbtWgETbSU zqpHc*hEYNZ$1VAaTK3;K3)yL2bU`$W!*B74NaL+93+Ie7r{#i;Mz*#CI~D;ta56w= zn=6D*x~`jv2|x#T2yxXuBkVf{2MzKdSXsq3IUmW*Qij6=BA6>HtNqwOtgq#Ju+3Tj zI^hJx91d`U-{95Mhm1*}=rMBO2(uzD|Jnc2mXObWNOsdTy96pq!(P9sWRfOAsV_}T zbO+!^^UrJeun`^jiyG0>*#hZ+h*NN#O(MzdDP<>(NC>MSrJISV^^Ekym2a$erSWXI zZh~HovERYB(3N8x#tl|ot6V$@t#(&RxD^1XYiewtPp=nHO`R$*;Dj%r$7{G!(7DK# z>b+H@Pjse(KRrwUf1aJ!^oK_$IK$_8@W{XDc6<^l!fWPq+a9)CL9{-j5D&$FD=s6H z=DD4NHim6XVxCQ&vbGV<&$XT(Nl&~s>r z!lz_7(-6SEy6;Oy^?MNnpCvtcFK|v%A!m`t)9iH|)t64({&?hq^x0^>pVpS8!LqEf z6Jb9&*S%nj}!>0q7ytKFpfC@NSpC22as z#R7kiFs71xy(O6I?N+LycOd1e(M zU^3=XJXu(S<1Ityf1%Pa0*=hdD%Aq{;(YBol^xE-Ee*iGDh>L|xM>q^6z$olA{{q@Bu*_oR< zhY;ea6kQ|hbp;yUo+pZ3RReEmkA!I?u`#b+N6K64Mt4E4&9 zmC54%F`SPF-8ZX!1u!*Jrj_0yIdMt9kI)a!^7X0(c08`nQB^A~PoZX_kYOQbYE-VY z)x|Xr|BfnBY)8fH9fm1VS}evf2ReQqFV>jpmHN@6zt+)@8p6{zrI$CmEm!8k7j5uF zgLPJYRwc%L=)LA!Ev%}lfp6~eVbu9HkTbq3yVf8bLWuIexIkvD(sa3;>nf0JAQezy zNP!8YM);_6)4i)R?Cz%r`tbp9Q~BYOI(aJ<`P%iSRK6^oF!MUD@!gU)(&y!d>$;;d ztWb+Qmb-D)@0av|!52$g(;hERfz{iid7+NCv0ZL5bOH{eKa|g?NAVd`HS@s*RpaA` z63E$#`&um;`3BA~1HU^9hvbCD-Wc1(=iA$qvprcI`%1@!xbaWKV5El$QwkRY+p}g) zEgjXClfyLj$5J`Cl&Gd2f>W(X1WVxA0PfMGK6oXj~pUWZHJ8q>& zB_SySWvbtZ^<41?Lwn)`dO)^rPU<$l)8?d-)cp-aTM^M6@0pfviatZ5D39OXhG zdRg4G-}}Cq7wY2=TqKJ2Ed}u19v|ei>hWrr$1k})JY8$))*)2fY2ceq^VVOE5fXnS zeD)P^8SHeEf`z*5-S44-FZiYcn>tl*QJXE~X=7_iUNGr)F~1sbju8Rl2To&%LOULe zD=Tf#w%rEEd2_^T<%HU5$){21UIH?C(5uYBgn)LWx5s$PvCu0Gh~X0=-pnP5gmakZ zQFRUnirIKw{S}llbzY>u#=MK3_e|6j>3Aa4_&v|tX{0N2zsE1lp1<{vNtMat?O5o5 zFl+J_RfpGWKud`q<~T2%vvA6rSgvYDb)EJ}W1eC+(d}%~5uYq?nz}+1_s!W0OMCRx zkl#kn5Y4KDs|}l}VvfV&iEFzRws4IwTM|!jbXykD1Z*I5LQ_Mbi2OPPcYF)ESwavC zN?P~zDClAZi$~BCQKZ?i?e=3g?W1iR@P4)%HCxw10^-0$ZGnjDOIm!fNC^lMzID69F(}*Y zf$5T0fuv$f@Zl#M;sqSvmhn`CNN&1D#zFDzZ_+7mVg0`P7iX>(+7e|*e^x)@lzh49 z{CUc`cSH+n7i+k~G_NlLQ@3ei7r@X0311$1)w9Q6Lv8lPRoGz?rOqZzXE5ashsKz= zI$F)P8R#0%kKUb_Q__*66o~k&CtgYE?xPMT7tg1%@|x7(%Q9!`&2e|>Qij+kH$~cS zhskBPmt2q>K|CI;Rek0Z{w>i2GumSQH0(`H4F=<3)&VLrjtdbn;Ax9`C|-=TyHHyh zvol`p(pe633F zChmt^V``b~KL_N_-j@f>GX z6fp-`JDHw)3%AO(xmq1z+whW>0x+-q;$v5J+xs$TrVjRCi*aXF0Kl23mW*fHekgdk z(oSIevl{!OqMJBG>BEO*-XWj2ivm$Lw>yu$0>MiW?REQi2`!bd$gie)yuNv&Af2*# zm&~WJ?bAe9K#^jwLNql)%z}qzt>yZ!nM4E9l*hw^1z}td)n{t@4RsTC5rz*wVM@)2 zOiY)kR+Im(U$VBv;U$HSF7PGl?k_J;qbL0Ni;dPBOWFFTBFfM_%nX!=1IeSf$tzV_ z{zkrrI5ME(g_L`*i)5y=m&PFgzhQ4mic>d!HgmNY%95A!S*kQJm&vgCfoRSUX)@GxdQeST8U7D(1NW}m@^ zlCIbeD9ESDG0}1E4Vyj;n)RqH?;RjCYPNz@u9PK`Qi__5g>MXbz1T4q6C0Rz;fDEZ zB9QqlbssS6R8NUXPs=E~YSqBW-`@tE7JDUH8oL9fnM&z{LI-Ga)&eE1_ch-~a3me+ zt=mi5Xa!ffzMXC!?z5OulR}B)@M1s%eixBap(v$-_BW+#^tOTL1vhdHnhoG7?%eHRUnRJ$VG)VEvl;i1z`Z@@qtG9+`np;I(yYs&aZUi8IdjW>}@=0R|`zNG}?SK+hT}uE8!* z_)fT(6IK-B`zI|fxbB3ssMTZVyN_B@)-dDL{o?8^cbhqKCFd%vEnMD_}9nR2@rT>k|E|Cpyk5gFc!d7L!My z&OJ%1qV3n^9+6c93~5Cr;h|Q4Lv3*6ZPMnM^!s>)X2-7s&ZooIvSh)NSc3(j)1hOQ z)6=&tCjrAG-`4XE`QkAUcmrkJ;@b1AO^xUM>u_9l$Ev=-Rf0v_dk}8SU*DMvGyVJm zUz3k8!2(B`-jhkkpX!EGM4>5lY4LoIr_ihjA3ql&L*{9o|6Ew`{K@bTVqf^Lyez2| ztPSt?htp{H31&zHw519K1Ark=`(OJj|K7-QXC1o>^oB8vn}KS|?C5|ZFV@dt?#5Ok zJvE)hg-5?Uwlv)nx1W&SVm7WhfZ z9!X6WwW#(VLq!s5{F>U~yi4+bP1#)9{^(DS?~?@r|9$4!=)#l$8yNESKfLg5G?{>C zIKhe-+J8uu`3hGuNHcfsThIUYCHlOQQo->@|A$*?v3PH9%U69Xj)v=nkW}8B`CLz^ z#kX2Cy#E8Myh)bqAYXy;E&n48zwLiE{u=MJ>F{3{SW_T8S2|?%|C3e9U5F1Ixk+8V zKo>{}S@f6$s|6;&cMX(cy-|G3EI zS;Bxcs~hC#e-NmT%N~n=eK%rgoYm!nQ0Xt@)35yy3-Hw$^{$Q=U$(3y!6yRxkMGX2 zl&-U>OdX_+ig$mzA%rTb7)tZ3-M3j;Y`_^m|J+kwqy6FJDk*)c>?Bm3{gC@)@NIDF zx#R7SM@+IjZgiaf_h$s7zP?E@iIb`;lDi+mhnJhvU|5^azZqvjIt@`2Z==VC1a}}6Ep_?yia7|zgn7b}|5IdL zYYps~(I>>=uJa=K_n*!ZQQbnVNJ<&6$4F)&Z-a7gGu3CWD1}+d0*`$-6@-2+cIT@+ zah7<9fW7Tw%X8VX^)TOrtgPBCcRasdTz+$m&fsG6Mt|Ac^cvC5b^mkPy%+0it#!O05N_}@BMsZ=y07bO#~9StB*Wc}`ZxM_sIsS|M0|hL4TT=HR3Qbzm!q$%3!m`U z56F(HC{82-aQW?gEI*G`*vDpxU&l487*sF;&BIL$6&J< ztjPeCrPQ9Yv}9gMvrVV5g`?gu&;t2@0rN0JExEIBV@JHT7eZ+A(_??6fW4_ps94AQ z^{;@v?@x!RT~$Sh@NLrh%IPRqa*3Q@|E0j&6Us)=+a!J`#y*jQ@mtn(blFbH9&?Jc zUE~P9LqVAh1v>S;+Ir*%#3*5iKcvHYTPW2>C3rqQhw7!aB>OhnI~2v3sP}&$Hax}wT6$bw#Pv;ty_N;L9@(h3EXowck=kdTN~QcOpFV21_9Y#8D_+;_WBaPO+% zax&vI<9Ao#DW?fK0sQLVjGRxKh1i_;TI{~B+P|E{sL+s=!#$V4DMWf)ehb?EXZD)t zLv?>hlG2f0^MFWeY)d$8G4jL~#3yK5W;6F*ObB#lv^#l>2Ns?_p&i6=A4RM(9yd2X z-L`u_VUSJoQ55dV3h6mR<}A6gjJ2skn(!*{(Qn2&tbSCd{nD9yF2t;jvSrLvK8>dB z+mKmgpCxi~=;EeY&T(Rf)$TIriAJ6!z$nK{c3UXpa-Mc;@^~4G>1(zr@lz0S#RW-@ zG`)JH2Zn&z=c1?lr(dfL8-mcINE%e9`psgaK8YtP!A!kLfA#vlCIEE081=Tm;9zT` z6Hc_fZfBn@gSQ?r=DEAPEyo(;?5c+8c=@}=^M;38AZuH#)^-|3(=dpZI^4acevfme z1AxK%a(5a#;mepAS^L)-?^b4mot6-rmw?AB2-+0`E9~1ujVIa9Y>%pw(N^RU1mC9) ztJN2P2R)B7|@i7`aGx zLnA&&<+Afz3%osVvH4wfzFR)f5`1@yV3CkBjJ~_4zffoT4wpXr(`);lVf+Zo@zkpx zEiY6*D=e1ENa7gN`C{QTHK?9hwdT(K{SO`}gO$=)`~LffJYw&j&+Ld6hapVfR64#o z_x-(9@L#aktFACh*B0mig7qK$sE8D*wYMA!NO51?#XUsU+D#ImsVDAUy+4X3(e8m$ zM2}03D>ZcD6rWZvLjRzX8EayFJv%4-M%`9NOfesmM@1n05E0>mzo)H1_7E5 zyJqN@3bav>E3EeEsZuB>%K^{$J%E>UZSdH-WQ|=p=B}EqQ_h_cndE(i4r2ox@OXko zV9czn+ig(>TE3?(RNJzs=|+a2_Kr^czSrIR&E|;gBaeJ|gD%r11t;^6n8YE>mXR3$pQ}u9 z;#=LF`rRtQ`dG}X3`LKN2M()#PB1*w6um<8)5?{S0?2s9M2G9lhQsCd!QKyB1e1I- ziSU#IP;A*~=`~%A%yi1WfeR($d*5F5%zCs{yYpP#j(4Ufa?4(jV&Tbt9$vC>pPF-b zDvETSGH}eXD#E~3Gxz0>o%h%aav$e}@x#=^2Dpa>K9NsJP;tMsia@IC zwwrnyg6(&g9Af3@Y%g=xKCEG*BxAK5AM0YGV>wpF)OPqrj17!M4Xt**PU_(a?Uq=b zi)XSm3s=Oi%3Phea3Kg&q6@;T zZXJCNsA`P0Yf*UKe*>QUqb(^EWW4&5s8tl^Os&PV3*}rW?;Qb$z~}a`MiEVSzP?(~6v|k|Qe=gKbfxPwy93LkZ_t=!s zL9jhQ&4QUvy9sR|j46!j$K6WG9sD{@VG-{0WzZi**bn2`SFqxi!FJ8YLAybJ0Z;~L zr4nnz1AGVw*f4=)UG1l-LbERDNmd6eQY_~X(>Y@v5|@X}K6LS-5|&T5sn;VapkUuu zRVT72fAH+w65_hw!I=mt!gS8=^RG7U(pN&v3GB=P5@on?vpaU9*bO}3)EkYC^JL|>ksbTPA@9WveDr2y##<*{3Z#B5(SkylqY`eK)TsCU#jYfq1KFhNmldd(&PFX)}$1J~ea zpS0)(2=_UH6;*`_N3}C!ki%~{CvJTAD+H0!L6*rgW-BV*OA7j4fsuzKqRV)#{H8}b z)9sqhM7nD5MJU26xjK|OwZ$4`SWYg7A#K;vLLH|ukCJGCokEwg`QpH#rFw}aa66UR3#lpOSEqmSob2gh0Xgh^JL zB34?DQrBKh%Lh5MZab6IXQ96+_&)w%=#3Ucs^}BoYF9hLS#%KVa4RE&GAL!-QEU=} zWCrEES%s5!K_}G^qiWtS8b4$kY$2bS&}Uxj*;%zm+$QpN9&I_lMVP%2^J{t_KPeNA zywybiHSgJs&k1D9XQTR03ea@(xlEKBzcdx(tsG2NTBfS!1>9aciL+1K-(3oD0Pa7| zKU=bzNnQ2hrwVU;8$gzSbx-#p{o=*a@dbxGZ3(x~0G${&Mm2HX8~7IX=KBMz*KU3S zf9&Zv5)WtVJvC6IVuO@T6<&TFd!5rd`Y##62k_Z!eJU97bJ}df!D^XW#z(*WPg8-F zZA!8x#6?6jpra?)vcz?pQJ z*rw&IXsPOcDnD}Cn6g!bw*RB%;j?5l_R!-1{JmW2Lpttna0C_0R5?@C5{YF`Z3mm&d0Qq6mfxTYT4`aNS)bS;4g$JwOjsO-!a!@Y*XjX=`TXWNg})y!(Y-8U-! z`%=S)QFyce9#DV84kl3#zC<;q!s71}ybf;@f8_!?XXaSOiCzeEC~Imeqcw$2wB`2v zQ6knB1z|=eO0@2G#gfZoVkmLLt#{(cv&oN|_n%TPi$FeVZN>Cx;?;D20pz zx*Lca+M&L^H!@>gIGrov zA!X%k@gsVAUZdhMAZ-78(4zRCDCAp+2*w>D8!rCyZ`FDx*LFG67=6wMk@lQ7d3)?zDKI=?A)8s5&%2E^FZu$Hy(0 z(cyBkkc3SvjfkC1bJ{{f7hZKDlwz@sn4H3KxWJ=jHSm9U`s#oxn(yzubcl3!BPre8 z-JODTcZWzf(ko*YtfDYA$zbB9!gOZyFTsq1kGE5H!Wfq&t(x*ag_C~Zw?9up(|B)?Mn za_PcogUpwoIRSO9uqTyoPR+ z1xk(P%e!tU%9N%REww*IrVvzC!F;U`Y3dMIS@q+%|$N>#P4YAr`miqPPT%-+YqH(I>>uVrfiIbd^e|K z@x1>Lu16nBS0yVi%qcpYj0BjOW7kH?MgFBiub!9V5!aP1rl;Zh`oah`1bx79WKZ;^ zvU~T9vA%|R%0o$!M5V!7C8|P@hzYTh5>?Xgavj!VaCp=O((;LiP~D~MH*;5oRRIzi zJPh_CGZ}cm$+^Z^f6!5&b&sVK>064$-1}i-y)Zh09W}%8s;keqwVIzLh!bWD)j59k zxNzN?LJ+dA;}Ob-$3{KTJ#c3PL~WSFBj|okFt9DfYr|1T7Vj2_7$@@Xf9r|%$uc}% zsIp!7Si-Trcz-0t?p5k`k|?of*paAx%;D_UdXtE)tzlxQ4s+=b7ZZ zq&#CiJy|_FSr@TdP(!Ux$*vn&j9peD{7&#{+Y!`5K1|NM;M>mG9(7j;`1{e)jy z{sj}D!&QESh4Egkyb@1n(qZgK`H~o;!$ z=3sTH)MJkiA#LigCAw?b?c`WpB|+E7LC8e~hpDk)ec0Y?wm5CV!l~y(%^l?z*K0K~ zYYu|UeXvPp#3LnK<=oR%NBtdRxD^w-&!D76G*KA@Ss5|jeSX8ZEKgdu+q3wkwH5hkL`jK2;fHJw zOJ5%wACJn8%8E`$jas6>;)8T zw9`$^`t-X&dSc(POh^=79S(>uLND~=^3Ua(xRg$e6wJLG))gehOb%|V)}H3M{DkEe z7u%^F2Ih?984EL|PM=Y0ActXnQ3IFvD28DlZXQ=L&uG5up19I(J=PKiFg;p0wPEI8 zT6_Mc&9@uFYbWh|zPi<)naa#XECM5Td@AFg#CsH`oD3atQmNINs#uxhZehPQW+hbV z->+ZGndXZKD050R={9lz&+{*u{8BmG-;sgI`jeCD z*ulG*C?F~<&EEKG)OBuVKZh?LCJgGZz;@pj@@;j?P5rH>jV+%oH@t;}vMNCfn$MId zGI06ePP-E=q7gIW zsD6bj*8Jgj#)EYl$1{TpVrPZ{pmx&OB*YLv@749Ln=+E<0ia9LjQ(kC3^1cO!ev^U zEg9pp)Ut=zdRB+`!0*buw{<6GXnbuDvaTCDMkWKjc0^o z!DDFlr2FHURuKGOU{d^-!T@XW(@FJM#!MKYpbxSpCE7)Nu8IPzIHkt6GZ!UJqaElw ztQFE5t9Tyxxp)r&`%epVR#Q1=j4Ozon6wF}9pfC$yzp=#fK_He=r4u}TlomIAB03& zd~L~4Fpx$TJQB`9@%FD_wN#6af`|3 zu+;hAS0pJC{U%Kec#C?TOb`I#Z=kQ?HrSAPNh-nZy}v1FWltLNLI5U3WOd8DB_WmNgElXK~5uVyzrZ&3WLOEHW5O-E-75*ZM2au znG)g{@XEZ7(3rQZzEoI0HetC1amf zw8B0csj5%U7vL;lVNykL@0cH0QAzqyf6D%a19?Hm_GTFV??jzn+j9U^f$#3h%4}lK z1Jeqhd`a->Fo&bAG;}eg`0!mWpO$M}_x>6UU9KMWZ$)?FqN1kNG>5g6I*zXzKLmsV zS#nUmK0wXc_>BFY@{+^$ZtBR$D8RP4{+(;DS$PY7gc=|?K*Oew% z9xW<@!WUEQoCkaP`D7)At;99=`mIJzrg63sSm0p%r1EI7Y6(-nwRS^Gz}MiX>nwW$ zHO4UdCj=#FrHp{1W^LkGYr*J0#9tpi-;$wpMUXt$NNHY_cxu}%FRU(3PD;uT&1$9G zNz7D8o;j@5x3bDXu1_ZKBB#Pa5kRygNEF^>m=d0*dX-6Cm4Y(0uCsHfl5S?blkWXr z^iMZqNAr$L%l2^6X1S|#P1tlNV$1B8TUM9`KgLSq2mi`4o`Wju z4-9Kvj{9*rzJy0Nc8*b4nzO0NIxA__i(O{7HU1VSRlM6iwM+0a(G~P;zVlVfS_`Yk zv$-xevvp7r!}A^0oi`j@rw+#<7wG+c2@O}j8|t`GKY~+sk z56Qf{s=f@@&EW3(c9b`pGRIhF06!zDq{D?4y!;vKlKHd@w z;k|fY3uiOrP+~RDr$7%fQ%NKKK7T|tkfTV8k(!7K2-%L_(!D_2U~Sj3;o+&jHT6z5R=nhyUi{G*s0 zEmjhX=dPNA;rUmI8cMLViLMrNR5zQy)@v8|EhlJ-i6aj3uaqKtrhk#8j?=hCFmaLL z2|@tDY9uFBK?vXBk)F}`5<|+`zZtrmHNn>dm0`r(Z|fF20{tEsZVfKu2ia}91*J~}!FNmDXIzrMt)uA%ELWdW zCJf*2S;?gs-JU7?AAt9sTrNW~`=l>BAjCqWQhcK1?nNO_-2xKoC6{r+UGlG$H_lso zH+rq~T`yC)1Foy%bA8WI=Sk|F$G@B2$;*H3SY6@wURZvP&jar{g8e*<)%!E=Q3LJ| zU28h_?QQ>vmy9W|-xTMKI`Z+z-gLhl)%xvQ>Vtr9fy>-n)$1=i_GYLxNRbj3`H-#2 zyAVIXLa0znm&4_>A7XXYmURrgAXFE=&NA-)dm!yVkaD`*YHyiT{2(2Zr?xeMqttx5 z+*Aq;t+_ok2geBn&7U0Icx3fN)o)kCj(55~8^YbYq_)EpHM z-An6s9fe;%6o)|2+q51DFpEr>K9V*zMA`Hz#tnHY--v zlR5nX7wo;&P1=}b7}#k)xX^pO-Rj``EMQf0ra~{zPS|qHZlj#3dIJ0Nc&)CS6Z%ty zb5b}2U}mbp|3&!a>Cfkt=Tbu=zG9E@5PH~er;F_t+Tm&(7e(hOf;4n<9p1M7P%&F( zLx*d=B+o|^XMx>z$D#Yth?s*5$!`g_B$1^-Zu8OofllzfLBXvg|5GJZrJT4c0QbJ3Nlk)^zU$rr8E>7;tOpOQ7{AO7&?PmaC{J;QP~`j~N`Nj>yr$MJ1iUf@k^-u-cLY2M4Qa1Q}I5LAL4A9xWnTx#UKxb)@kMQV+Ed>jj@>qwz51c1FV@V4D`Z?ya3M%l>cVs^^*?nT}BT`?~gst?uMCg$1>P%o;ufU`2LKVM@qQ#;O#<+ z5}z&6-cYGEmY{^g2tTslR;~6}-_C27*h9R~!bT?goxLtIt=h^DQ@Ph!>;5m6`|)3i z<-u-Sw=aAb(vFbyv)zL{e>b!*thC*yW^q4ahYmOUI1?&z*`Jq$JOeT>VpF}W+h9W{2orB%KxT4DSu zaSiq3?D>gv!{^6KAlTb?sX;QZlk;z>qk+qUul0MkcvJ%InscMSq5B(NhZkFC&v)Qw z(=2bdyh;fQ-j_)Z&HSr2#O=3ny+3iQ^_@nV7ht?y<|=DrI}UC)cvFG`)~R>a0@u!C zW2>1Ep)5>2iT20%JAaSOp@J9U{}Kwn%o+rZ&L7Um{d@=vIFr6J-nhRqhZ9*UCVkfp zj+7*18{fOFVD9x6TbRF(9>cGjE$_Z-*{ZvX4qUW0xW6$o&I$%nTAz12rr#Uq^#ntu>*w7+{$3pD_1|%|jE76V%G&Th&$E1Kcl`O84m4-|GQnN5q(M$W zXk_Hz_wZ>W27d9&u|j`HZQz3`1o-*I73_+#|KhU+&Sl2|9D2aYU~h|4N@Zs7dY8OZ z8aAjYIj&3u$`%(=5%{+-cx+?sPEO;~%^SBW-QH@45n=7+q%-fE32hB15%=O1IZ>91 z+|2p_?C+v90JbrrL>~CE^4fCsewmwv1RCH5Z>@(L@oaw|;(l=|8Hy3RkKF)&H>U+< zUkNXa`5mlx__L-PcxdERLD;@tr;w%c07|!xK^TqmXhsek-fwu(Jc*$;L6Tq#GE9YnU8-nAo-A| z)Q30$-}X~(oO<=&$OH)X&DY0yB6tXh*A+FzqF=DKc;wHkpFqlF$eCRhxv zLh5%zwRiAmphhDhHK8T)6Anhn-ch-g^TM6$fA?u4@V*A8xm+N&bIF1wDH)p@Gis^5T9tmG9_=4Z;;)V!W10vCy30V|)aPufSO``P@6B4oj4E2G$HydpwqkqD5TO@!;u z04nCFXpLH_?0{}X+Wtx?2uNaIMBTDMP37~v=(OgsQiD#^_W*abrs8&6$1HWaDlO+J zX({2$NmS-;zwP6##9hP5xm>b?8d4*V`@!jh{v_Mf=yT)y3)s5r`Vj|6)vBkNQB4+K zn|=S6Yy#k{8G^ZXstulDy=5;1#V|}9-Mwu4Zgp%-R02Wetfh`M-%=Vodt0RjJw z`}Osb{uB+!m(t<4&D6n0=Ph`C<0U5v632OuRlhSfN9ho_8O|LC6ZEA$O|ek<>F@MG zZQ$jpwh*|wccX1jy;Y<8e#n-_Hiz|OHc#kzWTy7{hPc(?>BVzj(d(iil_|R2iWwyfCF9g&gN2_XUz!>-ehJ6KgI}S^%Kw1&38Q z=BWE^%YIiLJ-$BMTgpcs^7+hH98ntg*U!%4&%Cbx$f^+k@to7tG9DflKsKh7^{3Y= zyLJLwP}1CNqU}#i1}3!k<)=>>`+gr?B1vbbFCD<^+RT+@InFP|CPG^a1NVJWFofC<09nuPzdsw9g)F5~;DOoYj0Gc}Zu(93u(6)4 zILAN-x2f62aejNd`guy$!(!~haXxSrZ=pPrqr^3CxKy_LIWMiIHyR*EJKA~Bz#bL) zc?&%);C|uuxtHM=B&4g3w$mmHP%G}4Bk~#@N9P>@5Q_;4)Uq%vRiK7pU82enjcMp=xAgleoyZN z&N{L-?j|VV-It349lf@@tvuZ4s8)Q27N;baKPeF;TXIv^^!joq9|Azm{6bC5-CXf5 zJfAE?U80f>xpa6)hWb4T6-V%5;e5Nu#yR8oj%o#+y)u@8=AM|DL?3r!&f40>I8arD z*6~E?^BHskKJ}}92q(7nm%OyHVyAYb17s4EqOKV5e6aQU5L}?%dbf={l)y9FR|EMe zaNDc)7Y8dAR6z0|0KwkIBWsKx8#q>tLV&p?{gC>qp|aANmqfZo98>^7pI=6nV84AI zA^NWQw9Z1@>3Mo0v}1wK7MUv8Nl+kt;sSx zss{bzvRo%?)mCP0zu3ol z9YabTrk+xmtl!3|^Idn%3{G}*CoY$7KPVybK9D&sb!NfXR6b7+zq_CO&Z~|V-%H|a zoIPJ$%XB07qLsT=VYzT9f5aiy?@TW7wF( z!mhrA91tmL7P7%$(lNlk33jr3>p?M%EnB&D5tZ;3u&8RJ%ygTitERtIRdJ8cCo0n& z?LM=2AoZADVt*qV8$=2MjwPh!E#(lCHLxG6YD#kWTbA(S`3j1DECeQYD@dF9MyVRh z;?F%BQ9&$=GxLk7aD`P3tCfJx@J-xla%|7=}gS|vTmu{Tgw`#L_o(HMcwQcg<2X~ zB(srbOWCEJdguZG5aLD}blx#E|n(2%5q!#|U* z#10HgYg1#u*Uk~fEH+D1a~U*<;TPvbp?uDAl%!BC-zU1fxw4otF%Jnr%;}UTZfo~G$3m~Qy`7Ra#D_iZhQ=}Vyoy)R^{Mt6V_1LcWD)Knt$LFPam zU5Cc}zz8*XX?-#my-!_3^H4j8^{s~hfjnz>1tZm$oJT(OA76iLvnLCc7(vWHU(qU5 z1Wq3%ZsM5AryE%^)KkVHt9dL>J3L$MTBQ`$x_>w4pcuAD%S*8hsPE;l&si^Mh|P^_@NBTzKpbSe21dt+Zx^adP$&awtzivSDKW+r~YTmx>M;*SYql*o1=ux)v}z`x*Z?2D+}SGXmZ?7XE7)l zFflY|tj1N)Dr_pC014#y^!ND`3wUoSzyC_?uV7eh)hbn)4gSGtajNrhSP?<+p3+(x zW+>0|dlfzBT=Q;sv2TIFb#k8bz&)kJN(tvk%dtFmY>xjq<8qt%SZCIawPsRj3_=s9 z)X->-`oU~>x6?$M{CIV&qpxR<;PX!Xx#38v;|a!3;^wF9%ZZ9lH=ejGs}>Kxl4YRvUcK*(SaWY_iXtH@S(kUa za9;s7qSniPxFybY-_Tp>ykv6c-PYn@u|4A|eyx5hlgo{?uu%nYymGbbt50LdLqE4} z$oX7|tBBgvE)tL3R&@v6+dDOBmW65GWgJNuvN6$;^o;~qTN z4hOSXV1oP!wNDPp(lz)ljv1t(L{EWC!*a_xmUk$et~AQ5@#@_bYM& ze%mXT+GjC2s&V)XUN4GivpXDwtsSjZYb7~;1GIx-kPW+=vi=Wa-*wGWEj{;J7L)Gwk!GJ&&DBvrDm&}0- zR>)>I1DY5B8o!3Xdv#g|baPZ#%|OJmNL zS!BQOySDR8J3C!V)HykdDA&sN`AEA{c=+t5J2ETvYKTE1d5>FAn04z0cTcwx)>ZK;T;m&JA{O}M9 zMbOs)${|QW&`o5`v@9iC@mY02cZe!S_TF#wrvs;%4Kd*!yt+8ph6aEa^uq9FK01`o zJN+_ji7HsT2ytobaS`TTgXmnoV0~Xx`^d|Ou#O+AQ|&S)(nG1K3QkCUTns5O7Gzcc zkLu7{TcMm*XACF+N(?QOpkrwjMFkFGHSJU{fDs}8v4sHqbRYOzVevd&+zFkeO#GR6 zg`i{Vu+ts=T1z3l#3KDKR_H}6b-GB@OQtODY%-ItS^sIOh^lJ6p)Pv^BLKx2_;nG@ zm$8Om67}j}ay}>MSAm^owkuiG9%3qL)_d#ZI5Lhxy7Z;L;}=|f4^1<%se|2I2;UJ! z>tOIgnaXVlEKF4iqci}SK}s5pigYQF=uf%ow#hcLN*?@ZPL4t3k~?AmnTq5k%&gmX z1ND*Q$>)2FN9tL#kH?p#nO6 zQzPPQE2%YQ+ETdzVXfWXX|UEGG{yuTgMW48WG&RZR}wbg8TEcST+8CBS~mz7Z%a5^ z8+0drv1Skd&_Af@3q`3!k8JZp)=k<(2NC#d<=Ll7hapBM4%84J@hsVv{(h$}{31OA z@%@nzMAJz-<(uaSbh5Grt}vq|G)Ts$^6C6pe7B3@*nRF}cd-b7PC4w?5(!v+}t{+ge-kERxDKLNwvexM4c0Zjcuzx}HAFd~bfBGisW^KQ;WZilkCOGuLLN z!NS@~qg_$<_t-XGRktjbe)la>Yz=U&BZI=1T@_3sM5s zn=LPM|IEH~X(PLTZ@Tg}=e^nd*n*Ke#PO&n;n?f+Hg%Xu9|3RKFZ2`cl(^$u89}N0 zK#5@vakaf+k9AruH>(UV+R{>#Z*enswv_f}jQ4p~PFO`P*-p2U38RXx@=a)L)R!-r zNcIyQw;tTBrO`u%?`>g_hFa!SWFsd;#_=iM)etGFuW(l_ErXUL>KmnSeGxv$m9@2P z=+%X)tl6!0InUg5?A0g?6lEk;cGt{>7X^wi|=j`~(H#KM!0>H4fv;=E8M0A#h_Vr1B?qYgj1fPE}ym`oAo9idDrYWSv>Au5bZR^D>@1q z4s^;BB}~Lz%`AVW+vX2t#PCI;=Yf>D51+k8D*T7XY+E>5T70EO`TYIRT~?q34b*muISh=x zXU_Mw+8e7?W^y=4czer!-JoEG_;V*N9T^AZ9Xn1SW_!1PQgrs$#VPtv@j};Sjga^0 zj<`j!O5ryE(yI3GtXiIsx5@k8Eh%W5q#q6X&}4Z(X`c`s3euTeCGV;vDNzS$s6CX#yl$jBUkV)aAPGcv!){c2RqTnqi_)DK6^dNe-#Ab{8rVGU2_kMbD zx(X2fLnp48pp|MP{qYB&b4b`R%}z7Hhn@1`Iuyq;iOc8bni;u;f{HdFL?1FVE-9=i>2jvoo5V`ZGFVsu;67R*`u=#HBae{4`6zZ*ouk36rWo<5% zcUf!GpzjrPxCDD#3VO1PP}g0T5bXKa{bzNkq3vnUSC=>MM+9;SqOK4ByyTG(A2eAw z*E`);!w4-_Nea0{;*{X4`}-s78&t&5{vo|LuV+LoUIK9EKIW$JuXc?Fo;dN2PCkgy z;a`VFb&OdbF^0{U!u}aOaCx>ve&Qp(UK&P!6OMo@Z8A*x+KJzLR=3Y&kTBhUeYknF zV1lHbDoOrbs;g5-de3Yq`|qjW=Xeq_{ba8Wb^)0Po}aPKuTFdys6x7mH$tyo?jraK zI+&e`m4A1$y6nhMr2o%RFE2084oVIaeI1W(CLtlBW)aIjtB)>JKAI^0$JbHI#%cVb zBEy|ZdOdzyyC6?A#5->aIf>ly0)Zm>i~jLOHuWRDWJrSUerEfe(d6h-Fjrsc{v!E4%PP~OYTzHo&x7UO ziE8|R)}hfM6#QR|0aQM{;Jn)Z=m_N>QhXf*2E_X{loT@D{N-O?p8@i?{`mi6{MStS z1-UP;grI70BNP}g{5Mnq(cU+L|M6+11rhgHCz||~m)oHd98x?<-!1=9n2#`>MD^NC z0^^DBi|&7+3rN%kN>2YV=G5tbgG3Ec5!*Se_&3Nc!N|G3FC$PNDQanaxqm5h{sBVkN6$0Set@!uS~4N?JY z|05JD7K4Je?Y~Hle56GEe?mlsT8y;C_T!(J5g}>rH2f2%1JNL|HdhsX12k9BOoal#uLT=7yBX`C&4BeqM!}2mO^A*g6;oU zf|^+%C;YE>A3Sc4H{=@2|G54!Uk0Io<9{+dyQ;vG#`<5owWDp4{J-y_D17>hT0zCt z{|OT8*gpAm;y<1XthCruyZB_i5`B?A96})yhYvAssumPB_B&_)E-+P`iECy&%WJve zBA4*iy+>@HU%fhD$FhcuU^vlY;8%*W;Qj1!v+d3Cl6i)fr1@NOx%!0gSyz1E)Ao>F z)91~U`%7c5tx!cmZZ3{lWb!bSO2LDjB$m$O26^V5JDq3`o^zjWulczJ7N5OyGbV^2 z@v?4ZgRe?GpAXZ(mJLnHsH54O(lbqK5W8ym1|pDVbd_lQe7LYZ6c1r4Nzi!B_?iFN zBdU-aDWH+6p`0xciq>G=|1e);0o={n=Yf|dPU+tGhqMW^0ncd@=u z6PmegGkDH+9)i;aVctrd1OHdBc@FR5F-v|AFQor+K z=NCh*2Fl%eeBhVik8q5CpDriT(o#Z#U#j(6iOrY7BCIo$XcQ+=T)@UJd^#DA;0x_M z=`0~LANmx&%m!lenwN*xpYVJzkXeh<4|rbL7!N!NHGX=!6@J=6bu%Qb8%@zRy5H*? zz-PEFX7N`g3Sn&bIyp| z@lk~jG@{VjwIJffyL!Cdz2CXXeK~PlTTm}icsVfa)q5Hz zM16VA7aHIa4BRgjx{tK2={U?h5_UdYQH1ZZy6k%t4tykbJ2<) zH|}|A7+Ix!yy0B+-d8?4JbX-k`YA1R5t$|Yy#IJ+)a2!Sru<`FGVuQDq!s)!Fa`jV z=c^Nr;484;vfC>DcM`cM`K^Zdjesh6X2^msvCY46Ut{ylwzhYD-^)^aKdtuydoIXU z$jAQ0M1Z80Sm-!eT}ifdCNz|^eXNqe?9}hL-q(?kkd6Qx?%8=8ICb62qs%E6*s?6Z z*t*FxKDS_?u0~W-Svf(vT5o2_gN4UiaFbz~d!Qb0xyNKA-n~07H16HAP7#GTu2aCR1z1=3?Z5cdU8K^l)@Qg4f$sl&m2G3Sck}odN17`9# zy`27o!_Ce8m++dJOiT>6cGciJ#f88d*F0N$+p$0n>**imGs*#G-z!V3apnv0i@$p3 zpPvaoov;Np{L%|L#8~)DstdlUM8>IEMu!c0xJ`9jpM#W@v0binn=7e~K5gIEjyCqW zzu#YIEsi_9D<~?9c<&3OWk6OFA|%CF6iI68d=F~aJD|0FNc-|~wx8RvpUKXAck{#?^kaI%i2HV0 z`T2M2t-$%Ikp&%62)*QUPF}XxVT!O%C$lSEYr^oyg5lGx=H^iNP&5aFdALVX@WWBL z>z=^HPs;mm;?~yIRMT^%t@hH(PREkM4-Y5qw`=EVXNqdh>A^SI#a>G7YcoNww+BcNPRApc62 zHuP@F;RCml^7`{2%ky>pNldx+xgPV&y{KOe6$RDNTuW&R?R%c6vClI(z5bfVJ^|mO zz}2gM&$mVbNBLnxj%6@G_O~ye#QLF)d(N-taGx!fTwCMSQO^`XL1=wBCow@#66z~G z#QYw6jyUM>>BzCERw@(EFK5B}wCmT+k3xFbYBL=;j`!y%;A_7Dd$78x&SR?IZQ981 ziLU0Y4qGALdu%ub@CkqXI#*bXQQ(=oqruH)(nf~QqN7>wab+!KNOq8V2PFEpzPO-* zo+O$E1M&7GowX2`#mH~s>;vCkqv{qT>o)AC^Xwcu21G2>Q2e!RW&qM5(Y=& z5Q)@R683j6>_2rsTEHcF>f0A?-O1V2HV9w>ewfxjoquGzpYP+QQA{^dRW;Jd)vd4T zCNy5_GT%0vkb?T;UHD;Zc;c$+DdN6>LUf7j6E&9 z``*AVU#Y#}BZqr^^`f*|un8ipcxf(|=d~{bGBl!C#AyvP_N*iL40XSk4}3MFG!ock zyKovyI1h0Ec>9lLd(>NDp2-+YWVfH4x{B| z*Ld}=adxQZ;RN|+?L4tom~{WsdEubw_IT_O;r4v~>X0bA&yxh7$6<`J-*IN44icvaDDd=6yZ0gXa$K;r z&Z*0N<{|872kfP>?)>|$8{wzj=(M<+E63#yyO))-Vwv-{3|zm5?FD0joUZ2|Ni01r zbuE^?tzEqo1}>yY92h%~^Wg&pxH>Gp_l4=U8n}-z*Tq6gp@?{B_PSAevQUB^_DPi36@!A}W)w;fyZAwN-2 z+fk`7F{|BGTF+f*X^sB4lWHw}tTxQ7+p< z!VmRFwYGN0{OghyhUh~bFb2Rg;W;m9>2&>JRUCe zq$-sn3&##^8$Vp6)%M&p!3%)RxO-oIP!8!q_NgwW4W5o` z+~C_RmaaQ2U^Ii*b5NGnI#a9F^K9C4{WQ)q4v*{MwzqTtf`M81bxVfLp#5^Y(A(p3 zt(Jr5x}U@8@Z=@-bDl{*m09;AqV4!-dvEXKsZis+P@BPdImS}80x>ptRXh8ON-eSw2 zN$Ai{fBsLSlVpF>m+_yzKownK^FNg(6oKuVUeK$`bzf(?Qj&fDpYCBdLS?WF`>HGL zlvPxacbxuz#q~QW5{4wdGtKd@c#8;S;%ue-*_=NDN(KAgjlnZF>?imDwtx%Vh*-$x5)Mts6$cH%Cou#ns1RS4h>#u2UuaNb zL7QYMWTM~O(1Ie~fBQ)ADS|9y>1arCcVTz&Im!^4zLZOL;pk+IMngoC7 zgyq@Kjt0?cwQsQ9o+6!*=|gf;UDx@Cr~Q#4mL75fM!;>YpVO;_jRACI!YDMVkoV(~ zqR$Taqk$s0?g_PX`OQ%x0~Y0;h!HDkuxO=$@Qo%^A(k9o>E`S`#~1L zC7`lz0386*96qER0sZM^#**B8Q{ep9=BsyuO<0gI{0wMiJmnw`+MNsw4)Q&Uu!~5_ zSO73VQ3)0aF=C0RBCZUo9Fy;g>^I*66i#m=Vg6us2{{?0Aa%eg1erndszf770iwU& zqI3Whnj5i3NC?U|06}aJjsYbAnk?kCHEGXzPF>B+$u!X|;6X)Z!SboLAdY3a^N-G)aBC=rKf36Y%`=Rqt@SP^obpl=5Il(kxTW}_ZN zLsM=!5N~6)GkM4(0RV$LS`Wcs9NO+-(pWm>v>%}eDeD-_u5vk3)z4-ht_p^#AOYE|+-OOF&~X7pbK-@SsCNR zI7JR;XHPmOAgQ3szRb=*7juG?WnYOK!@KnMzsEF`C*#={bNa40Q_RY~c09!mtvewq_*L6aJ5EMstA)6>MQJDS@H=hjU zCQck$O5ZDmpvzUtiJ+xqI9OsM0MsJrFhRfa&pK2hg1*f-7cV0B0Q(haQ0R08axkhv zHh@fsnOIOoJ_Wo$-#2t;>kmP$0eYNkdsNw?|>+_6{a-5!r{V1LOHY|hiu11AZ(?= z{?PIx8ImgS{(w;Vg!B{g-@8HpB!d7fH1V;Ld?1LT%?WslqC<%e^7w)Bx#p;4TSe@` zuup781fkxJAw%ZwDZp^XTQpp-cAj{T>bL3~sY%?)B|L}bQK9K{MpK4trQYOdk-Xe5 zwE8+@mJpc|jBM6ZRxC+G7%?#fW*(r;&=u6jp*S*HgfZ;oTtD=8C!81|BBI5NeVj5U zCqhR{YpbGB38H>ydPYJa-eo7r2fqcLVJtrJbnqgiUau+>Z`pN zNf6+=gnG?&YrK-_AyLe3L_?!RGs7CP-t83?_fS-p_jW6CG?*~5s?L!NsAdWXqVK3f zcv|c;Gu-G;E+5~-d)Bey?`K~=1%2MhduypglO#)%q^YS%im(zyMxg$VfQ}j8NR>vY zjuI|7!NWuw3)5P@5DLriJz5MhjS8^;4R7%c5j@XGyF3z@7fMwnFP;|x;_-6|G1Ds< zAQo}!Y>lZDipBg~taCGD!JBHW{|0@sIz*-BP9QFH6F~$`L8ruAHyarW_y+5g@8iy_ zk+=l~;&F=BO-*`6bOi>>YtSTJ89_vV3ePA9@yK4EW}pIERE4x97XrKpuy2wz+Je9R zr^D*oR;DtnhE5prCo&bD)nAJ-h*$to5OlE&O3uZ|}Hvd2?V(y0vshMX@tvgni1Z1}nM6&6qc5hrYXS{b@xBu%&Y z50EM4D<*^!4GxN7)rMuzP{kTJy5wzHTU#n83@f0kiE~XCe^;D*n7MWNNIZ04XNwu^ zD=4H5-C=5#xp(=Xspv{XOA=jzAsfGN^y}cz%8=VnsQ1WKzVu7IjKqxlp~nO|=-bh` zkHC_;-N><(Z6T5-CyEG~SOQ%@ud(Xv6Ipp<^;m-fWc9?O4EYnbb$x#^kARMOuH$K0 zx^=B4hnPIOJms3X$gvP zyxV)f5H+42duWi|I8T%b>1;hz+yA5Kt>c<{-~aKA96h>WBa{Z|c9euP43H8;K)SmI zj7Ca8Lb`{5gmeff9SS1dND4?!`nUJ%^Zo75^Vs8@?VS5u*L_{rGhFe2gm~i+|m`~J1>qt98Bi^$V9g2hN@`y$S;u%M|AmB)~6^2 z-IU@yHG^0CMG$)sND*NSRJs`CUu%cpM6GGF6$QZ!MQ5XGA^ud3USpCGmgQ$ckJ56 z$}m~0HFzg6mMCKha1n@)c%cj+mm{@@L75iGm?LON=FWiZOqH23F390$; z!ry{Z+f$yYSUWY$rzU<~at4dR^ zU|yu?JD@S3hQpFeunjQ+uMK>&IuWtyx_(yc-7{j#te|Hd9n6CY)KOqUIL^556*siK zoKi9E1Zit03U6dK)1%Vh-dVb6*Hu)&AOAjG*3a#nlOqQBm zw5FK`F{}5m)IgED2vbH%Obw^o+Id^Fxa5K(+Muycd_MgpTpH3Dm)Ez6PoOZphNo;$ zq*>AW1;>U5y2gy4?5BsE6%tZxO*gFEH&S|G#q|>LJAx}+UrPd{UY^EXH>m?6|ImRQ z+efZ+|6+&r%~AH{wJ@b3puVHy9avvaFB}=W8A!|2OJ3E(CEJNQ#g={rLkbXGJ`10x zDKZ3SEMhIy)`0;L9=&at)X2AUNsYBcDoI;gMaNmf)5OXewt~&q~WBcy?8ilnsdaGsuT1&kK+^ph7-&8JP6o8c-tlcP}YWU9jt+)x}KDR zLr6My_>X8U3A~2`2f)Zvy1=-vnVefFIQa4&@hMUDIfonK3gD1<;y#>)~2brX+q0(B_MXI*x*&9Ahlr_f+ZwbK?y5>(9P7$K}}`k?*3GmAU9> zgeIzr>DozgEgg*gz=~8VCxM-ob(7XfwlC;M&jUJhYIpi;kl^HXf@sAEqQ&~@Dh`Sb z^wo0U5~v4-3JrrzdkgqKdRNakeSB6OpF?uxS<8c(Jvj641ie}GeUztf2%q(q;Qj&k zW$C8`;c*vzI5QOPjdFiW&qfFs$S!v*a-Zvp-;|8=A3M0HLhY{zZW06g*V*bOAH&=S z^oMb5#*T?v<#`9_+5F|YVM1!$)Q~Yv={$|S_97nC;wvm;+1if2>4R z9~cZHZL^Om`&=-YHnJ#X{iJo_={s#sN&>A}i~e_E=^=yoZ83{GP6#zn+3;)MrIh1m zOvxbYm{F?PhZ_YPa%a4o;uLWgTwGl(AuuVWCZHHQg+h+AeoYjLTq9P1Kws#51i;u@ zNfH@*3vGFm9KzR-#kd@KBhkD#6s~6Rg8=@uuly5I1hDTzY~3Yb(^gp9~*2EZlMxwAbwSTH;%$AE%9{s|^h93TQ%I@PDu1;kl*N1_Bk1)V^83a~lE*bt73<6e>vf+1ym=^^BY?wgL`@_EWF zJ%2(+q;`^&u)5M!te2+v?G~Ghx#~@RmK<2_kK%rcTI8J-9VdC`Ibrid?F;Krbw%g2 zIvj3IprXfSVUbgQ)7jm3|8X(Imq`^q^O}t%S!HHps&lSZ+&ct~1RLmK_IvHM2RZp~ z-&^^%mY{g%)}F}bxwyodn3^61T0tc6Ja3NEzkBn{&#xR^TvMSyP_Qnb)!4&r#OSk{ zu>>0pb;gzw=@D#jrl-=Tsbg`(o4z)Z*RSyiqy#E*L{%}4za`13z3B{{#ob|mwg5N{ zXMILRWlYUtlIiwbpKh-36)6`H0_fUPwK+RF+6}eN0z+z%u8=_=`>Oa6Z}zEWek2!f zH4OJ`Gn$3E;JLB^)iH}}LFv2glUvLY^fjEEO z_8x&$2TM_pVAh(tY=$^~uF>PY>s`!&wP7-OP{P7u0tFzf=taf5VF0;klnH(A3mP#h z0V)^=2ugCxQ%dh`i-h0+^IkJ>SL6st0&z6HlmM_wnXT6F-ZAIb$Hl8rr9LMf*GTOF z9{Fw*t&zdxN$|;)S4I~Y*B`yX_|-!(0Pd~?5KOrg^noC?C9JC_3V0x1>wMn|&dhhheYE(3^e+CC&CX5#@S+G;UDqN89N zE(_&I)!d@=?__baq%by}O)C>|m^H>ooHMSt2kmMI$Z%z7xBaHykx!o0isyF*4tnq{ zdYb7^i&~5(RVz1N#Ddvu?3U61YnU8w`@v0G!$JC;Z$H%TQO#a7rbfa3cja7fC|!o) z*;%UR@89&1bBLA8dp6p3* zq5IO%&~pi6y7AA_I3915Hzp$^_>;Lh2nO=b{lv@Wyr@sj6T5GRqpK*2OO1u22M`XQ zcNJuVC}@~Gdh4rk!T=*trUIoGYm<}HgMmYI_LzJlDb|Uh*1;kaNbaPinG8tD)sX$l zY{mHAx^k|xrbU$o9I;6-JRCr)EwII~PPH&?=Cmy=YkX9dqm7uc<;+AE09Jqi*!F^4 zL!EgVx>%=n-YMeXd&_(VtPSu6B?mSNct*@?a1jpT@v4YXS80F<0r8avr8x8e+SqhN z9$VidLj^@pS!^Zr4WR;#D&%qO7Zn~2pC||$ryAGJ8(j`6X1`!9kUepp=nRMu23G-S z=t75pZ7}5ss_)tq)+LMY;8d_uWF-|ag$Nb_NX&JB#Ksdc0bme+0^TRO@T5OmTId*; zobp9_{M`$x!oq?fx@j>BINW%zeUQlG<|bX=VtOgoTb70dPbr{lfX)D(!9!SvdB<@Q z2TPh=aItz7^Nyr_y)7z`rp?rEy&0o1vi!3_0yq`vJcMwnneUh{D!0>lVfO1msOK0EOv1@f#=pTu{xw zwU@pqF8P90j}O5gzje`SO@q>uWoZ(g-Q5GqsE}4{W^pLg(V_c<%;G`{Vs_JK5t-op zcWLvaGG2pQ>k%dMp-Z^#5OYauK;8fP{+%p!i%<67I5jfMthy?KV7iqXPh@M)_%k$o zeZ2jH<&`9s@+sITIC9GO+Sf1Tme{Y730YeXet3p>UkT~-)@4GVRj(tw)-M8oXq7$9 zhs5%8KPSJ%7B@n4QgV|zOzSBC;0Wv%mx&b0Cc=bE76JF(SX=$NZ4=~TGvl!+a4gt5 zVyT`RWJt_=1lj_90p?79$GVbwh0IkSukb7~(WA6@N~TyoNzH6_!DSThp$Zu;Bc)OE zGBGPf^Rs?By30`b#D{{=?v^@3ctGwc9q(F~))T;3E=7TrHbfJ^R3NN;)*m0&3j|Ls z%n*u7%iE;sjSz<@zt&WtR77N~51BtuVzzi+JOMx{P?Merm7U0-f}xcACxCt%5FbpH zq$Fu9i#wqRj>S%DBz>ASPPB1#1id6x!$5VR&9qi$(Fb#5{2}2b)d}byW^VFYg`vxsPpG&ftZ?4@-C&ZLn z0zBec(}%7dKR~0+Tt%*&fVH#hk5&W2TX?`4ZGuEs7xT$8S8>FHZr1p&qp-Nds)LCi?oGo#P=G zaXJ9+fVQN~Kss3p@370mwd9}u?KioVm=8pDC5A72rS8>^T-j6?tl*(28CPX-SCUui#-GFt><69JAdho z{6duh3Qyukq;#G&RUiNy5st{k4k0q>ma6};?gcA^8oW^B5_QM)=p!zEV2k_y{U-sx)|N6Fbxg}kH zLdCCi)CTif6l_XHtz_L(Z>utPbpTWn? zJ?*p145P}lPJEF`ouJAM#~>z7DcVbLS|~;v_!i?;*zaLNbfE1T?e#6}i2%0j-J?HD z;+;l%RDOU|oj)F$%aZOsmAYQl9tmA3wD_!#`l zAv9%2Qd^e%`PYrI-@h>n?4rW}>nyoHkNbVtv#VbRXG12TJlL=MwWG8j1FtN@trF*( zsR^S;M@IhopK_Cb^~sB4&u#YLfFUXg-g9!Z6v$j| z94^>Jnq^MQdm1Age8VU2#pJEDxNx|lWqPN8j{qr<_F-KiwP?BRdr~{PhHp!P8!048 z);i2Vyle9N3`+qvSV({h?i#5sM?B&8=N=t?s)ib$d%G3Bjz7{TDN7y@Y$e(+SFB=@ zHlc^9xWl4Qgy$_xxP7r7|72Z=vPofyH?r2USGFigEf&8(V?l9RZOh5yW)FPsd|uSw z>|q((QUw;9`|L?3)gJ6=O0y&f%Camr-xzM#=`*yGCp^P68BwTmhi#JN>T3&l<-s#q z8m*vC6sp~l**IvMnHf{VBs@!tYhB&(yHl)Hi)zacE$HbgK z3lqDi4_|yxLizOoDi|S_6c`EuVMRc|yLXdvYzV8~Rrv>SLxs}4%KGB%YDCzpl-VdZ zB7yMT0Xx9*u&r8^69FNk$RZ%>?NWz27?QgzJv7ZUMP~h1ID|!|TZj#Z+GwlDyHMb2 z9hV%_d3Ra7AhWWR*a}LGjeTQE3N@TCZ@CYEbjEz z(0K58ZhSD+SN^qUGK%YLvpvbNN0N|&4||pqnel4sGy12QO@97CUPbA9MuGp-vwDynaO+g*hR)Hbr!%^U7 z8++kBZ|UD>SCK`!;@Eu`QQO5MnJ%2~Jb+eo(TmaM?h^ihHf6qPQOXlKczUn^Ox!)s zDWy+Og8UVS-t;cuq?Ac^BSs3E2MY)c=~Blg;)hu! z`?7p|lAMVBk(LT7aq(w2r0d4-8cdFaMdYA_k0yfHLZWf649w9{wFmSflnE+|MJWd- z?m^eJEI&l~^RyY;$%noDRNG@_h`mJ61jDwL40t+!u)X)mve@AJY)2*5b5#QrSx$rlJ7kM2(! z1z=-Pt!I%GdMQ}xf(~?ekcJOJSJTv}Kh;k5iC4k>gdyGm7bp}Dr?;^eWmyx(#QGyr zB%2tZTN>b0;b6+g;^gA0Z&*{>%5iKvGO6S1Vkw>R$Jxoi$uN0+cw%;xQ>)EZ6rSMg zS3xnn&i>3XXMm2KO-AQiSIF$d?_*N0r(`X*8*!4*(#pzM-9VH`?OL@urhpRCe&uSCI!KD+$HW09&gPnXjfLM-^Y%QlNq z^qee{smP5b0;0Ndd2U_{S&%Js^vb}%je!6ycq3)_&3d^7Tk+suZ;p*rwbzj6O2T%g zaCpJ&>eSND!;7{}V&mb3=EMBo0#Z8{SMTCl4@8f>_@PJ{Yc2SU3E##95BN?*5Ph>n zM1<}+D1umh`D{c6u-h52)^l(uZ4{wNu8Pk|UTT%Ii1_M*es65_OuFOt9u{_; zLp?FW-WG62;*+Q)m)p7vzSx!Lp`#*%dcL!W1G{GV>Dum>pU_3G+byAwo1hW+7(=Yx zK;Nl`#j`_$vF{`*dgq1t6XQ>Zh^7swm9(Z&D95Ex(IP5*hI8Vm$Y%Uw&2WwAUMy(Tf)@ zrsXmhMaft85grp=EOjluNQdlZ8*~+i8{;W`?G?1-z?DK7@`^1RfG935w#l#9noCN1 zDfrtTk6agK6VXx@?#Wn5c$D@KquG5IBz?APdir6pqQHf&;X8zmQk)%?q~!69ShrUp zQ(ny{$V!H7iBpI)@ZNp(8D-n7$=?P3?-jd6bIqOHiVCZ$s^@o#AdfDt+LBN}8xr=_ zN+`uo;rvSUfx%1U2Ua+M@eO%naD^p^oG=QH4;$c`6ltcTW87YlJNj9!*Gl{*mX_~c zdW}2sN%|{%zB75kR<8}JTB=ZGPp9(sFnSxyy4j027j+_Tpb+_0M0U0!NWvKr>w0~R zX!u>Xdv;A{gKhfCZ$4R(F_Sh8;&En1IgG;=-M?=0h7kmHIXomJ{p3IIfv*r-deton zXygVy@#h({hEbK`{r*)y#7H0ss^LUpJU%IYTh;WX8aUoL$-B31f*0BgX#QM1MQ;vu zAN_9R>D;|};vezqzKz*qDR$55>1HR*ZixXNUqK7gRcFZ^9ff_0g$LlvupJ0tu$IHB zySF2!_TkK1I&ad9IkCv8`X29C7sdP$RsaJ5geHiWhl1v;{zi`s8Un0@ssU{=!cbMK-$z8oBf;@Xsamg+Z*C`Fo)NoqGp}KXe=k5g*_V8HZlTuX+&FCalk}Eq3e7D_BtZT=0!Ssp* z01(GyHUS*0F1Jq)Sp-&q7|Q~zzoBx@Hx++}w^iM6Ks;HRoXe?8^$jHP#XMIQ#Ytx1 zLhfE^5w$h~!>Gt(L=TyA_zK0b6Agch3lyPyfk?jmn@EQD#K`3D)pw7{jYz+M6^XlV z;I5bFteGSX%iK-;xDbF`{N|ecSr*~eu0zLt!KK68U6}gyL2J>6&kqZPyyR^&C#Ne{ zk#%QxvGq@{$lf^O^$I0wKC*d{*#TB7;B6ON8Qh#p4yTvKwxvAJiupqhgRIp)@kw-! z{N810%Ozvati%=mCTDgqRV0@Ui#hn&d@6PjRz;Mlb59R0lw6VZKSV71FzTv)FBW`LG8|g9-4g2~@ui6Tn_M4Mi=4 zg)8mxle`HhWS>$5VJU-BF*jCiO0Stj5!5e~bRgD3037(blBM=S@i#Hm-L4eq`bk#w z$W0#MQ);HTa-c5kOGIL6fB74tj9o}t92S3=?zyB}QlbS{I!brwz65!%e-S5t9&G52 z+8`#VHthsphZWNYtmQHVVrxN^run+~lqxwx`( z{$}i+!7t_4o{wOR!oU0cqToy2%V}&ps%u(06KNm-QTjOVr1HBLyOQ1p{zVks_sH|m zroU^h+43Vp7D_TbeEJUyo<54!XXu`dP$o3?^SR^c-cENVDO#j1e8%ICxAfsf;EnA2 zBH0As@varW_c|vjm+wQG>tpsjZT43Xuw+iN!psHce=w@V=DvCvPYC{ktBTdf!WV-I zQ}rB*hPu5Bbg1p#d3EF;K3ejf@4{NhMfNqR^~Z%pelHL$-KQkropt0hAR$%SP=ST+ zF(9Phl6JW3o4ig-%WKfl$|4RomPfUm<1#P6ow|;0#N^WI^KH>=3jb5&KO|%D#IaEO zsxssKA>xy&hrfy%DC+@h*#f%oR(BNV%gp_gUP!8NWh@ zSOQ=##bTlaQ)xq!5Lj2Rge53o@+Eyx@Z8-ZSrF^7%=uiwioBtW+|b{$zxy}b-+Ri# zNiPp~cjWszQIq%7^Yxn6nBJc4%1i(citg!J7hk6L^%}9%h{DReR8GYgT1AvUA2UyzG9zW=9(x)}C^AL+S&UlOlB1y+T=5(Y&j zk!9ijteb+ags$*iu(obtVsbL@i$xV%s%9%`nf#duo`|uM=wVE49=`YIi)4wdv#(Qo zq5vGMaCR9%h9{|-JjW#xK|gg3XX>I9Vx8T*)y{v2-W}IYp2&B-^eFT~m(-K`XRMTD zEBLrPY(|f_aoz-zJd$!Qh7;wgQOS3OW}F-3q=*m~_h<~YZ+rb-@>>2qg5Md{ zs|Zm_^mq#oYo&u|lCE@k-a9)?Yk^ zzn3szuk?lPGqsP?ecH03;my#PZ)OJJG~Kx#dvF!5u_Bn4l01)f*rZI%wH9WUf6rx> z?_C{=<8KXx6c8!B-+=X(%SRC%#usy8RuIJ=A&%lvC_yCLlMC(n#fz*Sc5g5n_d2J% z!{#z{0G6dC81z6TkG>1W$J307>UDwN^C^3`cux6POkc47BvB+Kgl^+C_F$#Ms&N-JQF(jN z`^zL`mH1!!>R`!a!PKgPq2wnod&oArPewn|MtO0JOVuZ>QrR;?5rk{?f&7`|@7qtM zNwI%^HUZi2i&r^>e@u#n=?0*qY?rzUF#xS4{+t*SrH6&fRY8_S>`eNcf|{L`Wp(2D z!s~U=4wGSjUoSB;p6p6RqCEsy z{b>@y-u*)7=S4;Dn9*4=Ek+210Z|j7*}$g~GmjnYKVe0^-MsgC`vJ@ZSkiiTJ(f8h z_ETq}n-h&OyoEj7NOQ68ObnJi>u-8rkNe-QQ}$A-Q(X<}KsuvmyQ^3+qe4tnwf27^Sw3+fk$srj z_2w>AQvZafXg}VQ%IJH#nznO8bML{0zbxBeJabjkP+p<#l z`kJSt62;>M=S(XSN*8mvF0G_3pQ7zP^eX+!u2I!dIq+jXONDJOlD!p6m{Z-eQ`ky1 z=*#aAJU-tqo7e)(KYF(N=J7%-(Si`9`(rj+VfsOj>pFai!m3>_9{>c2g9UV8wxR7>y>SS4zo3`e^%k#^W489)xgNj|uv<9IAyt8SHKvxp%<>ZJqU z2OdrP(d#y%_xd`hOml7}3sZu#`^q+yd*i2%_N8l|?Ebjc4$yh?tr5n=JfNW z_WM5EpQk}kNbe>_32B%h0USY~;=W@-#CG+4-SOF=hx7j$PNG_H_%gqX_1}9R%NI)F zmJ?y7ts7=Vo|8S}-O)fkAQdsuHJ=z^*M+~}h1MJE@LSc`T}e{f54uwo`SQ^U#0{ir zLoPjhj|()C#A8Xls2*i839BWMs)68Kjm)!juZ8Iso9XQnpFBRoI4su9npF7gs}u2gLCaDYM7Xf{_`wJS{5WWMo+@^f33Ir&Gi08j)N2Vp3k z@kHdNF5F9-dqzyI?z{;0g7$KrXma0R7%|gcM~)_f@k^~DK9^Fp4@@A zL_?0|SA)3H^$RWyaWU=bw|$2JM3MMW`*RH+U-P_}gHKlbV_Kshyhs(@TZqW!S3-(B z{eF{oHEIVn5030PqPPgzioPz3@P>&#=oiHY(Lj;g?k{Nr>pf|JKmftzq`^L;+U^eh zJGCUX-K@+pjWi}sB$%Z@0!%DDR@d%AtYd`WR<&26fItdwjep85%|-C%~m9(LMEpW8(bmJ3f;Z< z1xE+m9Wh9$O1p3lN`T63xw%>{)0y~N`-L+PuU$@$Aj(Zzqwu?C+cph)0zE@&0{wm8 zrAFWWkmrOU7%%n!bsOd`NqVm~aO7sJ?8LMX;!aj{RP zl_*y@|L%`w00r9J?|BpvM z97795y84531OMZuPz-wjvC8@1eF1M1{>Rkl2kbciL7s3>5qtT5w8gMjFvcxFFD6C9 z|KoBKU|{sGCu^5Ws~aPA_q6`U^(SyAEwV}xGApmvz)(HDs&M6K5L@84t^X%E2>_+3 z*-I#_d8+@X+W~8?;^FZmxB0)A3n<#pVdBG_24fY#Hn8dO$_u~D=YLdm%#}b; zwNPWe|A-+&a355axgNfupx$19{>Mb=CnY@Mt<~#WFBS~j{*`FU>=b}Gtn8Us6k9E`sUb<#zPFv* zrfG^HtEZ94AydS9u1fl(biUf0ygoG<#XL2RG@HcL1B(_regfL4w*Plk00cp#-QLkb z{yX$P;yO@SEth`k$Gm#%|B+mPPzW7}qF?AW3iaO;L3kO-IEw03nw$NnTmU#?3k>b) zqhHjapQs$HCbG_+iBb9NEa4~kmQjWW z0A$tIwnj$xz49R9#savngFb(3AA_|72RV&B@^%Ndf|dDETxXEE6O$#)(wYb}c?Qrn z;<35u#w-BwxWlxVo`b6u5?I)Pk*oZo?^3fY4pxLonv=jY1O8k#3lOJg;28p9{lrwK zN=qC1a?Pp+gG+^$}WJ9sDGKM81<(UPLb~tjDnfvjJ zY6O5CMIx#oHJ*1EmyJgql;TYKW*)sT{u%)h$n*+EvPs{Bv89cHkDIJ5S$g`%f^8f- z#VobC?)YE)L~p;Z5$G_2X<>))tooK^_byv9$zH7=Z#6^ix()ToqArxQEETu1hw?4P zJ7u?gU>Kn+zvAT%^wIh~3NiB9^=AwLD&Wt!Ta6Z1H*5$X0N`F2wy4gmc%IPQb24$1 zCI8AW^%Hv9Neawl*keEI)pI+)nrS>K6XcD+;E34SK;PpPx66Z$ZhH$@Ljzr2%`Iim zST%-sheY^~o|j+wtz6t34s6kXE-KPN7v-?5Hh!LAv+Oa}^I2(kut=c4Z1_#~a7&Ap zzujsS6vclu$uvQG`+KnG{;a1U*jJ(HwKu`n=Gokg8K4zYtCiy$|1!CUeAb7pp> zgMR!0|2q7Z&$f6wq9?OuiILfYIL9i8f>6@FV$MtL^7Kp=wNgm{!{BG02WGhpk|h_< zX+>$1nYY8yKMdt`-KqpnMnYC^E^c=}2AoCj*-gE6)hDy3V=?0Q?e^Z02)q97HQCiH zEw;X;ZvFdjc?97Eb=_o1HJ#IZ*LenfKkJG0sr*hkea>aw&dW#MVF|n3(fJEqPF^+! z`m+tsd7u<1uJra0S&kza4KM(l3fAC;B9LH>#@`K(^{pjpO#UrwKbxs00#-V*O}DuY zZ!qWeedngYBs5(`FwSe=m-aI_>PqEc-%s4d&BbZ8(-WJQRnJV%l1Ws5 zyhEb1gTDINtdUVVZlS~A0%vs&ye=M4i9eFj6?QZ3#u}QOTp){T=oGcm6;M99G>nI| z-kceTX&G=A8LErc_)Y>2p7r9LVzcI?(zJShh&NASz+|Is~}Q>T7g zZB+Mi6?Pk5OksPd)N?m%;n&mIE=SXH0sGYH_|x5H&}Oo;Q7}5Z_%#0Xbbmx+p)JIC zOb=YS?Xdjs>#^mWoO4sy-K_+TfYZ-@JS;KdAoM`Zjj2B7y_+?Rn12jPfvbXGhA$yq zhwCw+5C7~sxJsd_a$q&*u+8BenkLUMNhV>CI}BxKMnRs!gF;a#D`uEu7p`F~SJdj_ z0M!}_xZ?+P7{uL7JIaIpeO;LQC9yI`|Ad%Y5&#ZUTSZ^n^t2tQdyW0ngHzjb%H#U4 z(^4z6nu?*hDmUZ}q5vSEnwLsk5L}T84u5kWQ>b5zFL#2@{Akkic$4g^Q-Kv1+8|L{ z6@T+5rS;VAV4ij972$jVzN))6@p6d+(hDl7YeAlE=%@ODdqr1IchioIK`Yz*M@a80 zrBZsR5l1T26jCTvWhm>AW~FCR@qq{kiCsSnd^7v&B9Gk;uhqeR<02Ogo97@w=%?=g z(a6@kh*1h<&K`DVNiI#C`ea=u&943vyXaH0P(q|A_%T3nZjDu>{i18;t?@WRQY_E% z#l$I1og>lec|b*}=3;$soY>)!8l_HUL#LW*MOW<)ZWgh=+_}a^DbA+ihMW<$Wo@6? z8Nd168ag9*v6G9chrJS=^-_a}7B!!TWS5$s1M-8ns1-SiKa&qek&H?_9O{8ppw{k>`7q8Lx z&9ce)QEWMRZ`QX|up^hYv6oXCQsb`J!7YZsG+_J_4E4K9rOvOu-o`GOl(&Al!z_)I z;QcSd3{-Y037g(31NuE2N#f09C;hV|A~LWEhSmAcNFsf0 z8NZ0=Ua{Ltj}BJrX`8SY4Yto;2l@=D)4a{|SvGc>b^S5+Ch(7g#KWyKV9tHA&iM1! ziUO}uGC?R{k9o4oP~xbxxO6y{)Fr6h{^i5rWS)%Ou|ZhytLdrss#&8nNqZ|~0-R?4 zvzU#C&dgszP8%$!S}MSgFM)gb~^7w#Uqk&N;)bhO6B#|E_VDL2={K7Ftf;?$8s~S zK5zE36@4Wx@zbX)O2R~{b0JsVJ^o~%Ig18W36f;yA7>`mCNU-x6p6)3Eg$%$mgBD^ z*3bJ{bIK^)-#|%`0?jb!dK59Fm|dE*>SQMI-38B8z<*3`u{ zkohHO(d{^zU#`uzrQcH1)YgkpbXJT3^mR{XY&%7E=%op{YQo#hg+U! zU9&6xZhO(sN`AhtGCP|UNgT77;& zvq4>3aA9JP?TVJ{J+=mWyYQ_5|>O7x?xy)}m z59_Hrs}{>(rl%pA*}Y894Eek5oqie{!A(nbGd{b_QIRE9pB|f@E=>*0bzkIC?lgvnlSr42OfQGQSjJ4v9$nEcLu_!L4VEB5Mlzu(Hq zf&Gd}`=8%sul~^G%-voaJuIo)`o8WrWBkalY`lzbKZvM(BF^2eX?(s0h|3XDep5< z!?&&$%W|QCHAe(Ne-5isH)Rj3@Yggy33i6> zEKnc2E*Z-PyaK6|fBse+N7{ihKTBkwMVU2z{@lI7Bx2Jf`1AAqMRN}K`ZgRLj1D5} z{2 zmtC>rW+NgfTkX8M*mHY{ez+ewm=rW&WC)w+{E;_#e-;g;=0 zLhbzRIfvVJFDm#);o`0Moiwx(Ck^eEv}ioy%-K#@muXF zF#p7Zkz<-3+@<%jdRkMCO6K=BAQw{Bq1v~sIqZ^HF>P-=-I~T)UR(*ed%N(^9eSER zAv!;k?!4Sq?(+J@;HAll?X2ZXW{b1kUt?RN@)9lH=tdov%E|Pk={Rh_*tQD%TNz&U z>XMkNDY|xIgWJYLRa4CG-2ulnS-;M2~EHxs7zT);KS5b&V=dFfFcYJ1$SDOmwn# zUEifXiZNWyB@@&M!?@*X&!65D)G(bjzQ6Zx_d9sX8hR2XF^lwVne4u!ecB#CBiebr zJS$Vzxp}oXLE3ZkuY}05s^hM9mE@%oM%;t_^3tn9Y^^i5RzSPS-kGYLF6?5qR`|H} zOb7i{|KaA_{2MzyRRD&F12Uuxq8+FRy`F8ce6jzLo8BYz@awcrUZrcrMbOa7&_LO7 zEyIh{1-|XO-M6brTbW&lZ^Q1_?1}6`HzIV;`hr;eediv6Uj=7LLJ+&{<*h6{#b5zl z1IR+_X&d$8EnTPGKW@rr4$D5zU%u>^#-}b|lIu2tpYd;+ENzMim2$q*D+N_v$<<%! z^c+bYFA9cTD%y^Fk#+waD{d=Ds5N75-;i*#VC;U7(BWT}+=&Uhp4lUL=f<#j{_pgc zn)~bmr-j7bNz`aX^vj;j+=By#X`8&JZ{*}KcWn}<$+U}$#-1xQYu=&yfOMU#U;oH< zxgSlB@ZGk~-8H`H!TiH<+AsW`uD1OfOq>0Fx4Ggd?6z!2++3`|$HwlG^})ldP0jC7 zlrahJMHeq)lS9Vw=ggnlH6QhV7<}{_5BrxI_Rz5&FVn4eU{I5Y3+v1=LSJ^RUQIW@ z6YLB<`l#`X8W^wrhzbdbIjuNm`JK)*pMExfoP>+> zL%W=5aSP)7oDNt}Y|x8a87zS%k&GOs4oAVIn@quAlZRhxM<|2>c3g7WCpTV&@`G4=c91&bM`M38| zyRpa1=&*agqtL=#%Cl8jo#TbmmZyBdem1j78H*Jw_n3uMmE@ZJ@V;fi)&I@CScxp7 z<-d!B@%-dfAN04wm9x5>?z6IbHz)g5PYs_2-Wn8yi(y?@E-#i+8GyQ}zaOtKR*}E1 zHg?Np&y+(KTnT=pmk6B>^tweq+(wF+J)F&4y{&ja+dLfq94o%ksj+BvKR)`*?sj`P z`SeM(&t7A4*Xh_bJ#91Jve*G{&-GW%X{;Y8uZiWBc7gW4KU6TrWvPO9ZdKy0pytw;WyTFnpJY2){j7y01*8gJ?j zM_tv7(PJ)!7@Lh#mS+0g+V=N~vdvdQ?E)#vOIOo|+pcSEUJNeOcT6~PT04h=IMrl8 z#<4G*ydOd@C`dXbx-AIhGhl>MYR~0$%+|T|=A=S1^tNhJ|8C7wDt7xPV*GXYCqEr! zVVnyph)0{64#HD8Ln}(=^>`oYFx2Ffn;#w{d)G~7}kJ7Z=l{VKKDWJ)tfQ%L5=l#%B}S%ntr zwO-?SDfvwQd?tY7QUxdLaKD?(4cCS^;6?a35mZ#F#(+}Q&0l6&z?{2SgB6u2F&7;ZNvj zmYf`-rx-}mV|v#y12XbU;UYFYQMDXP<|<=ss4~hxv*&&xVe&MWUdKnvMB@^TVI#rA*4YUHM5DGK!neD<&9i{FKKu zIf@Gc53k<86>rxn`*W>R5bomg#OGFuvZSWh`b?l(`l@BI=QL*U*XhWxms^*A>+}*m zzuexEyP0sB_CluZi_AmGX4}O?Y@k9VA)eFH&pncWWfQE0n!NkQoqUfY?=aE${^+*_ z3gXUc6Rp2b8=qa9C^h{#O?Y~p`cAg0)j~YjZZE%PA;5k@CWt3tU?h5$IJew+dG5*O zb?!utsHV=J4?SzcJDI-*J7hLal8&f0|2M?jgmF8$5LpBtEg1|{)tCD9{Y|B`UM3CQ zcQO7zv8Aiez{4QW{_ayj7C$uo&#C|fi#Aaz(PMO*aY;KRU69-5=$V~

          %~89HWvY;inUHFF@;P6yTZngqs-)m35vvV)_R8MTfmbjvBfA!(TJ9arn0Evo@W2KtkU1?wc$A|CzzndnP zC)?r-n3XX}X?gc^FE4&?S4y|`EZf!CpiivT7y!xto^7F*1xiaIuRPQ2tEd@YN~~Dj z_O-jj=YH{{%SJiPO%XD| zq=O?%tAncQwf8LFrs z5ENo*l@J~Zih{uh2#6vg#>nmt?9ANvz30{4U;a4v-nlc(E>%fY0y^K+%$)Ai-=n|p z>pth6^XtC%J)mE^bvZVgsWAj9N=Hu|dh)xE-h1~`#uG+q!vt`2To$({ZoT1KP0z#1 zPw#!g^;>M=#`8aX?Yo?xeDB$3p8d^FZ~4YkQQ+|ZdiYz71v#H_tqBmx=p;!pJebyO z>B^H9M34UM$L?tO9;Rum*w|?J{fEAH=MSE@t>)9u{^AL9;_?#L3dmq7*Zkgt-@fyQ z&okY5`k`-5tX*gBd*J@N9`4xuH@|%LxhG-8@vbHk(v6?_$s@njmw(~L1AqOtr2s0` zq*W3p${3~if`zSn?|a}ok5wccdFpao8)3&lMw2mM z<(ByRiHGjI@ushQ?d~Vbr@!$8|L|81eD><=zw|HnKf7|n8-^zzz2WoMJ$TrD)lkU^ za)Fz3EZg(_AP5}CaXcqqF6TYRaU92XTrXD~%3~U=UNJU$!suW!x9(i^!)q_w`ThgHhNY|5owj|`!tY*v(U#3Su6{7xviIEKIJTrviM4#~ ziO)ZH{rj)_$`LF$mKBtpr*8YqrF$>j`QB>}E?U20nIvo>DzwcoKNuRU$og`4p^AJ}%m?kjKnkI_@Nti^lYykXyvja z*tGAgkt8vkG13~O@4Bvq-1a5YAY2P`qwBVBWY@oA*Ov1>{KJYEK7PT9Rj*$-aozSe zpL@fvhE7|(I&Wz%EhHs_C2LQGk8VEuoOd3m`m0V^S{x}PpTGR=x2VmRt*w9Vo!d8` z|L(inC%tvsDxT;WxB98hFD`}^Mpbdbitx72-S)GI`qWQu`PAj-Yx*~&l1Yvr^TkqGH17Z6`}XhOyX&G) zO`dT2>Se=F8}Af@+{i-PK*_D$bK7mV+%taa?)}T3xn}2!-PHFo-C`_?}Gcb9D2w&QQU`D?f6S%SsdS+nunRqfmNY}>x`($CZBJI;Gu?!N1; z*nQ=V)&-7 zEgG^4$FE!Z{J(zU${Qc5I6mXAe$$@Ui(5XpWAphJfBDyA7wvqVj8b5Xv;paQUd}oO zI+wtf4xYVZ&mA}aQ?oP2w%bC8W}|iRx!-DSlp$o6oAZQ@+nrDmp`F}gYy9(A`uZm_FNMXfQSf@aYlw15CM=O0u)l1sNIPaS+3_wVbTn84op~(hMh20 z25rwf?o~@X&(X(Pls8YW7$Qx8$ORIjNr^FI3;;tg1b~)p>*nNCTM66Gp926N?d;4qb>Nffr)vFWxHV5ooZmcj75MMETPPw4v8 zWHSb2+|32~f|Jy$wPpm;FAe2|iV_VOV6?{zWDpsV0RWR~t2|r`Ty@X2pMHGdSr>0T zQ`Qep)MBSl4jgV$WisF@GK8cu*)Y;C1-?LKv~JW|yf89k#}gB^SaZKvEO-!w8gRx! zRAi_VLk27x+Ra3|mX6w;C^dk{?0m^potU^SF>178Lj=IRAh0lrl<++PWXK?66t$b} zNCVpC(L6UsD{V5wIsl>x+p%FX2psBEC+ewRDg`b}BGp|N$tA|EO0CW8T%jBkhsx38 zw}0UQx&JL2JfnKkACUoI$T$aW5Xlf31DH)pOn5dlDwSqvq@NF5PKJOn%MuW`j#S#f zoYH7Pg6cF|&30nti$&k&pqdj?Ek$;IsO0f9NeKWsV?dpHBN2WfC&&;Pv|VZ9=EP)+ z5SjGyg`CG#z0yt8p@N7y3J`?nhtE9u^XCqhU;oD8u+9s^fgq49s#fdmgxk5&Z~$?n z3?Lwvf}*fqZ)zEo3l|7LN651EGDaKf-*5D4v+5ab zW}h3#KE^qAD>E4^OE+UQ&EPXxlJ~N&f7sJQL}ozK3?uq_`#tQ5CDUbM)1${28qkwD zVPLEb^3T>Y-M#5imVw?eb0Zf#eB{or-tov}NsK>HUw6fy??3a^RwpuB0~dF%RYb-Ao6Va^(?-* z@@$X-&pY=Weg&Leb6rs zY}hiL$TVXcmt&O%(tp<0FJ#QD@=^Huhx8%|1LfH#k5>O8wFAR*uAzENrE@zl`>P3a z$FErGKKz^UWa-=fbnm8uFK_T}^f zKHGmYG*NGgozu-k)RoT|AgCl>xZ#3zV>zwDIR*9uI`jX`cn+wZ=@@hL)SK4uVl!t4 zelA{}#A0~K3a6Ayn;n?G!I)*jKu3-iweD#>r+G)eB=pXM?|Ha>%hvmDzqQ$J9kcN~ z&C@)+l86jRe`vU113=uIoUF$ve(&$6NGr^bEzI+9a-#am+kVXuN@-g{g`K0VKKnl) z*Onjohkq9073REonx}bsX+nl+SQ+o#G&AvsFwBt)Xitr|0RUcUR|NoINGgp~3jcps z1poj7Aq9ImJSLi_d77trnx~fo8KSX~F-D|by6rs8(>%@7JpBO>XL#_?LBUYug5aeZ zXRA^A#~ESoc=}WqQS#FJ+|6PfV28mEQiC;pkW$|w?6>I}G%c@d1<`Z^oc?{$+n1T< z^g*^gf&KUSefDY9StStx5F*ZO@IRng?}mDi6+oE7?%s)hVJ2hN{lT--F~hmJdZy#d zA{?_vG*c1upbvAhP~Tns27RCfO+)F>ka1amm;vhbD+>`47$RVZ)Uz#% zq%o#vSJw>){dfUQCm0e@za0Q*V}J-5W5^5`=wdrC+rt|m!#cG+`O*SvmBW{)A$$9(mB zn(anPLGdHz>xJoP+gM@nO>NtGnata01B+z zb?6QJX_QhoF1=(!03sj+%nHaD0@CaelnLv(0!+qAh5&&f%Oo(yjnUJN>+0|RHO6GZ zvoTHthBP8$$V`Sv9US!osc($wmNM{G=B{oQV+JOg8ItS~7-f5#W=W2K+Gv6-rKi1t z-I!t~DjN>nWtjt5wX8@$M8u|TChVpZ>jyFW@olG4nZnT%R~>iUaY`wc;dTKG0U7Fh zmoemw86u+%GG(DxX@aqX==0qfB}ql?|~I!rpOqhwdp1e z5fNF^l9nVgQ5AKBI8xG;LRg;XGcKyt ziZ*I!ct{Z#fK(}^Qf5F(D~(fQXk_sM+x6}B632<>djQ~io?|PQrZ)mlAYDwRh@^Z7!Wq=yb4tV~ucE{4lR&bedTNv9Qd zLd&)cV@ew`Mr%!Ev?j-O{U8vI-Kf>#Rwx*zDpjc(867nMMt`9WR$t%Cy6_Qp%N%QARk@ zk}^yZX*-VR#9`<;b{d8+96qFz*cFx|r7;>UL5v~e(zY$fRR)tZ9T^z~L~TsIP*7S; z9hq=_w^6B#|L(bE%a;qzYSmh*R1g$Wom#?*)5Nmmvg4Oc9GPe|>YnFSDizmtmMnf% ztI-%gbZB(JqGGvJ3)_zGE3KF@Nvlno60J1QvgOCOnoS)iVXITGR6Wo2^MPgCoj6QV zHC!I@J=b^KFb-YEMZ_pcYSk*Y#Q6AO1Xe7TrlzJ;lDuZc3L$u{QgapBZPDu+t1|=PfY$doG`QJ#sB4m00000NkvXXu0mjffsQO; literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi5.png b/devices/surface-hub/images/sh2-uefi5.png new file mode 100644 index 0000000000000000000000000000000000000000..18a780074f8d996e716190b5371e9ac0b531bb23 GIT binary patch literal 82156 zcmbTd1yo#36DE8i5G1&S5JDJ+!GpWI4DJ>j26uOt0Ko$UPjHtY!3n_v1PJc#?r#6& z{p9TK+259PfZN?w)m7EiHPz4UiBM9I!bE?K4gdfqR9ajG01#0D0AUmr5#IBBEN>b9 z56wYZ+Zh0`y8iwmB++A$008nEOEoPQEqOU!6MI`mBU5{07^8=+1DqNF_=P+ij7+Ry zE+Au=xuu-|_^7!Z46-y80Bdr{Gs`=O!7MDLy_{gGUJ7a^Ue+c&reGmK5Wfd6T!1ai z#R%kKYh&lk>mdOCM=me?`ENH981xT`i?sk)zKqylrccXcv>Nw~q)r1)!%1Fx79%*e&wNzLBg=06Li^dFT$Vq$+6h6hBW zX=!I_@9s?dKk&fBja*;?;J@Px%$)F5Q)6N0WoG7O<6vOsf-!Gp?1zLMs_AJsJH+a?jJ@= zOH*D>V^(7`PE#HRHf}Tc9}aeQ1|DV}b_O$J6CQRL3zrEy*T2k#^NZV?xc-fT|L~js z|KwM6vV`wKBb)zYIe+)&-|*p;wseLstmnUXk1EXZ-%mD{pnoEU*U04WP7nZ_{0#w^ zDfr*rmjA~d_?K9B3m9DJ|3h5-i_F>H%*EZv2_|9=_tyWH&|`w@&-8cO{>v1m|JBNW z#{P#b{vUF9-uV0Y--HEk{5R#n?BIFM37*iTWS$ZM1U@&YxQLoZ#{L20zO7!OBQ}_fN%9=)l{lM=BeZd0ho-db!^fD3qFR~IpQh|) zX1dI&uUjsfux#htx99Z>$2N!vXWw8w{Rp@Xd)_=qO!{_Zv$4OQE=fjNR~HfWgnz2q zx$sNC7yRDXxp(zdRmWcf0s@u|K@kk;TyteFfz|aB6O-P>#802EZ$_CuQmrkEh_ycW zaHq`eI9SxBO@E&L{rg>HUJm%D{7Y*O3oV`78&&F9OLn@HvEs8y_oLZCBlqXXNClbA zAoA_$;<2GjzNo0Epx~g{di$fbjXLWs1%IKZdeYfUK7URoE-p^0da-aU^i;Wgr5T(0 zjQROmXG_NKvZYgnwYJo`#hhpn5Rpx@EhJ==1a{x^X|(jQ#Wpc&{beruMbkQ++|Jw# zEGY?3PY(|dQ#G~V8E&7hUtwWk!-9GVqXp5DxqZ@#g_g5YM;q(9R;?*1-wou{)<=R- zUYxz~@%2H$AhxN|!6M_4Lv&#L9u!|pfF3@ez{;Kw2Z~gP8QZy#Ns1&wYVKTF+e=AE z(@{~`-`dK~a+_7s78_%y&xNrji+@_!fzXJG{#tRWaq={lagvj>k+8J1GfN&(!hcI# zu3WmiyQ|B{)$7cf`g?9JDxSWdj()bF;CXmhCcoqShD!oLU)Aa7&)nf-b}a8dQq>G> z7;o5US$v+canvpcA4%eYwF|6=^_`NMCY91tQ^|9QlMCLwjG8coc!=bydo5IjqbJvfKUA!3D@0-e81U)Idb4HMze5T54cL85g$FV8I#N8XTS zyR7`=Ns=Udi%Y9Y`;qQP$G2y4!eXvei2vTL`LZKAcrq z%2lLJ7u>OYME0lrJy+t01$$b|TLHNmo7lxx07|$)*hfnnZ?w{@__h!g%*rZSt~T}B zs{MBV%#D=y{BX+q>G2t7RK9ac1ZVua>q`UC5KKz z9%^I)M7earbH}v;qk!iw60?o8^ed5sMScA` zjtPbEa^GI8dSBR53PUz1(-FbpoEu#qP3-^#dfY< z!0QqN17o(%SxU=-TTHoeMw?N=Vy<4#!{hV9idu;pwPGeCEd#DNEj#TKv3s8L6-!k zr%FcmCi*9U@IZz$c%6)u9ZGXo=rboE$n~(M;4NJ6?=q^CtfcFfGaHe!OS87!h}ri^roZ#*8o-u zBm#o=eQ@`Asw4wNg;=eChjVcBga_^CQt|4qL*RJy*6)#ziNZ*-!AT?A1Q<8eD38za zBqBhx2><|zzys4p;&>J=Y%Ys;(bVb?MsbHvY%WuNA$(n~A}NjMq0k`yZJfhFm|2D? z^INE6T$$vHausmOi*-6m**eb6S78qV{r&Xs%-9BXlcgQ)+zkx_va^?>8&-2;1$iw; z*AEw(IhMF#{htJVZ~2dZJY&G~SgP0T30 ze{bR%Fu41{)9a$-q?$lP<*+~cx%-@Ey&u;sHfn+ucYA$HL!dRU0rUO&tu5JvV1v!@ zPm3zeml+J@LCk~Mx}TO~D{m(+hWaij2!Yl+ebp`|WVhXN?f0z(?N??g?Ju#yj5MW` zKk1Zf&?OCWm8i=^O}GVDTyJ+ttvk*5UM)1c9Sj#2(~f0lDC_C9dY%<*s`L4m)aHDA z`FQ-n1SR$aMKG2M(d1|Fm^B@%Gz&9WV@hdO@Rz^zRhCR$$xTNKi7VNB;pts%0+taj zYk$>Ec$1%)-FNGUbK{vd1IB5J@Wo`&V9&LA?e_y+>ny|koFMkAUf1TR{yKrTnXGb8 zYw1jf73-oXg6Frst-wBY^3ct0-bm$HW(`&JxbWku`C_YK;oSVy=*K`2YcqfEf{yF% zZk%+)BE$R z%~{XyhkNg5J#2`GK{w{}N9^SxT(&G-n1@Ma6?}D8mnq(@;U9O7CaHv`2dbS-uu@rl z9LgwggbP&-(u1ihe!P zJj=UYUIx9_(c166TD=hwKn;?ntD9Xqta7sOZ9D(zx6`;L=nd|{5s6HA!KeAqQrY(F zu&4s>jHGM!mb3Vv0%K@qdCo*eNUNDr49P;Px~)LbIC~tGa*xuqT;+JUyb};rz*9sB}I&JY9L)(WssQ1zV|{E6?+!ba<^Ja&-iJ}KC3PtLdD6*|0g}@ zej`?4TItQp*ZpPwew(X$H@ig+gcM_Yt>zPv&q z$zOGDSkBMSrQ8&RSX-nn_R2mF%Qo;fH;<{l{C#Tv)_02FwItbR z|0R6q8idgl#(U!#N1%xBbBK4Q z_GcOCP_w8$8*J$hFQQPJSKkGF5-+THIu|i0=TYy-BeWi03&(uANMCCar@2QA-dMcI zm-5p(cyOBhnFRobgS^X`?6=+dvDiV0*fDE|cdjREXoj*hSxzoup1Ra%7V5MD12#0SR zwLV;{okp4SiHAx|mIA>}K{5%&G%yGIo{CsyoB1PY4 zR+zeH6-GO?j{a7Z&JS|alio+_V*;)KOae;0pmzZtp7nN zILA`!>9Rm-4jrfZ_?f$|^d(|~nD!Lf%4ifKIfX=r)((;d=V6P_01+iLF}aO}0qa{3 z+1(ORp^>6?5-Bq57ZbajcD5VUz{1u6M`bJ^ zW_%e~&JJo+l>Q?30$}wu6mLjJf)Y=={Tz2Mm?uW6Z=n-2bF1$DoIc!p?p5T^CCTy7 zIG3m}rU#ye9DL57+Z z4IVo290=HGWTngp;Sju(8EY>$0*QA?L1GScSZ)_*PQFKbewF%S;#*U10SW*W7mPu~ ztqFNwBj6ks9P+*yj>{wXvzE2MCt2a|>9O0~>F42Hm0eOz({+a47*owPJ~N-J6F^f` z%=Ka3+*|Af8q0fjbP_;M$9%1f12~z) zjOF(CWVU$_auRIFk5jrBkW4sd8H8N+sh z##ANKpXW`ruv1*)o{}a)C}4U|`XCJiG}T<15kC`mlS9+J|4rh30RS988W4tJCWs;fyd7#m z1n&R|FKa@K0HcmBt}}1`@2m8dlfDBGVb}x}`R1ws$4h??wBm^X59Phe90ov>R>62$ zNMkrlvyae@CK*;a{ge53{%jbD;ccQ~a#B+H&52Z_u3b@SI=knn`;u>V#&~3g;wL1X zS{{FUE(X;blu%q@=69vv<|zB#Gp0QGbs)`H(b1PtF>LceZV21n&m7HpEW2wYPjUkh zVY@P7!S>SvR}0n4H!H&!`xQ~7=YI?h3fjtk?gL77jaPPdEAaZux7L#HPZbf_M>>J) zj*`w6F|uNEz5Y19yW}>G&B5S> zeOdP6b=!DvY(MWOj{QZcS+`@}H`k9JiI(S3+4=uu-j7A&H&D?jXll{unKt}HZ#RzN8Y^)5`D=w==j}z7TPPZ~ z;4jwSAB@D>?)=oV1sM*^RaMoY65Z4S{D+52d_g%DkvTvBOgmL>^XBOYw65P)ojEHZ zb>|_0-C%9{^hugb#`K~iKH^~Y;X)AiU=Gq7T7dNy)%?<&OKY4(uPKizR5FCJHueI% zfhHzZ)r~S*nz2CDe!O19UBuJwwuSZ#y>%--H5eZeFZ`-5b5{A!kNL;hr^B6X*%xK@ zK2A=}77W{~D%;<3UVDmWGaAtWqAQgg`?E=~danzAw~p~Z{n;-eMFIC~M6X3}1)Zm+ z7xj#NT?AKb=cuTVS<7ar>B#f-J}QvTQU7tdH%)aP_BP|6rRSz$Zo5N03R<(Qqv~gB z(+p=6=()sad^22L&NUXe&|KhE4FI3~@A#U+HnU{7P>m7|ZcJ^!$Um%HS!Kmw!83F> zJy*NqN%?Kil0VIu&04Ff)Y2U7pUQ>I>eG9Q z8TB^bp5e@y@aGCUWLfhZlwDEr-Zxz?`#5Cy1ULloyunSmX;{P^L?P|l*AOT%^*m)XgFQ2jOqjsesuXiE^wKb-tB-+w7p{hH}0ofHkD z^HCr}fyfiHlZ+Xov&x@72qdlFWs3nn=xb5<3mJ^AwCOu%8N-`T9(2)RYDH@PexNY8 zCQC{h$`aPKx7m{w$n#uiaL_;qn|x=vqf`7l-yz|^*|8M^oat3USICgS&Tizl7^9V+ zm|5UAoy-``7toxdDerj3QZxq+JUG$wfVlO8HK|b~1a9*ma5Vtw1Ud!=Dj4exX6Bo} z9Cs+>s6nQ%GV^$%zwm^R0zvn6NS8(hUNqdS2XAEp*Oi~1qdP7uoX_Fo7;yd~j`8@0 zKm>T>Y}wQA&vHi|4b)?t?eAm&k_a5xiANk>D}nq&O%vJQH`HM}4A*y>G6#|%9N*AP z_YY+Pq^G+lL7Ko({U0>})Ii;@5VV9Jl>eIMRhXdDHBRxkg=4JxKazmJ032F$aA0Wy z+zMtufBEiwM@oetV&KJJU%=HOAS4#K2?@KiR%>8|`wW93py~t>4e4$FUyKIfF99*3 zyb8p%#v};du>i(_#(fe5L4>3JB@qPuRx%_lgExf#k9;6&tJ&>H1X0vu{oj@$1kuDn z(EigTkbs%P65fd|{RgKBiHofygD#IE{$m}0O0Gdgt;g81`7dtacr_zO@}2bz4@<>= z%)tq?hy>%>dG`EW699lpS576$G$O{@!8Pv$0&IA}up49dLF#OeCY~&jPB(e-WftAAm2L2#bAl%5tg@|^FSw>Phk~|ADno5D7^AF3a)OZr2M#8kis4Aw^ULXY`#Yolm zb4gPdLZJ@YgD(q#^}&5V#Sbk5-4O)zi8buHj-^NekcJGqctZlGWH15(Lc*^`y%to> zkJMtQ(rNJnTEoUx;4P;YqZ5qM)lS6ncp;DmJ-fH@tc@8rFAkm|L0^%46gM6gjA+vb zXT5yZS+ysI#~rA)?d#h*jvfXE$l-YSNz82%Z=&9pqP+ws3gtNIMol><899$H`sIM^ z&WRX`^R7t8d~F5-Idq5g&3?HH`?%VKHm<8SRVYOKTiTC5pnSuUqKZ0a;UJ`sqfE@w z)YRhDo?tm8f`)R;2@cFRaY!O1Ezh2vJH;`|7NZ3T2jx~YP3~?|>fqzNDKcqjibT)7 zV_J_vMbjZmTSEppq$0r8M2HCLx)$&177z2>nSg7G20x)D6g1qvppKnPpNB|1U3?;e zf^(8^p`17l=Od~slUmT0p}1`7LCUs z4C$Kq*7b>0A;l8($4zsx2of-{GqK~aCNn4NGHXon29gKRB6>nUof zl#y*}pg8U*)f^fbaqyPQG?a+xA;0(?D)4s4O9&B+ zsgFNh*>o8af&)ekDk`U=pasNhruLGuzP#d*r$`yGaXzaRWynRl-kS6UE$SGk+OA5M zu+U1Pq9%Z#3BqvrOe7A{p-o~%SBfO5z`?|+G*zP>npad-hS9WWs*JlXbYW@y%B@s5 zLAv;pPP9soc9hJ(?mRfhvc!>0Gy&qZD}ss$33P7q2ukjQVa&8dXsl;4VkwvD4ygnL z0Lsg{Srpnb>kDs~5WBw-I5o{fM3^C~JSk&#?oRI#2G&`h;~+xN5SdVk-nXG87-@yI z^*2{SPWhQWBy8OxL6tE&RZ_6T!NX@kAdcr^Z0|bfizedG5^`uF!No#eQq>w`3nMp}$9JEG3cFu7rR`n$HDQ7S= z0SN#>l+(Vf6Bvx@YwBwp#L)nv71+@)F5*8DcB^a1JJ@`QeYwx^oZ6yRP^X-z&-n|Q zj7=#{!20j7Z~e~$;eS z4myJu7m|Fj(ug>C$OyEp!MQ#ctZ*Jj1yxsAT`0wL`{>SAGBv7kI_H4}arg3Dc+z@+ zAwi)Eh26Uj-g^(Z#+?V+-BkJzv>cX|c4>mZ5u~1cs>tq&-CZ4Ot1=BKR9vg}&+7zD zoVgWc^N}=h0TW2w`8|zix*7a5V5&*YLOd(VMPYGq${m{Ug^s{}rhaNQ1u@^1#?w{0 zV|0Z`MU0avTCFrNS`Y|`82Yn2|M6pv4qvwt5+IEjYx+3S=Q#3JpN{8%2P1Bqbu(Ka zUi|Jm7U&JHt$LzD?5s&5j~+RGvEK#2^J z{*#i1Tj4B^7hvwHsMvRCkbz+Q>hcO?nf84=i6D7IIu84-5UkTgIsmw=BHEc1Z8#FpXpE6$A3P*su}q-15$cNeuB6` z8vlorLxCc7zu3*?hZ*r7^?%5L_KzvZ#u3PmeJGGd3|Rd*L5V4hhlG$r z1I+;)V@^EJWuu8ps$o@ek|`4(H zg@Yjr0C>8XVF@{>$8jD^_Jr?E++>f#54y^mB@i3s>m*Y^xY3=0(m4B^L{^i(79J215WeaJhQP1OyM}HfKsE>jk%A4~teP#TBLqNb(;&;nOLS?^tznBZ^HzcJ9I#hNaS#c-DJE+W>d(Pu z%jN}i@#PD20(dC}NJ~}#BQr{=)^^O}#Q2GLL1Jt8?>1}qolvaQdxQb$91w7OX8I}u z(YSWSk;N!*(J71yEunxm2uWF3dX=A$nV?vyAC@z>z3z$ji#|69CxGm8)_v&ckf-t-2R?V3`i;Hw%QXY%Uu zCkXkZcM6cjnH`w;<7QkTvi7I@iMC#$IQ^+z z;EpP}vEKwp63Ws}T4jv5?CkOhNYbc|K>;+x19%YKlJ1w3jUV&TPG?mhfhh!jZRF%_ zA&uAbeP`;N@p;ma2yhW^s)T4M_Az!47CBnq1urIrwk=kQESMIt!rVV+ zPYkCkBo9gD=M208pF+Sx7A-!*K39)q3{S_0Kt)mE8wOpvSbe~v%aIW(43Q3+JKTh5 zluvzQ$3p_4;_$?%-QL~y(>6HO?7Ey*k!B7190arDX?y!oG+<*I*{JHwoS-*VgKJ z=X_|qA_1j~hTqW9kK#Uj5SDRi^1vkzfke1Bqb1p!T6~dnc^yqPXHS(XA$=R29>+UI zkdzg#5FC=8$%1jWhcgUyvX!>_R$2G0wqVGDbB-G=zLt@l`5h~r9OVppDaK3cj&I8@ zse7;AA$)zTjzBY3@XH?&p>H+DpAEh1r-WLFSpT%gh4eM^p!CWL>UYFD7Qg%B{@UJENU7P$i2uC zwL741JQC^`8n_mrlR~V#v?}HU-0qVQylnU((Y4tTCtFKc=0rC_ zhX=BRqJYM;WXoX8`XXgwMIY>G(sZY8?KPxdwa~3p;ArJ0@71O*sp2&Y5(&c)L z1$8(R?$a_YEh|Ecj4;&RRgouvvb>Z1qgkwWwI3AKDsLI)#5tavJXvJ&%y`!QMWlPg zhcA}>`UWZ+F>+W&@R#FA5c#N#YS3BGM=SidI17?w1bdqhaV7T7Q6FtDS7K&}Io&|W(24l zZ-3rjSbmCwD4}O+er{)~P=cdlmE<(9xxsemP(BhXt7uLHJu7BO z;FDajIxC}zt!;3q6a=aQIeuxKTIBXg%`*<${tx%0;6pQXyUq+40p;2*q zk6HJ;R5s5d^7yy!0rS)+!X%AU2@o_A=gnr*?DG^*Jb{E)kJVf>>?TzknNT6VO-Io6 zgfe<9b)0J3y~}m5DV<}g6CJt!F3c)8No=a+?K2?3^9DEGme1`2 z7QVRd*ASy=gRNp(sem+nPPClr^bNuY!ltsfnIP!|Fd76MeConx%P&nJ4!;$#%cY7) z4lm7+H1|alXrSAxT_w?hGC3dw3FYzp9BGqGK`Sp>D%2oQv6*iY4*XJ*==LZAWF_^w zm~ufqK7>E|-C$7rtSTV9+Kr}LDUL%R;hnS3^C540DVw;@S^BI`sscGMPPM#HTO-WD z@$Ydk7z8bWm7aLSv>1aBMA+6hP?Ue$KPO>71k=Lmj|H+nM7p@9P|@l*cm zZ{Q%nCAI_(V@jep($7RY6Zr63)?{)C<@C&jn#rOKJ zv~n;PeYWYV&0*{=I2iFrLK8-%P3&Eh8~B%&j#~ueiNMA8SBYpjD*V2+N9n&z5@t0K zYIL9eBSN%tEYV~7FLp8sVdM;RX?pXYk)Kv|iD3O46!@oiGdy%udR7lh-~zNLq9w%; z0}F@Y{hhBvr9u+1(jUyEp8X|L=l0}+D*0O`DXp_lOsY+dkE>~_Prc8;3n-=YerR4I z)UD)R1P<8@{OVweb;s$XIRiEa>J*`^F_N;tlxxt^^Nm@}Rmba(dt z*2wAlkEc^#75zNT*C!O%2sctJc<=S=N4j7P)79s#*;h%a!VbUqV!Z7Z@fUOwubSL_ zZrmKVQnM8zFfi2XR$E>c&D9t?mm9BN-yv4oH$1(G89gIu=b1Sf?8W!1DdqIOE4;g? zDLl85_eff5eX#!7n%hjhTd9fRzqiiiOy4X|I<_fvmv7|%9S{;qgZ#4Qol0uHZ7k&K z>lL`_+10EAfFHypWo1Y$;(hAqw_ZJGUKE5f#PoLu>w(Jdzx`c9bnp1gN6T0RhocWs909VYX2(?fWXGBrm;ByS>Gj-kJ{2KAuDxMDr)qo?OXij&@h>xE%g& zV)Ex!K@G~Yb)Gtly=dhI&9yzvb??OzIi-D`BTM6Dm3RSv(R;m{YtQ;fF?srtzub?%PA?uf5@S`sZS9&zQzSW3nDag_6IhFXnxShXmkc;&vTe3af=Ho z|CwP~j^}m7N4D_Mor<+t&W+N7V5#Bei-qUZeLqsK9#-uYh`CkN+#B6@eHWeq0ZfbD zT?Er@wh0w1Sz#3KWjnp=(JriZsd_gu`7(`S;TKhffPiLlzPmg&A1xI4Ld<^4aOU|P z*D+#9uk&;;74D3Ir5@g!ojN~4CTt}={4Olctpq>Y_uEd39;yHE_!f$U=)uWGRGW_b zb_1+ewGhm^$l?1_slDe-y5jqb4NdFGw-(3g@h>MgFC$`Oti+xX>_2Yq4el_$F7CYL z7j%}J-Y}@EIbQyjpItV;SXF1L=(F_}Th14(jVuwaSw8R5((|i#i3PTKU<>@n$kw#V zzxU}+X>IRcaPQA(oia_Z=YI{S{kKJJG%{coxI| zFybrS`^~9rrn{Y9gI}$#LcOlO%OlWdUlY&)H7houa&#-EfQ zWp;iGoepBt)3xTTuC678sb)XgC*lHt%%$(?>38aJ?I#3y@JBm3k^mc z8JOk=e|xJ>+Ac`UTk7eSkO5Z`!S_v+nGw;lAJP9rxX~lVmBcXW*M?(9Mn^zTzWs)r-2jMy7eo0<;A{1?pcdf`?a_Lordkb@!?*&MEmqFLxWJ= zw*)Uq^Tuw&dwZpx7i-_ePtXrfvW~EvR68Ep>+9Fjx595e{eHMz3!Urt$yr-nTm9KW zkU%0_#C?B4eMipD$;ruxlj-Mv8I~~MMHpwb6t`_CWFXZ3;n%UW!N6qZl3(UR?RTTj z0$1zN0P-=R`{NoiK`mSKj}cK(*!lf!eixwzrTpO;xA(cWRK6~9Ha@kSSDiCLrjwlZ z`Q)}U)LcyWGae^wDc}7E`eAi+udT2LGwaGkUlQZvlaP{ps&Txew}wY`T%FlM;M(BN zqWRm4%Fwz&O%!qlq8K~<+KP^|KCj0GO*0?I>E{4wX6WF-$2H>37sHE4+ndAX?S>Go z+v|*2AwgpRsMtR4UCVx2wTNfs6=YFRZ8}Yys@DKYG0`z&kEd?JdMU+`ZkSWT?(s_k zmXCiKW-2<^i0W2VrXfB~M`{Z3s1V_jkdWf<4P+W{KPL0KDE=Z+$HPFC@;9uwOy68Y(BSZ3TvtPm{#fg*@k*! zSZDqWGJfT-BvzCJ(VPr-7xMjc%I9s3Ehq%K*@^Cs&R!sXVc@epAR6+fnMy#=`hv%L zEMA*rF`M_s8%4C6K0Ebh^e4ajSXS84qx({N`0paOu?8vX@^ZUbMv&TfyUXUiSQ0o8 zdFQa&?A^~8C4AY0Tq)Ez7=k0J9=e3R%j>u^`V3FBNN{V<{Oueg$mK9ItFzb7Yj^d6 z&i^y>L*hFUQHjzeJ@%^rOmfxRLRBhX-%*E|=nY>1kLfQ{?rE=uc)Zx#Y6Gw{`fP)Qq(lEv{cAp?=NS3ZLhESXdi;rggXei8Q+K zltW@;zMGVoOyKwyTPhB6|IOubeX9OddM1TTolxt|VF6ox0YkeV^U1@riEVV0wp*_Y zEBL`P&p^=g?q=qWBwMSa;=7sroRxTy@rCVy6yxm7Ie$Lsi|kD1J!a9LO!lqct=uJ4 zrKyE{T^1*8ianP%P!|0iSKTF|-5pIYewr`MN5xgy-QwGq^N+a@WVc`Vt7cEH36I84 znfce$7wudsZ8ob43F#Z!zJ<_DKR!ND*%wKnl8f!cc6tfi_O0q6ivH3$U8uqLFOfh^ zmF?e6$1>pDnd#n(#C59lTFJUTSxW2bv3|UtEK6Bb6hkF<9w{Mew`w?T1cl(h@64QK zXI|YeIi2P76k8UWbfOF^>Ui98QS-E=*0JW6oCKFQb^STtio5K+9;RC9sKJOZQgj~A*1a+ ze%7fDbu=c^m@F$Z+7R+OuXVPB-94EH*tvc41pqW;hWK9xG>1vD`_dcoe-?*?AdGKF&+jJ3w*PggEoI^J!s`)}Keh|5(PV@N zvr2RoLtfnn13tXJwI4UM+Epv%(pl^`R(5-&F1?3GX`j37^L^1)Ez(l8cYbAU0|3Hz zQen)?H2nTfM~4PuA2D-usfoW0r4YGfd!)B%)0lP^*EOnd%-jjY!tO3JkzWpEIa6xt zmX!?IaHi5D03Q%qgJ>+b$WeeVFLsbGDnx?MK{}|}F}YIMmL)e7O;==T``os;QT3Zi zF9|aiZ)Dd@m^j~Gj=kTK*+qzc)9B4b-lDUHma+njzS9 zHD#N`f!OH;FuGg({&Hv6t_78#4u>FVeIo^Y#27c>+HL*v>xLGI?%i()Gdsdufn1 z+KZ;{$wA3NPW#nw@G5RGKK@4HdC3!7;?d{3p)~9z{)zf0z1V2Ez%X?Dl@B znEWvwYLCqJ^h5tklbBenOMACxUhrCoj#(BC+ zx);6d$i{+cA-lWEOBl_5oxLU?M6g>NUeY|j4@5VMuT{1+PRr~(!84{oN+@QGWuo-c zrSQxO-2N6H@9r|$kza|}`ADUcnY@{&;a*EU-H?Z%o~}URjd|HN>lYH|;K_m%0jBX? zQ0I&ZH*1Ut$m8vymOD~Eba-6`q>N&Z7*(K+S^_`Ze>^Rc#5F#web@A}!!r|@(j;57 z?(t>|FJ8fp)AOos&!Xjy?|a$nGEtI9K@u~=rtqd>^Dg!r1%RW-Hj5nh{W04g)X@u; z-i6BJtdeE9BJ<`v&B?+l1!@e{Z;q)6kcOegs-xl!^PKUbfN%ilQJ=}xe27cdPjF^) z(GnY5F6r5i)Tu=-ElN=w;>FdF0Vh~8=E2?X1ma+wF?M2JmXQnfo66LU2;{m0^V&oN zAVRpRAp^oL-)&c~HJJa^k5_-e?liLS2;(967^wBVrLTYVx%?9Gjcn|r_aZjX($Yv* zxE&@-j;Q!SQsN6bH#O7gwu;jrpSW@h>jf3BONzaaiU-);K-oo#$u^zlEF$fr>Rq(Y z)1wHWbbU5e`duyhGw)eUMF$XfHk304zqBb0`MQ}HKn_@Rzx!D>S^3Mbnqz6*siCn6 z)GoAbV=nK1lx~l?Vqz}H2^PfyP|SR_)u;ow$e{_#JL__NNb%KE?}0QwE)21;PY|>p zyL=aZHw%q=ek8{eFE(Gfb!PDUCO}~2M?_Go+t}CoZRIf#4^#aiTyqYV zCi0iXYd5yDyT0DuTd=$%HZDFv-=pWS6z+-cS}xD7-`)7U>y?WKqp{LF-y9#>HYu%@ zujPNz?M+HK(OmhrFcug90AE$BMUmdE-omnehyUlV01zM^NR=bs6@RcZbs8nE>7x?T zmth7}E(e^?=R|2&X?Z(62@YgmKBvEPjrs;p9-dCfI9$HXxwU@|@$q|^XAQoq>AGcp zSY$!*d)$$(3HPq+1*2t%tH?8r`e9?#5`41P`lcpuC@25`%wWy$CIf-8ic_h{z7++& zLP<@wT@j?|TpVQe9!bXtt3A{WkqS)Ls}{}B)@J}9dRxcD?ZulrbETf0?OglCo9N}a zktgLvK@`Kf%Hhg_I?U~||0n)fF*Uj8fv35=+L16&Z~uN&zkR)Q7hxgT7sv?zu2DZ{SPl~;K3SJV=;&`2J7d2BD4Za>G zzD7;x(j>dDZn~=tSNWmhcrKo%M^u!X_fgkGDOUg8ufx<=cfYR&TKeKetPrL9;?fHb zSW2X(H%O(56~yMr(RK`awb_aL<_}0Ziw|iDR*g#U|tOfBgm#NE6A#BpamPKm8m_gz&>{m+5YIzMu4@vxV4G@1l5K)WkptP1uR& z-AnhH%KnwA_fTBnuNpNjkB7m%O<|H$;?MijlE4IX_7W!%3sQu*xGdGd*(8o$L*euU zCMsfq!i-`=lN8%4Q@2lM{E<|jD+K+ni5lbH5H0YPJQilREwJ$`7ZSWaRm@__Z^i{a zIM4jP?8$yc=q6QpNG;^K_J7gz)d5j_U%ZQShjgO|2uPQ7cXury9n#$)h_rxocQ-6u z0s7@%cta!3Z{gV(>P<#gNz zpIvv!=h}2Z`c1G-{2WWDC+>TKzdglWma#k6y~-Qbg|0fu7bQe0*}yiyo{g`DQ{CG? zwM9TtP;?ene|sY?gW?5xyMT2bkpQ^UHQ5pG`< za}Lz^IT>>XaJjK3lLIwdgREUk9{cB;u1R96(ik>mvan*0B^_;TibZ#?K}}4=9xs8Z zu-KQj66qs2(fZk$dbMG8+`~V{Y3-2cxWmj1i8Nb^%ku?~;7Vr5Q;+QQ+IVt6^Y%vF z)qr0{mym?4L=2!rO4(S|&FPs<5)fbRM|$E>@UxlI@-Q8kvM{)%6n5KB{l#WES6LUp z1)8W^75IGT-)w#Z*(N$%it#sB%~vFw{;avlTq8Y<>J0Z-%oSe2YIlA%^Im>@f(E=* zgkF&x&|q_>XYDy|R)_jLeS&uK6&luy4g9 zw;#IoqJ9xhXOf|OY}ifOq(Jg?C@FzsaFjt>ua=qjxDZD88F128_V@PF%jFZeWW-cP zxuv8khliGyL)XmK+T_i$8_L(`@=VN|kUzZDO0*T2=Nj|=LeOuVlGbr!5r>w;l~cSc z%N;grPZ=v+Wvfg5?)$TA{-&!|Oc3(VKGc1L7elVoK1k0VnfZ*uYZu!(3LenUOEE35 zwcD9Bf}E-)H|iXD|LZ(8{VHKbetBqZDuTBm6k&W@^?MW9FO(w@aEB!{&sFPk(-WJX zq2yhQ@4N|P|3s$Wr_ggcoKTa59WOC5sZP#4#QC*|?5=%w#Ef`QczgSr5${s^e7d^$ zba^By&B1ZDBaq{_2U%;eAZag3RlMmRLZ(`6b6FgXMZLYlJ0_4S%5>EHHE*#iMeE{$ zrHOV+YDBnF{5OP@or6a)q9IJ=cZOZLogxc0YRIIt)Z?}^{IRy{_|C`1)h|z1@O6PC z`UH3>*UO^_1LZY0H(JHm%5$(Jz84v`wjefe&uA>-_ZQ)By`qK&- z{^P~A7s7(z3aK~n0Aecf9E0Gykp8IQ|LE09Q)AgQd9&!b|A9_0{cvnbng~0?D-z%{ zPef=aXzw;X_x%1N;=X>fwX>5;|Fazr?9@uX28b1stK7r_zXR4>pAbzzpiGPdcDNZo zF@2CaSb|Rd58$!@V5p+?>a;N6UoSd!%nIuNlF%*xcXE1y(06iZ|5w}{v*HlD^T9Cb zKbkFfK57W9tYGYar){@$wynU3??wK<(;gaam8CxaMf@M6Re)p$f8f^U;KB9Z=@=kN zsnbSS=?nlnEO=7!v>?{gi2uIJXFpy>7MJzpza8+ev^1$Vzqg71cLB(EXYcip;{JDS zq?nY#2|J%p|34s#0psXsEYg1%U&TV3JJZL+VaNaX!(rM* zbZ}1p<7v;yR%s@5kj0t($0a9K!&efZxXqx5fuW_0STrn-<%k#?8;>`B-4v8d&`nm7 zSH8HqnY3-<<^R55{DmjO&K7e~FD;(|Pcn)Qe}j*Ojg8^M2fZro5%YR73W?+NG_ZP; z5(7Krl$(?$SN6xPrN7oM?c2CCzah)!X@`<4OPOtvFRN|tHC@l@Mn=M*q1{T_$WNc6 zs8K?32BWy71YuK5y}xZNn)-*1qAw7J6C6ZG^DoN3ym@{b?8b3O#fFG0 zHO-~48Rp}_9J_5fmf3n8H7?+J^0*;^9Y@N|$j&}|;*p^!T`+k+2vx@)xOy(rD3MoC zAnJIT`+g%5c=vL6d$Rl@#6GD1j+Yg7T4x3rGMtfk8f$9K48=FwaFI4I+q2EI83uB= z*D2CfRF?_4+^bqz{<(kp^YVC9LlyYUZuD+WaO4*;bgrw`M2S5PXH&?03^_4Te{DCZ z;_u(T&0*IETfUenFEZ%@o~Ki+!hxGbdRNeK{L4A?LivW&V+F)VzO|K z+o{z~RK29X?Qqe0nx5&3tTNa9m=04NjHSqd&2^My2mDE7>JSPPE4j6|6#i`g_)8AV z4|&?(mimNkyFZba(fn%4Hq&|emua+FfIL=)%HM6H2TtNU#$u;$vz3{R-a`=F3-n(W zG6-AfdIAuqGD9ja|9%sA8Gcb2CBT!xAQLtP&LUX8EDr+NErEG<+;2tg?h>@$k`r^7 z%X&-gPUK01W0E`{|0CHxZEg2|@&L?N?7USSyI*d1%BBhZuQy*`kkcL4yJ0=KV&9Ok z$l1Iv%@c=r7VoE3L@>$uHjWovNl4P*k+F0eER{xBHNDSGw6)wdw21JON^Y}woOJxf zn3vmmr$=E#u85!oo&5#3-ZznRGi5)1SPZkCVe5;~c-`WxOBKAiRm38j*288&l?9C>)^zK zN6upodjBM;Pl4=mwm&v37K6O3fK`(89+Xpr9IfB&&M6p(IyC{?$Q2|VsC(iO)*!YqoRht?)4Jr z8?ZXt$oumAP?8g1J6~;VurLV%S&nDFtVZsNz@9a_1N?;yZjTomtS9q7m zy?<#`e&@mZRb5V-zdO7gn;q93fP-o}E^WiHDD)}q)09ih7Zq|)^(*EX7>2*pMTROC ze1Qw{y^)Y+{t^xtGWqp3x}nU4vp)y2g^{~jV^bF7T->ZEXmC`(x{Jj zcxJ4}zmtiHK#nYJLW5SUTnICRoXB}SPYr=EH70Nd*YhWaY_Id?cBH{5-yz^eSPb4! zffgmirV`m*`=eI0v~qC!@i}(G+A~ByUlcEd(r0rQwYg*>+4Zc0(`s4mtx^yV-%VI6 z?1&_fjy8Md%>rk);pO+Hd4n2^nC|LkH+1J#!*-8X4%_Q2F)=aFIS`Ivx2c~Dc$x*x zKtYq9YprI>dzqOlfR_|pPh`?MP3Y_0QUy`X{z|*2qftQb-e`t|xHuXbTC>9{V`TpH z!PhS$B%sayO+$2FgDXQg5JNKJa6-G~>5*|J`%h}(Z{fmEmsi+yuoS#VrYvFq;xSbL z=PgOl5G%tiht)O+o2aqzx`U7p1;5)*sJDtoJ#aI^sRF!aO4UFU zMGDZ&%*?)U?6(Nc&-WMo{gTG$-_3cgQ-hvg@kw1?>Y{wR5&&R{&KFlEN74F zq_FuHt2n}gTElNMD=>&*PBMf_vfN zCU!!x+L(A`4%71F%9DJ_MCIV(>Msz?s;H&k3kxeH}t$7Cg zNB|TF3;P~T{`r!BRf&o3Gtnrx&j*9+q|^X5Q&<4U1vc993pi-+>go@RS^p%j@NBw% zHwjYhxJc3y$)PCm+s%UuCsju*%qhc?YL|_+k@>O-J7CZMra$|~hyGy=E9IQ>Qihtc zGC5hr@~Z!~;jzDp%JN?q38Is3ky2nm>!)m)j}EsrQx(3R0MPsT{2Zaci}iAD1k;v+ z84v8b$S3SP1gx?UjT=8`h@(_$D^&dcHL}YR4o;v2m6ny+09Xi=CFL@y8r;4|gzrMG zqh{o@)gRGvAG&l{{yrQ#hEhns#O^>vu3C`yEP{fcib^FtoYt<1uawAeEm{;u6bDrL zbyj)=-j(M#02_2G^0eVg*6w%h1%(ZT{=;gXIo#|<7)qmIJ#wPh`3$OSdX6$;YwKA+VVP9+)_N9w)_z}>RDbp)9IKFE^L!v+B>z( zNfo)940NvsfzZP8t0{q+R>?cLQcwl}`_mW>+W>q?6=@F3LHu@9Ho$5INfJO>5! z^i+cl^bLU$eqX%D10Hd5`N*Q5h!=b9tScB+%w~`_O@ANHBnWp;Erc zR;mNHVD8AD#R8*oR+hS@ayRt=)dy+E{P{ zv7n&uLu~&Dx)zqvlFrT>;BKg5;2x~Dq)`9ZV||Mj_KuobG=Vlue6m1hJPe&Epxtz! zT&v>sHCn7>J`sQR@z@v#f30sVQzYNzDjrb@E@Z5~i6MirA&5nja29uUZH8-Az?uBrk%LFZwh8Dt@rjQ|3Sc$vo`&_?1eM74} zcGivGdF;{4enA|hZf>{8Vu{4wyn)@rLrkpwb^4ph^UKTI1oh;=&dQE_^)k(_*GDp+ zmm*J!$WUHr*J}Bf2;)yrZRO=l)9t9B=jZ48`uf|`)n&IHAV2~i1v^xCjj0-`p@IOL zD>)mziu@B7I;C`xz_k_WtF_1dJRW|y6};hkqGd{AZDlk(&_o2yV{yd8=N*Z8n2vSICDs!rgdK9X@Jn-!sesB}n>CR)9L_4c(}aIjbgPqpLWbf&SY7te{J zn`YsFDG6I{-4IL4dT8r0?Hk$1*5dE63N`GPY#)>!!Y-7L0Ib7k1+3}CmPPSd)zxdT zjT19w*%p$`Hr#d@Gp>#A>}dM(U>kdUF*#Fk_y0!TedlfCA6gg^A0H>YJMzY$dNCqCy>G|029RZR^Qhxt(ab_u1gsrvX@=ULlRwm)*5@a=woGIEpW z*_xHr*#2yZ%9Ur>a3Vdd#b@@?u^U*T90BiqU;}dMXdDjGm~012ASL#}@SC5nwh!dA|pK-BvEq_P;WahOxX9Xsw!R zZG4sT6gK&h&p3awuIcAJ^-FDASob)!zUy(|Qxo2zZZ{VshHkBy{my>93!K6NE>X?` z&SS31p!xNzN#~n{I9zUdd3k<48c31uDhJEG4Hqb5SnrW)I~A0E&(F~rtNvkOu~9kZ z?iP5H*UzWrycAv|^mzG0_Y-jgXRqDHLaNumiEy0XmFaG;ZZfFvVRiGan-yDohGMAZ zFz{>zm0+CZ#aL_EH@mIjq`T#BLVhVWVL)n1BKOy!4IS8>Pj|ozrT2ZFoQfceTmr4! z?CdN#>vQixHsSW)$jF3*EogR{o|e|j*b{n2TO~+TRJ7;u<|xPKuuLk7kR5~5am@hS z?g1Bsb+Y{M@ZkG89r-Go%_oCNHh=Uyf=-p5Cdd|q2y!CKe@!$sOL+ejAmqBIkoLuA zBa%s>D7HrMiuLtSztH#2!IdQ{^oP#p-KKB|1t#SSA85hwbB0K|CyP9s zxVxp&9g(yQ%(LrKl>26mZN1%gH5rX}--g;?4(Ag+y6wuewob5BDi<6;+Qu{4N=)P$ zzq_$y;jy0P>I8BYm1Ms*>&bVZR6ge|z#|J8^er4iNm>3)5Kq}h-lBdGtr$kT?=!1i z&6L4joP|RUY`9IlnHDZh&~?+*UI>0Antt7P`|7K}zNvKA!(Uw$+$HD7qqH1~WE|Q! z-|u+-`&VPO!z>+ zi!ys|h=-GWCu7u%rRSzAF82?gashQGTmZL5Ny72en22lO?Y&D6o}{Jj|) zJ1^bnZrA`1lIz~^WiHmoHRjYff7s)c5D#qs;%&Br0@=%!`-7fx)H10l|Vb-mKw*MOFredA-&^uan9X*vk++!*!0G9SjrpDls^Y3}D_ z=@R1$k1hWV{Eugzpvj1-1o2uGJ8r{~stbF2z}4G12K!k3rIEDy8dicsYwoHrQT~w~ z2M5900#2; z)u?R~>EU4&Vbt_uBsU|DIG0kzj4hQTE3hTM%#YJQ#JSZ^H8Bk)YY!)-AyVtdb9-@o zw-#EZ(F~BOUuu}Ss#3|*oSX@?T#U&mg+O@d>E|7qA08iV8uiD?Owpkmz!J>09sTkO z?UF|D9S0-F8zO3lj|sE{_=E%mgcDpRQ0Uq2$;t4I0Y?c)3@4vq$sRJ5U>YM$Mn?7) zD9LOWL^u7;^uIYfDRoWvHj&MZ&}P2oSThy zzlBZ&UK|l1(6Dyrwv}_R2-Ebek2kzF&?{Jb*Eq-}DAH*-JInd_@GDIV3k&nI{h60c zz0#`)~hev?Uxqf~us{r@Q_*tykMaNT@;Q zii$cuLB@*5?^RF8tD&!$kAsv_m6Z84=>XO1o1YC^6Rw^s?Unpr&2tv)GNM;3%7#Xm zs;bM}*=;-Xi`G?_n%9$&5X07H4vCtV{cn#yJ35|uoGdZoqp9JeM@3#;T`4GxU?9QE z;eD#4Fx8s_oO~@8>ZkCMhJeteX#cQ=Kcamr3 z=7RqkjJ`U*p)afnxa}>w`X_hij{b!H!NOC?Qrp?x-o7(y+Q$a=(IP+cZ+XI2eqmu@ zZLR9}FTl`Usqf&u49CKdGm*>}Q-=kDb__*vQrw!>&h<2SjGoB)7nZ#_AJ`r6T_2YF z({GS3^F}|)TAh5hbg((4(Ek3P8-y$ke^av7ZpZAXiUdArUDn=-1bjHa4pdCo?8t+rAX7R9 zj&hz_R_W@kRW1L#J+TIXuByRSOOPXSN)Lc47V^3#2SPK9U3C3-y5j;_sf|H90^lU3>jr=n9B3A zIwHO-sLU#-pfIcHj%QW4-Nk-=PGlp-0Lp5m)zxo;fHnB2m+jtqt@?D%)X`1j!sDWr z)ay)jCZ!04U-?A??SdWSVIwXsBdC;>v8W(q$S0&!xWje5I{m)4?JW6q0w7uh zl;06n)uFV(nU!FlRl)%~0|CVUO*BY7}a{OknqGn~A z@1n1{d+#lPbHhA!a4t3Rgp3wBx15`TMrihZNUN;iC;HQrwcu#+HUMmn*$j|%V zTgr_uE(@QcfI61d3=FVy;jI_$_nu@j^UFu>bU9 z|FBik!%L&2DN0L#{Q>u8boiMAH=tfXS5WuSjDdlfBSR5LWoc1<@494(1k!M80TB>a z9B^?*3<4rpFg!AZZcgf`Iet8_lb56PqCrzfTl_)N>!Vz4a`Li2mvH5nQ9@S3T}G$a zHvur;{cgNsH}JZR}H_oeKE{V&|wea;u`YkTuA!h!9s;pvG^ zdv4<#4w%o}8<&LbBF-chl|QOFI=tSOJ8GUQ>=*GeppA^(5$IT2Cs4G_XvnnUtTa^S zK(nw@dB2DdI1qU@20r$uX|o-p;G1fR^jgd7vj9B@-x+0IT-1RP30d2jkSrw$s~BT&$JRsZd5IQvS~eQynh57N)O#bdm!3fOModSx98 z53r||+v1CD)fIGW2j**(?Hp!wK10d$u(RPvpJv4`hvt!8TV_5B4leLuuDFkcF|{$70gE$2>_aANW}JV-}B-Q)Qe z=qKzow9NSA69IzSFWPL^&lD_T;<5>nYCB_9KCl#W(2)LBAN1_l-HCiW3PGpVe)Wzl zN>Yt0`@uqKuPB6EM?Ia0{k9V^&ez4$#Qg8iTDG9{s)l6pkG!trI*qTbAKI}}4PK*P zSp>)5ho&<|0UZFYUM;g>3n#b9$g()0hIzHiCrX&}?nn}DZolXmS`8_2h;?<=RW%LO zb${k$XRGOI8tSP9T<&}f@0;9;x_6IUXg{17E*>|%&6AMA6aBSRQmSi+}A;i$#%r95|E?MJ#skU>{-CBkcoW*dC5L?235+D-bLqZlGdo;*)g zD%y{$&GjA6q5`jdI@POx=KU>y-X4q;!miuj2*wLCfn^Syv8<&JIvc*UVTw2?x4X&E z^uqDS;DN|(n{lSrh^RZv?$fox9j=eh2|byN({Vu(bPwR7OE&JGh(>ST1SLjBcUWz= zxhLt1M zGu+-)&%xeO?K85O07umUOGN`Qlb{QW{LI4F*FE(6x=Rmc01Z7|X1SLr(5N{qHag2y zyBrH}K8CMF6DddL@3^!+nZB!5WnhT3?fL`Qd0_N4mVa10b>hG{DvP>y^O!keN&0KS zL83H`LQ|!!p!Q3<0Fs&nC}Bc;nJ}epp3Q4Nq z1{S_94<23z+q?q4aH9DV4wQnGQM@3GjOSN2kn>;^l~!9qVT1QTGpn%>GajfX*}b-f z#_2UdFCKK@o07$+nj<))5z?R);Z9ct&C+qv`{W?WG-JyXIHG1zqSHlM1`is9@DlFL zHyu=?cYLrl$*5&kNGR+(xHKPe346nG%Xa&W4AP(aGl4*}hzaz`-+!Q1o{C8BYuNBQQubFIjSKe9ITr?WxdMa7G6>1eb zTpWBrfmfxY+ldymvM5HFHt#R)hzL^jd-VtLH6D$0mQ+$7|3f?K^qQo|cCnaivtR3^ z%$cR9ypP^p&tgJ%+$NhP{!qkovgj*9q-FaCBw8BRRu?SGi zT~u4Gd+~sBO$V29#*TU1iHo}N?Ymg)k21s3`t}415QE0xk-)nAUv|a|_5y^P5?_%< zSBp&zrnw0~vLT*72BcZ0j{epZ{GkI$f!>%56QBLrs-Lx`;PR54X2<9Y{T?=odkzi(@0x>noBN0aD1AJ zf|T^KB&vc-2dwoWWkhIp4na&d!Q9jEkngN40Z5KQsB4*zPEPCri~7jR8H=W0{FNi; zo++V}3vF9bvosB-=p}l|MS6h0ras*pkjsZSa`LqW6kQzyv(i$e&LyAI@G!^96^q%@ z4x}#28i$`U;cii1F%lZIiUO||S?#(w+CXYuFP2#CUhHY|=DH1VJyeB*}(^KG!S#qx>@rx1vw-O}@xf4^p51TjOf`3~HbOwr|iAGA^Y?F)~^U zhO0^~pL1xQpPwI~r}g0gSRsbWP=fb+y2%$e7tVZ{y<)-mKx>xy@bEB5`J_7Gn$@8K zdl?z;vDe*upSgb?%pY{Tl&xeVo!dW4$y(RsfrXHD=I2Pu|H5s3{m{x}?7bPzf!_N) z*7u0!uJw^;`#VpQFhNPqg2(xwmV;cboUqe<{$@&mOXmB_>NFt%dRoBpH2KBKzOv7T zPBvZb4M>$E84m%}@Y(d=KATF6m8_~fJ^z_{Swc;B?dfjHoJO1w=N*Ir5fsFHJob_G zL($h~XK4FKSqfdFqjyf8_K!QWV3~<>l2X+B!(Xj|*A}yE%Pz;u4ad2;qLQJ}U*9gI zHV&KDcdTR<_W=YM;y(&Ci6gslihjrO;Z&B^KJ(S!`E70ea7n!3=3>f%crXa$EjyJ; zWUM+FyQNqGu21onk0XLmF^s@Tvm_$KLs_%LZAAH-ti^TF?`ty5cdBib5~O{_AflB)_iI=5srb zioEPpNlDVKSAbY4qnRViHa6+(Pb;ce{ila>o|ah=PKAI^i}m1M`-5_7~!mjBRg95b##d z2*eGP$B{$;;iN5jK8D~f%E*h+S)^px0N4Avre(v7Daw|=>|XXcL7g!y|D|Fc8ol6l zKC$MQqja;^m=~G;yL|g5My6I$wSAaVc-eh_qgNvQ*51obQR7o1W2%}}&9gOtJdiwZ zScPNNJXDg!BW{X$SFp^{5qmT0ko&B{d))_6E3q>*oN(JT0yG4JSBI zX~pz@dm> z2MKRj<_@bfDzU<5w=aPH6;Z>ZGJ0vv^>;2)jl@Vt@>rGONi%O zu-+Yhq+FhhqzS8Hr`7(Tq0v*I-66!;f2gr%1)1BKyL$H~O5w4o=k+fuQlbtmXwm>;!J*b#!n|elbJ^C3MDx?LWJHE58heg#!zY$ zU@m`N)T5!v8-4l|`W*q_;b@d7`^wWK(0-t!1AzvemCmZFGKRqkwsAE+XYKIHAR|f+ zuPu#@4_@>BPrqw1X)Zk8i?0@-fJ%m$QL<}@K7ZoL7-2yy{O;7A43K_Wsd)*G{;=cv zFEuIo!Zx3HLk}#v{Eagvg^DlFHR6=ef5PR(rQSa)WRYb^^>jb=(7ZRv)$cYCq9JiJ54QT^7%Gf>ov$r zU#p!9+0F)SfsC?`DDs+I5-fww!o7tkF|DL?Fa!T{^QyJozgxsH2WLLGosSYLBFz3@ z2IJ;11Xdk)vaWl?)R;twUwW2ss)#wy2hy^ZkDnh3WV&3KY*0?!*Z(0u+NQHubCbqM zQwG6-YUeVTd5mz2v3V#{1D4mgH{TtVW0InXhIHZ_FOpGd2e{S}VmGV3CttO}xEpF6LW7L+v{5zztya(}5F(U#`!y z2OJCaJ1SlW8z9Pgmq;aE9Yb($04$gV6(rm;I<7LSn<=mOBk*Q+KHJAu+R%_3^eZVz zDMy$B#K^=%7EK4L)nx{-!fxLxvOl9&nv&v|@3&7KW^F=4I4tnFR4e6|Z>ygiqvpQ- z;bjDx`+SXWqPqLL{jyx4JMkDQiR62fga9g-LC?T2&T^p5XVFcW~5xi;fk`+ps&=xlkqZj zWVd{oX8A0@UOFrMghze}T`x&P!(#$_ zJYnHA1Ua;hTvf(IV7k>1y8vC-)HyKTC)Vl56ccD+;!Dx^>Nyaom-)SQ^!3xlM~vJ- z2u#Tf(UDvcaqT@3qb-<10ursqauT$lnfs?O1Y~b--|)kKB)eErGqvyBDl z?#|A243R+V7oBUcB{3ZvThFNz4#Fn%jEaH)6^QVqn(|@dVhOAsVycGAJu zT9hhctc0HXKG6>a-=5%aDc0b;JVggy_Fha@${xZ04)ODE!T_XOicJw`Dq?|JI6z;g#_Vveid5LFC`PbM!SioH#Eg9`UoT zp0g3HR4-D0Kq~RDAuDoAfod+26fx#Of7HR_Ijl^yJ8YtnDP`8UT=C!rfe@%)7DW(5 zaXq4b8Xs4d?gr5Y(e``@L;h<-bpSI7A9?&z0`zmEqtnvXF4ZiDW(VfU+?|4OC@7{O zU;$Rv&YB$KK`aUh@z+zV%Jt`tcw#P(=Nb`z7_afY$dB!o%Sic#Ve{r?1MZ0IlJzL* z0#sDgKj_fa`hS+LQWiZ|?lR~{MpOp!u8Wz7~Pth}c8 zJs(gXO7~f4>Id5omXX#nJ*VeL?|Zhnax*3<4n=-gEbf=ehE8x_i(D~p1iUv51GDmH z0rhmbgqfu>SGbMx_rY}rGUF&x<0xT?GWj# zLOh~VG=eZg$FYef_B_nBLqu|dx{hIz82Yt(wy z03^>4BN(sIl|1=iQHhmxQ=4)YzmH1@K*Ht!CWeEMrbtLix^;B)R1ypd63>%W{9#30 zTw2?sP}7Gl3K(d9`;j0Cark{9J>=#w+6VuLO*|2JxOFlI;5j1xJ3Ti0oaJ^q+~YP* zJ6Fh$*!vzgY_OFL=x*YC}zq!WQXLA`OE-Obz$C}4C6aMmzj zjj4FPgZ6+J2E1f3F>iP>nu?40IXNq|B-YIG3ubJUyuGEal4-+&py}JWtn1NJWwv}iAe;3 zF6`H7M9lQ*%wFbLwX>>GFCZV8097ihFt~wAA@w*NX3s*dYIu%)vgw1$^2$P+^kNc_32`#C_3{#}(`fzDwx}mJcMtu> zOPT%T*e3q_fJ{HET9TmmRbYg9eAq*-1*$|a2KP8nqm{@!$IS!GG? zrKT`7}<6H)E(NMF_fYStw?jBRxF!0V}yT8L~7ler@7z0+4Il zODjN+F=CyNUpA*QF0MA5h1VVM6cKKUEGPusj1{G6(WH^WL4f0E+t??`d*K{`-n`jp z`}4<&z2FZ7KB#5Z;5%H;Qcg0Ji2d{=nKF*&@zc#)pk;}Qy};tpYRr z#4Yj@H^0YrdSkExge4N8 zbhX{2_fDq0i=a$nC)@Dy;NxgtoHCVDnQ|9{PHk+nU&B%Pg zihZumj;Q>h`maEIu=fa8q`TWe%U;UM&Fv}fv~6nZ1+c$ShvtlJz9#8D=ght@K#v;I zm_1K;K=5JrF5;TIiCq*rc{Xk#{9-*|HL|-s7;{8lvSCUj|D8_ODV^&jJPzvsD6Jr~Xo0q(~6*~*=8FcVUPMPEfu zSjWw10-O$yw@v{6RhpUk^ZW4?GSBzE0eA?TC)t+Et7yW5sM8$XFhPp| zf89i3j-llc9R#SATMnKdw5XCM~~)41w%R{@r5^5tS1Tfcr1 z&zjGYGV9$=ds&|jv9IS5knV|y2$FyOqNAser%g*u4f>A&1`<_sbCQ*vu0Q*v2ITb3 z%Xn|ebnXF{a_S$&1pT1g>gqAz5t-h-{YCGU?Wq3;@V7fw0bDDm-72g?q%gytlrwpw zXeH*~ZpNcgB{luI8Sy>ieA$kH3Jbl@LH!y!YRhdW2|^Ne`+UM98Dh=mB`_Pnn9lgw z*kEq#)7c`6<>pgPkNvPb&hNKR^w+2HMp6@8nAC{-?xPht%t`GcdZUdxjF<zKhu(`W^F&nl~Qdd+2&IbE1X5Y z0lduDi`6S^Vj#0xDx5DE&)hF4x~Zf;u}BO61DjUGY8Xe`d-v{4~~*twu%X_Y(QF&td5np*s*j4&XV zVgd78nVS>tK$-9(3kxO3(=mOr<`R$g-SsnpPNH)z(T371pKlIsass>>%r4KMPJHF% zcF~xaEGZRD5@^KVfo{FMy<$d2ykFeafjF!2U4%UgschCx*lb?3O!JSVj9fhK^T4c+ zL2U7XHn%DuoC9-a6Im0M@CCk4pv~}P_zfgZv$7$w{1lM?-^sMM9>b=2EBb$$Hd-qS zF4>k5wC^uk4$ZzJ$)6TKw|*Fqs^V8GQvXm==wZFyaeUgfc0YJ4vf3*ljik)NyqC z_^svy=8Xl?+xK?tXpL zkd7v14|u+RI_rjAv3C8U9d>9QPv^D+nCSopp92g+?Uz2t*Tt#Jid0tSz_Z=uGfENQ z_(9=S^&daYtH=1$%)Sn{hFQ%C@;bi_=McU>g%<3JSDc~zhDzcQQp`s?>FFFDb_^9H3q1pZe_R+}z8s`EUuGMR2fUGP<~XJMeW z$?Eu`$#uS1RCCkR#k*T(TwyPYi1n~8Gk%Ay_DtW-W^QG%RGADY)Zj$r+p<3TM9b-yzR7{a?3coxdh@|xWRbvk4<<#X z=CHLd@*th1LolS;|4EXmbv38sdGGNp!h5>A&S{xd4b+Dto)kI{veaYxy_f6Ws3_if z_#wPgfPF4U;RefwYk-awBZh|pi)?sNY3V&jY(6KGZYz#$LZpRG8I=%fVC5s=b8QV8 z8Xp0~IbdKI1$}`AMXra}X{+s?HM({01UQA5n3zOFU_D(z2x1+tk4J&f6=W2ebg091 z{osN~bpKnlthf?K@ajVWGTHAETqmxRjGEZNabpOdn$d0VP7&MlfW^!2UN76zOT=}C zJ>{dk?pEinkD83!O4F7NBp@#RDn+`6#bX`v?d|Ed;nj+YiV%rD!MD_Nv%IwQ^ha(f zmfq3P(fppT&l_Uj$}1SDyvU?7X}4!8kK0Bl9kKD0Xfhfk8O_hl zr~-}dXZYm00H(rvp4qffda=KspKOBPeqK0>VGA43M;eeB4((n75%1-t<_tE>D|C!q z_U6I0+wW>Cv(?pd+{byDrtU?R^=Hff;pnQPnta>v5CoJ|LAnG4q`N^yM5IBwL`u4I zj8TG;g7koilyrBAba%ss!kFaf(fi)tw{!SoXPmRW?-TF+T=x~adjmx*TP!p@`Pqkb zbC|7uLZAiG<3rc@(O*!oJMWywqLSaW~|lf|OX5+O%4k z0BtkJlINp5@bUTic`O}xJkm!Ivrvr>+7vXJDAj@&wyO@R@^)V3qSRbLzjh^&?owGm z_$un+&9pb5Z8miqJq{WX}(lwSItF zHQ?gzgFjaP$+FDLZ~v5(8SJzL90MYs-THatztvX5>9e~ek4IpVm4=l$_dg}Eezu20 z1f->loATcQQ@~v{>ATOj(;tPlo` zjZYzW&`V?apNz0)tF}L$x!6sp!EL_cV*aE^1aNxjgfhOMv=p@5GOl6*g@uKs3R)f> z4cDgf8Q%f1v9VQl9zF%cq-fRD2QMW#A&&_{T~U_QXBd@`(u$gVM%KE;*NuzY8~&ir zv{Tc!3x6qI!NFIN;fEt(tM){4BJ)>vy{C2n|Mu!OYIYsNA{jJ*Ta?|Al8)XD?JRN3 zV7By&0ly^Rdh_xt!MsxZ8Y83c03MOzhP$6Ud3?7y`91P`cz@X{b_7Ia75Mc#6&>w; zYg$!(*?-d;n@?)203kI~*q(1cFbLPdxKxUMT82nr zpkhq32x6lo&Ive!yS45$%-ks{xjlyCvLyD1r^P%yk6)9r5P~iOn&-{^nC4}0SSSwd zi*+b2F0t*LsaM$>6C*Ca?BLv%;->gr`u=o9FqKr!d!nj3pw{w6s$1S8r1r0(RT)x*ApPo=x_(auhCb9?KfL75*$ z*Qn@=y3Oc>ze#p^!kl0Uy*afEKFkDa zQgBq^7O=uB{8q(hQ>Yc-<6;^w-+1;k*wR{;loS>fQP7HQRQJPaWo+CP>wK@I&wlVu zCKkbuFBk+d+o{9^okRfP3NfLL1RJsyyi3ae(;bC*K{t0>MG)SF8a5;d51py^X(TO} z+0kH-^&QEnzdt63E_78=mc@JOSTTOQMQ#>s5bx zuJnRuwFLF9is3iyw3th2wsE)6-$Q@QRa@99ULP$R$5uUJQQJ}VhLMeTVbm)2kj^wr zo+L&@S*PLI;rgLJY+O+739>6ELODZ2|58KvP5K*xFNXQ>^Swq}21(a+d9bgKk9c2` zv3UI}3WPNtaN@`!8bc@tsz_=amPb<$*=GYS5Z zEnd_$G$4GJUB=~3IY9pHIoDx#a?YJgi5|ZEkvPCB*hv6d=hAEgDzgB)oNS_(16vFD za}OVQhng}pn5gSeH4gKLZ*OE`xAQZF`_nRfnZqEjh1Z{5FSaFsjw zg%4Dl(8~E?zpa)IR7M=_y1!gU&_#4~^wCa5^X2F6B88KG>xLE{7h_KR2{|hPrzE~W zYqlK8_b^O8*`1riMQuu9`ua3Za*ETf74XB*eEYluUd2_Vywd95$!4h=dASv#r@3Eigcmipfuw& zK>2%n2I`X%&oJ@PC@&dUTwEL-9i234`&spzmXhF3m%$;?wfn}FJyzPhu>u;5Huw7d zM}fr%sO@&Hf+m>j%L@$Oc+w*HmOxT2gFPw=RPOD58 zu^oCr#3U7P^g>JF)SH{?LoB~p)5qNf;l@>8Q-D}s=P*4ccdR~roh?}Ugp$~on1~t2 zb#L88m~$}msms*OOd9m`@0DU>2w*3qkEWHeH}vq79#4ArqrJW>x4bqPrb^Y(B}Sw{VW~Gsi~y@ zU>;t>ik6cpwcEo4SaU-YV2}Y1yv*3CZ1p|e)(4KZ@b)u$Y$Xj20ysP51RV{^UT*_; z6q9r^qW*;owV+_c{jPc~4Y|DyxZcu}m7^23^vEtOWU;qu%@PtN5v0Llq6; z3Gs9NfjsVnqy{X;|6kmvl&xlRBUxNls}j~c(D%#5`fL$YM{K~D!L4zrvt?(zq18g6 zvkoUGAe-}1Oa|SLDPjr`Yg~ffE*7m02OW<}wi}Xy+!w5(Zg!gO4J*vVfpGyH+!C>< zXVzhXp#Xu{yu0qwbR3T@*V>N*$EhM0iMwJEe;$3&$?sFegnC}_D23iM&C_{0>$F*hln9If^$7vpW zvWPW`gz;kEm7B@Za6C|$Aj17Bvjh^e!dEBKfvweIF(w67H&(RnHaBx2ybhRmiF;{f zv&L+minq2$eS~+s{(gDA7yU#!TN5Ot0l@bONGCH-z~{We&JWnMy27J=mdJcB6O)t# zghw<~RIUxLyW-g&$0$EZM5NirswM#h&7Rm=`7mv6s)T+prqnvtA#-k>0_s;-*kN&} z1;3`W#GuUa)-*xxXeI1vQCUJ3@eB=v?_Yk=vn|TNyff*)Z`#`Kes3@CpeD5AGef2O zA|}5?=vEvj&|g`AM`cVAY=-8+Ho{15Eh+F)q_|axypiyNb3=C_%XK?nFEgUa|@?lKxvr?J)*E;&t)@``ktDTmdloZG>ysI?B zcO}tTW(wL>qE$dPcu7k~1v#jpt9zWbcF|c``4g~)WpjPP_Bd%tQ_~Cy?mz~Tk|Tr( zfd-X>t!+VO;a><8v>+wz-#9k?s*z(aNxMB-jL7@#yiDXjPzpHIh~FWQNE z7owwpN}6aI)b$k8i4eYHtnJ+#6Hn%D&!MPml*TISRlI-lLz%uUFqt z@nV79jHWc&d-PP2*>ixcz0zfW1&+fWsuaOJp0WtDMjUy1F+)xgGtk!=onGS#*tW{@ z*`3olNwK3eDXRO*uiU)tAAWgdP-*e#%d1`A*5&oVkvC}^Uxe+9=M2&&UJ%noPR?zT z5QYQm@8n`Rijw;`VO!TrGhsHepxt(gi)Bb9)vnjL1p#Oqb9FGEL{dRla&tBT^Lm}-kLy?jRc)3_ z&TBL|B#a+JCteU)1f%p56ffTdzTO;+W- z9vqrQ>lLjSRad$7SW)26<2R+sMFuE&D2c_y#a9E+=Aem{nT^vXyk8hBiD>Uww@|F@ zaOzHrLh!Z4$}`%S-aDZnkiT5cMnnpKw_d4%{(PB5y{=Aj2j3dsLNoBd6ELpHZ_4*x zm|(m1n?WF$<6Z}d>>*~p-UV^?9{LCMMyK!^lrc)WI%Cq@mh>rOIUC4ym6C!O;IgQ6 ztQW^U5P8SnE_N&ncvv_pc=yzfCiXCSW0BPkl|ssAbbQWn}+(1t0tqkmsLGx@=vb5q%29e8U1 zt08g+3Q=)MNu=+vV#n1P?B1iNjD9PJ_SrY~(_+gvw^|Ap5iTCLqA!W9+Z<0bQ+QK5 zkB-!uo2A`4uU@En=+uDNHsWRX&#`KPm1fm)TwLhfDCWPFt6#Ws{&_cp)_NXYHt_99 zP+p@BOIdDQJDn_Lp?{ebfA8?3s8bT(_yf)mX1p_Vv--(~5#4MccNueF<+P6%nVY?% z{qkzA-27W&PHM}UrWB(^y<>gF4x&!1LmM#NZfK}5s`jjG?;EUX^FK_gshL_?Sz&^B zFs_$^$AVfMI*C}?0^cjXzSlQ@-L^15EAIHY7B{vC=*miwHr+8A9@lBbf8Dd~0#2;Tb>ki7Mk2IhLE02^0TS5?(RQjo z&&&dh9iU=_n6EBWTVHyad=R2aYOo!(kL9xTO*`~*NfrjtzRQw#UQ@=dtff!CPi6An z4wa6$!&mOBu5h~IThS#4G-!0?j0C`K?f0OC)a7w-h$)gy*lhb|rUEizH$_|;+gKoFB+a(rY01s7|IU<~m zS@Oduqj#QyvcR`@8xg)>s}~eYM{QpAzKcm_h7DRVlU_gRZuYle``7P9S}qh zf9ECjICS}41BPe)_^PVu@acK#ir*+TJk7diAUI7i7_G{VO~xZHs4K4*XJ`MWl3m}} zSZUd4F~2SWBLq!;v{`LAC6CI(@|Ka&OMNe{uFkFI33$UwY1HbQEy*88`5|-j2*n#o z#t=>E=;%5)It)~*)&a_|?d$}5AN8LIwyh_@>?L3Cu@}mpFKBc(N_C5CUvv}ADvc{R zKrsyp)P;t)D?!8dmTKywKIG9rcNA(y&?tmUb7b*IC*N-H$J(!5zUxybOY*kesmaz4 z()gW7mbllE6fAuxe_*6sH0t?=eOtqIOLKE`C`BA+1}x$SY>fqY_<@uXB_UdMa{3|O zXQrkmM&WtFO78fq{dn3YP=0%_+bWC?Ar4iX^2g+i9sRcL6NTAUdS_IEe2l zq6iUi1iH8Dz)4^v$M~YeJdu(%@pJK;XF9CR4yM?hKvRePOL*t(F_uZuQ=Kp(Z5%ew zm?(0;FOF^mZt08~Kc=_-YA)exQ%tlZd0q80IxrgePods^$Fack<19L8K+yA4PFc07 zCr&hgsFui1%^wGO8t*+M^UdY{j}~T0jYZcq(C=aNh?4}P^xj*|Totd4`0T*1dW4{l zrtKdcAhMp+d!ioNxO4aApx}i5;l0q73Q2K^p_&n{U@LWJ2^bPX5!Ee_=EO_Q`9|y5 zKvh?WYBL%D0A}WA_u8=>0$3#n1n^wRynDf4?sBd1v%FMNLzGLl6iyvJTBzDC7JinJ z6{=M3kCY>zqqBX~xA!}AU9%tM30MGx;t%=yC^e9dp41U#9ZgJH%SyZx%&2XUzxv+Y z$5Tzl07V%2Oq@7$$_MSiI!8j|!QEUHL%%rki|; z&*3*yd+?6KdcmtE5)$ppGTHs0+Fqg-g`iFL#vDm2$)nXn_0NMW{HtP}JTE^B7w!bY zw|i)hrMHRM%;#MsObzVN4@&`X_jzm=UKhm4f+OmGjZglgz6rvWj~a_Ac$hW{w_7RS(<1Xe=xnEg@bH;NmF!q z!CY<*55g(vtxp|E*Am6jxj=BIBv|>Aa4YR$xuX`afJ~sG8{BnA;ssAH?J*u+!qYda zF_b^NcMk6szmL`1`O^ErcyVzMt1>NCG(0;sHMNhux=~O~?atNK(_8O5iVh}Moe+cB z_?;ME0k)6jcKf3&lDV|Tx!OOmvn^)bMOsA=nO75F?t+q%vkzZhxV%67+Gfctb(>W= zcG=&}MbQ<)n(>5@EkYRdU0)5~zT+HG9gepK0(ao5*s=?9G2 zta^@znw$lX`=myfiL}@Y#2Cq2<#Y0do=iREEnIMx=&l1wRG~inp|{PC>7>4w2^LF| zoU!b*VN*mqZm#o}-K1qnLh$;&^v4J%*{;-dc!oFQxGXJyfYS9mEsa~p1EK;!YjZRm zcS533ZXGhbb+}|pq~%6CbWCeSbK+#ZbT?fEdJQ97gWsGAQZGt(*IuL>!Q_h1zoA_f z*N6W|uAE|p9lJOa6h;54_#AC8{=C_muK%o(#~#7aO0sPM2D{wqA%n8<4%S_0pe=2^ zOHSYKo$-0yFjV5?t`S}xD5=H*Iu{yG=xhQWL(@a=+*Y{!6Umex*a{j@0 z4+84!-ANioSaqxr>6TV4IfAkFB+ST!?HsiGPfKM7UlA=Mr5<$?efh+crE6tb9dP_qilfI zV=LlwJ|*b=pIr3F3S3s!`W9&3MFtM=hcyILnn89LG&1j5yB$=PzhYNQkS$>sQk*lA z#&z}Mu)iOLO2q&e^|T6;aE0~8D~)`a>Ert`W=8Tyzex!3%1$-fwm0yMLBsRP(Qn6* z36jn4F(e6wZ^b13NndIB5s~b-1{c zbKdJtEGg-F&PsKk)BerH^&WX^AFU{9cmfySbZq}RWN0v}9!E`KLw<|SV`)DJ$sf0P z-M_a+u9C;`;KOU{eCL6>WAZ-&d8rcc&U(CG_>{QoR9gno9&Y_-|4HJ8jc;$E5Wb`Q&*eA=b?BTWq-&pL!M1e?!`k@FpeVs4Qw zgIu*|w4-Twzcx)fo!e`WV$U6VVtvWWs#m+Wq1S6j!Pj<(Bk07@^1On++P5DuO5#)^ z!XVJo{onW$3MUhJUe0fx#K&4?3!J=RrxQnIS!>Ex*UD7Eet~}R$c(nR}%A>-=z8j3V<7l*#H7&aaqaPRS@WFPNI&{S0tF^xe%>c^#^5NUrhsp zsS!fy=4J-T)ZrSwVNcjNa$%xs-eR5BTD4YRa2~zY^W(V?v*%2?7R%xObi(a{&y_L0 zJNM6LAW)oBiR1jY_=qk&KY)o3pJf8X=nt3bs5TozvA(8p~a$m;|{O}SOgu0lLe_4Na}WKhUVU9hpn zX{pP z0Tg5XP(59!qoq)S{tI_>5)Ae&F|qp8XBG70N?;qr%nCq0J|i%q@>zNy>>Z3xV3w-(elH0 zm&qT^PT?~GM7;GY4;(ZH-omga>?RlfrmM@AnUl5lJWckIAmF6RE}3J#B(xQ#r`4{Rp8*i{|NIc zp2=f7RBA?>NSX`f(uCQA!All8SuLu|CKE-2;lY_tEDTH@-irc^&bE&mfhBri{4}VE zRW-?qHrds-S?M;2_t~?ZZO54C=$IIpZ_|`70jty2z|ke3AMhqA3zjDNy^IRx8#9_Vu(X1c+l#Sfn|ouP|Z1c2^n0&`%mkDvlB z#;dPBfhn;Y^!91o4`yaVerhd7l#lf6?=O1&Q13&0zfQR1`t?ryDvNvHm$aN&|Kr(l zMHY87T;|qNRO>Cps^=(^-#oqzY1?fV7rAN=?^1NM3Tv`su?B;<+$dH13-7D*<{e)r-+LZ4r-(x~cvsI9RCEDn|nUQCqK0KAp-^}RejiOA>| zfUf-xOy~Nl5EE5I4^Vh!BY=%%JFH{_yzV zv!ktE00FtKtT=g85w!hTjA`SGq&m|5vVJ_uYC+iE%;%qn(u41zk5qK4m`;CPpbX8h z*T;LFi?>*X;K{GIffPc0fDfCuRCc|%cnUQtf)b{&uGNq>F3FrA+{Z|cK6t>cSO2o+ z_Ca?PXHk)RlG5wS`POe?;SI5)c1qKl@=kN6xILT~2|*_pcY%wG%bz!Om8x?>edMik zMO)-yw_Fdu0PP)jn;j2H^RFC(6^p>qW3F>Y)Me19k@`M=C?C2;LEb0jl`s&_zVH+{ z&oifS_`oLDJ)B)eUq7WJCJ0j`&$R0vc^LhI6?k`#GBur3UG*l)Au}lOJ%*x-wzQ;$ zh>jaK(DR`hXm`xMNqNViIwe*P_hKe)zvKv5Jjbhz_?Qz8-TN#Q zELD@lM)%#Nj*gE5GX{+(#tH6(F11{03k|>p(=yrvI*5TBXh2J?rX~1{Z$YocFNtIC z^QS-pQ|r}BvRVCAL;N z{npgANH|Sh0GB4?{&v46M;zhHcb+o4t!K*Ei=a}&%CW&gCMkE27MC^cYbnNtMdxu)h-xVoj7Lo!Ny7b6rEqBZ=VqcbI~N`1 zbn#Az=V)`|h@lD-)XPv3G2~Cw0!ODeYIv)&6++L-{|bfs8Rk znEcaAU}s;dvVs6p*u^E=DiiUluZ};QvSxYDwXwCP=8jcT!&Y5dVPRqBQpbrl)r`#t9$=_?DX`MdW?ZVvc0V>&s#LbCtVXAF zWSAnpk}(Y5>w*aDML_+JQ4}3HwLgDbiUfW2ifQCuY1oFRU0>`06@MPZ(83%;+flfo zMfT~9Ag|LjVf?_ma5A!%!eZ0loo>aBGYe%tUNuu(x1ik?X#Da0sJV`-C8yfpb6br( zIXk0U^6Oq$VYC0?!?a;>yOECy;{l^ffLCTkX?b~Zc{$mq-Hqj~W~2XXcvC#%@Q%4tvxp-$a~10-S31 zV^k35j)>@{Xu^Dq&xk>EUZ%uO`ut|L{09cpd$FTnlww2Y&E5opOC(mjtdx^|db;5> zSvIz>&`vce`aTILM7JgQCUSH0seZkcI^S?vMM<))bcPGGG{4}#SEHC@8WjyE^>bhy z=-YC#y-G#Bkuoze`Rgu4&%jXnj5j7ahPtz}t?l>vA&1_z8<|19bC)SaXXDK0I}OxK z5?)Ryr{Lix|2Zup=h{=T2FFR+@s&;mNSi3LDdPRcs{ian$G^xk%l}MIwY1VtF?qW; z@)p&6F@iJQ(?2ePI*#HP$duA-?^-{+e^=6Z;b(~>W}1MChI(#xPE5R!gBn!eeQ`ux zZ4@i~_&%YvM>_z_)sz7~LYsw!zr(I0`wAm31JkA_cWNUx+mFv=-Jt7@!%M8FH-x4Z z!bDf|1vsBULlx)NcS{GIjfmi@Z$7V-jT0dWcR|P_)X+?^X+YnYSe%%)V{e#C@O&z% zM0I9L=k>v?8B6LC)GWby5zVMm_h}098-wj%uLfN74=Sls^iO^2lQ`6pMrgKQ5Cb4j zUD^{|<{gsvE?C3Y0zc$E`b@(6ydN*SFeOG>|p`khW5RAcHn=ki> zM&nLS4rw>z42q#*ud%jT2Rd39vas4Grjsi9(0S}eqv(s(A2Sb=OT3ytLt0@3l?7O>Ovucej z#cjU0f`lNNNf9mo%V~z!l2GV+09HWa7i5Oa%_4x<)l#BT$MR|mhk&1Y)xH0{s)eYZ z*EBs1uRKVBrHzBVfJ0GmrN*A>!FiM1m}sD?HZXX% z3!r6)d85W)C0qT|&wsjK{u!_U$9c7`I?b003h)RFU~ZljCvLaY2dKyetZserehskw zxAQ8j*xz!tH@HH)b|yUXB!grdeJ4pOKgFE!KFhh;6y;TbfS0BPEm$&q#>*@DU-);L z;=sopbOfxIhw@PHWt1nlt2m+4-y#=-hE=pdbiRq5_Cd|T?)LFf+Tq7lB+P*aJ$az- z+s9X%_0JJ4s97>N@^G@o!(IWrz7a`O(R2cJ-(k2xN4K8r&_ z4v+l=gC#f09Mn3%+eNk%m8SmdofRy;{g#3mrg#P4D*SihD#f6QqiLjIhnItq%)i~M zTaV4pk%Aa$>>n1R$xuJVpyPARYL@IqKL4RdnAqL)D?{w{Y?}O)lGEln4~3auv)U1F zfzo}|x*wj_-`l-MXoWY# zE&Z7Mh=BwfXV8(Io~ri#+EW9nv<)|aI;p0tY#SID2xbLrn#_QyG&5u4ClyJ-&=M~2 zv+>mv50Uph>5A|`T{yWCN4v*iwp)c3%e!REB=Lk%cT)4Pob~Gf(ECxW;*@ZnyyXgH z`dCrg?iSVbAdjT{zB`2P#9`=%x9J;l+y*9BplJBpNnmVN}=#HvrJv{-R9`?iiPkQh;wReWoDaAN3S&(aNoJ_!egAfS6Ipjs zyyXe}7aCr$(OqMLgzm`BA6WNI%XkfZeOceBqyWqkJv}c?&4xk;(8R*T0%Bil>9K#9 z9ITKNuIcvCjX;;XH(kIyO4R^j9)O@6^a?{a)GBA^U7bE!3Lr0J}zy+3y3 z>kS(^)SlVvxp8pd>#na5EEBV%NkhbLr_VlorQ-*)j4c{c=ZDWAZO$mN-+N zo3&iqW4Bg_>){_24e9q2+X;#l8ZbHAkC$4No!>+QuC?antJUd5ZX%ShQwGrEd%@HwW}&u$`aJb$po}VX*hHi8Lu>(q?Ah4KnVdS?4B!RHd|+;9 zXzwT0Zb1P8u*m7U=tpWz%gzn%9B=tcTUrVWTZZaBI;lDN=yTeBO-w|<|KwptE)BNz z)a8jn!IuG&bI738W=tIT`mi&e`(&uZ4nwQy;2L#Dj9!oqJQIv&l9tD3eF&dwGEwlj z26*3ix)=1E>RelaB5&j?T3nnf~Sc9gQ%;K&6t-9kp*~NSQ+HL zi-&)E^GD|Mlt=&d#loX;#b+dIKmYn6GaG+Cj$e{SD8yE;x>DQ?Z^QrCxU4^Gml?@1 zIG8oqE~)2vy@$u#ejk*q`||VjB3{PThn?1XyDmpI}nY1TVR<22ANTaDxY^Q=5fS|``B7E18ql9=|E#JC>7;0PKK*CynsJCUt&qnQsbM-?E+a(B zKKg!A^O!|>bB_==-9M9APp?g2q5#q<1IO3bkH>qDn^HwqLWp&TbBvkSelrzfDAE$y?kF zQ98kOU`$sCi2Rm*-Pzf^!R|Fe`=UDBA-CjpJXq4RGpl7*=(L0J1A;Bdk#u+I5idqh5V)U z++t_RKADZtQp62jq~&bZ^WI|<*b4bI;iY!Jt@*l<{vLtSi-&i<8n)fS?Jck0hj+(` z^ljSYP0)+2E#&udBWgT)$7ALo)FOCl`^ArDM?cJDd z*TI*`(c)ty|MY{f$58@k$0p(`5bve3x1yNdzy9l(*~&fnrO5948G13sfS=W(0;P{KcYB5 z?{L`%-+b$n*m;ARdT;}a)SMR6n09n>JU8J590maR;=e}37VUo>eE7H3sDoFXNaWIz z?pGo1<4=L-VRAt+R(Om}vN(;P>NX(%;Q4oX`nZ9b5xp(y$JD3FoJvYcc@CL_9bp`*ad8@)UmoCF zj?AXO9uX6~+y7!fWvmk@|9HhJg8jitqrL*LH`m{7ej$lI(2E($8m$kk{bSi=L=8{KxxbYGM8FahY@5ad_#zFNE!0kjuM3~6!Ei7&a64@`44g6-e#jA~g-V4WK_?zQEN2ihiEdr21 znbEy3DWIgm(5ti0KJt(MOc`c+_EztqT-N$JE6VPF!UK&%cDgPk?t#?1)i-smLd1U< z3f!K|*Eu0?c54$5O&laa2sQ^FrxHbz8J&ShwX^m=ku-|uyR|@g;Kn-C67n8ROvqM6 zDxWk(Ku~DaM;h{iPS{!V;5^`@~vTcp$EH&IbZqG$3GMn3WI&8u}GZE@#)Xq)a7p+I$St2mQP~3U@=eo;g0V zevM9`N#6i1oS$9Ako%u~1AhDgOB!iuaojT^`=DDmr^XkN@O~}%t!k{|#R+h2Hye2> zIFTAXC8FQgX&DlpIQFsoHwz%v*@iGe(4x)Rlw+&-2)~CDg zNL%P9_kGI~hI7W2j$!m3ku{%-lBa%tvZD8rMy-kUz>#M2+3lb8sn|$79~zDHKzq%} z^A)^DeRo8;cd}T!XsyNWeC*l4x0F5niOY0&M(4h=8dZw;!zJ$Nd$Ikk=Yp zu%BX|hkGO4_CP|YZF{$Lg`Z02Y*Y@xd$CFuTHkDFgRa*bbEJGm#6=4gKED;s$1Aef z{#DnsFn2zh(%)9~bX#E~ztb}D9wppHA!sWROB!_hjUk@pU|g?AUHriYv;T zVcQo##vqIFdKWbn-?F#qMdG{3t&x=ffIV^?-uWKUcEMRt@agV_GVmABEO!@*QTZI) z*;!LllA9YmvBp+>Yz@FqDslAn&WoPr3Bxr>sX1e!r(B(| zK|VGyz3IinA_&ll|}}lnqF8fpv}Onzn5sw1?DsOK#$Dld@bw`^yOA}yn^j- z{(0uhNFLcEt-$>ZJ!~}p_4G;cq}21xH5fBwvnu~8L%79(oz6N|hv}E_$G?L_W9|Dt zi#-So1|L9i{V2|R!lgFxt!w)p*T+k^YZV1_R!xUFI-X5lzTNrPuhX45&t**$lcfo^ za36D`5JV}#v={?D>>2MfQYAo2TlsEzvdT(nzQR<|eoQOXmM2=oeGSB1meh6w3GNWN zxh_0r&Nk%4PiFR6%}$f*YJj7czZEJJZKkTytyl6{2a27B3Jrav`X#$g<$HB8jY%Yx zxn2`ZAYIR5*Bop`pAU{NP>XD7C9HV;?KsAH&33W4e7#31byU24 zuGrT^Wl(uT!^I936v;aFO1g8BsI)}|Td(FIM4Y5jw85rAXuy~uxt#JYrV9#LOI`Qd zh!JxB_w_w%6_D2g7{CAc9R?^dftL~A(_v2x(PiSB{FcIolA0&Hyt2(-2|)lo+jln| zK&i`28*?hp{SuGLAyY3Xbr^t^1(o z;EPJN($lgB>rwgA#1c;?rP#@%qCsUwVvZrB1*!%+C6)#aMinbM-9$yhPv77Bq3^Y6 zsOwIVBP217ceupa=}LU(`Po`~B+6$g>G!BpYNf*$z55l{_rPRz;sQ4g8qbFW7-WA= zgf6EEUbwoh{tTbmfoY(B4uU<3>B=o?>t3?>PJ9$3fWq2)##z03LfJ(g%miP~(VKgb zp7xoVH|L$vPqDC-cfGFykVy=7xMqZQy_#%gcN#`CJ|ASLU!R{Z#Z?q_@Y`LA@yo0K zNNPJxj0!WH5$-Iy@P`iRp)Iy*5(IepC%IP%Lxi9z69Yb@RmY!7Pc?>YK@CRW&(gb@ z5qL&?lr_$pQDH{MnQ%jKlQBH&epE{}0cfJms%v}c=LbP%+3Hu}3zxmeJ3z$Md{y;& zO_D*O5uYQiL>ljftf*416kBGY6$q3UG$}aC=Drb^Bebw=9d5n1x8}L%yPDq#v@nK- zo^=bILpCFsZi5;F`7n$|sVS+c1_lO8>up5var?}|LI*ieWaT-x>O)C|H%T*Gdb-1z zNCU|RJ?-Pj1ePpLypY+pp#5iX10#u&vI#pA!kE_@uw?*%2J%mWT4_~ zbe}rk^as{uP*6;;#RHKynu`Ou%C5x8xVpN&4{IX~Qi1NlQ$ti0=BK6sF)uvqCjULK zbp?H%6|~UqeZ4EMkUb}u-Ppk-9jQeNx6S;n`Wyz$Zk5q&SL!1jI(-%yI`R?J+%6Ha zq)#F#rt&86k3!y%F4E4jw`8`SKk_ca&cepX$5oAQyTBxa3}W2S&Y{YM9>L08CR?9hZR*{zCHu@1p`(@`? zAPRO+ESbH~x{$El$dW@%k1aYT-$8Cg#a07>C{Qpf{g;zsnqRbf?`F5W?QHEhh;qYL z$;{_rnWisuzar8;1p+dR{KY-yMzyldD%oiSV*j{N<@cWsf#2%?F?8(h@-Z(moS(uy zDqdZ&bM|Q}^Uz9d{W7ZLECg=^udhRly1_)Dlz-PJf)#7OD{4~}Xg#*?%IRfsl(#1P z=8|#I2Fs-)&zy;J*Bc+W>BF@35d-p+9I{%{GH;k0=l{EWd?IWQUqYK=(_1NrYt*NA zO@r995(K`ai2C}`0(8$apFZwBqon*>^~9%?&UBIK5x%7aW1W^SbG0>GvXN*KLLl+^ zM0e1?)ma^7x44*1K>y3dm%>hL+)e*;{fe9+eMToxD5g99P$H- zJm>P^&!5!%E7|o1=&zDxmPI8EyIEPgS&T1<`wpUccfopJ9JQ8PwKd!`G^wm}rX9X?~OEOQQ^^HKFU$Ol!bn+3{{GSfmzmjI=Cn;m<^k?gP>3nTc zsQmqY89jUWrOd3krm4vW&^ZDwTz!B)1Vn)a^gj0Z=vdGGr7K|0*v-|V4Y&1O zzPIR(1HsdkjH{Di)i(FhlBXj6?{$!=CPM5^3gEv>DxLQpPK)nf6YXb7uhh4<vnBw zyKBJNTsxubdhCl*JH$O7TOgz(1|Ot-gFc}%vXz*oI)tkuG~_kM68rMrLV;+d)czA#S`8liSc($xr+!F z?6|B7BA%~v+=^2SKD_l)bC~?sY3A-}f2JmCgGB$8++5kd<29I-hP-IIz-f+t+6xh$ zn_J3EOB*kL4b&3_17`gHNj1`iy4DYY7I<1R6?*gR_T`h9&Cx<7mdii4uWG)&F;$w-uJxR%q9(2*U^l+o z%&#BZa9fUL$i}aovWFg{`l17i&oiw{g9ESPFvDFETQxiOHjh9dvq->eBLU^v7n)|~ z;ZHczj_dJKGu?pLBmCbP7xlRyiNQ=*?9MoR>#p@J0~V((3MpBsFj0eFJ6m;alxosB z1RqajD;k7|;(j^_A|#b-l?@=+?f#BI+|}V13(F<)r;Ox)%E$kJ^|rpCp8w&!A_b&2 z_rk)=3b^+d&9(#fijH?P#hI`2;OajY0zozoV9NlcC>sM00RD__V9x^;(65qNCvw@{ zs%$Svm?HP9daH;lIZ*%58s8Pnt@5opndCZIOb2{=q_gbC!&f}yc3nx*EO-y<1Y7?7 z=Og(0>ioOqhZ7lePEIba0`Svam>d5+{D?V4KZG6$EHg86=}F{d)%I~KuCcATIpBt- z5~`CnoSEUA=RD`WKTqtWmfo?6GwAV*Jg4<@&>{*c(sj@F z>Shw-2R%(w{>Rr+?A@^FQ0)D`; zg)0WEXv^=_zGN;C5+85Yg9K$J;LYfCiFG=WUJbk4IPUa^;?GIoN)5h)jP)awk0_gWCV%9LKm4 zC!pccr<=+B>`8$q4fUa^YR`AU#d~AW0rbgfgvFss#j_P{D&y<{0Op#O3REk2F zQZ^Jz^53#Oc}x#V*9)dwTS~1v19+d~f@wlf%?&Q)ft>@ma1ACAbk%e7h!bUobZeA#nS#FOv#W`&ZAQc)l*e{I^-S(u#eBTx8?559+Q z{Mm3!dVc@b9+=TXS+iNkH3&D@ihvG*4 zd0;+$PDzdNfAIRwnNsYFyep8eMf*;&mr9JYqOG7d}Q6!q` z@H_jVyLHiVYvEnTMjvb^pwEAt-!N-eW>d$Jz`c%5W9vI}mAG0d3RB{m>?w?&p0FO! z&`g4v=_dEAuGn52^_l-6`%+MlLhCZw{Guvd0QKws%jKu}aB|HFempE7{(hU36o6QV z``skCA0!Y1`9#_#JM|IP0CFv|*b3-$7kp+wO>M(z@cE#`zr+264hR@46QaHedHKmh ziWa0Y8fBfM=BrC-FzzoSc+UT3Jn}i#?F+^k{k*NfEv?(;Jvqz0=y$*D>d(l_I$E!@ z><|FTqP^11iVgsXWXGaTFNq~Z^aEeRRQ z&dcqme^^rHA9{76okxXF2;s`cCVgo zm(9%$O|3+n)Mut;MYAAm!%M6sLVZrv_|Qezvs)&snTPB>(_IrZsU+xsea428m6d%; z#)NxrJ$1)1>A-)8F=k`r&)zW0@<7{hBDQ>-g*-lhkQcxQI0SyoFy3)|DgLprCby;4 zG_U`j(ed|u!Hx^hw!s6@^-V|La^YsjTVnRRTe+P&}HCJCvq&yw0VJ$^-ZA-k;P({*E7H z!4Ws#m>A_G{P(_GeLuw{8^<$sdi;}EZFzen06=$gH~%)QSacej6oYHq!RyQgyT z3v&-#g#f)$BLJvj+IzA-n z>_|<2B~Eo(;#&rZP(QD#HiteRlD|}V1iAN8qFYsQSIql_vKcH$H=F%j*!L4vBQ)Qp z=ep{_ul5FG4y`bYfF*dZUNr7(db{WMmoyEpeCp{ELo&1O-)6LZ0w2BJyx?CeErdyYn9~AGFmg#BgrX|vVhR#saFSQS&c0)~p0PFNt`x67h7@cG=bxV}yvaWfq zqR-PtM&4Ta96=9MCyn|!)No+Y^+omzZ`^m9sfavW_OTkEe>9x+`{u58^Z>6Rp5AXv zDBj;_GQzJkzJHBruilRA%{p)T+uf zl{PZ^+_UN;Y=;{EGjzx};%Gg^nLi zh`(U4q4P}+Deh{bcVIM_{pnO#)B5@|{q5PieY^zbtICecc=Tcpt%Y;$)Rwp6RQ0(-1QS*&a(|pYq-8;W{o3IB znOHQ{C#f;g=9@A^I0)8%q((aS{BbQZ1?5{_&$86=WzSrRK#pvBdWN9=%xm4v-iUh| z#%R-?&`P}quj3y~*Q>&YTvgN5?`4S$fBHcTr<)2LSYURvvdZcLJ|{xO*$c%zvG~fr z{mZ|zsfA{HY&yN0h!ZKd%c=LXV5Iik5#tgz&(p9_aWInilTF9Lkt5c2Q>zr2NDve+ zHLk8D`gPX!=LdW7x_+$IGf(JsZ2?6>kdp>6m8kg_xkeiaPdF-5&}TU=q_W__%ipQ* zlSo5(jwv2JJsorM*w1t|^_<}m%yvI>bjbOR9t^ox=etp%>hYEH0aP2X^Yr9b)$fsg zkiKLw+ErCuq4WrL->cSph#=z9WD~TA` z*RMn7K#k5&ku~EB=+A>YnrfNEVH|^HdCi8E&spgut5@~g%%u`x)1CR;X*_b+S0(h; zpTC|;Bzn(Hkvz!ZS-RQMs*VO zQAX7C8#~^I2e}E+Gu}gEWVZW37>KOE=$8D|I-D=Aq z+(;DF9JwykCI(ho1IvVLY()HIpPA@Nm4okZ>$=yk-ix96d}>BeODwcq@?ko)g0Z0U zkowpM&s$if=?){}V*+-dINes~&vR5kic>n&`hJTMhgE=q$-=1Sw-4GOM65_vuwc49lMv%S( z4+aqq$NYec2bU9qJLTZWGs6|T6aU+ZxEc}hasJ;mZ3V*!qWkk5IsdgQ=U(wVr@`od-$GElkG#L|-?`;EDp9!){(X$?MJjWA-zNQc z1Ty7`-thm_{T~X7i=#aMy8&Ch{L24-nJVe}={({8yG%0j`$;B`U4n~Yu{iTibU$YRWr$njhw%USH|L$JfU7=Yav*v#vgH#k06oX^_cdGg@Y&gNA z|JqI#%s@IM-CXwXK9B`VO2m=<_stKiwH$kL|Fr@1Buc>VCG3M>gYBZB;Ycdewn zyg!lfe}@r%ZDT{u#`C|HYFSbwThx|kfKF)KphdjCN>fugvVX0OpR(05>9G0%# zmwl~{fArm_o(4fJA2I}OCb!r$iZWfl>$bI8`>y;R6}!Dyi%H=&*3viZgR`?fUb3w^ zo&eLuzrHZKyH2QP4hrWl0@EFzDS))+*fK2zU zkn;uSm$I^$O8d=dQ;czC(7PD1B=B){spQnu9Ot|vMnGhv;b$N#4_u1gYPC8^S#nORGjX@7i68d1g$jA+eh`8iBeo_<;U<&v~z_uf&dRc zdwuSR{YzE zmu|-xLEsfw(Ni>8=xhenaeG{>!|%0i%w^eTTx6xNE%U&z-hS~9$@9O@Fkz$`MD=XBZ$J(u-t4%JhEx>8gF&TYH{4;T%Lr_PyBlI z`ErvwXa$7sD%;QM7&%?-yMsw6H|}T7n@T||SBL&HE_{m@i*f#?> zix%M;UMnm4s9&VCU{j7=3Q zp88u%yb){Yucj)IlM8B!^EN`E%N^=!Q+S)#3W)6TbMQG|Yzheh!$oC<#f!gJhlfq0 z1y#hgaX)gXYQ;ZwmzK}`Bt%*4x%y;@4v=G^D9ocb@EOE4FZB+ zYcrFQG&MB5G1e@`j$L@~-@hL)WCW>(qW0I*#(tzR{TjP!^-9(3s+ZXrkFF`{*qd;3 z=%hgT!L36bNaAtpYIOrj42}lB5-9@!xc(-_sZ;aks{fJqO8?8}H(UA3=?phE=7VyI z{mI|n4g4D!8pHm~Q8{>p_OGoP+wShDi0s#EynJrm6Z&2>8I&#I+b^m}IL|Vk{&w(M z>H5v(>3$Kxz4+F#)u`!c-@oH*wJnCG=`h#-_7f2u|9Mx!naGdP^JgbB^Bu2LGZ29+ zDVmGNKf4l&mU-KF8%0xKQGIjsIDLIgrPP$D1#a8alMVll=JVd;s?UFH#*bsu(l*W; zT({p)e`e<2`Z8ZB*0eKw>uvo_Ru|huT0-^rZ@v_x%P%b1pN@(dW4uR+V%9;`L#cH-x!$oe|xlh>X4mv z7bwr>Cjhydg~dMYN8w>VecyJOc=j8S14zt;ofU2;U}FnPMD$ZW=>)5iIOoQV*sS;1 zdk(eR92sgq^HtB%h%Qs8UOm&`zG1!E+vR=ZbvY`yBq(_OZO?**#=A@HMJe(u&Uh(Z z2u7mwXMMoi}UKd&F# zR)$!N{9Vg?zvlrX{7G62{><=Dhx0&3UJ{V2Fr+Jn6^P8<; zrQSDusbZzC8yjgms=Ajymxm_Ce-+y|X{nO;*-xv#mjMD`KX9<|k$yjVXT@&*l`nC*BQmhI~_>Qt8L zzPY-SJ}Y)j@xkMZI22a$yRR$ql3{Fg{r)=Ym-o;qIFPwczRO3QNU%%_sFHC+qU#=`RjE{l0yjy3a|^uC@FnveN(Wx0+*j6`|iDddtj>e?Nm9 z$FteP0GYd+g**5d9ew=_j#cVgr{5{YehtfhSIq7e%hgVo4vHktT_WFToLUC^uAGP6 z1cVv6Ov!jwxYle2EPth}cTaAzc%me7`*FL)8ZYg;L-vyQoMD_sWxJovDNVo8v07|v zC@~z`u$#*5a-@B6@N&&5h<-GZNwH#7b{(fiuQd>hq0>UYDaQn)LQxzkQBt(?olKHN^;^%rgB z7_IR+eQA8%Ocyi}s`T{wn(w8k8T9(%Y(CouEM5#sg_-_1luwM@{uC`H0c%0u999Hs zkWlR`ZYp-d*&~1bv8@s^Ja|X)Jk`POjjeu@-^~a2<=-hC*M(8o&4-`8{jXQUL=IbR zd&5af=W#R#H}Bky7I}jK?x0hVjoVjA;}Q|-ifOa20JHx8*KC>_yx76U3Y2%;AoPpvw{qZ2| zj~)Vovzq_fE~uZYKwvX{?}3-Z2NW%_*uBceM1SdGEE29#~>b^o@qw6YRCIb!^8!0r6m zV|Shr$_0)acbW|<1(&?E;|nHKgf2mBWm##(uKG%r_o2w%3Xb2+ z3y;B0-G8+&1#~_aD+}%Y8sv_V%`f$S*R@iZV&t`l-UfRS|IL;M_{6O9n)?fZbc9=D z_f&4rZUo(26~WlyFyU9^SKGgCr~Qxo03hLP)@q@-om{50q$E}3=Zox7V?DiJTWc>z zQh89?g3jz9xcK%fJ9qZ&ZdDn>zW*4#R4B9yUZvMybFg>l+LK;C`aDML?|Om!J$F|= zcj$|3XEx!z;EB(kx5I{uWMGuj}i-CCO0W?y{6_A4nc z9G{W@-&ARTN6U^IWSjV>{K>h8oqCpNWbiNU^;aU#Akt7o!~ctw13B0k3^f03FGVg$ zaf$z%++3^ipr00*_5Rx$gd0lR&%g*qb}&f%`p*X@np1ABeE+^$-L~T5U0rbP$GrD% zLSQ0NT3X)aoB6(bhVl5|3md^Yk`F~p6dS{-6=Ow{&R9s)#uFn5g0dD zRO4M}j>hZgAp2AZk2tSlsQ$4h700F3J(wAsaS%I)nGOnZe-$2pe`F{cWJ zVPh^9U$99`eIUXHzJGfh3ZQ^sI37NoX>uj6a`$4{VwXiEe77w!~pc@YU{K`l64rG4OL$}X$7GVhE@3|Oz@dNV1Q)!BYR!) zoZr^S@0Yp^z4aWQ3)c*HN-~WZF%U}2(MwktHkt>8)=NC)caD6JlQ^Drj^iJ3QD#<} z5MBkR(M9V({NkY0%FLGJvho-4Wn-FQ2T4rtMwHz5XsSEz~y%- zx|F#{l)=!{P@gx{)zeRIsqg)E^6`UGY9G~ko1pu5bg^Osu}uJI?IeAS%e|Z{Z$+5u z-MM!ws^Z^;johIs_kS?MW%JP7kaz-n?xRP{IDPoML5|P>tS=BVir_i=VXT}Z1q9wJ zY&Dz`f&iE*VJ>V2@|qagB8R7m6%|N%M;w4luwt78EfOnXn*@k!O31=^0S*97XD|MY zP=#9j#TOt>oY{m2=>k9jh>t`yN_Agc1eY}qz)JnJ0iiPk-oG=%>Abe$R5VGTGY9Gb z81_Vv4*4sB@P%A9(h}ZYP9SO*hWia}f*%>rF?JmDKpc|iRQs|L4gFq`@5>e>##7_So9(9<*XHSm;r!T4ck}bN5%%aq7bSVlaE$irmSwU$$TBQE7b^5iVZnCE4MzIRT zO1AREB+=rwBWP#SmgDHM)TKZTA)%O55D1jS5<-WW0ZA#fE{59VeU^2)iM7&!%G}Gf z^G`sSbl^aNOCtw6MU;Ge@3hWlTQlMMBc;K}els^^#&~Hq8Hg$R()DOi5ZY7A5!Ms; zEOuF6mTkJ|*dr5WRyPYrUE`BUdf;44QHGjM@JGbHy38sg`KX*Q!W8pF8B~ArRpnGi z)z13nQgBi;k($uHOmFEg8kd3~gNh)8CYH`GECz6c7A9~FsTT*$iJMP|B4V_Gz@R`Z_%#7aHqBV;;VUP; zC@c&>hl)i$h3G(GviuaXyiDm6dAO$C`V1&lxDGkMXbFd=Nl(BNE+7P0a&Y*rs%Jo~ zjBos7oNuf>5Jiy0)ZMA{oS{2)N7zK_?Tj*xX&-U>mtTW9Yk_a4dH@92W4&`LfcNg= zGxK~^0*Z%t+lMMlY+2axH5({H-e5O5#BAPlL@5DnXrXS2f zuy7hq@Ym(XjPb;S^Zva0_KN%TiD@4aChg_Hw@0bGrUrC6r1TH&z910pZKeGOp^JHd z$}AhbFdpP*SVhwJ9=NC}fLBuLf%f1ai+E~iFQ3dg_yf;_>AEQ79Txt|agmxrsf8KC zF^UIMWUUuU3&jU(>1{ghw2qX7z`CU^(G0;H6XE@4adHSocKzfHbF5&IbWKYon{8mZ0+~c|c-9%j|PYyZ9UFcn}F*99nTN6bR&Eq}+b~Ac$pwmSohPpKbMrTC8tOPzfn!o`7 zt1gvx+Vz8aC>Fqq^VPgfA#KPkkscs?)#S2hP7c6SfhaP~?s&5uC@Vl`sdwC5N}cF* zY{jD#`>`|`YY5jwoDJ?Yh~$W3u+PIvcuY(gYu?9-g22s~r%<65JiP!bfF}v7ndQJa zrtapj+_HS8LWyG%t{w{iB0veNf#O1W@RL>6oTAi$&{RAVHTgcBcupL+6dJoBwKM}< z5DQR~=IjhFCC;!2vM>XnP>v7jpfd7eK67X@wIGQK;7m+o>7E0fXJ<^f1FkIBHQ3z@tMG+tHFIU%Nt-OBEA@4{q1qcZLX!S`HDhp&MA}zGD*v|GKsugd zVoR--5eO!rCwnAP^qByHiilN3zSaX33W$toAvY;xPG~Ayji}p4V9a!*ibP7kH?a%% zBltLxc8pZ`n%GfT*htpidyTUNzIkh6_|REODQQa`92*{X_$wOTgjau~NpbBp-|K@U z=UFEDAhc@YO6tzB>Rl{sOefbnW)U2xoX0(I9@$}4)dqGs^=1M?$((`S99B!@4{ULh zZDu+}H70Q~hbU%L1gqM+KwJn`{t#NP>^&VCi#{|qsIz=F4?h^0008eO8<4s2kNHBe zuw+*fEzn8fBb@|rM%hx*$Wks!QzNz+NJ;z$tX^}9;s8*koe7I#eXQs~4$)#lD@D;$ z!URK+QjMet(xtmHa$419Jm0^$;aYOwlSxT4WBfXh84{N!j#6O6EM8U)L1h+m1B4YDsi&n3B_ z*i&)B+QKsxJ5GN?L^HeZ^D3@>)p0e7N9|3zHN42$jYreDg?o_Kt<|T3(?Cf-nMt1P z@bq_gSy`%dqztOa)KL-gk3hi%3QYtIrxWst?8z0fR0s|>v)7rzS{6=Jx3HzY(exRwc6SABG6Rg zfqDjpcdCI^j#_@PC1_r2Tzs_pBZZl zf2~8>Mh|9_#Gj@>Tn$Hp8Vr+8aY4#M$J97FUdi5r93|{fFw%kIq*Cy4nn2YO#+##= z00d8Ha}NcM8M#YcPmx(45iSKroYE4Ch1VMZz?u0tdf}+VZyrkVfedMCz1+As*o2{d zN_TmJhvjf7P0c1sLIOcl9h?q7xet1eRVGo7pQ@V-E0zrp*XLCr2O-6ym&lx&rzm{p zRJGmIZO)%#>dIlT|G=la2JA(P#WT4`xhV$ois)kp{u2t zbVbmdS!xW8HZoQhaYVc+dVSTR;-Er*QSGb3)XDC_i96R@iIms&KLtXptwe}<*| z(`EuDDq`K_4VP9A4bDMH2!C78hTA;`9?XeOVvO2FYpTJ>ZUv>8RmT7CI(j;sYGHf5icXsFzt|4Dp5Fb&WvL85~tDGC>+ zYWR$Y_OW@2yz3D5w~P0>ATD=p=IE&e5xoJdL)eyjLuLW71TcAm%q<_{1vY6;T&O8D z_6Wr=RDwm(&?4GOpXNjZ@59{=$d4m-$CFB>YBjG5{2}m8xR9JL6heT5D}o&yiw8-2 z<>tkKlg5JslY%IrQ5>_-Ayy``E?jg8vD~JF!Ycd_RN@0D@xZ5uGL6B408&S*H;Kn% z)Z(2=3g(oM+HQOk$^czJ_^<;2%wWYsz|?9UJ|Bu%4i}yZm?l3X#mPyP(}_oy^a1*i z=6AtZIJC0wU`UQxyF_00k$|H=rC8x=_~KaisyUR*5p0%;JiQl4G(#_36?`6mBFw6G zLN-uGxCrf@LPp^!o3Q$_(-6YCO1k<@i^Ej?1q5)BBZ%ngWR-fAY(WVFHk_1zRMKwW zVv)6}`QQS17FWhY?%(Zby<}^XJ(c?uhONKhsHHn3_;YW{-VbUKr%XoXISR5B^3NQ& zw;0GDC-Ms)t6|5jyBTMEEFlhKY!Dmto+z^ZTKkXyuR^>nGcL_eASLwEVGPgrwfL$E zWwkeDWz08B*W3?&q!%>^2+{}h*4DP*;gg~0mi$?Qdl^=fH!ZyzNb$um3-R4W= z=uat#)7o=|r*@>05mNPT9byN+O9hBfXtD=`?55~}+K=TnhHonJ%G|>Egy`0KnElRU zZKC=!^wO!K6cjWJzZN0<3Jp|Dn&BP)g4GWn-nkk3<6uYSEd)xPQ;Yh)FWKeTYSmsyP&OA;Qa zjaLj+yQ`Ov26swZWo1ZYeVh-6!Jz555IUP6yoEHo@zg+z;Obtoz+9RNIU~S=gLFRq z0w)&QBLUGF|JurizVn)a)~!pp+g6aX8=wz{VB7E{Px@y_UpYP!L;+}eaVY$OUJ>mJ zNGyV}GaxQlqALKLTBat_qf1QH2YYdGl3}uB5`_2!JQz9~Y>RL#_%}FnKsZ?W0S%X= z!iRF0A-IwP3wOlNBox^(1?T95gVG%iXBNuP)%kpruSZ&8>82k;E?$0@a5@YeFNj{0!rA*%@QGdciesAs2q!z1 ziAPwc;}fub&&6l$3&zF9;&K7|0rJAAi45;gs2bwYu;i`ZMQ6@z7B%1$=pQ)v?KTNP zlo;SxuErbCZ{NhC->pCRM3;k#KHiS1)n=mkUdViHfwYS%f^2nztzpmYPFF^Ovn=G; ziA*w_I%TrAIns4ObO@|{U8LvQ=ZJxI<>aqb`bi|09b(ngx;KI2+*Zy$dh2u?X|R`!vea$R4{}^azu7B zTSE9I%uKU))Fr-qJkVqK!b~3&HxP>l2TCe&-VeIHr!STI%JP@Vs}`~<9jt5yYaOr( z1z_EVG0JFVp53jR6)taeQ*z;JQ0b;N?c~t!1LztIUGM&%0RUwE~65wj6e`Xf_Yj8t}!TS8O#dj z5wAr95b!M{hgm@A(GWVu;I!!QU|4rNF68(HG=LRH8itI*Fb0suo96%kG!RFhQUIZ7 zZj})aM;&``n2Im2vxzH+edFf@3q{NCgGo$rN$VYGf+5+5i-*0W2AZe!CisJDWUOr! z>!ibbw)vI$gf3R5^H>QnPsyRUIQzuKQDBZtH$q`OcwjKEzM+MZacs}c?`3?&6u)x3 zg{0h5avN*=w=JSRopBF$K_07%JIE?a3tfHNrg8tV!{a6n8OGJ`$rQr})l3ghuRYl! z^XBXZBy?fTHUMjjnNFM>&Kql%z|q669BfWV?h+tp)`)f6hP#jf%Sxk9@^ki})K$B@@08t08^s*P{pr`b@=5_QReTKhv7LzJRE;uG=tFre zU{$>B5q)A@Tua+FK7If^=VPtJooJedJ8AJA*M1f-fqFIb-Z%uKJictHy;|!Nr%re> zpx7I!kCq?_A;p$uqU7mJw#QOoizP3DVx`s=sV>$+@e7Licst2p1Q|{VJW#mvsBEOD zmEyiq!ygy6{&=Pwcj25vx@rU^U#QYMER6h`wG|dVgfGv;M%5-aiwh5{P+B55fV2tD z$Tm?W;=pK@TyUhXd^vffT)s8dU8_`Lp^J|S2ZGE|s%FGoaezFW&RW4t=eUhVM;iv3YJS$&#qFQ;1BDuPM0lvQsf;{`W9h5uzFS~$GYX%V#p;} zNP)0SW|H~~mU-i+dN0$xou=zEf-A||0L`|bfY#rW9OvUr;8gmshp}*~UOaScS+sXo z-z`vio|70VN$;<3E1_0{koN()dcxut&7bR-qAh-IGO@4jgt6l`Qqz# zJZuwoknq z=NF1Qbff&ksz?|iJ|7s)SVv#M)!!)l6dC-Yl!!Ew^EH>hN1@RCLH+cFLRElnGMK)Y zUmO1VRkkfbIfAaf{z<)akANFKr1MeO9DtN!fny~%%Y>Au$1t?AL)Gx(8`I1Q&@TwF zK*Q@XbG+awUwkT_oNVnJ6ChB?916!704LLRO4V?n8**&II-?XUs&KuSX|~0RG43^D z$4_K%A$6f?vGc-%ivLg(kB5pY(?JG#JDGzru*}G-B?ZJZf!}Pzwal(@7i`)RtQ$?~ zc9l@N2sLruIE$@HAz|tso&H{OTnHG}da!H_**msjp?se6J$Oj-NO6i%|DDpb0r60xr^zhf`MTO1;Bl=k! zjDxjhvl-OX2DDWmn7*>E*JY!iUK6BH7N{b(-g>K=eWyh*KX&KG96;)u?#$nSFU+%r z@RZd@%}MgkPt&QW46}6J9?&{)ijl_DCRwypG)(Ouzr6$Pa0oSZ3@K)fv~<7l{R{$i zRE)q3(`2oxS)P2@^PW`uxtP7Yj+V-u=g(K(%YSBx&7%hrO>$^Znc#n@{x-g{rrJmV z{Z$NQO)(k{!(KGE^&NxrGmXU+@JQ#l3)bKHxm(1w`~h2bh}W7UIy?v|5z+gCMtSGC z8CHODgXFpGyd8E<#ZH3JJ9vi>I*pGTTSYC|{kacP0=h!jVXW0`{c_-n1S z+nECqJvm_rLtORZ!B(y)`d8S}_;?V{v4_DY?J>p$g?mwbKaQKhWJQ~(5Kh2+I81Wk zB`E6!8AWZ2KI#02xx1~E)>P-E>IxvluyAtY?Lh62NQXR2a9rv^=RQ)U_}*%CScXg5 zTXwB7v|=PDZPVAb>jkrfEeUrcDs9PQkB4L$l&vSV3Ehd*iSbg&=9GS`3j)x@`dbE*?L2K6 zHc1-&a2lo7R|FPntMrIx6q3WGgL^%rjXK6S7AA4@u&)y44{imD;SKT|*pD8dG$cFq z5GlO^(;D+P;JQu@J@&AvY-(WmxOW9WK+q>}Ls&hl25Q^W@acjO5$-l>3dShs9D9Gk zQsgB|sZjiJbB0I}SaD1>4Q`GLhr2W|pDw(vRDlCc18<7xMf!n80$i-~qVu1-i|rF( zFnkP5Hj?3YiyaXBGJBQA1u&uMY7-AP*G(=fJJtcGMCTr#imV-vyDa!I(rS~h`N0*9 zxtr%5RTVkaa1`k5PyC|zUcGGBNmFxPFP#SinvnrvvCJ54{$YDvW)zzD``je!U~PX! za^}QfUrk;~k#&K>?{zDCZuR>z$%u4E;o~Uf&FZxf8sZn@$x|CfOrlL7NLgT5K83@& zZWaI|S`Ggv*Iwo9>>$XVoLu-J@pI__avU1>O$VK(WLSJc%HgROss@gb)qW_W78G~} z5=R->DJd!C+3zva1cl6hHj8t#bxzoNh}|ywz%7Y} z0AE(wQWa57pf)gDX_?RIvzRNHg0%}N-dFZ+V>Q~UPCgzy_@-N%u=FX~v2y>@V7r)M zWK+wFZ`C^Ctx&!n7QbPJX$-zl zg?7dKVEf4*#z#ij$gXfcas2u5`7ZwajR9@VL0pRdr?AqHHe*)@lMIZ@8QCO{HgTbq z`NiBEc3=RjrrlW>lJ)V4qs#$JuTz>@JQzepTgzPT^F`i(N@mVNElpoEwUN)E1xlov3NIdrOfXP?589$qIqKa=TVfv3J>w8EH1m^WMI%u1cGgxsC5V6 zcxPfFJsWY3E)2$J`lW+N!ab3&;jv5yAf}~NdZs@K8V;T~EH2j2oVR9>?_G->ugP5u zYP``hG??+#@<7uCH`Z;phqkHAS_IHZYx=5C^(dZ5SkYu8sC`jcq1|q;->E!mES?*_FGuwz9`C{~rXYk!z&}6!`F&s} zQ!9Y{#j#dK3cn^(lf!{!5wVDR696=^c|Kb*e611Li;Cx9zp+3s$|A9Qg317C*T*~w z@{J$fh+DF$EKWK}6?bnXJ+m09jYXXMd3@ggljHvU=VyKACZ}Yb80~qPO$Yg3b@tib zAD#H#^mJ-F&-;(Yz{Jn(8bocvxoX)cngyEqMY{EqNH~ttdd2fO8ouWN`{KDMzY}DAKLoUm00ncivWe=#X2+ z`Cuk%Nj-+DB#JS8`PT92kf{94M`}1qAfr+L=K?caDM}MxN7{2UffiW;G~)}%*gmWbhGPPumSME&QE8cm$?MBB4(-}vrGoLhR-M<_PV*X>$Z zb@Y6V;h82aK|Y^UK9u<>+X`k5&+gdDUiUR-F+I_duvC#|ngE z=?lw1;Mju-U*Gla83berulc&@xQTjB6T-xK2_HMvuFndh@cZY_M^46aMyet(Mc4%Yq7wrx7ODWx{oO!{-oGAW3_4SZT24a0}B z=0kA!1Rh9DwKLAz_Qg(eXUJ7n_UHAUkte(;)7$CZEO4rtjjq`#vP|25DiPy)@|tA+ z;{!Swx|;QGY^P^qf(z@2h^msoiN$&g$i>_|oD>%htM;p9a1EE^^3Zj_)cPjGqWSHlB`hR*?UZJsc7F^2TkM_6XzXNlCrSYzvHYQ;otSE+a3w6^b#p%mYG zdk+g{P<}4R^1X}KIz2gosie8-0ETT=*`H9AIaUwX@g z{~VPPPm`gijl2IYfZC*P;L7bO9JRuCDIiEZ|7|m;;(Ikw@#gn8_9^|rIa%>biupFWeu)Q6^~h zD7jzEYGo132e9+K?ku9|~PM=q;{mT2M`NHH|LGiBtmi6+4~Gwviu~@n znpg3;Nk6=A@1AcN%T(rvRvOet*2ka@BBL!K%yA>!dMM^0YcPBWcP~3vMyBCL092y*gyB2r&azF3-{!WrJGi$PD z&75=XeHmvf(WfhIpkVcPWiJj-eMwVG*cecZo7!-oo-gh2;%W5qFxfL!OMa1^VExx; zY1M(>+i=S|EC7&t+FW0k+`K?32p$K5D;xJdOw86u<|fw+E>}>tO=p?d!`}Js&)Sc^ zsp&sM;C(l!$hk)xk3Oy#ruJPKM^sQ&d`95p&kTyempudA`Ims?(ZL8dB;5-U%5pJL zo--P<@4yAv#)W)n*j|p&Xw70tW$-F{llcR4O2L|1t|2FTNB6G&T@vu>3|>9( zHhCSoy^%lOlFj!J9wW4||AHGV*fZRi!M4`f&isNI`>S*7dru-srZ-U`y@$SVmRpDFOc)toO!?qm~x$YLxZ1?cbKkP8iE)86MR&Z*G$nWOu_(S!Xu`ezkyqQr|CuZN3-tQIa$+1>r2)-M?I%G$vcyB! zEIM_1INLTTpB&m|%#JZ~IykT3JMLV#N=luC;fvUvd}5%CIXF$ROche&+dVCo{=jLB zWKnQ}ed&2uP=#ulsSq zUn3bA-^FL+|EMy|&J-!#(^^@S#@aaHuKI}Mdy;q}ZH@{6{3BXgtRib&38W|h-Jv%@ zj`r}CAT^8Wg{7tNJ#faBzh&)vg~wkKnn)t7mw?5`It@l}xG#GIxPxo{ef3~RIW%Up zf=4a#Hr|kJ{A9xq3%%`4rb}R5*&@x{-o-pkebDYpM-`R#0!FGxXc0^S-Zg)8+=Z9N zieSNP(?Ul*lwIuqOCbXQkicyxbANB49!VZ#?l=(O@ewKwe4_XXMxuYQALg>X>m?71 zg@sWiOe8R6XgHDT2hMXns$IPHL2GzFb?RHith+!w zmd~waNsQIN*LY7qKjP*T_cCr^9W_Af@*y!F^CAs%kOE}h1!6!a(DSv>b8In`mQ{Xddk4 zg66)SQPo6mCA;6DcA`q?0J&5&Yg6d&=)g}X$c3o2J1XRhxtT^U2WzyoG|g*dA;tTF zHkWB?dcCi&^!~PbVi4ez)z@=JIB_T)#Dw>kBI z43Y{4%+nAx=LE+%=;>(G`2%JI1?@)MnpAU?KuKhG6cIiO02MQ=H4Uf6fXfDnI86G>XCDI|060`mOO|e3Nc}W1GU&57Pul%^AS8EXR;8JoI z5hKYTM<-!6(ZxsSekw(<`1&~b-!o9sr{vw~BGDlM9azZN1j(YB|5t7~)8~7&l{qcX z1i}yFQBm4)5djhru_}0n+-M9(MXye>kbQ+ zf}EUhLlj!?x8i%=B1sa&?DqL>Ty5e@2G(>c=4(P;R8!4U2t+fLP|A$>5c%rxH`r81eOtjzgwK?#fsj>wvr(E z1_h>ozLao9f(t^0I%Ru0Z}(v2m7SZXLJzf+Z)+t5i_zpZu>lV=)rWqk>LJl%<^K`S z$ec*wJP#{F^MB++KoAhSp~)Q1@jvtg2}T$M05F13Mwl=-Es%RaMFCKC1)Fy1_Wh6V z26&LSsPu|Uo5uZzQ~&_L>~P9~fDnrR(dI~Be!~kq3UE7RRSNHa1UPE6Wg2KW?%)5= zasU9co0yDueJ1HEYx(~jM>dhL9bY4^=Krzd$io7~T9%ja)_jinztL%zmbZH`i$NU! zyEOtpmc~^i!}0`ZF9MOD0|00YWs$la|HGjvsDdTCsd$T-Kl}d2Z=i&6hW3~0BJZ$N zs~o0jy@8|zl>hsYOBYi=0YlF%>wiZF5D&P}#Z?ME+)w&%2d3_UoS`-H|0BUs@xkBt zk)=D+6Y6Rq0{@-e(?2R%ioK9H#t)BYIO7p}W?NRs(QopkfUMuK6pdqcAl&0b5@rAG zvJ1rSw~7_{3wjoVC_)7&X7_xf;f7N9TOGjF)Q;44Dm0n{;mA+p{EyoH#0qsa9XzA70k;dnA zU{!Q7I>4$KH#g>8W~x!B0r5TarFD-_8HpgqRU|ke!X9}##Zxu9MB0*Nl z4kSDGKtRfA;T0>;WoCyK#-t$?A~CJ%R$ox@>_=z{jVfjMG+b|s9YEhC=fK5q8QjZ; z3s}t;)Q1D#4{0KGmCCZ3yq~1gcH9TY(JeB(?CMhcZF68!0@{@&Ci z6UzwQd5uCfJx{>xVEiSp>^`58WpX*G21_y_NJxEC2jx&JpJxpy8K4S7pbh zp;v&AIBQsjdon)=9leW`P=uOfY+vv2EZ2o~t1FA1WsCyY+y4ava+RbSpY^q6>PsA7 z!pU&S!fv>(qP?(|(bru^QF`TP$=L-u(lzTD|#` z_-Df%`ru+xF~|Cl?fZ||UKvc3m&~hmS7LnE zjGgJv8Y-H?pZGot=mO@$Bt&|Kdxfi)n)6!qn12`YE$<`Q6b?^kUl| z=EL6kKD~+(HG&_Kadz|^%$XPfq|vn}I#aI8lEn<&$q8jX9PMD-mro1w0h4%Q`jn%( zpAR*FSd^Vh5B*@dcfNNBnJBWL9V7K^S0?&g+>FJnyVE6P8=xT}TsDSm%ds{z=#jpE zEYsbuY5m*npP}8t+gGAjOFfpZmV^vCck5C9*YPHu7f*~?toolWWw`98Qp}R2S_Y1O z=s!s&I(h&ALQ|HXc31^CgJLFSaVjE}mbQZpp$c32yyvIKryLpc-J+Kylt};q# z*j5$G`Khy{l>TF}bfB1oR*|@&=kY~tGNq4`jM?E-NkL?4wTnJ?Gu0pP=sBm0N_N4&7=Vk&^L^xKtA zkEb&!to3tiHknn3IgMf*9dhA{N*P^)2nnf0C8C1^oV%ps=oE;64li_p&eW)2h9aBN zE9po20#&2YB$YOoQASz-tGE1p=s42WvRr!>7htfC%K^hgK@-QMM#rS43D3>HEr=c^ zyK-OX00%^3NW{@;bYb$N?J|=AvX8kg=9pp=H*<{SXfhJQrQOcuFJX^i3;K&TO-BV7 zTb3cW5>;^#Q%4B>sK}Q|#KgfO6HXqpp+}>+3^V{bPwZgA^Gu)pqwl;HHvv6h;TTEK z24b2J3l-)(s+K^fK$ilfp00Hr{i45A_2MG_n7oA^3C#7mrR+GBWU7-RWTOw@mw7;4E2 zzM7?{KtYL}`m>BN&RWS*;&7tZv475=2iyA6v)5^1#pY!3o*;Ku#w>8GX2U7r6ORxPtdvyt?-T}rOYby8_ek-3TlUm@K1U^)kGvLj{A?yXC2%ddrTSO^R0 z86T7oQmwAftUpW#Hxi-Byoo$DjH@~v=1??;@@Av=5tMTX4bholWdk*yDax>iF9ZN; zVZxvL48%)*oeZ?!1@V>o>lFV~EzC!IycneHRO_8Go8S|Fzzc9DTMByFcsw`na@71O z_?PrPuU&Mrbh=Gmk;gQgev zGln~!A1tK+7rIJTFbgV7>8>R=5EY&2q+(;kffIE}MKsBh!?-UAz8quBJB3{>Y@#<9 z!fb(7W*-I?YNc@!-t1s~E@VDV02ETpN``Pb#+76H%>l$@!oz_SCQhMpr_j4M9Z}a9}(r(!&w-=q+@YDLJtXsJWv1Jf4OaubP4MfXu;a`Q_ z6NgCC+62W{#^l#OfCC`5iXYOO(H(#}vNLqidzey{H`|bV9J+wZ@ka~$A`OlAdr5l~ zZu3EPC+@U!&&w=i_){<#(fyIK>BO7?B~zIIRjQ-!M7~gF3O>L)>wf&GqJ$HE;^Ll;X#&41uhhf1=?_owDR{X_;Sso}g`v^; z%$~h#zXQJ0r!AOOfOT8n za@AbuC6BWTq~`Z;jy)aDn_~mJyR;HI8io0IM%p+nU9Ef#S@Z;vT5ovLkA{IXp_VG! zY{okO;pB81d|nuLN2FrI(?n8*cKRzh+_#ZOCN)1!x-;6E8s;t0lzfpl)w#yH)GH>P zmWVr@H{$i@b5ByL8kyynRa9X!tojX}D}fo_2emm*z2_AaWuJBYTZ$A$oyi#8?Usza zb9v~)B5{`T?T7a4QKb{O2HdRBFb2c!Bsm0{!bTVKC#h!g+Yu>qE*sVR!83jIdA15QIx*Cl!OzaQMKt1S^$WuF_c z(L!-q-CWE4&0RCzk_)o3*R*@7l@V^=C;z^hQDP}wyd0CV@3|}u&fDWKvbX00 zxD6|h)9hjfEyosg<}Dmfm*$H*VpsnN-&HKvd+sradi?se+#yN+SBbZ;KYKf?bUBB%|FA_E8DjC<@u1Y`yQO8$z{1sF?HkObgb?ZVvy!ppM4TB)N3|A* z6tV!6WWzKaZLTn#-;JetPWuVeo_&AR)o!bYP|X)-3fI@9Bvl__<9uw74h7yl^)pkqn z;SKH93`Hz_HejYOoYJUsJ?OYwt^Oi9@>9N#=o7_fjljdV9DVM&+u{d|5B`OG+y!YR9Qbw?}qG@8p(HaoLd@WuJIPR;+f-Q$zF9A8DrLj4!3BL5}g_&aL& zcY&5?4oLe!=-T|um9AjMpkSnuaEFkQ{-d2pwql`>M zhQ09VJ%*B~Uh@MLh4)~{8jL;jCML|-pz#b|YSb}A3V$ys=6TS2%RW-3AqQnV^1J1; zuUe=d7c#5A@7wA0y!%@>%1bDuh0y1!$20jg&v@Y)DTB`yY>(a0 zHCiE8pL%AvSAJoIfAgaQjmxx36A|P0Wn_z7%Hz>sj(L_(eNp!a8S9sqfZ|b9nH=E| z-YMBINaVXC%%7l57dq*KKV$kfQ-}U3{8PTQ`*r&ZZ<$vjibS0KJnC9DFGJem6V2r; z4zBE%#IcV%=zvNYuE2v{6AJ#MyH^zH0*w{7>x-lGFMFk4{Lvuf+}Fi-u5Ify+)>VG z+qZgD!A_00*|wiNdF++ju*tgZZyyv}$mk%&MokQD)P&`cy>OV$S-p(!)V} zXWBV=nH$l0`RHDjl-Yce-1(t`8qW4M{>E&wPxj;G)qzxrTd(ZMx>V)!lk4{QPRETc z*L|KpX_#`a6Nm~I>KNU3aXPL^d*XeUX>)d%rv9wA)ytp;dQVA{{BD48{hs#+f-{?= zElVxE?P~sMr1n*X-vMKc&d>G(0+ZpL@yDn5zt7D!;je_cP=+JvsL-KkuQ@j438*KV ze@xCu*=@GxxJYh^3%L2fOVje+5-kZ;*BTOe({1P~PZMn>bM2wSFn?`+jvp4&FBtRr z)-PuK{?PDZAueWC?a9qdr{QGZsxz&!H*Blc;z9~t(iHyme#J|msewhm zXsOAQ5qbWbGm3>+Bj~L)Zt}T}J%8tMP(%6%z`4YsyyG%{s?*7Iu=l#Uero$%na=D^ znR5NGV{q+Cx$Ne#`B)|5C*`=_b*3}ZFm~HpO7^1In?$T7U#9&$ncZ;aIL#HYo2T^B zpIWuk+sBciGz!%LOyu7IRbhPH1CVyhyW@HHBL;CXweJl(AB_^#?P&fw@ypj6LM`UM zwPyX}-NV6Ip@P`WKRLpmm%}78<&O^@h{~rXk?TGqbJ}!KPygEiZ_>>-@C%h?4mzGABIrA#MU;3Zg=yk4XGWpS_&wuhpu?-pqp5@oArGl zF&2IQOMXyBsyAr5un(hdKu*m6&fryhQ(5LntKV6IW5_8TrD(o~xL@zGY}W|ahhazC zMK{|p$3HD%j@*{f?bj{tlu*+7QyHVrP9?ci;ULF!J!Ye1rOGzn1&)#0q^-H=pwxK} zhsT2x`|sa=sPv_)eQY{Vcy_IOX|WJTiXh<0Iehqg(?M}>-VcZ2pV^FjA+MH>cOA%c z9OHaLpKrhxQs`nRx)*pYYSQq1RPI_0yMBi8<+#tc?zF_RnUT&TG8Cb_o#haLok*P- z*S0NnWt`HMdE0M7c18}<7g2@H1XwGpkq(xp5gC^l+{Ybe(sSa=Tqex{4fM)i^$NE* zScl5bnKC@@`+TO7UWcht8ZE7C=_;$!L8^m~5-g=JC#IO|s@`sly0{%1Kg^u%FUWgy z&7_T_kj6WGFEUt=oHgOJ{zk2m;<>`a&W6;1+pbc$E8{pUekJFZva9fzyD_ynx;lCt zf|K(pOGnvO?{ShP3f?4ge}lIZMu9*FNc<9d#pbi#+q<)JTJ_5J0JVt6?rgbiVM&ob z8g)*b2&uo2MP7!Rc)BR}K=X#0xq zal29Zx0_9GHg;EiK?2VmqeJ`AzRUU_$e{jwqxoW^3MtiUN_h4J%$FifZMcHoROs(o zrl{vWg!5RM{E~%~>&3}@@+}Ne$Nt_O9_rz7wZ&)ToSCMwuvS~+iInbgvqO1(=~U>> zhZPlNv0h%e;-)#@%k(O4PE8WCkodHgh!P*k7YMGC4v{ksBmoy@_S<}5o2Nnj7BHUt z`e*ey*96tyR#)ikLBEAfvJ(dWIz;mrK(Iuwn*)FxvL#YTPgJQQLA3B3 zfpqIM!yCR<fAOP^k4B zaB(8f2pSBong-|u>UPu(WM7|SgYv+GzHHKn$APiT^HKX{cQ|D7aT79s-TIFYwT}Xx z-MyZZSTM~#VnfFNePkDvCD9T9nMcR4DBGXbmILM`NeMVeY~qiWIn4SsAHzo(=}R{L zRLcKYiYKXT-dgi->(83kCbaU_@on*X)R0lMUDWi?b?yp(uw5_%VDdZL4!bcSS2O5Y z<|pSpYYTegum=)Tuxc=)c^U?CPw&#Sl}KikC>01^uXmvY2qidk`xbvq|G2SZ|8N|# zD4SHOT1x*}$bZdmQ!+vD&E@Clj$^*_72oR$9e>a9dMdsTVVdb-_hmLDc0w~>S{-}O z`d`*6s2KyS)+-qIg%-)k1iA3vP^H`2e;c=x|b&)Hgpl~d@z54y_Tea7uIlJvx ztF}d|Al@q%ZFZw}GfU|tvhP<7ly(#xf?2eR%v9AXi?twG=qK1~hwqDX2H)&-JGjj} z9ePV+cqv6t(ux_bXA03z|3%)Kkc;j!Q9>{_`IDAwEz@~+3fxWZE{|x>;1$f+Qy-Pd z$6`L{H+I~8``j39FN%zbzhX&b0=Tsje{&W%#M|jl_FKv&zAD2tXYo8!AJup|V%#wn z=(4tp7Q)nc0V#5`j~TfM^Y{OE2HqH0RE7jNr#k}B#VNv2B}bHbK7N$LwSQI@%c5&N z+%VYhe?Sthqi&$0k;0K9cZ&2*i>9NGmG`wd+}lIfoI@ysey2BaYC4rR=DQA;%R%Ys zk+Lc&MB#_R#*6!u+?YkUNd3L#h-%@M1j!rO&lP%d10$5dam?wQ_|euoudt2`42&8c z0C4neby;*OU5%PlYyazlM1|21GahYkL;bfTDs5*uI~^5=y8ajcCe3-y#Y%XDu?1RM z-s^47aO5PQNkX@v2?7B1$l*|Y_K&6hr*-sLO*jILUp9JBAEQ(blImoF9um(+z?5cYLJJCs%Zd$n3cffJy zNoU1pZ_+*qg&%)wsz!PE>xiSggk$UX(bfhYjfkeB(lVjou*+-n0c71C>oD)00Pjl< z7&dm#4SD4{gd2z`c#CM?tD80Uw_l6&4OAe(pGjNsekx(iO6T)eK}-y8oC}tk_*~87 zjXLQuWqTkflMRS1M=Lxq^qSVeWNt3(0*XkGY z*}rk<4UIAJUK_=W_}5&rF^q^*A`D=mWmG*av@!NSE-A|LcD}8|ylM&V__^RuxQc5- zNz%~wWa+sDhc)Z*GwIH4#lI%7RL}x*+qbIfpHDQ*nmp&}d@h^@XM=yb@P6DYOnowU z-Wf^r9KCkKia&1sax+tO(sAX@P9AbLY0hZuj4Y{Qv~RJPnSO5R?(i9-{{knX@2=^K zJP(!T6}|7uJ87WFqKVAR{&e3>=)TN<-|FwzTH_&U=`ly2N60Sh@M!t`AXxU>2RiH$ z9{w72OaPNjrYFsRGlg?Iolhl0*lJC|kn8LE&smdb(dXsFx~lu8*$&*8wg;bjv+X{G zc*f|?``d9iSdJk)9qVLQ=$PzXy7x6t@)HmoH85+MUjQ@Rp=Y?W;B*7W1c#Yt<}|wL_ujt^Th< z9e3?9V)F|Yjar>|$R({J6Ssqk=bbu{(P&|(%PZ_SDfVWj%&p}OP`Y?oxL4RyfW&7sB_(;yI315GPiU4`BbxWAa z)inEW=NX8_5>KJ(s)cLGm>OgmlA4kND zpR1}GaMSobheDE7_L?r*W{n)DwbhPCJHO6IchdYR?Lr|=Bs%uG>dxwDQ^P4u5qL4y z_VDBniq&<1BM0+`|6F;xT(@{GX;S&1FL1q}m%RLMieV3CFi@5>8UcX5ZNB;abQVg| z={h*=TncrpV^m9XJqo@m5K9+1i1YXPdJvwz15vk)Qqc1jNjrp3XSBK!z3Ib9q1AOSV7SU=mJSoA!`mA(^?9qjTz~9{b0<-%xSzZ z>iL4iScOd)8Js1oGV`wn2xmdI5QokHPW^cY0SVzgo~m>U4li2c?` zn^xVji;w=BK#4xy8u6M)t*Z=kPC?q7G+xQhe}ZM9brcBb$ql&B;yS>jjCqgLj+QG6 zRv3s|sCBV8M%Pe8G5q-DgOb(9nvRwY9e-g(&H+Q0;C-!R0A|b{%%w85waU$44l6#+ zR-;w6w^!o=s;?16H+#Op4( zEt0*}_ex7(a*2}9(qw{#aGRfqY6lkCwSTDWq;THG^I8BhDJ`txvnD)fdk}7r(EQ-n ziQOuJl5tfY!Qo^JBb6t}hbQGnPW`dKOGlH`y}Hqs;}eLbx1fVF>=<3XiM8Yh8xRL@ z!(K}mju+Oxz@U5CYup1WNZ1zMKmnS~mk(BNy0RF?G%(ugP_1fLTM8Q8(?kT9yL`-) zs9k*b@8%o~t9<3(q?+cuNc2+xfp}*{4xpCAR1XDOK{fH2W|^ra;;COp6}mEfH?EQd z?F3ZQVVf2#=8|?riXFyx59Y)7AoL!OD9OrQ3T`f6$=N)mBogNuN0ClskOxC*J^E-B z7Ss_In=3z}+~8g)fK>5$w%h&WKh;gn+4jURat8z!f1jtl|4#N6Y|f6mhqXR@PJmA^ zvr%IK>!}q2odsCWkprnDh?+|V2$>l?!N#%9l3mJu-13*jG^jK!)xxn}#}i??m^Ih)$o zG0!m_UiWzsrcJii+-&#VdYskv-R)*5&4g>vCpm(G*LkvGk`niaqFTN;EWPs(z-1$C zFqSL;ssZ!PrGiiG6rCOzPQmd1>f&z6Px`hN`ki zzgo$B>lVLN&O#_U?FHIszu63)D66;_^JmD?oEDlMqGD`;f+EB(_6ttf=O-zF`fiLc z-`??wE?WHhMfkBU zj0qrV6r@Me&)v5&Ow*bW!hcZW*Tmtirx7hmKr}e_w03Y(`J?$TCu{V5oXYTCM(Mzu zDtBw8LyRaX8vk^RD|5LV2Z+|i&0L6{JQypK8{1Ry)FhcCe0^xj4&l_Cv%W7BCLwI@ zK8U)pwEIlVYoxycJvG)JZVzx04>!d%8Fl9sI>3wBZoOGP!PGN)ZZ&Um?foOBf@~9j=DqUA+T|SMX7>WO`>lNBn+SCkn+-4ZCQSL=FGTiQQ z54SsINHj6tG??uX&t7)lEO}##Nda3bH%8_t1rgX{ntnx&>j9WubdyuTGR_;re(|vVI|ujiMBtM<_8w^A*U7 zC`U)8L)FHpX-_Ze`cg{r+IQk3$y@h9VjHnLszlW+ZpZ&JGMx+@W0oHhcH&XGlwIo? zM~+|q>HOjlMq?roo4iZ$qo%WCW0qeomo5sNXVqzUJ^%c&xb|XV*dG}D+<^LDIOoP6 z1M(~5XQM?Mc=Kc(Xh{eB<5F({06ZXZ zJrQ*Av;Sf5f(rQy|M*{8=VI*yfSw0~$)eD9ADuqb^tB+EL}mrDj}J7PT7?y#ZUo$| zEDjSXvS+P3+s(b830{i9UVmMPcZu37KRNilM-jZdPn=GMN5MBN7FDXPL^>JonP*z$ z#{>X!m>HR?YF(r@QV2GdfK}G5rCi1|IdqWKh1;N3VHbf0LujK zXpSDxPJXPnqg?UuuGfbsw+Ngad|#RNpXUkg3RTKR+p|Ip$)QLQ(D}4B+%6a4r)cD- z38Kz4&jiolKlg@&R4;CR_J zHU5R9z?~6zlqbwECRNj@$yYL(WrsZLJ+~ZxGVwJN=XD;l;>Vf5vlpMQ-f?s}l0#~k zumN5C4lwWhC{7v>_cA?&9s$raT@cC*!P-H-36c(=E98bph?kfz^5)@sjh>%oVzC4} zL6D}hS~~^Du@ zGPyeS7bc{I4)PPrC=k$VBvl9e7|wy{C4IoAp{BD^B4+|%1_LCMzRr#ix8<}Z`vhCCV(Zf zq=LVw#TbG{Kp#s5#!vv#E29rM7H?4Xk><5HyW<%ZO-TfJ5upHbnIgem{B^8k0ZMVf zK-6sqaeT|94ZurD4q4$@J+nXn0T5POO3k{N_VUG8s(Ct+r~p7YWtlCfP*_c+r8QQ& z=oOMILy%^kn0j=OIR`Z! zJ!F`{J-5bLD~;vIdaG}8T6B`e6Ka?mmh&Tpm*s3jG`({<5N=uKEvUv2F|sO}QX`h| zv^jMK17bViX3Gf88VBg>>)S4#dHj9~7@w*O&DjY#6Sn)gpeoCUyI4c24to&wx3bdG zCI;B)GrSIG!j7byFD$UCV{2M;)Ri6QkIqxXc23Eb&!yW-q92T0|D&Rkn@P%)}9 z#icEwMHj&ti5^G@;fS@+)6xo~9&SW-Hlk1~rp}(Y7sDqPw*O8^e|%eF&s0_n#Ec$T zZ#?q&Et?8xw0>$Ozip=#A6QwW$k!D9v05~gQL^pERf`)M#4pdh0vT`6e_{(oO{spS9w literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi6.png b/devices/surface-hub/images/sh2-uefi6.png new file mode 100644 index 0000000000000000000000000000000000000000..7b4390574a2bb55bef76ce6ffad0f4cca4ab6217 GIT binary patch literal 63618 zcmbTd1yo$kwjkU%L4pLAU?IWXo#5{7PUFyxYe)zVA-F>WA-KD{1$TFMclbNsyZ5d) zv*w>QGq6~kQ?+aRuG+P$PN=e?6gmnK3IG5=mys4%1pr`?0RWf@WLRhm;$-d`^xqpN zX&n#%@V5K!A51*`TVenJ0S~CI4c1nW=QDG(XEHH&G__#zuy=w&0{{ZT9!@4^wiaM= zQwuAggCON;QyV2Y&|HvGi&KF`!AZ=*8Yu1MVxi`xsBY$EYsPC%DJ(=T;K2t)U~d67 zA@{Jia{%#q2vYuomk;{~X%*xBl%gn;Y%*MtDgj3(fnxG0}_Aqf`W@TdeE7CuJ=4Stab8>aD`-ix>8MB3* zg}sFX7zBl7{ST~@wIkROWbOF>gZe++{{sQ2Y84dzL*swRi@p7SNPxf+Zcs7)rI7z6 zG)Udk$%0wc0_5oGVrC)X24$1#uQX14VlEaYU`H2qM@PGV8%p`#ER&0g{WT0PIgJ+3 z!Q9auMEl>yScsc|Ed(k5_A|0@L9M3F%E8CN!pFhM$ifYM_%BceM{}U1=l=xC^B0uu ze}sd&jJXNepzStDDcTRfWRgWW)?Eyf|O9rFad$)e5R(n zmh8M19E@zdW?YPx92}O6CYF{KjFwy+9BgddmZt3HP(uHhi%;Cq%=NGR|2^LP|8l&N z3lJKACU*bNc>YG^U&rB-27;g__54@ds98Aw>&XsC{*SNlnV9{J0YOT$zs9#Pr~Fql z@c&r@|Ap4w+5(F7f8!DV1qO1o1iPEKScqCdwe^4Ebj(oxng0gte~H5UKTG*f-+v44 ze}hA3jK7cnnW~^K|C#J89H29t3v?D3J$#=^xq-fp(Yqn3?l6Bfo`*=b&>CFMgzL?m5k z8+E7&3YJ1Zgh%)W4+ohk*0-$Fh56m}cpKFK(l>P(bYJzeXCr*PCfj(ow(HuE_BLO$ zC^9sBXk-wAMM_9$QL)h3*{PVu=XW^6Tu(sJ39Zs+S-YW+_ zHwHeTc8F3C+Alurp{LH2U1K2kTTk9}4^TB&jrR8T)Bz_AKgQGH$~FyWfS4ZV&T|~1 z<#HzTYi$@U_NH=i#Iu*!t>DB0F}qGy+h$L|)ee&}@0yD=8ESM&#<5tL@~f(U(+IG! zv3*>y=0Ydp>Qpy-+BsBGo6sxZOqtAAWJ5bNW2qNliXX|kJ&%qIov#CV8!DETMH^*` z!r5yMtq3+@1=)+I1`OrIcF^f7(iJ^bl!i{?$)QkR+P#F^fphL323)V54!Emh?P#LYbIp!rc+z!yiwpU!Al*G_Vmn?WdgW)H;Ygt%YPx@W8s+MIyj)(Q%P2)Xfv{yUUulR+N_Kb-k!p%|VHd z_&KmGB-HAX_fs-LHBZR(X)mS=X|eWHJ1Nt#Mw`#|c;^&9fMBP)!i=*=X)_do@HNzALB?O`&tKq6K9c|>BJYH&0 zx6|M2p3|T$ZWfs{k7d$=%w|GpXg8`!$O0-oU*ouhd4O8^|_kwxTD1zD zI8!1${bjCUJ}Nqf8m)%k%NKq(hvhc++vQuKtZ|#s-5tu5&SvAYa}8RJ?d@%ce0mz5 zIboXa&1)Q-t@wm^Q$qpok44_mLKPJifwO8!nf`lcFvcG!OxAHe3weoINHh!q9hXZD zObiV*JP{z|6toqq0TkQY)bt6AGYF7wE zEknl$HwHfF-w@UX4_QxhF;I5yg9qaayMi%r@Nmuo35ecXRxRi&N|~Cfifem}%(L4> zGV$<$JDzwQFu2XT?G4MkcW;K%Cg0(bCa0ue#r~)VUiMz@j$R*4YvoLP>1X_`G%cIl z-rdYhN;Bt7R?OrhBqcrGsQ)vWY`^GQy=b4$rbOLMT^LW7Q^Cc|9lYCu*kaP2)d8V7 zTCQ8PbaiRg${&~P>4xgU^>kb+TNydf>E(0Ol4=l(qO2O;%D;5+iL6 zBicb%^3ZvYdj3YnA-|=zG2vH1dzNzI&^~y<*XK!Jad!Qy_hPN>YN6|)uebX+TG9A{ zl2v-bz*eiDUm$Yt!a`vfisIRxYvbOYwGo+7&}Tdn63bfM8?vQSmwGT!dY4UPM1;+1 z#bt(IQ^c=>sp{$~E5-c0d@T)4S!&hv701bkn)D`DeDRJf?tb%&gF=)bSwF7JYJX$$ zVe)wWZG23Rr#;aE{ekj`#CPIo)0`TL!CkY$W9t{nWxfyldTRNwqL}cafIo)yXxm#` z9PS**f#e|x5FTN&f%veUC`4%QxT~f- zs~MN-UD}ZI7gIHkP-`m(W2`)pzY(bK8+3p*mbmO^scvzl<~rIpUlY3mX^<&LQE?zN zVK#U0sD{jAXs$X=Dmb(#0$fFtax%GEK6ma;csU5{E(xuYIFX!^!NhV~*jM;S>m`y^ z{n9#(1LvKAroCj9^kmxd2t`8P>jCzgKS+elpL^Ws%vN)7}xNbX6n@1=nIHZET}c+F2tT+By3YXfB9T}-u<-kr0dxA;xqj- z(aT@ux_#8UEgaU{^JKh}4SD*hM~3!vB}lkQn6Jh&1U5@*l{oA!?<;BY%am>xJ6YS} z_9N;w|VDRwOqFO^c+bBg9a{6!Oe<+Sh~R>O~-}r z%I^yC!sNmTUX;X0<{E+*S=kd%A|jE8=$Hp{zh(9FlvI>!I2pe(3F6pjY__KnyYJ6s z+l`DvYGc+_8@+m%Ia`pTs%@Xap9gBE^N&>EB+Xfj4SAmnY9u}n?%{vDiR{;@w_XhT ztS~F}3vHa)Ydf^WVr9%P*03!fKj3++j`35g-=FW@Eyed-up2wR;F$Dy6-XQ z<>f$0$|iEvUwE^*#aiq}@nk%7XLi;9w=DqBe|^%tWPosH-spIm(Q3@hS8WMWSdM zSFZ`esp}PdG7=j6C|`l?Dt!_T%Y!Qz+UvwW{pPANzUVlNF)|it0O@JJ^>dd51i%?` zp!y*hmg+737>;G0U00%7>wXhL@WLN~D;ohofRI3gk-@y`Ox*7B*!SVD5}mG`4=>p3 zOt5J^?XsVo8uQoe#gA$=0f(1QeJ1HKFWgRqe8IC=ptY%jTU*yZ*RQ$IIZ_^{j3L&j zWqYU5`{~&wc_aA~nSz|crOV2yR>%pVVyoMn| z{bVv?VlpiAto5a|bF+lq;Nb5SLm6oTW?ecO;BUH=llwkkKfXNqf?EtWnnNQ)m9P2F zPXRtIK6P)5P5^+>1`Q*@=VMPmKr_PR%BthW;A|_~dV`V;oS0h9^H#C?=_Y-)$jLiG z{KT~t;nP?vzdG2XyQiDzx}?utop5M$Vf=!pU+PA!u{V5N{0%Da)a{>pOtH-LU;V>i z+sR=Nv}*SEPnHpH8;) zQOPg!FF(qihI*CAyj|jn$2JPgPF^;|t&{543i1sX_19AI3QVZ^$jE5bnS9qv6s&BE zqMpwF2s);AbD|~RuEU)KCMi~~joMQ@(z7!#N zhj~DyznmZVqxwDPHRQOlFAMFwO)wFD-G2m*w)I!~s{=2BKVTD5spy++RmFXA!o`u% z7h}I_C3G)JTh_KKGV?d#oaX?zjksFje;uUb^E-v-0|sn#kt8+K^E5AbfwE1 z55F&8*?|vyR^7BnljYN~F|5L@)jXRR*rahREaYk44;OtqS9vf{u}PVIcI7UWW9aP; ze(I4f$MQ9L=FA$tC2Mm%rP@ohTI~HUF--#lnCeh5Awo3EwV&P|D9iMCOPHudGI!Jc z&P+@cjCyf&6g%xxGHghX@@dBx*!Fm~(*)htW_g?x_oSM@)1O%&rS~yJ%m3!b=#?&w zn_YInV~3C%ufwEHT#qN;Xx7kcL70!S zlX3oRQPTBf;rZbBO{mPPpZN=Kv_b|BHeRjYeqlbD|J5;ukj-qXS*)A;+;POvdh-L^ z8^{8p3L&Dt4wH0V2PNrAdDD`j_ot@#O>vA-q~KuoKhvCOaRCh>TTT2pw@sVV-6rnM z6TJNu%_@2v$|BivO`%EC{jO+;Spp(Cjl~6tW?0y8O)FKdef`^$jrq;o=Iec5pW?11 zD40Jb?rVG7M=qNcz=wPbBVs3;{%saFYyAuTVTwX+$Ai0fM30@00b4tf2oO-@w74mX zBOaM4>40R6Qgrm*7C|J<^&C#ER&nmacIzT>b+M;O5P-9cDHpRz15ABfdES5FQONnj zPD~h_pt)sC0J|pmGx=E7PaZ>4CE2Af$GsYw`Y2@+#yLNqk}ki4`VmPLw=4lU#6WUw zH(GwxYgEb?4ghF(*bwbBZbt?Lj9SR4MUql!;Np>m+#}qyVQqg8 zV|6m;{I7;G(Ln?4C5-gNPOx}|gF}UdzMXxmu8*mcUP}9u68QXU9e%BL_9_)UFj+Rf zyV|2x7=p@EYTiDA@2@Vp`#bG3pBrOAdyuLA611igt@S1`!@1>OPyM}H1FIM)Uoyi- zv>IUmus&N&ZC>ZjPZz{yix02?&wrlwK`6dY`$q=(NYSZ3S2WwW&z}1-J+rGuljC<$ z`3JPi8k*}_=1|)`hH(+Lnb6kM`I4xHg#5*p>bZ>$Hj1<#!g~;Ip`Gr^_L z`x@yex8{W3TgTsq;aTBJM>+sl;&HTo8&JAw;wJEm1J)w%5!@1AL)X4QDzc-IvF8)BoLl?@1X>iOtmCUW2%h@=k}7f*kjeOgAIOX#m||`2O#`xyMt&TPX_blx!do z-~)E3I$g=*D_PbSV%wZsNsig`RRvrx+G#4uwiGJ1fwjEqVK<<~(c@5a;0;y*+=H4_ zttD~E!CchwgsNB$CHCTny&nuFXVNk&GsSFL`F)0-N44U=d0rkLo;7%$qL7UC5((mX zs_Qn#7A_^-=2B0W$48>qsarz}XiGMyvceU_dhqGCWPBHbiU2g80kxK05A2pjt)p^e z0<0os=rSR1c-mgSu@=uxVQn_L%d_nHbm`S7%D=VDqsvU%nwmK$a`lOBU-*g?j%IM` zXX-M#wzhW1M1{6{`@W2W;&rRkp5MK-s?Nz}wINKG{oPW7+IK}*fCy4G={PUL?plG3 z(8l_#RkY$Sm=8qp-MV@<)pO#jTcyW~l6~UT)ru_T0Dv^)EIcYy3B&O>KMIilptZI# zy{VFctBk_;Px|rKXWdmodf~cL`DDk@$JLCPRG2bKa<&GLZipx)_g!zbBQY5<2_|;@ z5|_&8SW3W;y=u)+!sUgUg!K7LdZp9fL#Ar)iGC(bNgdMh__hu@wu?C~&3vL^oa!4D zZnby$o$23KtFlrRJR;T<{GKf3CnnkK#|3+)5v|;4LLrFzZ97$JREl!yuAdh}*e~r8 zNAP3qoAa04B0h8*O>H zxgpsD=KOUWx)82A4)+gGAAVhTX}}tiP5IZ}UsMHW1O7ide?LFJ{{03WPzE-XcAY?; zWaO6Yv=I_?9Qg~etn45`jb@wqx(~T;?BAA47CiUkIT=?H9(5WaDNS1nXk$6e2k_BI zTs%$0r}hcYQ&+C$>$2&pwBeXEAqGY z0r;%0VZlj>j`p{lK^nFBfKCzuuks-$0}74|$f8kKQ;YOqRx14Y53ww0#mkKg==~A; z#)Ksf1M^kdUE?3F#8pDV!=;k&r8Tgjl@J&J!B_cg5gdqg=oe@e1OP~|xH(=3#UVo9 zuaNzRtnnJFB#&yZsL>LQXDgPp%P&YIahe%Jr|HE9s zW_^@FBSm{sgwJ2j0RfNze2;~-)BlJ?Q|^iIA%E=x%9@LmO{$m6f3oP-ii^hS8jDOfMMqv+;O#0KH@Q-K!yb8rKDU{?0bt)`q zH$Y?(>@dRH%`&kQ_2!?7Qb=G(^Lu=t**~HJ%#O$i0+yJV3Ge0q84gkQ1kz%|XE&Jr zHDEOwjzvWZ7G)m7Kav38GaRQ2Nq_d|ig*?O^)vv1NVY0vnB)h8f3O8WXw2-vbNsCdgd)>TzkW^VMao~IW}Txy*i4> z7PLeTz;4k0Ow}&(g~mgWNil%FH`W9#B&I+2XJgM4eA!}`Q56y`Rg4^=xC-T|a|3Ty z9`qc8djW|?oY2;$;I6hL*7q7V8Sg83NUGRYi@?uA-)D3>LOHbnR%M(ZUMqWr`1z5^ zD+N!G*%$nnKbWy8c*Iz_8uT4M{hel`K%C@Osf-rw+Uj@T5Q%XV%_KZ)a3>R~RkgdN zA#c!7RnB@RE@Xr8F+<;z-?Pd%F7WM70?(x<|BQv5h;=9h(%<|HM;${6>X1>> z$wSqKkNfz6i*qKiQ-t%a_~e|9+mbra&BHU9?gJ~8q6M!5LxFSnp5&+MzmELC%9a8-VP68@ z5fkzS#H)`p1PB2H&K_R#MIi7ZSXjnbGT|bNmrc`7a8Ma{9J=uRNPYJ@qmG9Y(06S4 znTk@v3_&^95juDHhxdb|NpY~=737m5=twE;YIsUSu>PV6D`a4lWsp+KP!H^G9&IVMD4W?}HBsv)JLI0R zYmx;u!=qBkcX^7GUqGU9{{*RgOob|jUyiEm!!;&Bsy%Uu@#5bfLMdg4po`HXO&BZ+ zD>hzvaHE~A;2+dDd9wG!JM<~C;X}5~u!X6~NMDLJ3Cz7Dwz{K!)gpN6zxTfo3nuuZFisZ-)#US`N>0z?tH z;b>88yGZ$`?4@XqQb#xBkUkp2o3l? z&Mpv8%ts?6DADh(5vSGYIaMwCao`1DcQbf?g<;qXgytQ{JaX(0ivSQ^3h*WSSVDR*RWr1{( z@8jK4@@N5=o^R!z%_cU?IB?NFt+>qedx(g}E@r0Y6&s<)N%di)f8;JRDy<#DdD3TBlJbiAZ^Iao441S zSPC#Z2wTLlX$eI1&IuM|LVAYwa0Of+KGF((6jHe2iB4nnEZ_S03B6jpRNaG6d=mdO zrro>6Cnv!?;!8q5j%(DEO`O2U+pkw2z5*u1oV7ZY~!1Y89PD@9m* zeEfF=n6r{(>S`)UnMT?=_BUaF&^0=ZRdO|SCGO|V<{K>D%Ts-`M)BswpYULj__F4@ zP^=jhU(O*RM>F!%-^NkHGd>&+5J4J+YPHRm{!wJJXu98~h&KbafP#U7T9;Zqlh==@ zuA34T7LYh(QbH?%Lmq=929~$`Hf50DxuxtE84LmNr|(uSkstrWCcryVGo`OEuJ`Ps zE~lATsE_jfi5bL-2naLzk$>}NU2s0Wxw=)L$Gc^Xc(&DDj2w_+!Wa~ML(077upyTQ z3th^{QCMi1p+c%DhnSRCoc$S3DI5#wA1haGJNvNOzE;^>HP0)dS>^%f%7QZ-HnRbl zAY!)EsV!al0z@3YPPP?iXZT7;qyng()i%_IEM(fF-_jLP;pSDT*06ou0T0Tk<_l1Q7Qq=>d}rqr>c07mD6DAOawF+HdcAVy=x-1akjFzBJ!Rk|RNjvaLr>4MU>#>fp(!f>P{GEF zT)Hqp0DQxb$md^|CzF*zux5m^-)CuqZ5jMva~v;HjsphA@p&%Dq*}0{rw=QP#0#F@+4!9mr&#itX!g+< zMP)CgN)nm|9qzbY#HH~isqN>EZ+A7*ponMSCkq!!brP6C*MgL6@lo6$6qK*xlqRfJ zw_#}_Do5K$lCCdDM6@UrMA`mM+X`QH`JtPP{%w?rJ9+3tETuwzM#8LI{LMZoIS>LQ z3Rf(eW(-I%!BqGXP!YVz$`~(81D|M9fuQm+o(-q5BFsMH-S&%LcD7#}?`wDV<~A41 zIC6L(Ko({EZo|`~1L#`+BU&~;jnx@=#17#Ly!^RNfE!K`*U*$dihJXoyQ z3C}sn+%)-<$Gz36MKN;l{K15^CL$!glnMJ_8_nu@5{J4FYZM1de@N=r-JtF`^AA7G zzd$oX0IERV7y|qQEqqQ-z6j**fKH}7qjaA;VKKjDndn%2nle^RmCd5s{_aRCAs(bfg9)Hlb z7?#DwUc_8pHf|)t_35`xR_<)!Wj5wU`ZNMUp3wfd$(s_whT7lN3p*D8>hWN4De=Cb zhw`0`v<)`)9=612vK#_UrdaMm+0P-^(B$TuKew~7w%ciGdPMu>a6>VIDCR3OX6O4l zDRZz1>p_51^lVos0ZmGbbY4guzE$P`V=*p4f~YoFPnJ3DcJdd}x86GF9Rn~(Waz`3 zrmiX$2{CPqVG30|1e#LiCE2PMs&Nd<=C;r5HWMbeO>5%dY5v}THPdr{6XpIU$&_Hh zP)~U$O7>0s1T=ohzhgD`qUI~fCP#z>B!LZ_(iW*q!z@2w&*;VJ7@{#;q+E=c%O!6q zx7E)qtij_4e}U*Ef2MVgOW;kX{Or$xOD>`2qp+Slsrr%kBh3eeCcp z(WFS?03@i+7KSZT)pD&x0s=NjrtvEkadbs;;=LKCH8eglkKrg6%jap1jVy%GqK(8VOVN^|3$;#RfwvTIYNtT;e~r#TKb!fUl2!O zk^_5r<{*r&NH0r=h~jS|IE)*FA2#?0mRww|c~W0Z=Ws(JtRTE7^zp&oum zcYms7F z+vp5@i4j9J4WP5h_g{Ikk%8;O8u5}vs8kPyZXkvU)kw)89$Qz>yy0+14?#o#1N)uY z`nj{cS*Pch2Tjl-JQpl3-7-#)|gZ+{18dl`&$=d!j{02$;)k`gZhYy zQpq@FR{xdf-ytpK{m5I@^Zy>Qe&K~B@miwsxnfdXLq$_Z#ZX04)7Ci*a8g;kefpB- zUbS(DaYk})Gc%}w`=mjJ%oN_Uh4*4yH(BLx`1E-Hy2Mbejrn4nccF*XyFq5~77xMj z4v85D^{MAZ;191n9{=prj3C2B;9VK>n8SSYR#kzV;|yG6klZXe-!NX&<-zV5b4Vch z)9VwZ9t097kUMtZ2zFQMSdU-zds>K%J@NG!{1$vda($F2S19o#WTsP%w>FhPR~$Pxdj>agiE{skiK0&!5roe#S6FPvWJf*yxGu@+ zFQbwrJ*<1$c8S4IH*mn-A|~HF)?MZlnt(sxEt3(zjk;#LzqU)mo z`v(P7fUzL&;Urn5jljg1P_(eS`<{icuF_2mT*Jy1mI3r&RzH4zUaEOqj2#RJ7`mt$ zNeH?g8{DEZYQ5`@uJRjU;6Qro@pSJ@N&qM~=x1a>$OU5*$KSleqBB@E1Z-y-yGBGK6KzWF((OJ1TdLp*4No01CWCjEq&UG z=Q_@Rj>SZ`P4L6Q1Z+=5eby*n0H548gpYt^Zd94orGBqXxIrH&su#QQKVDf&&(hrvzj$>xq|(F&)%fr2zo~Em0Mu4m?PQ8H zf4P!9)t4ry)sjALbQ_`@1$vl{_kr9q@x^^Jr3~LE|AGs+cz%p*l=kllHEPv&S?P9b zwms&CC~DN(343{f-Ilq2ts1epW^=Rw<#BA<>mmuX2o^GZw0TSfQRZCSFdS5 zow~QIh#FnK4E&xvhsA}jb01Iu?QSPmq1c}Jt>X-UxgnRTw@JFu2jo5Rdj2mCUE{Dt z1b(yCiQav(Fh@F{K%SZ3`hTtpr?ixOMZu6|BPrA#uTU&8*!q<}Dekuq* zm*1OLphNoF&Q$9{zOO=@pCd51tTgzYq}!VM#QAQ9UwwKtoqM+8LrMFD*nuJRm(>hC z2C<30-DS6P$m(qv{w9kVluR|ZB1SAHY5bt!Y}2wVva2QjuQ~HSTTol?pDtbFFPa$_ z7hH*Wp;s1k1HuHWte95R4u9k=zwA+osg>UAfin%B_uY%=nycj#!F`iTu4hO9mc(=+ z16%2!XGi}ly(2+KMWQ&c1XqFe;h!>p;enwk```!_Yfi8jI)F*%x(9!8L{B7LU_Ho+ zjp>)Y=c3iHp=Z`Ym~N!c)p`sedS6Al{>A(#anTayk13G(YW*ha%A=dB#axiW`LVaq z(_l{LJi`_lFzCob!5gDBiPm4TNa5dLvNHUH=D0@qK!XVwPv&hMMp z6V1m9BOft((9`ZDS9#v71+EI;nYx!Iqo4AuCreGFq>N!|6_gY}y0ACM2>5G(kD)h_ zt8MG=ue!Ry`_p8mW&2~ys5ht*GF(FQlbh&p)>T5{p8fkGCLE*7a5|qn0IK z<8?b*aM=fc!T{$U{>eIgm31r%#II$YmF_bODN_z5Xm;0OWo?UI31OjEYV@4n*Y@s| z8JQM2K|4&ySCfZmy8Q+VkgI?T2NZHzmmNmYBdof&3){eUd5L-ts*kx&n?G6`y+ zbKmJ{DONCAI8TM&@h=0D>dQbFj&ur{*P>C@~=VX>kP~K|c=F*C+1=O4G+Z+}nEz6x=Tqsn_ zU-wJ%kT}ciGU0^jt&AO6p|jm$?b%^;EfP)I`$*9euKKskD`}@PCrh&EBXDxU_jd8L zoD|B(o4bcXO{T+^X?!e(aK8jkg;_w%T3v{Uz<43~n_3Camu0?hg@CjszlSs9n(o=r z*|nk}o%1F}9!^$qt$LsHTQVOHCb}^thz9V(rv&>#i%q?rv7jK&_!>zAm$Iq7xhd`K zj`&jsJ~B+Q;@k25I8o=&?1k@-4t$M1Cu!4f+|de#&_55Co?7_D2zG*%cZt08UA>Xe zfS3(ZB5T@pS899YyNC0Lc6@j#YJtf?By#iP7p@|?55BX;l?c~NoB9NfzV7m_8}Zm4 zJ~q)!7SC5H__J7NSM&YKK94;<0s2iqJW}-`?mMi+7@WMuJ3esg;GoT*Y51a5ii%+}GSQb$HycE=D?T zdPmhSullxZ{4PFSYI2kd1e4D4y-EGqKxu6<(?x$E!0 z5y@FeSI02-iJ`{VC*-Zc!jQMqz*X68*ueT1FJXU)^93dRj0=1JN754C_T;LwE(A^+ z|MZo$oZ4e;@Kl*b6FGW%mGj7V!Fy;tmwe}KwUZMHJB-^wYR}Yv9Qw1$)ZK$bdo3jN z@*)aD(XZpN6Y+_GlbRL!D`0PtCf(lHvzdR&e5@LMTv zLGWr5Nmn$gJbApFsIL|`k^?#`Myc%Mr;dMQ`j}_`1N6GoaCy1kPo6%5@4|f~Or>;0 zln1+Us$FeLef6G`h&yI)r8Zg*>UG~(qPwl~T(_SFBN zZgb}Q539u1=l*Z=iV>*($rn>o?xWsBLIvr!8)w{Z$4x!W-~IL=jyKodiz%QCcM|` zf|)YPt`fb;9=3|nH=7&C{BJIph$TYe-Umj)X-y(7ZpQQ1f#}Mkt5pk&>zg(<4XKEQA>E7P8W3^~$%{Z>UXwGsi zp9oo(waxKj2wWUrkVKp(xc9nRU)~YE^FN*+9>XYI1M;y#9 z%D%SL>ta1o=uZ#9Ci{?IMq_dpfmwz1P!ZKbX}5p7-$D5PZClf%fq$Lmu+RDWsT~2C z&*{x>tM;Y?vS!on@uxnY)Ntqh;=Z;dUr6mb+$KbZ*^$S{d7gFHTlje`n>orXq9X60 zJ$Ar%<>8=-E~28&wCAy|%^%0?h<1qHwtlh6Fy*Xcw28Hsf3>Af?Q!>#*>JZ*DZ|@M zcUePk#`of`!nW6l=X^W%8voM{W9w<_E;lX;I@!tVd3+z4!BM>nnUs#9gjm+F+UYB} z152g4^l7IeH1oLJ2#f19xInJ*;MM==GT4ft&LoX;V8a?gFM+pa3x~H3Rxg3sOaGISum}6)1~aTTm+;e76aR=o<1m5Q;eCl? zBtaX^>`eLgQgeZl;OhuNgkZ4HX)2GKSxi8g>43r08Jr`jgGZyi_orweXz{jz02Qe< zjmy?mQ>=d}NJ*G$m!)@3Usrq4$+otI*LA`6p3*Ht=eaY zt=M#kxd?^SbrHxys_Rl)eRnhxX{%YP*W$9AQgg4lnD7oEl1hZya%?cGxWx^i?^ftD zCib<)`V|PUYjRqchkjNBnT{E=vVM&S-$gx%>zs7^1c1;0zQaBS2|jXmo!G07A^?o* zB*3IR)#0TtN)oAH-R+Xr;`n9oy8K8*7E*5>SLssasUGzQbF?<~SUA7slVigA#{fcc z=94iqC)?L>?hlk+dwWbO*Vk&`CiO4wJ8%JC(QSooe14vo+Wvqn*53&EoMgx5N29t6 zj9sg8B(J!;{p>8wvHWqjH*rd`+$wbY_Tfhq&?gyvZEK=CiM)Y(qR~i2LR!okIwv0TvRBTxZUiS>xfI-kF%8!v@ z)6*oSFl&RCqttI@-~ckp>X>i|mwh+KOU*lWHKC>k0ORRiaN}iZe|TQQx2t-V;ZRw? zZ(45MBUp!cG>m4id`h09dt?@fLpW zGG0eER=Oh^{!I7Ui>Oe+vfq~Acw*8WIxT}lBt(_=R2bF9VATuu;2{`*tkM>dTn*fU z3Sf;Gj~ZbyDAv2yLEHVeW_6X=Cugz<_ahjg{_)p!* zC_Nn)myp@~{U*NdvbWVy-V^AlAIrvby0r=-{_D*NN0u2uVA0mG?mEAndee8)R61Yf zw$ikI*f_ftZ58L2yWX0jnG(YWhwB5e_}WSDDqeuSQ@tomyjAq+VyoZsc~!Gy=cTff zm#xmKw|9{K_%|KX%4A!*A{an`Bul^nSF-ENn{Ghrxi&Q*7+E{tl%zP@6&dH%EKy>4J7$#g;sF_ng*yF2k0*T z2&?Z|BRBHx@&wj=OE3i-p`*W*?1+p8p4IRQ#&c>++pC!|@h2OVYgy1R1S`@3r2|eT zIL|4m;w#$YJ?}w!wMj))1Xyr@(e*t;v26g}$f%TUeOyK;L(m7UW-c0oqx4uqy8E-f zGQ;`U70;{gMLmOaOGj>w18BA2Ci!IlP{4f${;@rlsC)-6uP3;W$p2V69}RVo5tf!- z!th{%0&`e-DjpbAD}}7(VWP&Ht98V)dO7|Hw8K!eWQ*5ivD1C)oq_=1X*j>7+NI}d zswjRs8hE}h@dm;Ka9eXO<$CSWm*psEkleU&hrO;^PZWO%7G^!68aBoG4!p`{!#pXn$~KalOnC1VMaa!y22rUsI8!xo(o~fR;6mQ3%(Q9YAg%FLfR0ac zxMYiI2ZmSt+b6S2;M>h4g}nJ* zYG$QnTfb~w6dLdh?%GomiS0xXY!X^9Y7Rxc=zo2q5qGjvkr@* z|JwM_2uKJ@hbSeDbR!@k-O?f5xxlh4hyo&lfOL0v*Md^g-LZ7T(jD*m{I2)U*=u)p zcCPQv%sJ=2Kes^Bx0Lw-)>hp-yg*2HUl=Yv)o@90#3lKk360yKs>NGSipu^RIiM8M zc4N5`7!EdRZFA;9YcKV^C$(k))UufQlhE-jfQ2s~zi5jeYEZ(jZo5<@UnD+m2>nbF zOCR`{GJ71TOS4U`iY6EbYX~n|VPRlrX-iYj{sjO{BEsJhu{1EX(zmpp_(?RVz{S1^ zJf$svxHBJdm=+Gufx9i_%9&FwhE||kxDw(=rhoV%z{f{=S*Iy&E$+qB1M*_eOoTQY zSkp(p>&2FKFI|n<>byaTz{-GpKJ-8Me%n!=Af0aq-)i&IAd=W93<<$_1&n{@B;6oS zZI{>9_UhS){KIDksDT`Vyf&$34}PeXRG(8&;sbt%)+TrQ&wXw?Vw}Efph<34Bd9=n zz{C$P&yRRUhxb=sIm;IJRTc_fg%Hrcj^*=_$l2j@v+0eGEaPZdlIgO*Qi!B!Y_1;G zF`3g#gdCZwyl+}6FMhdoRyg}l6oFj@OrYnfq*Fz4y^u5!F@v;nAW<@JLRxE}ul z?~sZ5Ec5#8kJ-bj0({uAi_!fIIE8L!Y;$1jX&dihDd!O?vQeq+Oy}0}*U*^#8D#$S zt?^+cwBxwgsbv?2vOjy;Hk8D$;OR^c1k_jvY}6evQJxEfo~H^`GBkjw{-UiICeFGY z6LzB|tNhYG)=mvY!(y6+ocMdU=2_d5OZss>Dth${7iVF1W1+Oq!U?cI$ybu_PnbY^ zo#_zl^eZ$;w+D3?cfYpkIoWATz;0jrlho#vIq#ATb$!2w&ccB(nng~Di$sQySGOv# zW^2)>fT{jbf98T8#N}P+>jt~twEk#JJm7PD{_FEeYfpg)R6y+qS!s(}rR8Y3+}+`J zJ|@5{QAKeh!3X2e2AsNDeE5rrkvs_Fs5llN;9#!X=V~Gzi&FcOv6#!S1RIOZmUBME zL8!Mf1J* z-FAg3I`FgE<~S;-R{trwY+bQY%}rG%1sTA#^_)S&GP@Z`<8df9Ls2xC5~z+ZdVlc) z9bksTV(lJBG(8JZ69gV>-Xc(SkPU7c6mA?KgV@67`^LP`^^fe%n2%DAb&Db(F8%u- zcrK^5Z#Oogtl>WEzoYYMY|EuX-_zGMw+o1gDF=Fo%ua3RzG#0t?y0qP)SvFzWC2BhHSsm7-vt4Z0vQ&w z0hhS95>9H|K)~XQ*Z@WA|_mkK~==oK=#g2C7V9=_OvgLm>tyYpPhp3o!W=Y;fK z=JrWIww%AsD#0!Bta=n zm!l@ST}!uquO*}UcU_9Ue2}XVX4dUMB!Tp)oCE-QO;k362uG7DaZ#oISI6roT}o%| z59DsSTrS?bw+L9X$7+BY4dJhJ!+1-l%fGC?0l4_hvz|M#bZ*8WU3O^lelB)b_q6w1 z{nnDc%ox1Zy&RH`Jr@eksPIGPC%0D(UxX|UqS>53>!khI%+#VRqePZ65B@B0)lXC; zt}~Vg0eNV<{lQQAlrRZOekcXicv?Q$X}7(Eo*iD|&bS`Ko}sJxxhcf?EzBPP1;!Sr zQ2n+eEZawqIHKWwVVg_A=hNHIc13s?pjQ(mEaOPobTn4>rG)5)_e);MC%_ZPDs-{N z?-*b9i^ky_R*6KgF+T;+eo$qw_=5v};38Ne3dq0aDLiNo6RY}lG|}KKFyLes_tbuGW9 z<UKt)(=p_lmcyrb?d$45$1VDa&rI%VFYpz4~^NxV9VBdgf5f?tiZ zzV6PhP#edB2v=CFPl}uuLg1^Ht6AvoMB8MQuJQGlvpFd(5jx7u&xDIiOl3j?pHFaM zhS;ctyfp{@=`Jdz-B2BOCe;O!t5fNhNK01${^B6K^v=iV@>6Sgk+3({v>j~@DqaS* zmamtkqo7NUrk2LuEv9A5(HblKN^JbMT#jDmx>DiGT#L)8mFX7VRbdtq9ASQL%RB1q zWEkg(vw*j}ZX5CUwv^NPV6tM*_{Sm{lJo!!+D2YFLdz>Gcj$JzF9eklj< zJ!7-HR0+TPy&;ImMT*zC&;B|00R#n@$-p;?#t|4ys`WltDm6H@G)nh-SV3pN(D+ro zlAj14fcw+MD6|~RGJ*S1w2sAuuVU}`Pm?{Hy$;3HDHeRZAHxYZi>S)WYchC>`ZK)9 z?I;4yJ=0F=b{5(BrT`$TwMG9~DhXw2Q8|{Y?(^eO>S(<1!oHUTk@m#QvE5$egtl{6 z2OtUOg~m&*G=Wl3B%ziz3wk%x>zzF~W7@8{u8r@z3X?UQk0d{*nzKztQ_9!nw52(c zq_MczM_SEqx9cIIrEnroC0qeV3#+s6tC2}7j18Wzo9@vQ<&!?FSApd7fcM3QRkk6e zW>iV5rHS7xK+0f`2IQ@aWWKi5a=3+di+vID zXW^kNBi>-2HQWO8fA{^Df{dv!FIKN@Erj5d~Ls*8ol zP;cgoKJ=aq_vchn&oSkD?&oppy>;*YvxwzIGh{6%db_)v!xtOAA6VAVxAyn2 zx4~&K-Ius(Hy9ybzEYSsdws7fPq{v?;!F0T9oA*MJS5D`M0-cyg9$0=u#8xX5O{FT0hid7(u_orRYXs_KDA zyWc2r_~4ztRl`9i4g)-XurS zYBsg?LEvBsy8MOLY`fiQMN!+MN6&XFl9pYswOM9#bLkfIdXE>yj0L8Veu36}d<(rk z-0Bj!*l#mE--@{y{eTGf$ImkZj29n$CXibLe!JpE)L@a)zef@?A*b{7e+U)SNJ6S8y(K` z?&XGU^`BBty-jNs?s&)Bbrkr2h z))I)`IyASp@nMl7B^;J_*^#djTXr1rI@@r}!ex)+5^{R$*6$aC&xTlDYa_KIFEGQI zHTLaxn04r*DyO&Ima-inZH4zJb7y9lK)&E|HPZRWR{Qt(9=gW-0zsUZ3Q+DNx zM#HlIC&!G0z7HKJ`{#Eue2tBo74Z5$lU3_2ld=>l!tv1NpVEfCYiB$Wn~S{XpBrmp zz7@h6UGZuC?Z2-thyPp&J&i8<=Qzq*s+fQOD(aum2`Pw~Yw>>?&C2)xN*ujrHwGk_ z=l?fH3MQ}vv>5*V&~q(Cj8#!Xcex zdJIy>{u-s97M-j`Rd~KFNtBIrwzd`ec6|hwrV?{W#uy`zvRk1KwfIqO z6VuM}(Yxtk46fNzskP9C+D(_r{{C;~nzT?nUJPLjcZ00m+TRZ=!c`Ma{pP2kCi?~V z*As=>0aVN+REDQ`sO8vre%=Nn?yY{#fwa@mAl-n-I^DLqyl38c(R&a2 z%s45i4M^u#4)$&zj+Z!_QsvF>ig43w2~x8xg|NZ9tFK+n5g(-jmxbXwNEsn!2#|s; z8Tc8K1r;SouAw|1FtA>^M2jgPceKq^=*9|=6N&t7eYCF!n5Dx_}&b( zpV53%xBgJ~_5ESmwWTZr$B5x2wmVMyOP)73X)3{F5(>sYK(=|4Rx6THK?Z)V%9i0$ zJi_WZj9Za3Xzhf6|pyovjo?ChnYpD&ey}v=RT0FHC%NPNZcys zPd^@ymVX$H(^OL04@l5Me?AX?I1=&p?E8Bq0a5oM*k5wM|F9!QUnf_!-Znl|yVhcH zt$@p0cp%sQ?8(jH&@y<=hJhCY7`|A~D=pJ=8^Lo!NA-jL<%PBK56O*H^xQhD!duL! zfpALbqjaRGe>Lao`wE^XucDSrQ}eu6QW!2GLYf8phCW%LTN$?aq`AuxXo*PfP{t%t z^`Q!$L{f3q1uY10^G)jFn~GL5732Jb&O7ybVrVa)Wc1_@=eRRXBN18xFzfQ*rIxhYDu+s)wbho^<8K+Th=Hf}-FvyyiM78#?n zZ=3@YzjIdrro2<)+?E;|io35=MGxE>{jYa!i~7P`*AR~e$NaR3_1VlDqt~2~p{;ie zrv3BoB}$#)P~UtRv`{L#ZhICn*Avlv#lyL76JAS1e@V_c3-$Qju9L6l5X}9#aUvtk zsMr*U9AwaLcDuCFy=L@O<|3=cw@xz3z*iawB|z5EB-G+5TPU8N-p{L@!<#-s{qvkq<#Zj+($9w7gTRM_flf>BR?ghtdB0v z1y5Q3?61BwF4)u(f95HJ*MF3uOg2*VK57-{hW&X&T~yPm|EyyK7uC2ieOUB-5;VOBxjm0pe!muy4#5Ce03AUj3EyjRMivEEBn*5 zZS{)dQc{V9gHJix@Vom_8stF0#AhW&nx96n-0La_M4LV)C0er^60}$U=%ylewZcMu zM=eao<^82``4Y7Ba4{hiQZPvNc(E0uA^Nd+3GxsmMk7RVF_&eH`F>#m>~+8IR5|bm z?RyfJj!eK`U?;V-M%Uqxv|I@{CcV!!;8#)Au@7Hb)0dU$*=nxta@eto5m$YGt=YkD z^I;<=;*U>K-gNoL$x^xUns6QEZ+uXj%a5!gcd>W9Kq zN$T~VXz7~!KPz^iGe>85P~3e5PxBZ{aNFH{*2;>x)kRgkaf)q;XHd&@HEkTNC8K)A&5nZ zES_eEi1qq3W+^Oez}QCP8XJvkd#SF8m0xaqR!X7Bq;4u88WTUg^kTwM!vE|juocXY z5LdgjHdQ+UJHrk=1mC>r+i<%^&eEhi{)FJs`Vg1pd^0pAU2Cm8C!@+G9XiMm!H<=L zbAX|m*M#}b63G(FEH7??{#0osRe%{qMSN0X?0r$(ivfR@EC+<8fb z?;}YoVu+I)o;|Z7k}tmzQY2SokqY3Z!}(6nWLjWg^CVNBg9_8b#yI; zY4<6nItl3`|6_>BW>0sQ2?#yh@`3`?9#FjcRcdY}Xi-iZFuhytUV&Sv!Q8 zAE)RsClO5__BOZ8)Svgz2|jd>CwtZJ<F6s;%0Gj zV439&xv2HtJplCZx7C}+iws<4?+guwz|eqETUV5tyDz^7zqQcu*QSSkZtW&`_ez>X z)=V8eqlM}PHy~*#>*HHIbs*yDggphbuudNIwRwc~FshP)FI$oL#{NN}%cY+5w@SoS zAh)jLdRo2W<0n(L>OOjHA(%B*fiaAW)eggNk>8#6xb5QlZYI%LLPXSdsIoZ=uh>!R6g}6QrZ9gWv3^B~3<43lA+|&aU*@Bu%Fgt>EMke|ft8=oJs&9!-+N+{PSS9^f)!7K3XFBu;`Zd{iC)V-2eR0^VsmYYp$A%* zzNT~dKJGG;FGxo)6hLCLvq;OoCNHbmLEe2a%;2WW5fXf{C*-jFxACpNAhAG2_WjJ; zNPlh2_JXs)*f&6cP6Yi^wjTt6RVz%@3y`XXr_a!-_zPxC9U+)cEe3G! za^Ko{!eIVXJ-r(zl_2=-eAVP=rR$zfxr1T}Mvw|Ig}3$rAlsYOvE3mNc`$u?ar=U{ zMCZs$wO9lJx%;LEEKh>`Z?7Pr1!`o^S(xpMJ6R;6_ikrC(rHhu#$w2dgLEafGpdHH7=Nk-(vufsDuyrwyvZSNEo#_ULL;+ zIp8;l$@)<#vq8Fw*qig=YP%m1X~IAOigC|}6Ce9V{Ke#8-Xoo{=|a|r{8zom6$H?^ zEdLTX)QOu1B(tKER6a>3`x7WDl#1x*gM;BOjQj@1a+nt=vLH!%cv*m8OMSa*mlYG! z;a~Sal0a?+U*2Z!=)}qnJZir*SW?dVV_rck+xT_74ZcMF_^A{I* zmR@mjpn;mp+0qTYyzc0@gkRh+Y0gFZUOEmAr;B>`7!kByxPFeCyfzU|>iKRHPfhny zObxt~phuGGcb3833Jwum5Cxb~HE)7D<BE;`$5F%xsVXA%q+g`3Ma$(ylfn-*~& z3pW+0J)h32#DX_z_yR*w)Z4#N)023bw5F#+FLp`}4ESZ0{c||hcc1qMYXy zBn>u8!4FYHl9L;z;^t#TuRCt%ceG>T{Hi_1edQKRb6GE|Z6j%7;M}f?_H{RE_-nOq zVxOr>3-IQ5nXjE;1I&sp!nJleunAUtAH#&$2B56up=E;sLmq`IRN3I+YEijXEGxG1 z$Fo>k{Dils)O6CzFSOq@N$WwDgt!E+IzVv0yB%vwHzB}KFdcmNcjXCzN~J#A)7&pj ze(h~aIRTjr0&3M)3us z=dQl)_m}eT?nZ3WowBilCuzTK8G5OY!r&7a_r9$c?Qsxl>883qGQorCz*`gO<_Pzk zD%fEZwTBYKiUJILO(qy`4GH*eMn3VAEA%rncjrzEgX=3qXk)|Zwgx6Qzg<*9k_rYHbdCxkQrMTRarldX@om?*B#^Y^bqTv zZR-0&TfUQ_jPG)Ubn)4VP0p&KjVCG2J%uJMi#QqP57t{lqraxnGK~(w*&pU<#Z4YJ z5T#30@Dr?)>!R)3xjkb}SG36TdY&W{sT@X54l$!0@_EJV=nTg#YFb1AJI7@JRiJbz zjxOE@*ss{clbIM3=);piF66~k4xd^u8L~Mk05@v0(w6e40kA)-X=~3m$h(RWy6L{y z#JQOw5?ixx6RatBaj|AB9^m$08n{Kta2f1vZBb`sOJRvF2mV%5Zu0xWnSC+-k06w5oMm<)G~C{qart0N+(e*4FKn z$2T=Hqr1E8IOM`R>WZJDCZF?eyW!2&-m5zh@$g;$ecKb>N(uPiTk7ob9{?FGB{d~A z=)eGDOz)?bo$2#m|(4T z_|j)TOmSXYyZRrIe%!mG6;uBBDk7iyasuo7jnn)Ql?65cK*hhjvNC4T#vx=_7Hw*~ zwe*`}E6F*}n&Kmi-Z+-$4!ORO&)IJl)$|X?D00^r-wP*WhUurn+=wFziiKB7bl$RF z#^=}UUEIGSrro37z$N=|FASnd)wn;M&L5e@71hn?51Edhk5Vp)pk5fiEhVjp;v{_j&_ad7=MLj;A@?w+!1pTjw`B!k=k1d+7z%}9(QG_2gO9J7(sP7@#hB06k^UKZTA zl20G`nFYO%Dv<81s{Oz7J@O37_7TSk%J@UyQQFHt&|Vj18-P5?p6%+M^|~XTlU29~ z-v&5OgR>F#r6LaxuOjv4F@o}h-TQz4xuyM0CtSqZ*Yy`BwuTRp@Y$dJ&4R;4EwrIb zdueXi&k5%<%1H7Dg+4lJJAJ6cI>R&EDwc^rvhA3LIUBEzP)A7UaFh)7!!{e2VEbK$ z)E!*ugI7+Q@#&EB*&cvvC6mQd_VFPo_;qd$s-&H7u+kJ2br+HBQz~w^j=ty0bKi&O z>xQT$c!g?SlGkdb3@5kemm%L427%mHVxBA$BOdu{zzAXJf;G=GA~go z@}Vc<*5&4J+(_(UeM}r^N;`cB1OzkI$)X{{bO?c(ffzA}$?h6)!Go@jh36sIdQSJ6 zA28Lxl;A!;j8LmSF0`#acy|(14yRnrp2Tg)yAzF_;nqOS>WBjEera-_27vGn1P7p+ z-DjK_!%gM+9Aa9y@==1TlUwhxXhafdDV}d3I8gw^H+Vj@u|$!`2k~n){gATUIq~BgZ#MyX=WCmdlzAXUH%K zxhiaAl_^q6Yd^a>z~MdPZiQOrexx`UC0g%%%aoi z>AwCT{57WcnSKHC53-M=8kksa&(h$JikbT*?A**Cr0>;V83p!exz1(|LATXmJLBX?O%!}ol-?=88~wjM?CT$M=xh_vvkkoZa-~N$)Dc!fYKnp9#?~_du4Ko{-;*oB5^kb6%o16EWBa=I4`lW|?J;7J` zMyiYfdA5%M?a-Gzoys7wM8#Z123_U{9 z=;55lTVyzdKTZAviD9o2k!wo-n;XO^=3?{p8&dsu@^ZB7$j)@B)4wHmt&`Xrw#)}5 z^QYotevvHCK$}o{t3v#N@X?aLT+f1ZKaDZ+1{L^$cU?rr0PYuU)hYgJ=4>N|iR^eQ z-GQ*elZWS2bsB^y;Wa3~=rLc&-h2=V?oZpZFj=Y zr;9~$btSKV{ekw-sexU)V*!U6w66GE`thLhsxy7w|2Maf`t`LRmOS&%tUaR|EHoE- z7cxB@vZ9PRO|@-(Q1`>8>0>_lYJtax;B!Ol^Q0>*(s(B!I}{wr2uc4%geOgqF0wFr zqHVuXr_)fsIY)c2bNY}044%{GB+BQyp_|7rbr;SxZ-w`UqO`m3{{6PEK?zKx4GQrh zVzjM?(vI$SU^C{To~G$YIZ%tvULgd`VL&|M>3bY@P5B)F8nQI^p!dT0PR%{~zUIT~ z?wS^JcXrfwnyhbzO)7$dQG_6^mKZAN;UZmyjF;yJi8*D%IW{)Q-@s;$8&ih2lVIcm z2@}v5VtBAAur|V>dVZXJ4fPqxvgrAdl3TR-C#vJC z0B6ylQs>c4a38ze0G(V$-ioljn-3mU1i>%m?HzXmaH^qVP^eT#05;sA^!oVc4h55) z83AXO?HBZwax`O=-v@IZo!Efi@sh5@H^4ZFB0my+8^Y zKxmW~jr;X5*=6vtD%RQ|(Yhp~6~^GZ>n+=w^w9%)6^!)?MoZk{t8o>E_2=G`&0AJ& z)UX!Wq_6!E6dxZOK_Q%BozD+xs(Xa2i1J|29Os`D`!$OR+&6=0S_bPNxm^~e1tpc< zDIEA{0o%t&zi9*Gmds|a;dkAFUUZi@53~@M!A8EjKJJ75dH_EaXeqJcl%*amOl+; zm5twancORpF6Q4sQttu-B;eWx4yzQO!L3V$krE5ln#pOYbAESA^C~^Dd$I!GPfmD* z+1}g)f)Aa>oRkWhu0loll>K=L>~RZpAkvkTl*I}1v`dGprE;X=C*A#EoS=E88Gpa6 z>OqkR=J|;57blx-T!*Ez{ZlkN*FCu&_Rrl$(P}taO7qr*m=Z_rd!|oX*g?{hzNY?d_-I zRG}Yvt(Oo&foNEr1r(1a=YJ*968JaO!<(h=Vl~hK-mK5H4)1?DK+4AL zwgU60L=UO6!!P4e13H}2FV?d$Y11Ry5?r?$j(Z|$W-FXL%f;`LAn2a?*s?Z%h=cZXEJvln8zIP%VW>@WDq5F8@f0jRP%%=0YTh_jQ_{Mj5 z)@WA>aWD(@SUlsX#h4ztKIPAG!KFT=kPzlF+~J-VidUXJF5@uMwucVA)hF*_uQ(Zf zKA`e4e-1Z#Z^#J<08sS3l$tif1}|$S^S=IVXAk&NSo(I$@6;e- z_^j)r$OSD_@MfT{Z;6&ouf}VuUV5dy^4WdOb2$*(p3BOJ4-8{6Vj;Bp`5|S34Opp| zm2};fmV-7W2R$Dk2^AH0E`fSS(u!#OOuy`IrbQk*20EtL)n5ya{P7JB8sQ4g)Aet< zCf*l4&ejWG`fY^2DMidsCJ1626GcrNrrPy664(>li)nUIvyJAz8e+#m#XqJLJt$Lq zIZp9>2a#P?=o)rh_~0dN=WEUhjJ(DtpU35xjM6N4>FTlR>~pcyjG*Fo*%z~b3aSq( z)XwM!1j&hViTd3-CyN~#I5$ZUNjj{)I{*YFy9#o3tuzQR*s=gLy1tEP;a)TVy3|ir z5^1@GDMB`$H~NJd&q<$)U!JYewwwk}ulXEw*)l~?-zSs4yQ5{9j_|Qxn<{0U8pPog zbK}s>{TaBxDX5VL0ACdk&DgB8n>kK)lk6OmhiqZK`Lo@D-guXYsOViR0HxBA=QU}8 z@j>=06kzVP*UmEd!lSgulCAvWVCiy*X%)pg{R}%Y#LkV~v;Pkouj6wPqG}vrN%qDY z;wMj${bfLW3A0@6#kf|zUhF)5lIAWF)~jG_LsSw;!tmU$e}3|;=~VFCnX zn?PG*%1&?(QmS27{t)}qUKWYqUkHcSG7>+nQF@;)0h91rWqo2Nkjo|kX0F%iH9-5{VV`qRBJ<-O*|InM;|e4gxMO5`%L z{OZYgHBv86GVID2Q~5GMqi}5J4Ev>tNn3BE_-H;npqIECF;kbTom?kyP!wuFxyK;_ z;$h`_7as!2dR@{H@!a?)(&V3^D|6O_5bz1Uv=`wuis3J8r9pzrhlCB)ojmJe9d9jF z3$5i5IdAhL^j=|NmcU!YGOdTFwnrLYr5!~n{E4H;j*u12BLc9En>DrIe@~{_6$E&gH_q3&PRa_ng5^##8*-xDL zAJ0A^W|TN-7jsq~DiF5hXW_%d1OikjJ#}013}?r{K1K?CYOb(nN1@6Mz1VMlEW|h4 zQ*!PwgdUB?CH2`6{3Z1M0z4;1Fkt{+ekzux-LHY38d1b?Jd`3kH*BKs-o!94GN1)0 zy@`=8lQ5!xKzz-RcBk>lxIA(l$G!8-XQU70d(Gf^+}{GdYX64SUO&0au^1yw3Lh;3 zhv zf$pxNYT;Ua^zAM4gD<}sjulv9d~ccVFp~_|`eSIE%7ki|MrhiA;Z6s}rCJnk2Iw)| zJX*UnXwak=$Mr=jv&9WL3u|2A`+N`nV}HQNe`E5|L`6I2`>FDcPu2SAKC5PFYsg$P z2Oe^y0`uYItlszHaK2G_x1%|G@}Ry|Vw=HzKrKJR1JhD5kWB)ffWg!Pj{Vc0>1{l{;=X+-?_q z`ErY(xFtvhM%g-$7IPsaxNw&BMOQ9!X9Zga&vwy5m$pQO!3im8SqwJzfv_10-t>HH zU>+d7iLtei9oLmuSMD`wwb?9_go@MNS+6pE=Vo28znYn&u@gEkhs?n9TpvLx?z-F2 zh1b|EzCfbd6^iQ)NN^bX6*b1kk#oYwM*G)J+$82?ab_Hdn|Gsl^ERGwH%z3+dBDvW zltS!}r|MCK-;&qPEkP@jLsR=#mG3ug(tkzmas?qu&Y=?!gLy+M)eED#tEHkQI-Ryo0ev_4Q_fab*->Ixx%XuUA*(eMs+c4 zVjg5r2AO7Im5-uZjj=rBe|gdr2}?fSm>Q%ES>(q7_)Cn8Gz@vKN12i!fhe3?vgYGf zR7gO+&U=tk@rkgK^#G&m--62Hl7kk3^3N*xB}IcGpr+A;Jhc|*!$oPHCeVR^#iE(J zta0FRWaKrpXpDpR;2;!5q0nokik1I^jSVFmvYy7N&>bi*HJLl@tjtEn{%nNIo-&FG zS|UTkXna<8&~7hg9P8%hC_)xtpvxg-3Lre^gDpjv6`9ig77r@2y%I-dYx41Rq*de0 z%NtFRf#6!E*QJvBv(*)g26ZgcHq9%)TMoaK-LdnJ=61E1PSsZ^z(4N0onG0MUbpMblvm zr@~$)XffjAM!L)#kXe+f)I05!VbS{U-#Wu?z@)CyGAL2}n4hnl)jcA-Xipd!(Ii_A z?~G$pwrt1|p2;6rr0eVbjcQ$XhCz9^+R0SLFpg8!BT-N>=dvG~@B9A1JV^&d&u9`z zU9InhnPx}u8~SJJKd^wW zRX&(v*q_@?qqzt>p-SZ<@CsX`1Azy#jpog9w$uyid3M2;QJ%Jk#iq*~+ZRBX8z zGAGj~%Laz=@*5E98u$9C&(XnqDP+&pUr;_SXN_UVl^*=r;KTO^mz}=LrOYAm<}yu~ z8fTI*keHQ0&Pi&77yF0B-XfPHu-pM!LZ(z=zs#;gBHZx+DzE1Gjhmh_1VQC9mJTjm z{#az+?eXc3U#;h3HX8jM3LyDL_ru1I&lPs(U5ZwUMOu%S(HH=5Wn-gO`3>&hhogeW z=4n*D{gUutHSSd&I}D6C# zRq)Z}^pEEY@^%mm2X#G#n8~Q?VNNxD+$fu>O{OvPkTxc@1)fihm`yZ2@a{UZUe6N!o){X^I>feCVI)NLPbyrnwtB=F zGH9>zQAG>fKVV24jZvUVPJb4ygA#o!Oz}Rq@Uc*DNsH&(ufRQfD<&k4yqvqaliU4! zJq;fk=FeBA1$#+iPtdT*yzxjd*tGR_I0oFy25Q767LV??m*XVd!n2q$AHbR!$aO=F z;QF{oCTVu`axLMZvzYQtJq>?g7|O*>G&-=%ZAwK%w@1byApCXl8b9&_Ackgq+*8Wu zD7~R6yz_WNH`ur1!L!{aOoStKCzm+Ho_>8~U91EMR-H>btF}pq>OuC-a_=rv*iHu) zG;!@PxA#<@b5-D-`!F2bp>kzJNJ1NMuyysS(( zCiV%iLtaYBIAL!r+A~U2d3*^MEBhDC(Am~eb3LCw6s&rCwN}rl>?aBG8%iQhG8VI7 z9*?4JGpHzUk4bpJ&~I{j&RIMp@=3e|Rl)lSYh{8m5|`iq_s1>t%5vwz?#*j)t*rs0 z$F+snkW>4Pv1eK;nd>tpLf=8;uAdAOC^D?ZFX5#k2?o;F-B=?5uW6EVMaz|T^4q>@ zWHibR8mP<%I4b@!`m@#wk)WYrj;E7B2`X@*P9~zC_g*rqej*v9*$FZKRS7#EKaC|J z72`REA*a8HIoP?9j+LKz^zY@?}vbwN+6p+ZO z`xL*Cx^#J-lFHB}IK`EPc4NB~ZSirF(C72v5mE0E{=KGwWt!*^vq#+`XNjoy)ax6E z1;;UoOD$ndeJ$e^VRc_-b_QWY2nd=K`RVx9oy4^i;l-9z?XdFRKo6%!UCKe@U9nfh zslhZ2PI>~#;=(i>-RC_gud8UXk`#RWJ*aDwgD8wi z8!qE7c8Myq`Z4XxDt`v16q?Kti#Gh}n|2%!_SA6Zn#jcgxK1v(-7Qz_%h$H--Q%fg-o%FFTt@7h*w<*H0N|@JtCze;J z*2KLD@$#!CmC|s-u=Z_2LK#tdHI1#PVq&`nXN++C(1Z7=9M64%IGX~fYjos zoMSv+&P2)gkBEBS!d}d#^Da_ zKkh3u@G16@reZGM_?MQpaeafeap#2ql1T~Da;Szz0I#@KoI!{7M?pfa(CN#__jCb` zQ+sYlbh31S+K9l%`!%EA)E&=%MADL`kJLfr%BLxxQCtk1a$43np#dzmJEe0q+V;FJ zGc!|#LFWY6SMlXHTVLDMTZ8fDVP5BLe&+u`yRzTD!o8=w8fLU@HUsSXUi%`$Pt4Dv zBZy8`dXu`J60pzyeL@g*ScI&9pp07mO1lN=6P3BDmaf&NK3z7sJid(8FFZb z9Ha-3Zs~C75b5qly1OMDLP|oVODXB@91tW#8YyXzkd%H0pYQKoYyLQE?m7F^y=TYS zdw-_t)Ao?9;SY}3F(frad@(ftqLbFD^IJb;A|D_@p}vt3J4^RSqtJBox4=Xl8wYx#fpV&SauEVBQAx8QLs zu=+@sL;c6boaj;eh<|H_bQYMaz-I*gFA|LaDBX^9o&PVa44u>FtMTK|`kCsr6Il54 z9$~rMlZ^|ZFCWt__cKwA(`%6YUso1FMoBCwh{qWh(7XheDm{W|arHnGSz?Ru`X3g= zjsRa{9oBNSbcDRK#4}N=Bbm0dJP8@g!@}O5Q#{X&O@2dwyThNaCMTyZg@(q+Ez(Dn zZetN1W%J{=YR>LYA?@s=#J$5^rM5b!NWJIojW<3^t)E?lKksE}dE;S3{0J&F!>a3foz5$LrR|neBY4r?{E5eIF?K8f93p*3`l`L?IS@5 zTmLWK(=oe$#KEUTDjzTZk<3@FF}BR7b+PAtY+c>Z-ONM$^RdW-#%HZ^%*h%3*tn7G zHJvrd2k?KCQk5l9d3MVl2U@HnzuCa;yjih&}5`DP2FQB(JUFUTX-)2{w?^8`E3sUvAZcyA^gMT+2i!{ zqqqHS`yW>-n*QU*%u(^jsyw)0x#X|PeE+(YkXXX~27e@mtMh66z0LBf?Z4VogEp_0 z2miHXi!x5A*!ieauxLi~st=rlOE}_HPk! zNp-7C2U27Hx9+}nwR4lnmbU zTw*laZ{|Ghm=G!mOIqx%mkbBZ%4BVOU_fAC0gsb|OO12ji;sAujJ}y~MlY6cZ_Z~WAAa+@cK!*F%yqQ4U$Wme!57`ARtvq4OSf^h-+eml zIWF#f`rO5D_v-4!N(ehBLh0SpquRwo1zO+UEAkMh7jca=KRvgpeQ)>E<*M4-JqA3W zA0@4}asm%LPfBUU*ER^8?7s^>t3?u`*sSKD>QOBz(n?(m3<<@4q~f(4s4 zitBwEF_+Vg^+XqY;OyJflbe<6)_s6*lG`dA^-}WiIHECovcSlFxJIG9=5GTh=X&ez z!NJvr+_vKfW+6m^q;;1SftZ_S#OJ1_aI19wU1oQ9A^!5^!1gu)K5nE1BzkSN zyZd%KN8~!`t~;EB za9-rcLU;J0%hk4Ry7RBBpl?VzmtE)Q9xdXw;ft;vEnltNF&h`$BaUts)m-iHZx8p( z67;rw^&TdD%rg#bNpPY@Sr?!Fs#go8Q5E0+`R_G?AhMetaHyI$3TaIPYr^mEXCeg} zM3O0}eu}?FMmx3q@^D+Vd){h!FhIr`^g+aJL+VD6RVdM%SV7r;?aep}=3)DtS-=Yt zIji*cgY?kXs1JWiUkK*9WyV`^w?kAVZy1aWagnEltYn6xm%E3RQ@g2;#6o1yZe1=_ zO-J<(qRQB7ON5!mefZB{@W$l6Ze*tX%pd=oFHEc5YnZ^^tV^eMF9Fx157LT=^3^UZ=j zpG%PBZQ4U5@tC;Xi#X)z8Qpw1J{yMm{BA8Yaqj-sb3DhV_d9jDZo*vW1C6KAuY&UO zx)7_&=i@-kgu5{_m%qC$_LvDBC-k8b1AfP1%+#lUR%~XBZn2S3rQ|)~{+G)VmVstw zN86I_yu!yl#EGTO-)xZX7Q{EdYlBPmE4XiGJ%L$UBM;XZ<>StOvKq}Krn@d8xY~nU z-TsoE&Nh9qB9{AZ&rFr=V}4cZ>p+>&ekI=nSh1Jx%;v zoQf(;$xcFxu7K3+J=#Rb!fPx@v`y&4Z8CGnpW;y$>9OmdF5#+@_^qc2{WvmRr!lGpiFw`a0pZ)gJr z&;Ss>t!1&Jz>Qr}CS+z3-O1hKq zQ$M^>e%1D~_Qa5jxX<)nRb1>M)n}z`N9{*Bn5M?{#=6Q;N8dts?%R$&KKL}f`alyw zF=|hV?b?3UPwaZ(lH@UB%a@3BwxtO?6tLQ=Sdbs7HO%~|Yg@OS6M8tveXFRq{c%Cf z(|6uGQDku?bljx#Xm-|W&=3f~aJj!oq(OcE%%7~go=hUf%B@G{aw+)X)D<74JN7EE z>q3_t0JGg>Pkes2=SXn-%dRWrZ~mfd*ZIJquP@#*=jiB5X$+4gbUci{Ez6e*n3(S+ zJ#Ft0W)HWYo1Wj&0gTU2b93BIF!3eNju+JU?M5-ezO9-E`@6KYPX+#HswxnP`oz!u zcR=p5ScmKFCT7Nchfv4Co)~xb$>x5S``J-vz;egH(uFe%?QuhgA*NZ^$>Pe9(?^NF z6WKo`|77y7`*s?l9h)`ZUk?(jgsKMJk!$bkH`KPYFfC2wbyXhfpKp$bUVjQad{Wh} z+c_YeA5xeRORo3abC)#3*X$uNJMnJGH^B*?Ov3F4t;-2zt?$p{;Ww@!=Ve;IKUaz$ z)YEeOw8_oBy!x9)9v}^q5$o{0dgF6@*p6D|f4h8Ow0x(X=+W{_pR@u4Jl}{4pzo%A zaPJHDUGd-4dH!&GMeZ>M%qwm<*kp2zmRc27b1B>aLrX6G-Sr znZN$^;c8*_(0*Z{V|&ad_iB-Lu~Kxu7qcm}?5OiMv#-c@Wkgr#=2&7oI>6-Ne!VL} z!aT9@?^dQ##sQ_dIT?~WH}ZkPUX{H2yR{$Jb@%q+^YaW~=h?iPE&qq)wuxg^CTP>| zU$m_zhH!p?g-QHA=)6U!< z9noCYiDf*iZ)}aqSqVM5^yIqg`|OJ;{M+dA_QLAN$~0dl!v<@bGV%ne^yC(}B|VGh zr#NrF*kiX;-rv}gOY9^HXv?}erR?f(bX<5{xp){-dlO}r6M37J(p2NBSS5z2X?cY9;@x;i(h&KM=cvWeVr{qiDq2Qry~!4 z-W}zP~ak~ z?&|bB|MfgL(TXy3Ofy>`nv5|<4GZWiqO<8`^qnFFxa-#Z;Y^bZ-*DKEKPhWn_ z8nr!X$+~Yn@bS!f|8U}3b$#Vm)>>Xi3@{!qU(u%;V){%Qda&YheHZaO@DyPdeA?PZ z({jy#i3A=ssJUCydiS;`wz#Te5>qR2J~Wm~O|>_CS!}zD%rPtA+Xba4=TDz3Kb`6) za0mtvK-k^6cyv4!k!a#GkQhaHJsTb#LI6vo+4Dsam@C%Iy~$<&-03lzn-hunB<#g) zs>0*w6R36Cskh{I(_TL2QBk^`y~<^J-1}nSE^#gaXg!0gsJ$3TJmOl8tA=fF&HTc)Q>!5FJdC#w@cU&SzX9l{p{+g#7R-MOho`;G|w;eAm zlB>--%2(IA?$sd8#P&BrPZu&LIr$BN>0Ci;UtAtcu9^stvYzktjhX4Oz=*#Q^MKN<;?55JdbXpK6{#%Zx-&4pQw z`j9Q36d~dFA8L~L_(6ZaX(?#)9nX;t(uVwX&G}0FT}v;!=_bK5^ztlI&GfXT!)NKd z`tI_!n>qAusxVaYA@5F2@?t_p?P}~taCqvA(DTyZi>1KvzKfOh-du4N*`>?-S*5_= z9yE-Jih}{HJ_Xuy=A$Ys(Rjh zbSOsK`jGSHpylpE#>x}rmb3ID+PW3V!7TqhtiYq-iwsxYB2kyC@pa#vz@2-{kU!&z z+$}do3cmx!`XtV-SGeb#2ZJkbXBUs;&qQ7R?wfUok93}nE~Gc5xBDZ$4laf4j~3!Q zY-c>6QZ;XWqEvWxx#`HYe3^u^>cfoE<>gLFQF6Z;@ z+Kf@>X-~(6#MY#00cK}Nf2HTRe><%HSHk$w^UI{ZhtoegncmTZ24?q9r~=E7I%eO@ zfNRLr^VRNRvzrsq7h@l0Y(;o%4e!XdPjhb}!pE2URn(`m3o11_?0Wswa~4}0L0nA~ z#hHZ2XzY@ROF7J(;A^E0rc4U4h|50;v>2GGVrx62EK8q$WpM|QCP-e@|0n)_y$}3` zju~?PT<_|B&fvI21j2FYUe09u1#WSrWlUi!xJ`>Ar1*n(H=SN5xy5Iji zEvga~`B>tt`))n0Wj|rDF?V@6$74Cf@#|KqGqF2T|LN0UeoGbk1UH&$%5T||z#d(!2{tV+1@@GFkl7BJeR=ph>@Y_(L_1mcw6LfrqG#99Z zIX(4!R9Zeq9Edw#BhQmmMaJ0*gS#o>MDLAL-Y~Pf6Cv{8TdjEKY1ZwLWrOQ9B*Ql& z7()$1-8yU^%n4jKK}RO4*T-^hQ%awm>~E}jAc)Q7w)@}{ z-ZyHlFPW&1sb0C6FS2ryhy1N5cI|2?mNO!#?7B#NbJ#Rkgu#6nwhb$c6Z@8R+rS+h zk{3!{ZtNrxY4P_5?fvDU*f*D$xc8{Mn1;VBt6COKyf+EFpxrmo#FAe0G@d7{r-!$f z>4F+awaytAAGf{k44Hi+RaMBTYhAUW|LT&=Q5UJ#wMZ+^&&}2Msd_fm3m>KUrgtta zO=AI^58m0j)*Ymi*{yqinxyhsTpzjlml_TH!wQv zTw$$*5k>;tj>H9nV6$?qcZy;0)}U?xg)ZY4-2yctC@Xpqpe1KZ(-#{EPvV8@i1c~K zNiv{-iNJg)D8-Bb8H5AB4FnZRhaMS;tHcI{$wI97@aUn0yLE})O4BkZK!8pW6b%6& zR00A)@^1zGXP%lR8Y&yGk-qtg2UFIu#smNm>a4}7E}Ia3Wp-u?jcHC}U3R@2(&Vpe zICE2K(w6byAskRra`{iHm@d4c;vsF*zWM41TX|R5S$n>*3 z2@K9Qykm9E&t|bU?Z@^E=k1TVA!XnP^9&yN-^zXU^9&{0kd_ zB91!cQ%rZ&W!xwR7$d-H7?1~mK~}X>2tygt5c5Q1vf#nN!sMtbu!S&Ev%DePyUC)* zwU&}ia;TVsnTwh84`l#BFuK1)ClM3x0oC42y(oGxUH}u2P>OYEvwMB@Da;`ayAm(? zHOoXR1-%&>h@J+M2!IAkKoykc0;mJvgpul8(vzqqMYwMGjbVyX5M7-u7}+n}-+lv6 z0dDvp!s!K5Y^ij58dP&bJp(Fn91ma;G9?phzBbw{ipw-du~h^uP@6_6Qj-D_?mUaF z{VlG{G^Lh6gW{JvK({XSwNz0a^gRm8MmK3U$Esz~cSISzbcsL_G)BN0e*{bjK$DCF zH`DNZ;wCh#cf=8B%M_%f1dnWbsObq=%5lF7xn`#Y0n$>GmFPJDjGBPRX?|TTcFkdy z*a99ezQi3j^|}9jxV4C zIW77~sIkdSqoi#qAThO*Q)~3&Jxz^nTRvsmkfcSxc(wve58CY+!r{upiptMpEz<`$ zUu2RYalB=f_qN_xumFFxUTLBL)~NuB%5p`iCxvj-<{Sm(UE(2;S)V9)FAr{v@d%Oh zgxk7F9VXus`#Nv-0u~2*`)twRYmimlc|p;Ftx!++r@S*e3>CjTl3&72+5!bJk58?u~nh?RjBr^?B~yTP3DDzH32Qt8l})aoBE!Tl_n zLty|DRorgk*1A|te0ch^IH4hsx9hBBH$`5aB9M-)YiJT*t+=>WgNWB0PKH{_QVW1E zu*OJ_#3d`T7*OENQ4!L!!q@-_e7U4GXaTGgI@cyysHoLgP)ay2DaQK?IV%|wYzb2! zS|$(}d5z7l$@6L+%jUBp5f27{47G=@M~a9}MrXLt&7XswQ~}YzNQU|bNiUit8V#J- zB1^_oi7EUV2$m&vPDsI!WyAWZ)t`g~Fvq1(FH(?=FQo(E%Js%cTl-Kwtsdr<+I;Q6 zuMFtLKw%up8}PHjR!k}Y(OGD{KrME9DpX_PMkRzR&E@yyh5l8!fY^5U(YEK6EZ>t(W1`rOi<9jMjsh$2kzrZRmMBJq_;FO3LI^nPSPA!tla&5Y|M?+ zwqMFQlN5Y0Bt(mnmdtiBpI*M4D5Z-nC{Z8sL=b;1(v0;qtutyBT)B)Jkmmc)$U$E` zh3>_)@NL7x0Ogg_D{bXz>{p8vavG567GuE=Dg*0(=s@*;Svb(*LEcTxQhm0@#zup5 z9d`A)APdMAj!1MxX{o_T;TP&{<3xUB=9(H~<^Er$9D>X5Rdmz>5Bm2SU$BmBYSQQC ziref3_6qXk=?tJGG86GXZRqsfe(o7*iRNmr8V-7BMcW=F-i&)rkF>Pr2Vrd$%qdIP>oGRfwYP$#4@87RDqa#lfJy5>4F^OE3 z=UB_S@E<>DY(Y+rizXXcqEbiqAK7MdUIG9XR= zj>3ydA(7@RPw;R+ysGvEA)3UJNtWkgBM{CT9nVaJMK9}|H1%VNG*XK1!xZzd_mZEu zX`MX${fNy?KwyWyvE##ga!;zJ<<+#B0_jIvhQUC#W+n0`8N9+kRI0q=aB{nJS{fGoc0=gy;B@+AAf!*;w zX81W;q&swjjF%v_h$Yi={dHvF5pP102leybAefIb-5`${Q3Z#lJrkG^PG=i#$6RNl zj?YUFqy2uQ#ho(hi^&d3Pn|zY4Hc0ZkZy?1lBI@(R$yM3IS6af@*CGRnvyxLQYnvKt(G9432QSI6}u|H zCN2maL^mS24Q?{&jdcy@S8$7mN|*C#>yhxh$Xiu+S27Z;W73fGi7YY3$WL0#;)gK; zG6y*m`r$3z$lVPe{z(RkH6R1i8H$o@6xG+gs<-q1txJg3!{sK!!Y8*z&fHI z;9;^Fgvr%lp?p`p=NF{U%^Thrt*}om*)iEbqHD@>vvu0~;4DDMdL<=J1RZwY$AvQO z0f^PNTBK{o{Ol}yAsmOkm?XV8@NVHkIAOGfB~96aP`yFM*NI;{r zqnLthZ!KWLyTh1^GCIGJ_?o4a=u08>EN6ObNXu_wRY>$g|I8ROpt+Krqg!%OovB&1l!#JAxmRKQ2fA|ve*4%IBt_Qq9Er=(@Ul0BEfq@KWls>i~B zx^b*n$!M%nX(#a5c~vGtyww6Hk2I^8mjOomAx%da6qNI7k!2qzRDHN256fn?yJo24 zc`ah}ImqG$8)QEHzWL*aG?p1whr1v8n~E;Ml%u57Imjq1p&zEsSy+J+wFlOGr5!q( z9`gjRkqp&B>wawN$g4SrL_yLvaI|rS%EF$WHv_Na6-R z_%xsnvD8w3&d=8vq<>`0b;#aootJ!*H6r17Z(sh=H>Rym8h=sDR>1eP5CpdTBl%&@@OjSzjg=3N#^5ag}<(zJVzof zK-JBeI7mxaw7Urb&@ky_2tWn}gH5})G2AMZAlv}N2n;fbabaSK?S9Lwt!Tk29T)MM zkj_kk5CzOKhEA-jpNj33LPRfvQlPk-`2>zNt`l3pmp^e{PN=SgqCO-do8pcWMNJw5 z*|m5t&4@ywBn#sjVrE}sAxs`8**#3T5CbPmTkDVNtl<)tgTc`5f}NNU(1ULJ&RQeEha> zjcmbWvPLXUerm0=(Ho_-)DPdx`O?ZtnW+`zWJhWhS?T+`VO>^>e~?z^=jDMvz+pB9 zSIARGZnV*an3AIW?2a?e{qQCvG&FZzIAPy`m#vQ)!7+jYP=g~GqO6m%>nsffQQz4;j2*Bn5DlUSFfmo(3smq-)x7r^n;9cZCfWRUuKXmmy0N^U-aM(?N7~Dgyl~Oo zvgW-cK?C74uswq)&xD$+^FqEJxoX%R^B4C>!iAT5M*?LAareunvQueJUnH5(SZkbz zr;vAPyAtF<@@RDW=}}GBr1CZ{B52aezv4O2#()56^yJqT%(Tg{ua+@JVZHRf0Cd8_ zRE*)=K(JFBda?So-*eb3#5QIDvUgJMi zC?nycOvWmE8m(JYA^-#H@cWd70vzmx;V=R2eK$qsS5PEUj(oXo(Yq+J)< zR~zgVp9u;B0kIU>zpxyGfl*Q2Vfp6f{4ju-bPHLv#Rqkg=l>z)hGZQgizJb1$4lc8p>@-czm{?1Y~} zm()!dt|$*Sq!KB|y#+j}Fn@y)-!}7UOc}e+&DMnH9!2c zh8q0jK=04UCQ?=&JF(;~ai}p=$#l;dwXUCZH=b=gu#j?vBJ@{pHa!e3^E&h^KDk-2 z6u%iRh5}fM9TsTIXhH$z@td9^oSar1WQntk-zObj=(45NS0TJj7Tvw>_+le%cFSU; zUUPA$#SX4#;TerlfD3tWU&C^h78|qonw6O!cED;a+Pw~3P8?*Yh-xnTG#m{!vIf*I z##~|v>jRbzfX;*-LX8^zdX5)%EdDv4Ikh^RXQb>ANXIA9odUJM(F$eO2)bkOD#^=w z+wnb0okdBn=h`s^EXQ}qm-EYvAgKT94n619tM|(@C(9m8^Z+}a)xMMv?7nWItoKOE z3c&6g8H+GaG#U#Q(D8wHLnS?qgDv(w=1)0U=~XJ~a5zg0I4_lrZL7JsnUaAJ5QeM8 z^^`iEgiKm~h$W?rXO)q<+OidgQ@EAPBRW|c3m2eG7$1NoCOFqNEP7qj5!K5NXmG4CD~|xPkX6M1{~M zFxEsZVHiIN6=@z+)_MroCtgVCt*-{ku5mE}g~b9yP?R>w!|AbKFe5eUtPwJD&K{u# z_82%4HC${R&{v5vbsZD`mBoWEnZ4sQ%eiYB~>lQg9DGU%`SsC~hlBI7LwX=4HKKraJ}+!B z4;Galug+It_RFf@O)A+spWD)hgoh$hbeR=+YiNAgJJ~4nvaeEHOvQP)l>NxtrtiIR6hF7Uex%OuP76j1UlO!1(|`g zBQ@yJT!2!MWkr{T!#o(MwU*-8$aE1;fqCLi?GbFT!c9pQN$l@Pe>}%e-yZ{7l^HiW zL0{)FYB)R)6Jnx(pfDJEByb@oDL-C1x)B8(2&)lYMH&?3Ran=iMR39i2dV6wgQ|%% zbsG-p@d*_95W-eS2fK>efhFhZx5VU$$T6PaPuC_8uDKHg!mMI87G-E)7W}| z_xA0Fo*p`o*Mzjb?&?jzMMMIuIcIiaqGV6}h9r8^gCcmPd`nnBKu7^;uBaBoI2o~7 zxr`!A*oRtWouWja$S{%lo`CWJ0|yXxj0G zqPD+gSx4lP1wT6sOmIz0i;ZI)9$FaMoOsJ!wS-SFK}$+KcYr^B`WY+k2#XU5S(0YB zwu8xD7#z#|^$Rni9!L~8JheJ0>?=(Aj&bxO9}^m!V_Y{pl^#gD4@Xl0kaL_cKr!NX zhvc)L+c|s81P05e78+u`e~+ghN?2440n5_^tpv7r)qyD1{m!4Hiy0H9NzjU$-)70| zynvbt-39DCgDP3`c25{%~g=(2bDb~ zYxQgc-4|Dv!Cl%MNFJTuC@Aq8)_={nKwPk-KFY}{fVI!uW{;XqL8bCZ6Zsa{dhapQ zvJ{`R7>9S}9aPg53Z zs(&Sfv@{l_RuY4~=_E2nkOrRlgu?v{O*U3En>?3~lu+HR2_0_V z4k5MNa30(rczDQengy;>g@3&WZh4v6Si=enlcLqN4eJf#$545di0#||o-KeeG8X2y z&XEoSuy|c0kXrRUbG@@8VFYs4XMwS*y#>HT;cgUkN%1fu0H16&F8aFloYnb}Uv$2v z%64dTHa61&kD)M4MZIdM^(kLwHV&GSN$ zzmwEbfp^`_hslu(Ii+iNLlzfCtX#4kRg)U{Vb3^(v4i z%O~ms%$s!}OO5X20K?A`A9xh6HwfiYAnt=u^L@#2;YpO9W*^UYc?!7jXVa&40{ZEz znb!s~{Xvp?9Au9CjnQ9aiZWvN4t8zgKT~S9>hU14x+N55FN3+se(ds|12JT$+!r)! zklDZ3vS)D2cW44uZx-^a(p*dRwUwE)SVwB>WlG5+L4E48r4g+$)Z-V``{%}Wz42wlhaSAfz%_5yDu}1jJ(TUIdc?D*PE8ezBKX9CF+yaxfncmPqV4r^~ra?6ucRwR=`G9rMV$+s0B;1;Y0C`+C zw2Z1$d0};nRBbF>c*(+nv96!Mx1Uv|Oa568|vJJ+U*9;VigEiUU zT^?>JZ{;WPJJf+R+dsWc%C|x&LbmB%lgI6?SD zE;fEv$^3NlT?IttIKdBIj*`${k<8cyY1qIGq#k6|X#fXrO>)Nrw@uue}dJV_jE zxB*3@JeSc^0P)%nlSmL-il5ppULY^u?>r35Qo#(A2c>ZX>-@jmyNvN8%w?IhGfvB% zPX)zm>sd%^?E?7|5KW&9 zASDDdy<;to_AY*t5LGg5%=Tf@^ZP!r(cn)T@u!+j*)}s(NCb|&?f&VRl8NfQkEPdD zseHQUuijSH*~~jYHjVgEOo@ zIvTpBtT`6SCnoCupXiyY!X@%DQum}+Y==dU;ystH^2)(faI9- z2JB4L(zliVOKS;u!n1|-s}o(*ZwjAqS6v#s1zA)z^)MvBDOs+O{CNry81MMWGO~cS z&Pb-LpsSY$Qgvy#$Qz3YHVQ-w7~p{yBwxLdIoI~o!D7FXF4ioS1c^T-p4DZLXLelq zW0Lun1=lelutQFHHy}sVY1*0M=v=DdJvJcTjx>);yLuJ{*#UEAMyJ}QO#9lKH zP_M?C?K1aTvbeyEDBana%kFnuBz+_@vL>H|MT#EFRZA?Xl&i$(xeJ63LOl6dmQUJ3 zEy(Zw@SvyPa%}%-G&rNKAK`QW%I*>zRV$QCG*}m|<(+W#Ts#I%MV5$SruvZK-sLSL zQ(Y#1P4M1lS22G1%J-|EK%)Bmd9I_s*gg}#&Qs4Xh2LcN=DVK&0I$2bGtQ;yc-q6Q ziZCh!MEMpZ8o;GpwI!%>I%Zn*xeEOYnh}(j&BRh5Be%}4W}(gDblrRHzd50LHmiaa zp_sQOFz(rDT4=7zBsZSDxnbqIUKP4KUsj;X&UIliN>cwhZ}^S!Uuy-@7D zu^1n1bx6?Y*#BEt(Y-|pR-ra$!m}txVxRhi^55r`G?C!*osde^iz+pk;kf9^TZrSk z(CkmPR9+VjglLuf3CFkbLVmAn#=aV2w>#QMw0@P@lJaFOE2Qc`Op(>%Z9KI!x=De& z?lD*59LY4`mB+9Q{QXUS?w-#oAl`MxOQ%F~ zZM}5LTYS#xx52`-+{L>05+bguil5c0eaw~9$;iz1=iJxpv%J}PT3Yx1@3Stiv+rUv za(SI8iN0DplTODdwwZp(QH)aGQ>pPLNEX%yOQS;E#sMn3ebL5XhLlIpQzk zRdD?2J~md}=!CYW5E$(+FOz0AOM%R=!yZMTGhAw7pBuK z4SfksmGt-es%7q9HmV`0d8RULjU1D36d7-Pp@G8ldqb*At905s_R90wh9ex=bQ?J- zbv81qX`z6GN((4iL8sil4W~SnWwvD^S82w?L?itN6=&5&bCF7ON*<1dB2Z+7+6ay@ zkXH^HnNDe4{J2mog;)?*;D%4d^X*Ua^2L2)nsZxwv~~M+tU938^qR{DJmK#5-toHx zltS3*LY;*R%iiY+--W1rlJ@kd+`Zqth(_MObSE+J!16{n}W`kE@> z9Zjmnw~H1AMh-zRD?i^?E*WW7wa!jPnYH;tOhS;kHigDYd@SYf_Yjs*L8hPU_sshY zoxUwZQGwSD5;?;D)TPL43s~-`)24EfVZ$Mb%<_y|E>Obi-*0+}F37T9@N&hUO0#C} zbDrpbe2*8V-hw6H>g;g0wQvch1(+9o?7L1Z*$Y*GNej#@xPkH<6cF^Z7dr~XZ(M0b z&h#^vm(|52#*T~ccN|%HT0hkYCj8#f3+??_R&`rEtpDkLW9G;pc$}iAI%cgwMq4xt z=Hx8Be|}0xqJ$puy;cUFHO!s-XmN)J0UO_-bfs#{$sRpdmvBrpjdvB14=hk*MX*%~ z*k--mEqlVN8;0elC%@3!8jDDBxCPw!2{zb9?S(?2V=eps#g-Z%UR%Of;`Fn#{JKl! zCr1mH)OBUwxAHH-ap((6wAsMlwA`w z!G%NV7J)L8L_u{Ofy#Ciy751R@!xnyvok}eO$J@8Vw<=|fPHT>>PuSfjsfU+`s(5vBXg3#1Szj84Vfbm`FOHuA8;M10NKOu^t zOdJaXr8Y49Y(CSR85^+oY;-4E-syAeq0rRZ=ZHmL&L@t}3Z*xqrc4cG@~*U2>xN7a zw&%tP?ulZCpT5h@LeCb^s26+-9J7BJ4wR6VRB7FO)VQIH5%k;>Dz6Cchpfvom>JiP z-S}in-eJ|6o=>&a?Kkm{IalW|Xi$$6>v)3`G&8KO%@qbc-XLWot0CQod_w|lJk+=N zDcZ)T(;fk49q(7)zl3n3@%8BUqA{@STYE_`pmn#}PX_!XOk_p`jr@=Y0%f{51kc$k z1tXPDD4_9YFRP-?soAvyDf&W8wmbKOZlChq>sN)`wFZG5In~x5o|)nmj$g=*J^0y_ zEixB1BF+roa;ckrzOQ&n23+3RArB#qjndYvZXNX7QLakF36#D1GXm(ID1b3&-}Vo( z6ebQt(cMWl{9#zs7dcq>KA7cvaI=4NV04Q9b^$$4Fc4M2wlZms3(Rp40e6EZQF4QQ+?5Y-gqJ9qq^Ub~k1( z>-sd3k>Iu6^ICSP_gqrtFT%@~kPAwznQE?C5)vM{At$FetQXeyMP z1l03FF`qdQQM~mStfwB_{YEd^6D zWz}^OKY1$Y1@XLr^C2($Z#qqX1`^LlcXMMgjrt*7Yv~Ai$xitq^f@*}$kSb&Q`?hc zD5GEIGn_3Z3b|x|V0EF*5zcw&$DfBp5_@E}W- z=X@Rkg7T8NaRn?Nl$qXHaiBJ65XQ%N)U;pKa^Xc^QX9JanL6#&?+#efAKwLJ3>aRI zorhZ71#V_ed_Z25W_i}|I`!@FSJ&Y71>_gu_8oW7R9nXjJbNZunF(h$*BU4v^5LkV z(4BY&SzdY7K^8Y4K3>RXWLWaHdn-QG31eA^+~!B;3f_0_G&#PskkBmd2#b*da+4Ap zqbJKN6;%qatZFEx8e&rwi-{1(@L@{yAA{FjeF39S{JEtz0%&k9)eTIPmI9-lP zT~Ch`)r|oCqucM_E(~zq>d>-6AssUQ*gBY5+O@*l4>$T89eg^FQq8&eEl3dZv{!bf zo&uayp;lb=AZm#NvpH}?`DMH#Cm=W;XMh_GmMuc7*vC`H=u5Z!mT>WY({f^t?PLV2FXM&m}~%4vqd}B`dNTPGw;g*cp)mlisOR{#iIG#Pr|uM21KC2r=Dv6 ziK}cYpMu%iphbAf`ZVr(g}ScRCc_L3r0&MdOvX6|4h{~5YHAWqed1Lok<%b~yG!!K zvjCM9T~-AINYao+${0vJ$O?jsG=m^7ER4=?Ah<`a^`;30EVwd=_Y>RzNNDiwbrr+2 z8#q_{r{&2h1n_)nc*;vuyP@m8Vw=a&Dla3S#)3$GgJWjae$mGnswpRqsPB694So3R z1@$vyP(w1=1utZV0Gh(67-eKg*!Lh(-}&PyJud3XrT5W$PyF@ED#zj0#^ls8*0XEU zmA$mUO~)nE)?>KCpcmQni}F&lhZH>>|A8y5O95<|ViL;EdqF6X)j4TG>2-s7{OL=v zo@sLkaX(9ZB%}Q`WArGhRlH~ALHJPy(nl47rm4(oLn4QCo0!EECqB^qJ3nqbo4u!YY1xJ@)@vI_tQmzWZ1ZhlDgJT{4lF zN_R6tB&8b$(h^dWjtK}z4hf0THHnQLG1z|d^ZosM@8jO{zUSV1?z!jvdOhFT;nvEE zKiyk$AFh)CNT|*O>B#_!WN}7TI!0m{(^la`^&sY%?uk=&&mA8fhJ>;~HOM!kO5k)r z?s59uOyS#_)QX#G-;2tzv9vVmylMLSgN8zAl~+!I2C|kTHAb=*;y$+v^?`!qs^YAJnu7Wb&0+eQ8fLnBLQZ$MXZ z*v{dKGukB)rPi@;-1vUX2Ywm}ORXB7DwBItI0YME_y3rm-_@^c#*?KB{vZ)T`FSplSfr)?hfv7nSFzl-#-fR))Isl@p{ zj`_D=#Nr$D$t$d?{OOF)J@0HJS1aqNK8ccj3VuT*BjnuRCMN#NJ!PnRxG4GbpxGm~ z5SoZrU! zk1bhg_M|AuY)I*clUY8EC(6_%Ls5*f^ zLF^wnKmhRE_TSY;XIt2FX9qp)qq89r0_g9jCe09e2l$6?{db6NoM`>Y$?-mxLO0%j z=mHV|;8$$Gu(spy*Z@x@7#{dS^keh0RWH;ZQQy&Use6#zg;RnS(+OEp#+FuG#Nz!#u%c) za&%N;usMa;zzRX`t8JlQ>pRB}_yj~?H(i*h=zl>rinAX?VB+4XO9ieMG3ONj*GuAk zR_&|&N`hGkd-wCp^z{Fb6c(8(a-GY)C^Kb)B7MFe|KcGBkgCQIwZ%ndxBsJr0HR(B zrJ1>aYW%`;{?`MPL|L-OYeaFyKg$UTAT{|((?a|Wd*j7_{0(AqUmkY=I%j7qpE2_T2Xf8C?1zzvmT80_*MoxB(=vwQ`lz zfqlc|h!V@{xWI6K(PFMeNeQRQuFcrVx z5JRe=itf&&B(v8!rrNPqvgRQ}!NRka5oJnPR&KuV^=3cl&j-A|H=RZ_*Z_u|HBStb zRJh;je$dyV0w^-I%HoukX+n#?j~iInJl8Yfs*8yX4N%U!#OUq1TeB$&2qCt#W+*VoBTIAyfP-zN9@<1iPu!#}M*hc8f28aY%Ku zq;@Qy&N_UQQSgTD5HUba`N{y&yWYTZb@TE+jpW2SyqX;j7o>9!=HjE8(Y*T3$r`c)F&N5}D&86UJ8-&kH`3$+d9GS5kcJnicuv^v%HJMm29+0#ZvhjqNsQG~5LAL#%h@~~(JX&H4LmW{>mNUV z=o6Fq8K9_X{&}LTt35vu(+<;xFDo+>uyvy<-DX2Ko;&+_;|ubGSA_EkgPa_}ff@-Z zu1jfVs+&J2@=OU*T}5dhV!RYC`Vsj77w4QZxM{trXg@K4D>4GZ-w9dCLP5Rynjk(z z3oFOk1K!e7L`d&6{+LdRPR6Rg2i|!$KY@Vn!YIEnrJmOcpcfvK$Vd zVfGOPsPm0GaGZ^vgY!>%;6&tj*6J-1S1G1y-?b5=d(sM>VM<7wpdqWk&CaHw=w~(R z+Z&)3LKZ6B>$o$JII$W0(iD0T$#0%=-UbO==@+}&36bp(wKh087L2(0#6F7AC-`W0 zVib59rw6&Zi2qe5S)cRi&W(p0dOx9Wr`b+H0m!@VyFR#m*L7&63=0U!?ceQ1bs2$d9xx9cykH~A%&~o)0NkJ7R`TzwV%5>exg*~9a>+X?DkN&YUX=g$ z8z1?rze7RR$`%H3Zq~B#c8|!oL$VzKAx5kpP6e74hF6)>J+YeBZn7FsgnZpQHxuyb zDwye)1`Mp7H<{@jTba>*I4u0ktBuuwuc7$O3EM+C{O|{1=lcMeEy)9{gvsS{4PprG zGwVHG{HM4-joY4>LYiqDVTb~-uKhFd@Uk#-FC9#V*9?_Uloqc&vPi6e-bB8=cwX@< zl7^wyU-P=MZTi|wyeQe)t8;X}^XtT>HOWcc242$*-|qV3-(K=lbl3CdvS`S2}9oY0+e)K5t)B6RB zBC92KtLQPGqeawQ_#2PS()MBM1cjD;^xMMw40^oJ=nHCvBFCm_Sz+7Ttej+wFTz&L z6bh6Zp*Zt**@b$X?6F zm-gkQ_K_N@WQxO|`z;mr=VF6kSS=x-h@G*BKlPk<1Ie?Zw=R0WGmPsWLHEUl2Glpm zshqV^*qAO_kN%d9-_&3_|M1O*y(fUI5O7O&cq^M=+0RO$t)@a`Jj|>?-GqzRog+Cd zk9!2d1lru+`y}<=1#Fwd!slyOk94BZgnT&C(vpaZr)~xya=Mgv_r- zX6*W2N_Aqlp4R zO5%OrFxlqdgRnfiO7iYLENcqeQH_{?+g2^z>$6b#*EE-78Hzzei+2TV>dPAn1mmr_ zqLEBIjMs0m-WH>~F!5nBRn|&2hEJfwCnSUH>uWC}BKI&RvW{(gx#SM6TNahn3=Z#d z6k28lnXg5;3(LTw8wYOEzIc47ymBMz*W@lHYDBh0ong`Fj0c=9n0_?sOX^L0!UUsja*&Lsz{iK$k^DfaMYp{&WI5 z+Y#S=-i3qtIJJZmXNe? zUq+jNs8glAn!961mFagXlHAA>%BQlX{q zC-``qmpYD5@FDY?vq-bq3{Y?xIuQZ##aQWCUY!K2%xvAHXe<`BHFoO_qj2efjPpYd zBW|OJv+Y1V(5(GRHlr3!>yDOQmICi9F?F#g_n@q8Ztek(|GtK`N-_7|Ez@y{eMAy| zPq>vlM&ysU*QQ}xE_F-Vj%i-gU5oa^Z69)OPYWl#U_M7Ah+57U zy%j}ry6!$tIjU*jpAi;5#1v=Y@;sGxDl+nd(FY~H$HPvvIwuOX->^#_A+)dK^gTM8U{1&lD$~c#UeDTUbDGF{ zC(yqCd%|E&!;hF7g2&#gDDY!trInv-_};Kd100Zc5(e>!ej#(8&Z?w#0;Ru{MP9_49Jf*Soy50B>-# zY?w63m+d+sF1t|)c`1oWK;u|Hk-m$i*3)cYS{cu69m6?H{0|mdg**yx6TMrGkapd z?~=0TzgeeR9^Mq)aXje)2^eBS<{wAsv5VB4@4;!Pc7DVXaO%xF52Y5Q&fbZin*fn^ zvk1Zx9Vd5N?jlOd#PYnQ(GJpnQHtY)@U|{T!sQ`id%Nc6!|lAXLHor{w<7wTJD$v~ zBnDwK@BeBj-yf7G1U5o)Z1|KhJA_U@>*neAZKbw#hQ*EY2{VuUox40@ z2i)vVhmP_Bu1+%YHQ4<(t2FAgQ5BYt7l^l|w^aVFT#i!o7!nF?M+H|&>21w^PP{>m z3oE}#*$ulg(wq06Qg+$UdUerV8C(yxHye`#Bd#^>1z&bCo1|f%o&S7bP|`k+PrN33 zh(9#R(2=*@uJ4z%oqXy8-|EG5M%2jNVt3ulO-s1KRxSk#DI;?aKudBm-lsrF@Q!da z42T;zBu-#419pWUDInNwmweb&vRd`|3Mh{~^QsGEbzawP06AMcb>6vbY2BLH0BO-{l`&JwzXFN|-E6T+;yu?&RRGKtBYqdM8>mN~gZ5$hFDf z)WUmcD#OYP{DTLKOR&Pnx{UZACBXB2maa}8j+z<(Ps1I=6n^ato!JOMREF0dhrJ2& zXM#2_$P@C^@_d8F7bE$|tpc!%0pP&3u$DG#y6eF9>NYRJXY|94+2a}i@fMUGYc8ax zvZRIca+PSS#-Aiy7ry)>EtvpNB(HEY_ox&$5!qd`MubWQUJ`7G34m^e7ia@m7*MEiFVVFBF zIdX3c#+GH|&fXev$qrf_hSDJ+)hB$Q#?%h^=KbH`{Dsnv=EV53-#zeIl|4CTNBdaSSD?uHjAjzVBx{m)g&9YJL&gi1Pl9r;w8hevVF?CTfK%7@<)%;Q}8G zHGu^Ep4?l!=>CnYZaJTxUO1`A(9P-af3+2|bh&2ZR56ob@~HAYx>FvK*0Hk=Zp{Yo zJ@(6vuu7Q-*lU1XAVJ2t?!8U+KXVB#r&KArzf0$sTi}LU4f?9oNd<2onwm|#A$CL%2MniQjaLo9UB{4_al$Kxh zjo-m#Y{L3xE@bUyehdPBUJ3?nJBW!{FfMgAZ9yf5o*WdF&ISwCDl$FB%-b}2$>2<| z-&~Ecp1!!ec7y&mg4`C5%8oZXd^$U)Ortg z28B(W4oU#q2(uAET6w`i8G3{(3a}oc-M@d2b6e)LuWWRN4?76Q?~G2>9YNej4i@Tc zM(1(gWP=Zyy@)g%?T5$AqSR4E$QjI?Lun$e14(}ntF9yGO;5$+0~1?fh^Th|UCVv7V|DGYOH+M569&&0w2xAgs7A&sDv@d(6Lqy6gZRM8bnmA0>`Bt;}m}@_0Y? zCMs>9G*!WUvz*d_Vg?aE=#*I>8DV_UT|oTF?=&bhE7WMu^EkC$hf~h0P06J6CGGCV z%sRwymr0(*Q*rcIkk7lgN_7Tt3;QL@KT_&HGdJD{MzuUPdHaMGKlfQr;mKY!PE7i1 zOMsvEs9VOu6(;Btf>1#kknMnQDUv_5idryL#oaD32 z#o)GdXsIX!55*P%gS)Gp>>M)}#}-RlVRnoc8(jLs-iC-0Mrl0lse%_X9`sm(!N{#L_WFrp z0Rv~G$DiZ(zYBFGQ0>$SjxVjhQmR`&eq@K~`s~0o3i1A|Txj<~S(8T2gK!hxCP7%K zg!uOA5*3(9+oGbaCzFvk(F^TvWH5u$SdvJrI=(}Qi{Xzcn4FX5XY8;Fs0dMYb0tze%Xt0zCO^B!86Jt84RnlTMPeu) ziX~BiJm;PZ-Wd7z`SX)^TyzduWj|QJ4o%ciUs6*GQXf;=%^TY`AfylD5P_Elobu?u zPUM?#%Xi4VOGFT6*-QgSr9tKSU@e*D8h}aQhXBpagtg$I$1}e&r{q6{YWatoqwn3T zzOw&FO&=~SWAZwk)wN#Pd41jFyLPfBRsLNYfi>8v>_$(1$C&}Ag8M0}cfp-b3klnq zRz=3Nq5Ai8y0WAGD=3pw$2J@$K%2H+_4*gvUvxEF{{eh@C z`vAIy<8|c12APHT-nSYiSot45D|XAP(Zj{Ov?2dkhTAU(y}xY>(sWstBo0E%>v+Am&KEQwI$PAErNX_aot~L4t6KH zS|H6=QoxRPC~TmQvC?|RP?eqjo)aN>|D0Eq-*=~+S6F5q3ZA(YGL?r)od09!Ftm(r zs@B!c?lho2f(==L_W6RgnSl!LbKdEw!Bq^Y?$|NOA>Gz_m+*ZW2I-<`8kTGNN!$Rk zmr1E1UoVF%7=>lEwq`{q#v2)_)8%0EADrfc-9_T=2ySR;O8i{v#5ZPizdPsA6WQ5G zXedj2px88E?!SXR9o()w2YCQR|^YI&lh67hd)_i-ru4ly( zN1G!l0ePLG_U;AxWJ#Rg(PJ0e*ANSkX<;GfashoyfSOd_r4nih;^rfk_ahXA0nx{z zX4iZ4+K#0_uK5A`XsN|OR0MI(IQ4dXV<^8}SeBO+WvNN3lKfZzXRQL@;*qq$h@tT? z;8~yOtO|S4j|9_zfP=bz&i0)H+Wyh@I@=YchKWWUIjYb*l6W(c z|5Itj1>jx*1Zd@XHg1wpWlkyU%$%aqjlGo0_X~c1d;laINtp!NlPliQNPe|Uk);3X zC%?|Xk`JLh(rUM%{HTQ2rF{T3>b(An5U~S68ZTFQm z!o|d1O~(f2x()@W1pjZhHN->sb_M7)aBt)uo&1*;RLhd3*T(I8i^u8qQfbAIOFhHxNPugyRvO;r}m z-2PstiDiS7TYm32ZQ;gT`n3CT3u@*Ra`HVTfqwi@E=AnXVc<;{l4h}!ggIt zP{2QV7~L}pbZ7!Y0yp31w{44NHtcjp=KAlZM%G;ZsEfRJwWij+hLEl6eMoJgQqX~3 zl&$jH?FU_A8y2d%8ot@4oX#x~cG~IK{pR{>b~D|VX`R|QU}~Gw`O^5a1VYW+!Fq>H zNfeTXA%yZHYEESF`w&L}4kCA+*rC_r$C}fMdJfJFq8h~wYxLhcjaZWZ(@3De{)BLL zpsFd*(x*khHu#$o$9O{yZ4ACn3(MKOtK82XFynSw-=U{~UM{y9YdhNm$)kx3ZTT%( zNC2O^#rS(@5vj^MSu1Ymlm~$Q*pi>sWst31>C@n&=9G9KW|uDLcn$?EdMKTe*RfsI zLwmN|=Y>aW;PU-haJ_#0905O>^S2m9k-Cf4 zsH;-XtG}tr*baZUA(DXIr1}RH-QnaKx_>F`(^ zB4~4!LXV)km#gdpouUn|jMdpv*?Fq=yl5J-1gaq*7b>yRs3N53`Q8LA5IcG(R+jJO z+n)NF(sovF*VDA;kPRX0xTHroObdG0Zp%NoT-+zMXR)Z@L&bPa5x_;SE0V;dnkBcK ziC&#(%I_`wq01|8!F7#QM`pe72>W^;SO)bRewDF={WMJvyMDyu)6}Ck*RntTBwl*; zI}D;t0S#ES8lb3_Asp)w>_>9L>11~QuF*lgr_17jL}+aAp*xNu9$4Jfz^+HXoXTnd zy4W)53|bgE*km!VW<~0rP4auQUgEO)+1)P6`GXD*E!<%VXTPisFgR=-abvep!Ynw? zrdQolQCi8E~mT+}B;@v^ZcTQd5$J-(&*Q(pt|f(t;pIa4(`EzcsL{j}-9 zYmW2h%gjgT^%be#L%vFiYJofH?xnXq(z3s3b+=RO>#&tcI}FoadecbeU07H0{9}n? zXdbiqg2{9leBkArj;PLnsqYdU9C!G=2o>_dSY&yK*?zf~VCHYgH z*1Ecl2*pToc8ZG@rxY^7D)tV)dBZ#I7JG-GU`@IrcWY~ef!kxX+)#+GTN~c_Dkpow zxP=8!xPPlein+ZtP<0|$t?>?ppK?I*?U^dMnVbQNc^%2d;sVP!N`^!vQyO(vSCyx} zj$n?utAHKFA&ZtD(>09mJm+8Z!%u%pa@cOSTT%&SwfA6PkD>w=dzV^i5}vJ`$vR)E z1&j17H)FEnBjJ=ew=!rUF>1EgW0=J@*ze3Q|C<_fN|%QAD^L} ztPz@88Boq`G1Io&sb=8d@HZjr#M(FE(WcHz2xoy+ovKFp*FQ@D+uSDrF4poDJ3!)% zc=6)~@6$*3YwKT4cd^(2zSyc5g32bP{7x{HK~u;~g z04-h0Wpy`R-Sam-#}qt8W##UWb{{H>1O3A2)L zk$#nt7oQY^&MJ7S8HzC_S4hD9AMaqeUjwP8g@_C95CVQVW(|%Dw<-1Sh!+g*%(S2XWbf4e_A+nn{nd0 z&(+ZB+k3h!T;*z~; zJfz1*j%XnbsV%ozGD2*fQ5V*{Px1Tn^rd8!I?@ z!A&|=9{KFj^V>t7x5`tgX_^XHfm*!!3B{CXGdsulh>h06*s z{zhUlhA`s~8-V9R*Hxn89+j#;KT$L_D@{)2R;BU^qYcfw8>wvanWg^21qUF+u$~)e zbKxkU4|r+8_FYUw6QHhGb!c-nVwV5aoFH!ev(o9eU8;UVZjGi^mX(GvIIU9ikkN)F z$>#uH64TbHf6;2_ z(rA7myWRbZg>?My-wzv4w+#x8tEXf?GyJ9QN=sHr^R%p(KTCsa3aXSM6dpeyEwSAQ zei@@~ePsah*)iF(CR15>!CkS~`&9_sj86uTUgPR$6lB`b$lXa`i1# zR20$Ifvk@4$}S#b7w74>eAmzwVR#Q=8I9%j|p)c z+RVj;*0@lz3UY5ei>K#~>*k`o%a)zFoYh6b^)^>aFgk=Jb;wTTyC?;#dikfk!UBFy z7G=_xnu1(J(aq3C9FGmv*e#|t5gHyiyZDPnQF<;KMiMGABK(t5QK%$UU*#6Pr*pQQ z1-ta^_*zFkl{+sU$IxpCzPAXwpQ@!Q$U|0TNy$x=-V#|hNmOC;6Yn z@AzjOgEAe&W<8OQT<0s2rwvf7GZac6w4}^2>sWYA^i%wzX9e`!Yg{U?D}Vo`tjS}l zLSR4TrjAnzlCeBc3?!5myHU9Ij7%g=(_O4M?(KmJ-xE`@bj=7QWt+L9_O7lje5ZnS zG|{nJGKlhsN8cwdkBQz7`(pSjL&Spq)tv#;c@L4cmJ(j75|m7dzI0wxiawF6z46xV z%^UHl$;o*c!KpEN@~#RaVO)T}sB^*%%kie55mo(sgu^&2JKsU(2f3;6<>n`Dhp>MSdJ0{tL>3pUWA=B7P9^&mdYx1)>E&u-rQ?C__`eBt*ayY26# zo28g3Xv^>qMG!~`s`CH@D*)rOx`_%A_XEqNtkQ3q!;Vh%=51``%`4q`4IMix#sb{-yj zVpe7rZYE}KCKfgZ7EWGvW?oiS;(vcg!PJ~h&3RSCB>qhcT;nITbai#)Wn%L1@L=>{ zV{~w~U}E9n;bCHCWnyJz07Edic-gxec{13$ko^aPn3;=-vz4Q(m4iL;UyMe^4sNde zq+m|}C4!yff6>~z{98?6g)w;=IWn;@GXE9nA3#%+|H3)CIotk2+|-20%+}1#%-+=n z49oIgSVv0-R|gkMhyNSY|Ly*t2!K^9FaKW}|65+{?EXu_#Z}xLEXKbT^1p?4QS)*% zV^T45ad2}sF%x$Ovq|<>8b@AHXEP&L2WK@02iyNll+u4#CKeU_J25=O)S6cIrVbu1 zH2=dGGchAqGk(&){S3^U;8{~+VdrIL=H*~#VCDiB{sk)UU}|OV^}m2}{{>~`;ALj} zpFqJ@V`}7T^#2NMYQk&o;B03Emf6bA$ij@t(cXfT_`jOu6?L$6a0U|wbI0~Swo8kO zDmgotTiJp;TvQ}Qh^56vIazo(IT=_PS^i;HUY=Ll-o@3(-o#8=jGq*&A4V%HQ(kU1 zHWp?xb~6SOW)o%x4l{Nh1|CjUP6lIhV@@L$9%EAzZtnk#7jrOi`)dXN8E^XkbG)Ln z71#@nZ2yn({PoSh=EEyx6T|JDP&4ew$+WP-udQ4#cnf|)%zeHjBU#0w~?|*Rd z|A2$z#^2(90~WaQ-;if!4~}!r;DAFwBU6^K~}172oEC zwGjwO53)7dFjC_WK@s605yp`b-$-G@h<{0W5Uy!DuC=x|6QEB$4G}mJcl{=TJG^>1 zf5&$D!LWYKkk-SWB`|Gl$6FoqSPiX|Z6-|f1;Z*jo#H7R4eIq->Xj%^;= zap%UzYorB#=-4v9@1NHw)eqpIVSMJ?>K)mVRHF?UJ5ckn;&a>Iui<-nd7jE@CpMI_ zOKdZFiplQ{>In!)ny>71Ys+3~e!72bv|YPAeyDH7W|9yeDr~Z6NS4A-X`Qg|c0Kr& zUSF(lpQ=+XZ@nbb`*Wn$2_xT`@zW*BburHF@bngEXr-IAZi*=8Se)P$*)8_j>LjY zif2Vx6o=3iDx((Ef z^go{-&9VfvRh0*RMrrj*ksBk-xEG^OOZ6=NagHqdbzj&&yq{K=pPw~OuWILJsr5ys zw4}1qt#y@fo-AIfqr;W7w4$)1LfqL|NoqgbL{eXYN?et+mYtP%{!fke1eR*{(vEX@ z(PrERYW>n?osQRhG>lxh_(_{YJSAK7a$BxCWA1_6Hq`tuWB*Y9HE>1@SfXyF64x0lmUu<3FcX=x=Yqf=QRE6#M2Ei|Sq zK{`zukv_6Q*7W97h3`r~F)HKACvyco4*M@=-A^JB5Gt@_Llv?=`+lbRD&TYb+0L#} zrL>~5>h|L5>}Ou^k|}HYVN4-`asQ^mS{o#mjO*6dehxl~Z zcbLG15)R%<%AN%xz~OgGt$sTvXvpiR^ZDlWXuguK#=$|z(NW6M^zPFdhxJXZ$xtkj zAm`)j6K;e%Z}!0fE_f(6xl*apXLS*=cAfXeqsiPCLE4u-otUi!{nt89l7L zT8I9ePd^O~4e7|a;bJq2Nl5T&bMmwCH_Gc~PWb)l4Ov{|PS&$x$3t{xa>73^t zVZ+MGC{v`;8JmOMW63#)<+xt0B=V9BI4kMm~X%;~H(yL&wc2-Kjz z;vO1Ph$}z1z5V6*_!w(MdQN=~tyZl3>UXWLPw`~7SK!^RgF-ZIdAnpilCjC*+nbvr zTp1eG`}_MG9v>ajL>8p2Kb{bx@^+Pdr{FlTq;G%yh>f_OBLD*zL<|SH5vrb9l9iRk zNAMn8-LzL$QIi|luKQ1w1S_&MY{)$<#WcedXPHdexVo)b>Eo6X|<%Wvt54}WvkCd2e{Z@$ACqRq@8qnH+ zfl$WS)GnSdu3aXeHzzm7^TEfeUo!XbWM;r(A%+vmJ0grNnm2Ug){c`AmyZfI#44y|Lf%SLXN-1DIX?g zax~;-!I>aN;`2RxrlXnaD_1O4bJttIM9%F%=Go`OU3=q>*QgCfgR9Gc)8OK_6g%c5 zjg0K)Wc`krhNIwO*eE<6>+==|aBgu9(a6vf6s3*(8_F+Xz;tL#}|lAUqiw z%j}!~&h=u-=eFmkN-9F%8eLn@pUuTg$ByaGI6hKtcDn1-YaH(vKI>=4UT=B`7IiOI znQ#LDhF{Hf^Xm0R9o|lhrohQu*2>e{;w8Zmr?-D%YXw=7|Ie*~VWN~ZpH`c>fyS#{ zLaXMZ9!Twz+6K}|(cpa)1(BuO>Q4;%X{~if@&i9K^wp2tXN$`eMBU_*2Ou~j$u83| z=?2AT!t&R4KH97@nA_=auD(MR|2S36NWo(jTl#G;gk#WqMVBF;dCt1ZAQSme$9XnMHrP!Vx~c*G-+%nnu`|0 zxqQw&v+91hKOC*p^|<9p^QDcKhsSDJb*7w_j_b84K0iabQAy>~sN)+~|Fr1PVz7ZE z@!Nh)&vjWHQp6oftn$Z59oYNZqgnB)j_>UKZBE4k`m}xmy0g6Gav}@1I!61yJ;L-) z3U*{~9l8xsjs&U0A+El9eEO|7P8IF#t}?YD+g-JiXi#?gJe>H_NVopk$)lC3W$Fvp z=^3PvJaiA2})y%6TM-@|d}-ih33OKQ#`=J}DXtRk*_WY-(xf=0*7CdqAj z@u7L=g(sB(5O<&#;uVVU=K{lbfzZ1qIqP@B(Bkf&E(oQ@x8ki=vL|aq#%#gQ$A)I+ zznAJQqAADP*WY!qOMC5aHK!QlyD|)QvsM8rIV9kC6(n|oj-~YmZ}~+WZ918$*mx=d zlS%M9nttMJgsN^w7Sz> z$FHENN~`BSTnnFd$Sf~-a+Ow_&w1Xd6!+ zl&4T+!$mMA&2&M)YFGF&#MRY3T*e2w8x20~Gq79FWvp@>?6}*xSF?F+)9hY6G*&|y ze=RH~+9m>JINc79@aCqo4O+9y&G@T83$s(gEu@b4ckj%58y;(=t8renrjJNV6UJKX zj3!TvVgdnMo-$P$Z+@Y3!3#SGOvl(cg1e1WuF#mo44`h`fsB{0pEC>cv!+-s=e{Nt zCLJm6v3q-D{DSgZ%lZL@>XE*XSvUCiy zT)R^AZ>7`3#m&c%X4lEqs8*HQ=FJ6|#6>qTryT~HQDky$c?^H`_5mA{OPp^51FZlc zK4#(T-QTZan|rm`FopE`L;8a^4cWB!krd>)&zHU4h&^3QM9-dz`i@d1 zxv6Ni*s1&%Mk%z6gLDo{ZSVKqzvqf%8EpCU1_xmn7Z6psc4gZQ5eyq+@VQ3kkf=Z9 znX_oBM;Pi|SM6hzJ|1yrM$e`UnWAKjrPm1*sP+C2S2s5n2AcKK#g6KfoeMnAStDZ1owRfg21BFh?=kW$hf2+d+3*l+itGY3!Wta8_T!N z^1=yV&eFPCs!*2@%Crz3UT!80+KY102oYK&MU)oF+Y2&0RGthqRy%Bw-A5e1r-6N0Alb)~Rrowz~fcG(8{t_Hf9 z_yWK;*PXlW)4)HZIpv^Jkd5DQ;Ny|u-)+jHBx7$>&lL{04AyUl=cKCF%Mxl#i)NL> zMTo@jO`5?5A~lO{LG6$E0fiV->7&^|^k8tyOk!Z`9JRM*-p#&-RmUZl|K5!%COvRKfGAQy5)fv2 zrsV()G{_u?`dHI9YQ$EKB7MtC`zjfPlK~6#0K@>mfCG~b39x6C!i^08>_s!fVgLsb z=+azaZ!d)&>l5KqHqcU77Zcg_S@Hb>+@SiA=0W#D@s_rL!(;# z_n(-MJexEnmo_2DfWzEL zc=!HHgVkd@^PR4G&NAlP{qt|(nhx^rWf)-Nh(SK{?Gf>QAoa}Q!@}JKmxw))Ihjx5*6dr#^%_T#S6)YfcZhXe2ffUF^V>e9|%_w=#20#?6v zFJ`{ZuJKW$;@gXlw-gf+@i2UTq*9!!ve(Q?DgDS^&X82urbW-v3elscp;6>&bPQhV z8xVmW+{j2fg!XohSulk3wQHyM zVZWLBrEK|V`dQZFk5l8qQIkTNzg^E~j-2uHeUm)Sm^$;V=PjjVOU&#NV&c=&(J?Q7 zdOJ~s7Jl}pAH%{<9j>lSX2F$bT{_9gJDrv!s;uOw&~2{j(*Kipu{A(C{SD&9U#F=< zxB2^ReQ5=CF_|$s<*MLrtjJGx(HV9iY`{2NOy%uOFu?SafU=zmDOsmme5VA;VLHyK z{FSktl9Bs`Sac$|*2>$-NDcL}zpDiEMz|4H>Z?qF#dVk?mFu*2S|oDOZW{Xlfa zghtmvww0(OVU?t;|1vQYgYDzibyq5#4F&aV!iRJ{%IE&QE#@-(=vSLv@$_0N;t-<- z?qOPh!bxI-F#s$#@6_D>z*hXe;7Fp_b-AMsFU9bcwP1;Mf2*y*3KJKXaDjDM z78(!=-+l}mUfkZG>kj)iFG^(1u;x!aV{6ix5W1FncsAoKmc%Z|P_DP``<#WVk9$7s z+lRJ70ec|E%5*l&S!qo6;tSP>t~;=gqjT~RCp`&&Jzq3a<1)&mwJzy)8Hx8G-j89k z%|>qk*Nfw^3*7?ch%gRk|6~h&g_l$7Y$ngGZvnXv}Q3Q z<%`wUGfn|7XB8DCDY$$kS65eb#X6U}PqTLC!%&&?zhkJ;{NF`EkN_?B6Z%6A{Z5aXBoC2cGFhRtxq>)R#dV-Qr7qO%W zrvg3$uvo!Thed6|Z>&MYVY@U8OlFp>OOt|l3>pU=r>^91LHBo#y!x~9NdDlHJ@IQL zstCqdA}1{PP@f+d8=K?Y;xLz03@r?%oFh_NXxeO{|a z+#-l#@@FGZv}CL1>Ap^{P6tsK6*>?`ph}+VdtC=R2ltou3Dqy?U`!r@fqNV}1Uq%} z5Tz2NV4?ssR>yT0Mldxo4-|M1gpjhUv@!%myp;XX_QpS?;Y7mFr2B6oJ5a&ZHz&~4 z&>$7NOS0u(PSzv8A0X~cDKi#FHn9Bd2ZWSM+PRrf{4Y$B$V03*ALSEHh93xkwnZtzI!N@ zR{skPfg!Fwn?X$<2MPpF6#y7&H~AJ%Vi?Lv2>e?xN01~5!tk)gKkQj%Oiqq}>nGh+ z82a)zX+vii)d|)zX%W~;{@%SZ4;q&yIkyjIO#LG)AU_QQQK z85}55$Otwxu;hU7MzDwot^_$H40tMD^J;o(>8T6>vB-W>*m%6SZfHbq@E$x5H{!2B zIN891hUzMa*)udDrj2X0`oHON%t4BzUDc#1??bVpeeKN}vu@(%`F3i0=hI)$m>OC< zfL59ocw~X^Epb&#NXr23m1p9mY^4hY|eFy{+nLj&c z<;g*g@-oq=y;*%q+IDXBkOh~B*P4-_uXU`6PfXh}I4;%>U(I-g3de;|`zr&y6i~fF z2gD@4cv~g2evk*J;lhk9WB)u~u#0AA=BIb(IGY3xMS<8!ICxa7=w%d{xN5V8c7+o7 z+RkyXJd6BY%T063u1%6LDdi$Ru9xfSqDJhmS&07aU zV9BvW^`}GHMy;vBsD;XU_O~q^zCdswi;)~x@S2pB*4JmL;o_vC6*OeAq%5>SADUA& z^x*g$b>fEWDg2Fi_Ar4vag5}YJQTkpo#vACN2}OdwIGzEkM`8f165Sq&OG#IVfRWjS-=Jx+?meEp?{ z1=n-p%qC2d7gUOXdXNc@*#@MJ^hMVw(FhCEx4ltp=`b9G5GGL{L`vH7lky>$$-305 zufwpUaber#%-b`~3K8IgH*$6F0=3KY%IYRXr{7Dn3nHoiobS#6B4$6^8bAmURjtqrRXy~-3>(EM{kf(}S~c455KxdgS1pI45mq^FK3as9wP}M2&7mSv zVn*{P&dUS}8eb^DW1w-Mu()G(TE-aG!_dOP;RW`r3v#NCehBeqK@vkgQq1_#T4=nU ze#}Xv&k84Ai@Z(0oP;dmyH&>b{kOZA80rjj9J%#;^Nf#u&aFYEW%MX0vxtx*c;JQT z2vsD2TB09tFR*Fi?7@#MT;3=#bjYj9Z}_$GhbBS<2&fe*heS)bPU>u`DEvk86Obx< zAA@|0C1)m%siAJzklT!Rtlp@gRMt6X%@lDHz)Q_2J_xbHvXGSWk%#;|NNQ{AtWq@` z7Xbp!)>pPB^uu&C0tV!eGikC%K5VMWss^CtfQeUVBMft95YIq>K9*Q2;ZC~qCYkyegK z3CW-Cs6FAr%UHYk9_+R<+Vbp{JRJg)s3d`D=@B`%w!FgG2rE>f3WPAb4@X_wmr_u@ z1t!;cFq#ZCbJQSKVNt#lWEAS__}{`Rut;7OV+eFY*f>O)sK>?e;kX$ha3nn)Y=wu$ zk0HI*d<^*?066?eimv!@7G)CNkfc%+*ffuH=SlprDpzHUU12;_^pEJc`SFpsUjPU! zkdd%>`avq~kzT_-Rzt1TeL3moNQrJz77tBW-(7u zQfRFWEtG{43S5(K18A)xBQu*{Ey7WEwNZTNEQZZ3dFjX^<0Fa+`~L<-p>VOF((O&J zaq%IE$ESh9Lr7~n@NJ`Pnau=YU~8!i4n16h3R!iFCnaBVZ?siJzU3GGibNGJW|1Br ze9rO^vwl*%Y0`cjgh`^((lVzyur06U_$!yqHQuTo&C!mEcT}fG{KKW|k{c9d`~YD{93HLX`c2mD{Lpe7FE}vE6)h$w|!mX66r) z8&0iYf1up?8%g2CSdchVOmjKsp+mmHhC)Amq1=B79=)oscadcv{6l$Yh{}LgK|!$t zi-Hv{c5^nGW=`GKm5rs$-p8DlM*}V7BbPiN@eNg^=PIbj1>dHkf`u0fs$Zq{3tCo? z*7qC4pJPrFMY187<`CiO~2oj!d+ za7tcc=y|iFvj5FMdR$e`%F6@6f%Nn(pngTK#p#SJV{oz!FLENBNppfE!X5WyA+_xl zkKV9SVvM`OT;_;s%VZ90VhoB9v*4!|e!EIQ*jvPv|`O(sQD@ z-e;o|BoT}<53{i|dmIumePnkIjbgGa&HiW=R~FfB;KOFS#!G$b!`a z3f;yt@bAp>;8`V9K!uK~?QsEx?pPOn`9T;fyTJ?tx!2UrAEb3qgvOS(1(0m;6Uv+x z+{OO_xY&MUAwrU2jt!7**J)266Hc>>D{G;e^7Aa-f)K z(_VE1O?iW|gjj;sY*|}8YZaABs)H`if1Z;vITF&}TwbZuQU5_fbN$j|R>GpqldkD# znI<^Fr%xZtG8oj;wkDN_f(RdXu24`qdD|{+&VuE)hg>*`ByS+q-4h^`kqurIj+l== z6dr!tCMS~BR#vYZF>dk#yGjP}TU^+%Qi$OgU3D#YycUu|YU`lk1>!|`cq}^OZb~M8 zlpZ$b0`0gYEu0>@4!R$TGRDy@H>hIc1QP?xa-5<3=A1OzKuylL5bZ*w@1uY?l&+?> ziXLVhDo*+@1Zk!nbv!%z@BPm5Vcmokm^+PFvhrSDc1pHFo{?&wlJu3VYA$<*XS$Op0PB7TOD5%;IATOreOzL_#q|O$`{iGl%ljqzk9hX6;+IXMwHY) zZHj~-$uPo6XDo9oKDSBbFa~{%s;9cLfv&}&)*;7QxU1+ik_dDXMV&Utm5@gD)cJmc za51+YP6|Hyzfp#n_iUAvSF$Xx5q<(&I82Vk8nUXHvVyyYUwXVGyF3XXrn*s^engK9 z!6F0!6V^DlZKg-fY0{{(%d()cFzXc{5g>*ZqC(<~Lsu@(iELoUJP0(1RjGvO4<1?< zgbZMaPh-?zCH^?YvXl^0g}XY<$R8hHb*7)Aw$zk2i(dL8%q~BZw9z!Lp{}ckKf$c_ zvbqq{HoEzofWU@=Ax<`FR8`5z%|keiq%WwkVopCfGCWG>aycG-SvsZ|m`{DoxiE`! zXp0Zq13oWL)g!B_8`MjrAf(M%&T)#_40CmReT9OdX6^N?Gt-YoP z5wZ(ZYuzUelY<`c-RjX=xiC+G$iRz60*)lYepVCSM0f)xsv7p2(o4Uh{6SR&jNbb2 zul;K-Zv-H%8x(kSgPL#kU10PkkUHaGD?R=&m_6t7wmETBwhRLqnyl0lII=dw4jKyXf11+b|U_Y`Si?EYDt}%*Dv%@UdgH5k${a1_1n*>QUzo7WKW!)*I zaF~d^FEUqKbh)D{BnOKWx?$8DF9U^RFT=-fNpO1OIq?ESM1U^4_89L1PB-)mVu&!N zCicQ5N;iX(DPi7dwP9$UuXn1>e^ViE!a>CQH=mI5Y1-E&6K}x@j<7dS%FS&0A&$Y@ zH=0=f?Mu&7*U#Y0K^PyBk!^eg_ph6Sq~2h4`jw2s@BjO_g*(QW=hv|um@s<@+nh4}L97_KtY^-WN!=>vS6l$j z#R#u5u;USkfBje1sDDsQSs``nKM1rc-6N=Eum3Wh3LhjS-Cx*F3m!8qRHULDFnsL= zZWjxVt3e$#s$V~_{0ruRNOhEl`jV;vKQP&LSTx=<>Gwb5R^b6zkng_94$NO}5ue%r0-_6K53g%Si zW70-LhOPZ8ljOx9E%Mv>ewZ+dU}ye4r~XEYOO~JAD_41a1{V@sJ#ysIG3AMOzkWqa zNm@dABbQH0`}ypA^={|WbrMyvAje7gJ0fqtAA@)h{XvcUpSy0bB<6>S^7`0id(|xP z(s_P$VMHyqHd|Yjl|02?FYNv1Qm@&O4+{XXBbJzmJqQhIBxd$zpv(zfSU5+=mv`W& zQDgQli0yiLak3QtrN?gNr1=SS+vD=F@*j>cvnJ3N&wmVM))}vV)&CT1pd%%%-b|d( zEvjADDBySJ5u3OcQ@>6r6CzU;7oKrfl3aP}PjM?SVCNM9&MZ+U)9&tKeXinfJ{_3Y z)a-gF9GlB+(c0U24{%~dHhRCGwM`fFS4|Nnn7%5-K7HSXKb+He5?RC-O^?OyWI`pl zG`TnWCuioUOW%(hgCE79r>($?Q2ja%KJgtzDFje~yYBlc+V+DC z{*>k9V47rMTcpZG7u)}0=a7`k_uSTej6_i$jfK?hTfcIf@sHG}`lDyQSg+UVuF_}#w5hwMtMbo zzSlD$ImZO-ZzxATf!E1&+L&Au`WDf+N$BLclkjRsZRj?+P%??AW5=UAGI zCQGgRiP6RHlMF7u_-r+Lr}w^S48aw{vEbdN#Icwc> zO$EFE&AIQn+JCKqN7m1Hw{4P!q4n}v)W;*mKFg1n-E6oaTvR-yI4W;VO@-Fq1CM+F z9%dz_LcrS9=AELClTvT;y70jARQF=0SzgeJqECsgkz1pKW2goM++v-2u76kiaOH)3 z%UkV`DpZwe{^uV*lF!E19DkFJO>vPof4msKzeQtqcys^Vgb16GAaR#{KORR80Fq`B zezl~;v^G0g3_O*^9al>E`G2y%liI8^>aL2OKvsb|u3d_qK_g@~Dwqj@zT)F6HSag@zo zsom>`#R_9uNzd%i&=;R0%=^oNUBo-z$GHqpD0jm|oCW1=0^ejMXuv~8{=GUo{)h&l zt}Y%oc>o;^9g6L`I0^u?Z1)TyE@1P)q|-kBE>&HDQ34#Tp7M#BvN@cV?NLA+U8y%ZpKBmhUqw$y1L9%j8Tusc>^t0-_a zT6e<9Zp#(TmBV>(^j8)rQwlS2nUR*4MA%xe*6I(kY``aq)Unw~)pjPFwEkHwnwq62 zuGgAYR(iSO*&`d)SVEd#?uzeQZte9XQyF-aLwrB`vhyA_oheG0B$_~N12AJw$65llOPl9 zHa5u?AfXs7-#yQ9_>}9zC|8bdqfTo!ImwSrAe^o92nCn!chIFg1(Qxe9X`1ROYMKQC?+i%xeM2!gDSj7=x4hh} zEUZ)m_LjEbY%b~QqZsdKaYb-xhKWS?#E0xP1 zq@bdsm6<}@42b(!#x}+0)k-T14`Fx3;qn$X=5F72z{qmG>JZ`+k}K1>P4dge3>PHi zLt+|&+BU|jr`pj;U*;Z(t>)Ue27T3k+g!(qDW5)83-U@+g&a2WVius-;~x4py6)7? zVwe+DZ>zzdv=2!1H_fKf=iD8T=(^g*Y3!XGfj2LjU37WAbqNgo9oq+YF-PFH+RXwL z;+fPZJ3;XmzfK(ld8SXhCNmyaDkttAu43i02VK7-cf7o|@oG!O|G`oUv#hbvY4-~g056K_!zgy`lI{;W%cv!N_7{v zab)c6g6F%@LwCQslMe%7EKrFZ$`=;|vi<@^(FjVGpFtrOC>BDo3Vvfb4}<9G%cKo| zD7K$B_x$^^`RWh4D|ENk94v{2rZ3(TF$!SgVVBH$A2dXK+t(1bo(kL%JQ-^MU*42; z%%(P-lwyVy_Inne={_&H%YOdSJt<4^>#;fFyZ|-5CZI)M47l$hr_hawP+EjlYi%v9FpFS$p9KF+?7RRM}#cp<{ z1z)pRr==s4b&%=cTz7Q#b${6?-3m{X%|h49beqX{y3AYO+hIu`*{WEv+QBZliZbu z8oc;X4c;GDBNi*ZcIjCzp3*<(sfMy3D)KB|`qooUOjNFqW_tL)^&%cc*2KObKiR0*`# zBNDw>dNr=NSg%>cg1QGiz3Pv)sc2p#8M%EX_|I<>t6ei%nlDl!5Cx}v?A3oHzn{C> z?cjCLBp7VDJP%5}eau=xBtvDbY0<^}A(7ugUB5Mhc;g7)=Oo(eY|b#M)?`bwI?C6r z{$P}G>|kMtzunXUW>Ed=yW7d@Dg5bUFiR6AqmS=%@gAPQ4$-U8qe~{V?Tgp)SJJhBG4jVq26rWe>}UFRnh$Di0oQ|*DCe=W=D7RbUCwWmyGKFJRxzlRyi@jP2$d*B$eaP!@AEpY7i4}f+$l1qDF z4gO+&7uOS%_q|`S*Ad{dlyT&XH?WLFe(A*%h-~=4(5H|Qz_gTayY6E+nyiB#b|lbn z6FButU({J)SoiiLfmVUD`FvS!8hQv0bT*ZoNe|R-syZ!4X8C~!b zB^X9z0H=w%z3KaLzKzzmhUs+6+&CdX)5zP~D7v-m``1Y2z~V)Xhj)5@R*7HT z&emxqnZ43x)Akn)nzDiq7=EZ~df(y@UX&sONf1VWQo0Lg^{Qp3nhlf$P@_9r$@|+w zadF4{=8I`{92*SghR=neakDv$%pUC31Odo=V77r0h>i3m_90U#}cDSJf&eZ~2#i9QwlhC#0g zmjh!oP{8gzY<+Y!Bpei=Y1cSnUJ3!ekVTr^d2-_;dwP!>@7OAru-F)Ugn@&|wEeN% zTmIOmC|hXlA}49vmy(S6bsAndGsTwoVLPtL8n|Cusj8i~u6Jw%yj8u0<#&39V6Cc; zRU31D`Wzev)t@SykpKAL>)p^MEE_}0+$R2{+HD(}3!1E>zSnk+%^{<_Z)W@KuRuEzs-;X>4Pz^>vD(Dfz=!Q4UCRh1Y-XQyX~Um;EAof z0p1r=R;c^J`uCy#deiP14NR{C`w9aJ_1;OaSpYhJ} zI(qw@5v=zKr$8*v*(e%*kGmr&oe~OoY0!gpyo!^z6DdgVgIR!GeOIk+Q{>HyoAM*hWmzYuItA>#M{>TI$J6l_E*E( zntTfZ@Y}PZ4^_J&X(Cb)JSA*cjn*IB?C2|!^V?jOLR;nzqxazZ1iol*S4T(+m!$1E9F0m-&!{5@LdeitWXKlbqy95^ zk+9e%<=gOqs4u0Jx5FU0&r(~(z3^$fS&$L-cRv%!1U_B&wOgRLb?p6!Ke^@tF+c+7 z)#t+rz12&Er~}#&SrYZAg$rfR4vUq-v#dPc3kL)%1b3@_x%UkGr|Ek@%&u6-!^5W) zsc(ppbQMhjSjr_%hY^-#0t+Tk!8gYK)$0a5CfgK@PR3i36LpYbmJq8c%lJ)UuR9B0 zx#%aYEQ}>6riDC+@}9kH{&cD)n0B8EG4M59!Z_BnyeinxI_px#cHfdRLa`QO@8!?6 zs=eIxv~CqV!b(02QcU3_y}sTN?Gah8+4TndHgJ9Z4DA$I!eKo~Rx`nm6mGKVqiGAW zJN&f=>n{S}n4B)ZCZz2NS9xeIg6P>t<+w~$ zd_Skh9VI`91>VXtkQw8^ZXG3h40gXD<~DaXT$D5UXWUdy@$o~yA(IsgzWnJ~U#l&* z>W0n1{!+fsg9A+-UrRV>@5=cYgv%ly3Ag~p)$Vtbc3jS9&1aSOhh7R7Bc0*Dxddv_ zd`zoY(HpFizUh|r>%>cu4B<05`v3f(nGtt*=6iaqAvyFddv-(F2>3Rgx(K4=3%Ipr zF0Le}R)PTS?Si8116;hdkVydY^BXd*Dkc?Xv>5ain~CTyEQ$V~4FNp#m*BrD-Q2BP z-aKiEqe$yDcVdY!nt6w}H_O8Y&`qa~s;eXKHU7}Xmhpamkd8%u@}1E?hpP7DIb0p} z=z4gCDc;qG zg$J#X?0cxCAQPdnKJcU>@#yDLaDMPKKe8f8$4KP}4`u$Dg@nUmfH2iv=xYNV6>7jA^zYV?h!U$ zFtYsl&*4tlB;f>)MIsFlAbogPjWG6lx^ffoo4@xnM8Mc5Rg7OJrJ>&U;N;0eH~qvE z-CJ;r5jn)$@a=9RpAFdiW{3E$hIa>|C4XLkP(FQPjW!>O`Bgr&mp#JkFI?49MZMsd zSljpg^M%N-F40tSYlbn#SAlA$xJM8IJU-RWR2NHnNBpkKr+a;O7tA5&AMt^Vfy)h* zht^1JvHESE%Czk&GN#`Aua8G}KaXNC*3QX6u;=i~QjIGM+w9AFwdN=V^OWVur-I-= zC;&bFTKS)J&PQ!Nnou=FLIPnYJ04ZsFP;x`#5s}gxbkmVjL#7nN|{sD41U{lH_|bc zKfW=_iM)IG$@&nprg?^J07}n}r_qoq?CL5TSLEV&wRh~R>G`=Ytj{lt#lZAF@r#GO z+7b?0?wVvv$#PjPPL}D+0x$c5$2&waE2g+39F?Aw^J-G^N<8MlCs=#A_o!LY@HiXH~V)!L*qVq_G;Q zn!a;e%_3p7BNSVML1dzVFR%YtRE)Q9p->SOS9a@{(7Z?60e_`B*TE!<&OM^{8f3t? zEuW**lTTf@O2vk)v)X>ApM_hG1rP!}+K%TXwBt9LmhH?@hIOxxH*S{84ekY&w3&!E zAYjCbDFrX$oR_%}yKX{$5luo<*`^s}eGAG;fbVpYG~531x2 zZBalUaCZq7+}$m>yITmZ!Ciy9ySuwf zT!eLv^CRsEw^RoCiWU0r+6Imb1|T1wYRlbruz5rk2LV7%UaXLqtvDaOt!}FcEb>olgy9V+Y3SRD)DfuSG7+f z_0(|AQ5842%%(@D(|)p4UH29|`3a)DwGJuPZbFlsWQ9pWiv-Pc%$fbKtwTvCRh{u- zOiP`pUOA`T?Pd?@8-s}J&;CE#S`d(r7FmthJBhY5++fmjVk%GCi3;*?SW+ET4 z^T`=>B~9UT>8R8)0>n>etUSe6zV5G<2cwYis}V05=y&40FRGM=3oD5wNIBU2) zbbOH}!U?9Vw+caRqPASRtQxY@Q!!j5-U!sf@p>8E*rA-UOwfTvGTS1z^degkU{i>H zImxxKmw{7S|a5FsCvKT zv1Us>WQO`+06%JqTypNM1$^2)ZnhMy4=9O`X%vok@&fvuDOyDcSE*~Z64D!0)sw5L z`t0hd>s?LvPe&?~%2r(;4@Kizlp0laud_4T;}9AcbX!aY-+Kp3cCBGi&$r17zWNXI zWmyB1ml_LQ~m313+!u?K;?hYcm19VrFk!# znEv6jg{t*H%oArVb;|P3v@A$yh=Vgk?&Y=jg8r%QJO+aZqpXoG zOx3Gd|1K(Su%;buEO~|Jy5%R@hPJ}!pE_~#^86pW*z1ku?@KidYGt723-B24v`S+# z^41twqmS#)2{j`r4VYrRmhJayghr z%Ci`1e}IFv5E91Nxy`*~_cnSY*Ykbqjq0VGz`3ULK)%4p$wdP&rpwf=67RB>n)zkh zdbNZ54d^saek3lHw^rzn_FSl)@uVl}(#xLBOvvrcHv0y*1W0wf7~gaV4~CK2Y)<(Y zSd7FsTX&lZoN>7@CfR=6vg8Tp|GP?Qio7T03iOEn+~|3B4R$PVgAQlpY8T^C)1MW^ z#+McYgpU+pRPqOSgGu?PI<0D}w zy}KC3?z$Z<0neGc=)bCwhIGP0nV^Y=<@eDEjyC@ebkr5lG=U)4wdjnuuarBTy|z_{ z8*#W@^#tkUpKzYVRTGK$5~qW;r^1SfE?^ipL@OW`&L#QQ~lf_yTr@QVYIH&Ckur z)2^OE*nm}~zD^ZstIy^J|7l(o$IGo8{r3OCOki0H9vL~`#w3OKKXFX&__Ub?>++X@ z19+9&y#*Eg-6_uUe@O9%P=~)i)~k)he=y3nKxsiqm|-$uS%@fjk5`VTM_5J0@A!0* z|Lw>~fP@t|q$&SDZEHK$FbsFd;(rUMuv{t#aaWc9HuqPjEigk*DM|)kky)3AHkRoB zk>;ysIqLrZA2*GR_lHX4ul@hvZ74lkzHf2=w`d#`g&R-Y6YGDP zUn`8vG?u7|+Bfime#bpi=m*XNm~1B{kapWe2TO7P1DcbJf0-!w4RihvZST(U_WWKQ z65$1=T1W|Q@i~(X`7-~{?auUT2u+f7=RY(#WYpz+NpKkaX#D?e^VP<)6q00rH~vqz zs~3`hh$;DxanAKuq%TzGz#shIFPv>21SUdVxd}e7DJb={2NN|ogDeKj9A&#C(Xmg+ z7lzF6g@cMg`RSi49Iu<}iPOZg)1Ka7i$%X^4oLl^=%PGFU)DSc~Uo*lpgC^kO zW7WOV6!1q9XXe7n3xM^6#haKJC ziqC`3p@MW!;=X9xvKWkvkghCBhUr>wJ#aLL8WDfhJ{kqw$ugbX-=IV(?sN2Lq(-!} zEw14mp*PX+VE7vH*k`nq^?xnuR4voe4w>0~sx+;7jn+-|UE78LQhYlfI=trWwtq_#Vq)gC zIW+uUznFa5uTwz-NDbz0YKafsELDSQOgs8|EMf zNX;E2ARv~Wmf)AW)B_cTh-mGIhiV{Tve6R~n~8PQ>W^|rKMFoH;kQ+H7){jWZWfI; zo7%{qAljcP#J@(}T4%jtyiWWP^ocDX&PZ_|F^f1_QCUAdd53y)8_-tX1XLWujAi-9 z^lDE1yP|TCB@UG`wBvlrhp6m+rw`!VkLEd(W2oHj{TbS_llDC>?&%RqEznD4E0w$0 z@MW3^ax8ox*}ZgIo z!HGao7~MFg(@Dj8^Hq&XI6ptUk2J{+znWnX18mg|s>^%_%M^!rKj1e`?&aFUYpKLGYA8Q-K)^(h#DQmh=x5ORrc*U?4Rm%R=)mu zZCzb;Lpn+z&IYLF=5)JxaU_m7o=+-w5r7y1s*Lr?gLe`sreOa9dKFKElO-w!bO0}M z0Drb{kdi_slX?EgiT>#-`1ttP-e~YW!7MypvYcb_Fb%y_Me;k$=e&!nq4wyz8SQ0- zktZiY4)@(5oFoqA5Nrgnd|9Fla-NwJ(_|jod)a|O;Tn-kFQ2PFMJt8ut?pf>g*7)j zX~=N^7AC^6Hfh`JTIMDm8&A>7oeoS-H5=JSE$S&;rDRa7h8#}YTKYE!2l&_Ufo!?m zbk~P{zB&5r$L+vv&8WoSIx8ZIN>np`N7nTTK|3Kt0b8~+*lOr5ZM#DuF8S2>iDBQp zyMJAMiF4III4A`iu0L(nLhYYdl{Al z(p3B|PkIS~shfPax%qX#;k*}hW5eNJlwdZBtozBh+H3fI#k+I+YV8Z{wHJq}&{8M2 zQB`xG10oz*3BHl28~hzED9ORwW1d4Z6OU|s$leccUj4}{ppf6_(R_IlZ)Z{0JD)#! z^lYWU`DE$kVserp+uY-%!CI%)$$XmZNp&5a{4d8l70@qEu!v;f6d)3t$gD>5vuqy| zabtatR@+q>ul6uF7=__!cfS6>84I4jI}YS?vZ0=}<}FaUtf#9|#Zx&(eZ+q@$Pr}y zVm_P`kguUZ$s@)8VkY9$EAjob8lMPo0N@W7xVYr38;P`@htoW7`dorNE_V=hGq8Rn zRDO7Ev|7qp;$iL3@gF#XYEUVj7qA(8PS#~`5&dq6Zy!$!iKQ_>r?XVWMj19pGL?7T zKp7*cg8etOrtNo}V-?eKJgAVVe9hftsUL(CJou>@T;{x4P8sX{`83jOWbFXPNj!5Fc~t!Uq~HI9YXj`ND7P1;r5WGdwU1-{$f>4QIq|x z*ql2<7VXb`XT__@bmR22g71}X47`N;>I4_2+)p!rvj+(56=@54a(xUcY9WX$>?Ww)^tm$s%CUx!M0MJ_v2Up#nHRmUl_m zQIlCh`5HeO5v_f-8hP*@??^x#wu6Vw7nL!T+D#W571uwTF(~Dk%YEO1!dLZHLSXNm zT9q<&oHp42zq-9y_B~mTe;#|(M%#&RBu_wmdCIb{K}E0C=u#`2{`0oZCjeLm`84EH zoBsjH@MGfA*tJcK$(oSju4l6e(dD3le*+*UxE~T0C@Lwj_!~P@Vckm8y;5&$Tdx_N z#mQu}63_Gy$>)2nJ&_;ocram%H$x$~#?0ItfxfO>`Bg-MZDV5t2@{W8uX$g4s2!b4 z*7}2zk^{@W7w*ES9GQnpI?xDUCv@h_uquZQjxt73Iz#UgiunE%pydYj|mqEoh zIUQj{rEIe$7vHi1r#H*CCzSsp6iC>IWv71d4MCYh88D3CifYA>E>$@3_ToxR82^InP=Djgk*4mIjI+fyid zHvpim?S$S6?=k+cVJ9pt(MCsC%L>g}vG=-?0x>+~LkO+75VKU%o#jspuSZYHYU#)y zWRn-TuoDe`a^IPL2jdQCtRC0u!VTmCCw9||M2mB65D@ZnSBei852qup@aX^+q#*oa=sz-O086x*HvDS-x}Y+eVYCK3i*#?l znczX{y}ekRG^za?1h0`;k-h6EB5uG>D97ylEY_JJ*|7*79JQv#~{e8H=3}dN$b*z%v+P}zvJOzaB2fcmLZtUU!{&z zn}l9t9AVex2L)0*v;kc02W5M$B71pf73}lrl};aCD@c&A2oN-Nh<_J+@A&z_<0K8w zhqLgIWOb73Mi4s+0qc@JYn|m{rU71XZ;moGjDK0Z=$a%XWEjr6GTX=eBA$6jdXD#R zjl#Rl)PN*cT&&NMxTvT3ymdzF=0?2@C3J(4hQ9xH$JqTlhF$A?)2qK*WOPEG${elv zq$ID{PcU!3%*ZS^L{LBMTdfuu8w-%I1*AjD0$hAK^^#uA-Hv023am1nuh*k#jaEj71oVFMn{Xw zQR=Q5L+xjRr%$T+V{FZgBx(qi-L*kZ&6g{+Riw;hUiZDQJ*h z>FLI=->4tx9r*C?NxK!{Ne8wDX3D*sw9n8{gqQGFcGD-dS4^OwVVSSI&)p0@%Or0wE%~ z2EAgEUpcZG(fg3)L!!duJT5z?eTi>Vd#RxF3!`ur@GK(llT9}~c?D6jqs|xjznc!; zOC`YCpH?kjMBPBfK-Uvt=s!9S;sQtPgUR=5$V)so@GXECD!BW*Uqt4L+=q>C`@5^RCM?S5$4y~WzRNBs zK|#Sgtrn;AGR0zml&#)bS=mu5Go^?g%1|`vK4XLluQ)Th^W91hoH50yZ2TO0Izo^) ztNVBMn#_1m2IPvESrCZhO-2~ZB9@l zy7h)#_JDrOt=m%^oX1Sp44JcEXJ=Lr><_ZPbBk)Yctvs%ju)~#a0VHzqLwFsf0W?la7SYYJ8ydIzQw+X6+}s9H(2o~8tcEv65y>-%xDpyXRYKq zM%b@U%)%OFbk*V8+rH`@!Q@~mdFSn_%VtnJ-caDEuhm`P>fO9~Fg872qAj;Ey`wg? zbO>wy@cVeY+9B~e%z=P{onl1>y1NDM?*1V4f^$YSXgiL4RG{sl!hJOYxl!?4+)jdc zh~j)Z5eR)t=G=={jP{_Pf3ng0igfv*{jn5b;@^(?@~h^L2_q4YZps|HpaewM21lk| z@#)7o%Uipx9JNQuSc1wPJ=m5?2O~3RBp)JQ*I48n6E7VvvWDyt?Hj*ko7+k~?FAv} zA>M|uec{CWE~U&=l2w3|p>0v<7j}Hv6CC&Ax!&MEvu zh}q3aP}#O6jYI=oAA9#k5!K>f$$S&~^eEB8Q_>DkRMpf>T{%BkL%*C;^A4KV6GZ;J z`3U&*TV6%y=A-vDV2YLQZwN$}u9nTa+QTsx^p`G>+*h&$g+4uFMts|Xz8?x$q6*`h zk$;+Ypu;S-Pj)+x)B1l;T{1`6oIAf~?dbV<_JMv<#Idne|2G7CN2ChsNU0~Q*F4Kw z5Jz*(DQJV9Vm&)KdEpQVYTA1z$3#GDOdHnM@7p#}lZ*v{Itk7B$U;7tVIg3?V*j@T zK@R7!0ORBT23Q24B0>rn%+$gEO|!D)i}1pnyxv>kf6FT=8L_6Ovi(N-@^8Vc%}KLH zesNtIplY-;p=4lnEh2y|#&aJwzwmwFZtN2PN2wZ!a8wgRO?!FXpT8Xjpx&RZY@Ggq z0)X7yysVU`o=3QWdAUfjH5C+Wt`6B!DH{6(WzTG%_KX6|D)Hg3kCM-Wqoz(XFt51# z3181`n45p+3~Qe^rjWwV7RYF|9iD7%ZsJe!S3X>+P$%FS1@~@UxurV5HjcWVpDrIM zWocjUJb=6(gbfXQ&Z1bRMQBkkE-K&j8>g*J1b+s=3u5AOqBFWN!sGQ}jc(t-MBOA= zrPZ8C{d_5mGWrfl1QNNpb%nx;lPfsta$vehf|s zN_$v72*>s2dpk1K^E_i?U|;|^9d?V9sjb&rRB9(`eR_jD#Uk;TyoQFAOy`bIC`~J} zR(4x5`|x(2s}X;bvbM)nAKg|mjB9FB>7xzuee9XOk-uLOHC*=`ol+}AchJ4p27FyK z)dX$mBHBRANh_Jw_5fws3yge0_+b5l35llxE zvaftpsRc$DO2nU8ay5cK_4Jb$9*K9SDp|_lGc|}6oi!Ro>C!<`p$7oa(dGBs)z+Sq z4IbA==sJo$;HUxufG7Ony{0)t?z5ZRqMf^shl_c==+?nE*v+$n?NiB|l^_Db_)3-)7X-W7?7m^GnY?PyfC{ zxN{lT$%X4%>!^Cz7$*qtm12JZHe&w%)l)gUzn*oYo~YDl%s>r8p8NjZu(HNtI3+ahW&2_tZuuGN%j4D2V>Zi7ukEXEQi-R_?S;-KbI*54 z@Z0w(AHB@ntQ7BC)kdk#$)w7-iIT$KMMUckLCw}yquD(fl+~>xpK(s4T4k-*R8Q!6 zj8Ig_TbU`o*Z3@Z#eGYfNI71iuE$G#1ZQ`EJB25r8|!lu4$%l+JQ zf=c{G9*S}jo!;fxDZ^scchtj0Cc6VlTl!VUs=ij?qBg_%LAj5r?Iza)LHmz^`e){n zH4+lW7GB7Z)K~h8O{1P)C&UN{i=oE{{}jWDZP2f!ezKSLAhSZsUf$s7X{kzYe^@}Ox$qz;3@g4QcQWhjvj&DPD`^PShi{yfB+|}`{>jkM=t7FK66p> zJwLL{7XC6ZskdH*1ysw_(b4c85C4fBKk#1<{gX-a;qkm*tI3zD*DNQ6CtN76Rj0kO zx99V4vR%PO!*DBHN6LostBTn`xSiLs-Cv^JsveHrv3y7si#$4P*$w;Dsa$MBMApRT zHGEXAeK3hS83ygAm+9^1TwY-9pgz9Oa9>MqjQ%j0#ZjF?6aH?b&FnUYLY%xmciHqv ztib$Xsg=A(c57E+@&;4t#}rZ|gn6=G^+yo+@7^=v_5PGdrv!9OPG0m4$E9ebNG6m_ z{Gz6&=l0kgioj<92V2`5S)+eAgA;HthHcKz@F5`m544G+(WdOhS9j${qy}(|OTk=uO2Xtpy<3df*b13l@q^$;^x?hm?~z@d=Lj#>f-7^F?z4M0 zd9x2sp5kuj+mO>7`tHmU1b|Ah!PoI=;*OBLjr;N#J;GrVHEp3%uk+X^Ynz4ep-=j# z92&SJSRh-gq@c7j~2FbG@iY^y;zbex<14*vo?*ZXD(2{XpK#DD;KUH*1UY%r5iqy zsZ%k!Bz0=^9=jabC$e{f@CQL>~<)O$#b4zu1A}FAw#(^FM>W7BAd+Yt#&UQt` z`CP7O&EO7~@4Gf=gKr|8OG{Ic+4J5i@tdVJdSmRem5E4fn)+PW0cT;Uh#Avn;9%>& z1vO$%F^fJ=)psl6r{g9x7+YqN$%^nB26}tyfTN%l&#SFbKUj`I&(CW{}@ z@z2Mt1pL0B{q@Jci<;PlNt(-t_qQb^_i897^O9nofg@T`B%pS&5)xp^YQdj;prj-z zvvt?(r1J5Bjrp+@uQ}d9ozt&i{j(4dqw5?X{p^)5RixLaf=1Tf=fDI5IHZjIVy=#C zsW6`-NE(F!>_3Ix!Hk2iYT1fCL)MkXCIlRn=!aWG@&1ocSiC}2(yaau#;LJdLrKp! z>=Ls;sjrIAfrau<7s!O{PStcJp7FlI)U-;Y-?>?7o0X6r&O>r~gT`r*E>^xV{~)tb zevm0P#kuF9aPbm20#v$ZPHF?Wt&Ls%ofw0-T-qQ&UZ_C9(LUM)U-T!PhedM`0W4?Vv1Oq-Vi# z7q;l(a!Ve>d;x}Q`>v~j*WxYO!e&%9O3Dgz{q_-vO$%s`H@P9P+7Y8t>Vuuj4*6-}T`j!4q@l`+ zo&9GH2HE*D&yYMWt!sFA#qkgTSnNdU+fGZddflI!pLf34C}$M7SPL8r3Ax;kok0bc zewSOqtTL#dIS*4zGtE6lYf0gwrPG^U53*D%ba^axhn^!&2qa9XH%LxVbIXma4(;l5&gG^it;2)s3Q@9eDu^sc*>3EnTgAv_C`8r7Ao< z@Bj!C9UJ0lvd|FNOy_D|`3PlcM`DiP%FJDm>BzuH|0;6!uhbT46iB;I-9Foc+-AW8 z-@hSA(zy7z48?04L#IOGgqtt1(UmEw3k$1juKab~Z(FZ+#I?1(xJ5kBNYtq_n{K%~ z>C|nqJE+jX3D5Wa@JZvay}G~e@O}_~T|{zsV?K5S1+=QZI~5vT+a{)@%;#yDhKexX z1SV1P-s;af{-yyRaxkIO%K!A37x41X{;)+kDZp{l0yu&^1>Rn{z@L2?Z|vy>CnaBQ zv1Z67B`4cG+7Sp9IUdM1?wf>ICTKKuON}x!TV)sc|CAvZ@dMP6hy`;^;xR_#M9=#2c9P^j&rv@52gg|#PSWphoKaFzJT*px_eNsTsdOgQO%m4c zypyx688Iq>OQc9L(1%%+#x`8rHh9kq=gV{{D%_@%|1kfYfN zSAK={kB3CZ&c+1`yc~J8vLbOK-?n9AM}HydU(>X;?-Mb#*Eb-T0q8Ie1XEdTU{D02 zYa#&SJ9fl)cR&CfG)hvHQ|I^9p)+6F{b@OaS26!D$tequo5 z56|#Eq&?Q^J0obC5gR!Af1xe}nn{hbOv{dXaAtlqKA#8p zKB%Fw?8`NB{=0{TGAfPfC$5i%`-Ihdr$3Rq=o1^qP5uYr9QR}WQA5yi2gNl!0)GAB zhToI$+fRz(XOUsOlf8B?Fa6|BXig-Il7^9X?%tKhkhZp0Fxe1=&-Yxvn99V*Be=$@ zi&m6&LU+L0D$?Ekef<}{IV{?!cdjywIU&EB#fmV)WUJZUEXNoDmto&5BKztOs*R6c zL{uc7s{lRvT^rw$kIjwtAYbnwxT5Ftz)$4CsGjcQq3Ho9{K;H<9gCebj;&F&8B7j+ zAxTNZPC~*xrb!K%%n!ZM0;wO$jruEyO(RgVKOYX)TNmSQX4L_z6>f90$&L1xj<$vY zoy*bITHVhak9SZijo0{Z*eI%;8vC$Z>vN(c5PopYzcW`S#a7IIlKs&KkDDtS@w9ox zi!^z%EX{^KIHS_I98Jv4k2Z6JJ#UZSw%{&oLDf5z{VToC6tW&~rO^WKcFG5jKww1W z(o0XWZoB7$$8(_(&~;#)&R(Z>vEdC`&NAX{Jc%oo<9l6O%bWk`Pb_i7uAoL-jHn?6 zI3MZlN5odNYnd$%*!GXDO3+D4oNx7jRihw_1ncek^0YO1Om zJzAt8pqnaMa#r%`mayQN)FOO_;_C@4l@w0f1zKn)8-eHH;yPbn=i!=V9+7p=`;rzn zinCuKTbl?*4@r6*V)r{^B+9*}6Oj+UNZy+N-Tmnh4%Uj!pyz4dy6uB29E%YbdTyCy z(D9lp^_(mU!wjC`{__xu2m$CFKgJoEEQHMY=b89Ux7*BK-#$WA^37Cn_A&*S{dMQ_Ne#3gR@Lg&pIhQjh+qfZ4;T_ zqmTI#mq1f%M+feDe6(wB4PEYS)7a-xf6rR5tu|V>7W#g)v~d5KYIZ!>+1WWRG_+=J zE}(duKVs<24U7-we~KwxZF^`s?LZZX_!mZRqtzLQSyBT@;qxk9S+Zl0M_<9;fRs*SVM$!as>}42O$fxL${pi-Xt#=%jAdY&U3 zhs~5pyl|ez=K96*<@Rc1_5P{RvRL&Q#rDA#4zOO4>~t&7*6EbZ^QeRHD>7SNR!Z-X zv6Kv%USpelz4#X^j}*YEYi4m_6yg7KEmHFiDe5^N3!T(!?}d#Z(qB*zilF>rz0}pV zb=`-P?kt1Lw$XBtpYH7Pkm-T%Wo-7B6|X%a6PC<$?mol734iBR{NITc-_7Jar^!$Y z$7WJBL%U^-YDwgkOJY>tHlMd3g5QCG(5aYe+vu>0k@I&D1y+d8*2pT9$+7z-f-CYmJe<+mYSI-PMxB#g#&CHP5<_GUD zC8HBNG=*VVAr~CQJ-pli%UR&F~W#6d83kmU28Hf z2`-#02k%c7!oP)dN^aT~MCKS?5MK;->b7`2UGE9l=uDlRcGrz5@*sP3<{D#?_|TD) zHaom~2f!f{@LJqYd@fX!09(x3X3zHB09y62sQWjb)2ClOG5#5#4dWPhPfO-bFT3Nx zppYfRN@PM_v#Cuues0bA%cMM9lul-gsZGHEN?#v-o1v=2_xajjClcPGi&+|k*dX3D zsSKui*Ng6e=Z+50JT?DNrOVqtCMB1IHM+ZXRv4XL>YiI<6?4%En$-!F zrb64Y8XmV8`L1m=Hq3v9064cOY4mP&AW}_ee}6yaMB2b0hal2qY3d7@;;?Y)PBmMOvAw-f>1g z!4nqgR0vo{AiyFudggns>tv%KE!dG_5c&KaYK37z4Fhcr5yG#{`eH(y4DN@I!Z1Hw zf^yZR@~UR~nz#PH*ntP>%+Dy*Idr;SZ~fMVmVy|c3oJqsd<&UabY;uz?fLEb$V8ED z313S38keY`DIPxMLHy)>P36v=5em$|M_hyio&CkXKBhXO^Zenv-jsNJfiZ^5e1?2; z#{nappxhMfqqo4Knz>0cQf~aP$Ak0}=PTBdTea$~qU(BsE@N*n@@kX8daf<*0~nUk zXKZ_4DFq`$G&tda8sa?|QqgxDZxSD5JURn?H)Cnu}m;&B>RHM*> zXRuWLGk@OYe1!Vaa1oIW3HW9;c=$p78A9HsvjSoeQ-_O2 z`!@-h^jnINf4Eh*`D0CO)i+0mTqIOLi$c!d9*3rl__H|VF3KOSuDI+jyIR;v2g@~` z4==Yy!ob)L=Y&Q5`&B>uwn<2z;oL>eFi)b7^M9S0OVQHPW!Uw$A}-)pG;CSi5*TDq zeK(K73W+3%&5{@Wpw(WfQBhh`bG>Yu`Mr`#3|_|5;yHOb4_yc>XLvoQnDz<@Z+LzL z93B>V4n{Q3H;S?**G^tePiPhf!XadbT0$WJHV|e20z|m~PXLb!3xibW{>P7lDNEJ$ zwP!hxZxpHuKF>Z51-pSAni#U znR?%o${^4-%k-2)!|2|@rQ66hs;fBI{6rDKR*C9QSfKU;{??(zyU9vZ%sM)x)eJoQ zv^A~pzWQ`?1!)>tYhLdH59kqVhW(Jv(`RELRp6>ERr8B=Vj?@QvY%`p(a+JiL+Tq3 znFeYc?WP@FaX&Ol5c;~PHBy2If zsHfDe!%S^R6V05)F&x8{mf2s->wR0`iCZ$S@v-;A22I@Gk)qa# zEwV*aN@+1kou_)*K{nG^Bmk{Sw*TvKKcC^Qob$}nki-s)eXvA72JD{?L)6>OW$@g$ zLz7XDI)R_b-9p{%k7WKX=f=*J-RFl7TuC8#2)}uY^#aG39`&7k3G#|4h_TJ7zY-y)I^9cPgO6x`l)uPunlR+?k;DGTg=$F|a zjmrmmV;>gXuY+0X*TI;|i>r5c^#EdtMMZ-yYfr3fZr2 zBa&9Rq>Y0W_piDuAU${^ueUtY43jj%S*&k%pXrn&zDrApI5}D#x>8aa4jSjm@JWhD=Oz0xz_Vqlk|#@lgY>H- zZ*s8+JSMB2vUTHv4*_BjN?@TZ+cElRizK@@uk-CCI(ZN(;pKG+iwZ}ooZosY%ea-x zM;6sD(=0AG#tXST5BrzI+MbN`@~zh=aN)vZv<8JruieB*#b`HwJinFGO|)8Xv)Ur+ zq};b)y_)Jq9ArR@$8nydVp+q&axj+SxV|BkV0SoWkTZQuFc?KNIW`9AH#Szb zGbqREj;xlmJro=29R$8iugA+l-=&n37MsrR0_2suEyq53p+&d;4oYDTX?RT+-_2tDt+dR1#mA&r;( zOQZJkmwuM2Pi(4AX#+N?cXH8VaDOLp1(Q)BGuyX04Tsw_W5TGE`CKpwztl z<3DypkW@4@jPs#+d4v?mbX*-?M=em4$89TO?hrrvkDLW6mX-7qhR1Mp9B8?d{_2c8 z!Iiwfb1Y2?e7x>nckk9#YjmAF?-mX^y4&#eAp^iU z4dUvZ2ExyQH*&mJy9xUzy}`34V{X)Ems{SR4~Z(u6ciLgd)LCjC~_&+Uqx9AwzlH3 z+;}-CO%JDXWYPj=bZ9&@XrmH|FkY*65Gg6E+g;cw|Ti=X5bt#$5;46CSlbIQXL z48BWR!P~jN`}Fx9?_3F^u|tG0AkVvS9cYY|TLrlE9a><}*q&fO6TvVNjr6j&onb z;i_;fFZP}vWzrbMia-|pKs;FL*V?_z)Cu8 zB3S*Sp;0T>eOoE5WPM9lDwOdxd5*t1V5s{~{fi>zyYE4q1V6wy=(GxeE-8j~R^Rtm z4v-fMgMjVbaXk~$G$M}A-KpawGCpt9QPK}q@&t)*;BWPZfTp@~|;;iZmJeC!yzRmcJ6u2~r2I+NDUm ztp{D9MQE1G#eB;-2KGdKV)R&vs!C6VEGvJg@@`86q9=7qhx$@7yp#&N{hkY8c*!)5 zT+c2|>f;GA$~0X!AR+ydTjY=IYko_MKy>k3OpK2<$0xc#1JV?;eZeHE)bTnkP95`& zLTGB>(^`T$itUle5*7r0;QkurbKUw;o?mxC(}|3l2Z2Jb8(RyqB7UE4@Zko0RvT&P z`1rM_zJn@75dgnU@Oe8itd}F^RWfLy(%AXZJ*xtIvtqTrp-+1t{xHa)lm{u7qm2vQ zkK4w7{N+crS@cTZg}*XQ(s`T=Pk}`HkEnQc7koE@ru_lC^V!LnuaXUmt>M9sP{3&h z$NAr79})()d@ZM1oYH2tHJiqH?LryJiVt;d<=YoVaPsIlcj3=GmsUPm)84hxR+o$O z*+N_I3UDkUFSGg6b(ZVt+SA@E1CIC2T@xJfT9u8psB!bW1rdjf)oi6h{)Pl1zsDPw zx!J>}pN{*1l+T(%%T}Bk&h76QyAL+hukX?iwkJAo>tW7kJd=`tXCAK&42wnVG)N5( z7j5})5P3|c8-1T|;5i+vqU}FSZGAmxnZHHRYjjwMI;1Vy?99wJW(DKAt))LugIi34 zRKmK_VG(#LXkGwDMRj7_UmE)JAdw8u>qM*LN$;Uk%NDsr?vAfA^1`4rb%O;BGGr-o&TvC^`*fWK&jL=<~2elSm}J<eD5UQY%aF0RU-HK84(b zgr~s0WFxzzCNIA-?yr&Vu%FG4sCCl$FhGn1cEm`l!SM4G{P4GOWt>wGnsmR^+s?R4 z7EcTf;HOO=9Thq{GEwrel%sS&m*(3_FYOQ>Z<68o(c#UVLC?+(3vfownz1rjuWB!! zoScxWQQ-$2P3IL#Q=BZ+TiQ(I4;2;7EfmXiKn`H#$lj_*^ZKM; ziC4#$(wCO0i1(=EvSXUmAD8?MA-P44nupMvYpNdJae`|Mi#Y`R9thc15CQFU@m&?V z^N-89Ch?4)_t~~n>$M9T<5#h>is*YzZ0_gaT9)!(0%u|GovW^)iT|J#i%iILy%WvV(voz zMbtjUvZGq%kB~Dx$$Gn#`tm`R_XZoqh*Ih}<%899;QQt*44;vZ&bMW!RsLhr#f{0u zAt*8D5JmFP84i)R*|CENB{*0}Jjt6HqT&mF;j=Y^n=t75F^-pTIaTDS1a&$3v2gE7 zwN~|$V(yZ9R7z}xAp=)dn~k{U(t8_T!?Gy-wp{0qOykNvm`Qpu}koW2kTzkNx;4#{qF4bGAX7D&Z zOZuJjc|_v#l^jtzHERpdJ>@v3HTd}W06%8ydbfrqI^2x^GNcwT4OlBGSz3a*RWHp3 zX$hOZWEf2L_SG^S@R7%o_tvk=@_8-`s@l9~d}rk`V_D%%msDcq`AzbYQjn6-*26mk zb&|QLgkRV~3eCb`fkbDn&vyb8jkEoZC`vlzC|!fr^fY2Xw~bh&PU;%PyGZ@;emQpN zN%S*i_(Hfd^NRWQ4+I%&uf!=H<})70v$x#J1~Tm;2VciIBwjzfuHnI#5PSsS$HiHK zBh%`F*+29_M~iw*v_Bi(&yl{H5WrHEP5I~^89tP~<+^kwXDW*FJh6J6-Bzw+lkp%s z-3lrp1>gH!PoMx!(f{M=s{^8HzP}e(U{R0-5f%_wIu!(@yG4-h?(URa8l<~HIt2mg z25AB54yB~K>%IDXe=mPs?%sRunKNf*&V1$sud~%m(`i4_*W2Bor@kf6{>%%!mCkcc z+Mo4WR`)HJTkte%ow)zr6{N?k-B8PQ*0a^bw)z74viP$Q@tD;tXbbx(fsgm{?pPMT zmfQZ%3X*p7k%hw_*T3aa$x>2gi^K4HuKIVXUAu;)AQ?`yx-CWw%nITm%00goH27?|zs8`Ew~Ky41dCvN=ws z6#w~i_5J(p0omn!^!sm`HWQ;9CMU)r-N!e?HM@cofw{R9?K)?Po%+QqC(E9P8b4f! zB75~&rbj0aoq23HJe_ixuw#b?*?b;6es!6ozswUL+25b?5&ATmTDfxVMaJgg%s2j> zu55&q+k?Js#{K%hZ6)>eqG&ft9c13hLB*hn4uYTtOS)g*1P4kMBOx#%B9GBP4pQdo zLQtOSVq>%0 zzPruELd}YM>v07$0h4yk&CKd&{q$j)@6Apt;Zaddk8QV`ZI=SF6U?nw zU0>RO{869B2hZ;+sF?eZ7z#_eIiR5MPD=OdP!-&!;zd+gKn5Bo5HdXP{y4{9S=R#8 z?Hlp9Hpv?+RxJaD(CtP0R%7aDg>KE}ZBKZ;HGqq0qGOYOvt9DAJ1lgyrVJIFvb)PG zo++;KoGx$pyK@GP7f()xm`S<4=ool357){RtlYEQxJZ1P=#1`JSd)hm9UjV6x6Ut` z4+VibZ!4TnZIpZLgUFen6YI4-X%=`k=nNq(FG}Z5y(rD%P$cY7_U1Zy6vY=_VCK zzFb60Q1)3}Pb@sm@_W48im}_&W3Ah?pDW(XnxL8K`OfKjPf#G3@mVLex&!_6MaYy+ z+gnSaR@6^*sPp3@@97ou&Edd_WE$wr@55HU_BK{0AKxFXw+A)r)KI^XqO*g(WX*rZYRlV?{76P#N-)I`Hc{*aV`T7#eF>_oDu z{%XbsM`L;u5_x0h?396o!3rm6uj2~mUVby~?n}nk)z;BmB1X3U{^{PI&Z0_3LJM8y z(|+CxX6cwY2b=d@Rp~l3o1nnG>XXz6$vaX)qx}98Xo2llHI6v z(u_VMS296Q2f&6-1}wJrcV9;Zm!=!{whzdb$DX|G6k~x|%a@f!^l3vdKW37jAbVlZ zj1u(dk?wjGF}klWI?&8)YUhnv=9555e*Qy{DLJ+r>?D__D|Gfuu*_hYXfB0RywsGCglvPLmy1 z*|IFJv+H`sA=2{9#}Q4=swFDXAMLv%)92an$D6wze#)~3>$SVnbD1hmu-W(2eKGi- zb#E)uHvL64(>yxgMM_8NBm zRH*c~Z^|`&Z}gTdRL3>Xy50vVBzW%)+TE>J^ziYY->N+xr(m3P>iJ$IV}CI;GQB@; z%4TZ2Yswa!bQx89bRR`p8zMr-MUB1uhqDn-2yp;TdH#=%plA1G^xTW273ZluW*P2ZYimlNpF1y)H+b7Pt*pIzT5c=vHI9P9 zqeykw1kjWW_m+x$ybnLLx9fk>GV8{hI~PH7Tn;Q*qnYvjqr^ri>a?a;l6h=Q*AK(f z#aE6Jg3-KJ#{}gkv>j&ao}*u8MOiw z=aF*qEjtT22T%Xd#M<=Ir9CY&h>!QO)w;}s*Zg$rb^A_vSdh4#OX@ZekTH#IqADLU znIiW2McF%~?`cFd2kotbhXW?zAds}-6fTeP=2NF-T@27q66bPl6}F&$sV1@q!a0oa z$jUeRc|@?|OnkeMxGu!7Q_{Lx#nTQk$oj0udo23U&^Lvu!%CCW)9f6P4EUc6U?YG_ zD>|u{{baGi<)YIly8RoX$W7mXn;RZ{FtPfo6HB>IcD$Re%Rx>}bV}>vlvN$C?evd5 z%64wUi#&yZdC)x1JX`l35OBx1?KH ztc<5Wpjj4%t%`g=NH<1I`-y5GOl^w7)6&1*GAu8Ek3&Sv|!))*R#C* z)e-jQ2*{oc!%WD!oA+JN)m`E|wl_$B^u_*0aDt?c>BZgF3rlB3LO78I|I%?=CQS6Y zKj&;}=Ar$N5hFtrox)EHiYu8!cNYhmMLD{YgpaaLBStvun*DIYOhY;;Ydv0Z8zoKL zSy6QVr>_Qt%XX2L5)me+>)eyIPnutJAedJ%ekezJpZGLg&XR!XjrXNP1&W!^TJ^x; zw@|TrQcrfEtn%a1kgMkShqrl`%O9EixgO)lY8%N=N3XV*pNgxOW3!|RZ;Qn_(y!{*?RY;WOc+YWdWr+9Cg?oZlrq?XX=<&1(-FC?aDI^8RjCqN@o5@e5YW(H@m+JLOhr`QY%Iu&r zV9cgP^N^72M{pQ!$o+fr`!RnsMv2b5|32UJj4}r+;O`3005_ug#`x~P605yJo2o1dwDQ2oBAKK>$m4E#AvTz#(|E~d!q=>M74wLtVk0?&T~ zi*?`Ti^scvT6;G3bN0JT{Qn=}`aRl(B>zTgnEPdBkc^xifIJb&1}2XZf<1nG9`l0y z+1{qd58rm?!4J2w(cs98ii%>v+}+t>8k(Q4w&vNL{z92sSXdanuIbe5Wz8wNfC|hq zrUP*W^>@2^l`Ut#fA<`2IyE*0_olL$j?6zIn7tmH3N37Hwj~C`ncJNENa}$A=CZ@q zdiJCH!m(lA{e}sH8Z+OW`0T~`TpKX9z}e5%%f%Y~PAx0dFI2fzYqWb!yS9C#Zi{1* zB(=5Tx9~6^E`1fFC>9tRG>r#0#6-JRSZHVg_m?Y&#gx&DAGb0mXO>(S&H*>%rFmqa zaNT!t0zF)}R{_F2go0;3MWc95`Yje@71SK=9QuHbP41UhYr)$9B(S(8P-INXX?nH? z1pAzXQucC0D{2Yc&W*Y{J6qcj3bI7qcFp{XiT|+jcg{&8zd9=tFkykQHEkEB+u2%K zo$@hbc6$l5djQ9&%q{XI`R|#Vy{y6;1?K1HpYi+=3h0dD9r60}D}fPxGaRuYe$xx-Wpf_(o=Mo^$ zAQNKlJ`&IJ&ehy-X8J^FQT&FjWl!Q=E2Xem4qn?MKD*wF38rT=I=V`_9=~+wCDIOxwN_b(eX1X^Fq7#GtF;O>1kbmc-Y{ z-)_merYsG2multhvs!kqzH+^E{gWdS`igS4A4ep^bA%f$;P#+h&jzF0zCX@w#VNXT z72taZKf%_?Vco0^v(Nj4?ccOJA^AGls<@00=o0(ZJ<9})>t4>bH~OAFzkJ)y8z0?z z-}RCBcF||wZMUm|(!?V8T`3hzC+Z2rqWCpBMvHQvjrK1?*doAKn_SAdG%{eJIL=XL$5 zGia3eQahmYxg6h|Z;jVs*e-D7w79ZTj|dH&KfKv!+`9jrG<6aXcO0;_cX*E%#l73| zK!>(3><3&rqtI@J+y_itK-QKV8Y4g0N^d0DNe@Yzd?FmoLk3W9*y!U>qq8Tkgui?mM=6CkPBxtL}>*mA=3$1tEDT^68mR2c? zW;8xm8QHz zbhl~|EtLD~??b`1J#IwrW*Eq5cZw=1i*u8oZ|gXj;1apxQ*yRmgEI+8$aFt_w54S= zleV(u#7%DLvV;G!t*YXyxY-LJ@Pe2EO8mNb%)Aco%d1xzr^jo3Dt0ZK^MZ?)E1sa$ z%jEluKY7t}zK{30I?ri8fDnMM($2|Z^~aL?i|~p9i=g>s!0m*J@^# z(nF$x)(<SM!vvGOundN1^cb%L~*i$yl?#|!xm6htuG-v*V#ktGyeC^7^Cg)+xTHUX~=xi1w(32pMa|upD#&0cN zzY3CTR~)x~#6MoF1?=7h$t_-y(s7P5 zg2j-EGx}aU7V4eM?g{ccZk+|oX74C4Bzkyy(ne&T|>Hj*_Zso%aI;2=en|TAZS>bnP#YEOQTa) z7Vh`gs+{YUr@Z;In=2mfdy_|2JesxTdz!8{YRnpdy?sd%oBqMz;fo*;&M<#@)y_;Z z-E!0URM6>qUwuaY5M23qPb}E@d&alL*JpU0-`A(lMvwdRc6)M$^OVl}aV)G4KHGZj zm-QA~+ShYBNEeR>C~7{AT{N$1xP`J5tG=1;r(uy&-?sZ_Indl+)DyJyNOE$_y!LVw zUOlisdBN#zw$+>P?){u#9!c<$Ar$v$2` zz0~_E>8K>8$1Ij_%FD>#YC4?O6OJ!V5FRS}BS<1!wL3?!?S#>@<@~hr(Ll#$Tx{V- zovv3e!QlWE5m8*H=jg*K=V<2fVNsip@|Kyv!|_wK{gd0Rhx=h>Ae+GR9sRvNyOv$_ z+sL_GOOK6DFCvbkR}*X_H@n{(8RaEZ*VgXk(cwKI(6-mDrFK70O!mE*$d=HXsjxvp zh*2o$gdM%lS-QGj*lfK{raZj4xoFRrscLF{Zdqh4SekQuwX*bft0dglelGp-=EI?0 zTiehXijPm<{o$8En!dY;zSPuU%#K*&nj(J6-}pUnj&s?4?Hv2g@p#3@^Oqpm$KN-jdxED=nTaNz zW&G4$tJJs{(bD;P|I0HlE;oDwkpRT=C-;b;dpQ0eGq!-~mrJ3R&MCjoC2T=22 zf=6Au5l~Tob+1fVw$*;%&Xr3<%d?xu3uJ`7xveE z!Q1mu4!4R|b!N>Q#rqeQ<=b8aQGAc_eNm-^Gw@~iRZg?J+@ml%U$=|W_fe1Yts1Er z0wzS|8Yk1cR@D!;jZu-NClMs8{c>K8@B3Qb5)B`H`}VB?e+4i}m34h{!c8~Ra%eN$6 zN5ZsT8_c64%^MRTBLW8vM$dT8)ka-zM9Ld(%0doWABEA$yjC04_+-U)Nn6imz0F9R zJ6DpiGaK5GbiIzL13I^}ufDJ9C=MQaA9@O2bz)UL?Q_VKRImG?~TQKyYQSM9h`%kC{q+iPGn_Z6UT{O1Wu2aT7@ok0L7d`N_O za5w6UrhTyMdwa4R;`@M;_;&hYHu-XS7s0Go6-TFi{c{U@*61++o5y{ckaO{Ng)H0W zXu0p9CGpP~8A<&R>DDkK^oz$IM)X6c)mXvIdeiWcqpR<3zQ~eUg#cJkV{;rL_y8Ev zzk&#Czph_Q)H}TrFxI?R-D1=OEV|Vs-+Qb6)-jnXm9m+9+^STz!Y#+fS9D9Ebcxa- zWUeU#t3d?1%38o$A49!0>^ZM*KORPF%l(Uk*v#uzlI1p`rvC5#+!TI$&s4%0?H_P_6eZ0S9Bjh_f>ef=Miv@N#T@6-% zt-oE>M@Clh;~txj#pu?;NP_c~PLuW1Pj!u4n|I9Jzi6>v23oSGefjYI{g7?*z9kFS zD&k(x`@9y(^U-DZ%XzIuZN-)@xli)C(&sfp4*}RCoUWfh0hU795)~RGq&lNsW!Db!aW<@8xN`G}K*Y z2j@Th4cyk3U-$GcZcxGkxa65G9Q@n7{Y9ycoj(yyOPY0M{RK&uX|1Nq4Rx>DmXp8y zg_xpob>S&nR^9(WOHsRDg)3>N0GMF-@wH;y*woxZKc&-?p7Ck?P47;S7Y2#=Q2;a+ zB>QRn%OoGxr-w6?SePg|$QaTO8e)X8fsyHoPAJG(pNNRTdl}J@k(EDC5E>~;!7(C| z<-$7PrGYU>P(>KBQAY}H5GBYz%~Q8RUbPKW>Pv_KFj{a}L_8D>?pH<%MogLgqC-VM zV&8}aL%^SRC|vHP5D{V!1Ojs?PL)9+GEhnp8AtzP+IyAf$WU@4vFgPxm2d${WE@-^ zR%FE)|9*9L01|^E#|cUG#{^O#iv^O?Oh74+V=cYQrArTI!C}GhUi(@j?Wunk%&P?%~;-#1V22(`n zy8QcW15|pG_KD{>6v*&g9&Lz%j*W>R2(+c$YKez~k-H+%$YO+v)BQEueF{0D=Xo3y zZN*weNSdA+i@Qpi-(+W}wDPkyELQE=q24Pfl40Wm%gctl=%$z79q$#8#L8{ydSl+u z(s1TMfDyzsn4kCeMCZuTMcTPgAGiSetoxsvK^fHAmRslHulrh?PthEPX9x z1OM`~KuUol!9XYzbi0&-U|7p*Jjobjj~Zxwhx3qSuy7X|b0EApVSB_MN2C;OGG0!f zTc2Y6JqWB%kpN!z$l-XVUm}h9)cRQu(7yIauiGSfhzVQ*dQdBNClAb zfC;cS1~vR$(zu5nvESAhNXhSFBajIYo+D8h2zNI%0o$CM3$Q<;6nRf+`@K zPoxlR!>T__2z?d^bwXq!h;F@OvqOdj@F*i@42CdnFwRO`M?FW-B0wFdaOf&eM@o~h z`PefTvV5QWx zlvq+?vBT84ESQ1Ns5OZxwK6-YI^F}gz;0pk;XNySeNw-Mx@CpRN>Wziq4OA z2tr<4MAe*YtjLG?u~ngMXW6S99cgSFSXUFWDU7=$*Mcf6wM!{eMIV%bBnby8b#=Jp zK#_#;Yb10qf4`%br4Ru}nX?+A**^sl29Z)VrdD8e7RXbeAUkut0T~pJFbsYT;Ve{V zdL^RVsuPc7hCmC#1;yS`u!a{YifGb>!dS%O{bKNlKoPM}I7)Y9EKYJRAJJDXxJVa> z9EnT1|Ab4FmcGkTFvCe7B&MGx6fw}zmtZzo*xez&_Cn|@3@Y^bfQ9m1YvGGz)i^Mc z5lEkv1@@gAf^1Cp{v$iJ+nR`@vGzMd)~}F2u)dVA5X^CgoOKd{frN=BW)hDcD)OY8 z!;d!(#)_g`|CCOdlA<^N5anq^12I~EIV?gyQP2MbOQkRbgo%ty)&Kd$Q5sc@aGVGt z@Ew+gw1$keX}7+XD>N{prueCba5ghR*(EXQ;Nt5rN=*s;jGw+ASP^Tl!#*mpkdP>KWuEkXm67p|Ze6r&aqk zX4GM1Ei6BQb-Xe5*Kw<2m3%1eM4<(QTp39v%<`Ky2MTCAP19sO7vL8-iSf%GGJQT^ z%#?NHttai*&&3%^MG0oWPI)4!MyH-sUfS=8YdYV6UxO2yt?X{ z1^CLW9XG7?1{24>qtDfet%Xz22dXh_oL+B^4U;`t=s>6vJmFK&5^O6u?&f_=rNk3a zPwKQDtLO4FhzH@ufyw<6;9xLv7c{@P;eF}jQ;b-5zSkmw2oOl*3IEEe2_&@ClQEyL zp2|r~xY&W^I_D6zO$e-<$nrX}f%pbOj)aVH!oPA^K!pZ^V^F2O(TaOV{SE>bzUjIY zjRPUzNP+8hotTVg7*rs5P}ix5U`+mGHoSMt*#-v`1Oh9HtcJm%BDs!ZLUdmmFw8^a zs6^oT@;3!S5E0}U5H6SG!7PQ)6r76gNOUw_3>2t{i<=UK(Jzh=k^*-nXVK<^;Z#WQ zd;>~085|H!9GIT&Oq3h~lFG&Fh}mnP6oHbX0LeML2+@#mN^eCJ9fyQ$LqQ0xcX7Bv z$cc}lamo)&gU{$JLg$5e$jJ6s+=JrbYnwjhK=WGS#)H+x&l2C@ z2m2YMB$)^o6mPf3#8nKyjCV-sFQ7ykKk7VrEr2)ct8D~xMku9?L1 z6clIx!|3KViwF^h7kni_XCSe8%e0z79BjZFH9nHGU!0~Qr?>xBh7vzKMEK{@R0&he zxPt-AafExTZvXr5FcwVSg&CXyb*74ZMML$Z7typbLr=O{lDA*2pV~4Nt}Ao&)@8a= zT<8EGvAGzqr$JgmE6nobkmVJLzVReDDq;rJH=Bto}=7v@j5fvilB9I?R zf#B~i4_LoqLBSBH)DgqTXuqJsLkNOJB5;vv(;ttjnw!@)#-PkBf->KF;d#pGfDBRp zoBkKvr+d!QPrzV`(A3qmun6>Vn%)?x;KmFRwz01XPnU%3Wl5!&P`}56AYIr<0Je_U z;H+q%VQWyqgkTDRZ1dG)rxC*O3IAFp4Kfz)NB2rIeLh?Fu z_To5RnPTKt??DVoz-Z*0+-3+V5PozjW*817V4Xk>#@6s9V}7uQfyTh!q~bD}9;<_! zT18jwS=8s`HbbDekZc^5QuiVpq_8eHRkz4uM4OJ-ivk5*j|dJ`Ud4n9Y-B_JwpxozkbtH0yto%#TiO*vVU<%3EY=w*3*V-eO(n%($!uqh_QnB-u zM6-dqeZ?xe2}N9Tgo(!BNXZkVpRO6&9K>Kh6AfVTttpn~+KPBHR2LrPf0$^!@XR0a zCODBilr^btjVM@w0pI925b6)foxvA3Y_3QjHr)-y?3PcoA5qCGxu_?hO&+=~h|8?b zLsozWIoZx}3~hx6i7;j9N5m#bx9s4EI#=cqYc>{5VY3-UpcuNT(HdDRPZT31T6@Nb zt%s$Z1&-wj=2M~t|J>+4(S`bra?zR&B7|JL!w^!CxVXT4dF916vCllKaZ z_xc6`efc3#jGbT%Dryu~&>douSs@tNQ770+ni9<)fe7V-La)e6o=K|r8^o+tHBg~I z-XTNZAmrug5D*i(f-N=_5Eg|pk`|g2?%mftB^+G@9ES2P0wRozYmb2E3&C+>skRd_ zpHrn#Dd<2@z!-j?<>BN{pQ2(uS#&7S7ZL(XA;2Q?Q2zwFf|wpYHW-4Q8eXh``UFEH zk``h-K>38wj4E~#5*9-R!C(-3C7Np(MGVr1Cdhrqm{P}rKvL=OQ|aCWgdt+m;bBzL z7@rNtz++cJPvE7bJjDnOs9!?di#uQrmc1WMZ)3w27{L_>8sduBr{y)XMz6sQYa zfj4(Fp>MK>JPP87!|B<|(RfOnWmywT#U{I#4_;4H+bl#;RarL|){U^p78E|c&N%e6 zRL;?yVjouK*>9+bD^+H~bL1YXE890Y|M@k|+~^DjXYJJxNPe!^YjoVNX%_%jke@K8 zdpr!m30{4wp6QoM0F&x?g)5W;7e>I4@p4=8cf=qs@ZymDV%{L6Up^-s00lZL(hIVP zjH1UyN10Tqa^+IaIBjqAZ=dz5k9TKGx$?#s|v;eVD18Te8XAv3pCC zV425+0W7UBb=0ILRkx;%99PRibn4P9;$zm>#FWWGl+A)di`c!2^rFks$b}1Fjm_rs zvB(pmlsxcmwW#;I)z$YIIuytx`h}sPD-L#i^Jr?usj90Gc*0$bJw~3Ib+CM3+vh-N zq~55mf`OA-xIO1Ol=e2srf)6GT&OTuw)EV3Vf$#>rQC{G&_U6qUsJ;bWdE`VpzP+7 z`WHV|*-(IJW{S^#kaOe2dCMNzReDz?@IvpM7#pVOQlVv~g7GWBw+pALqza>c$sNT% zX0~N1LW6hs>L+S84iY5E%s`|5`_HvPaeatzMr_#UO;a$g$Q*McR)TM{x*^(U0~`ks z3)k#Rupcc5hbjKLN9anx4f7ouoHdY$_%}@g*cm?zCfdQGC-%D0B;FX&LD+x>7kUFm zVn}&8sMsMRW-3qp<{Oi^Gg4e}+=Avc3bf!C99dj<`XNU8r&yw^@W$EvgE$0=!|jhJ z7JCnrrpz;36a$Gtq=cj`g4#kL<|z z5PWpu)u;NQLR4K)*{F;}bRW>$V8K_B4t%FyH`0LqYLf(7v?3w0||2AoS11?*e| z)ub5`KY`!{-)yuje2d-hkPvT@hBk7+S?Wyq?{f21lFHSYh=OszZEFn-EjeBq64boK z@^r-~B7^Qsy&CNs88`}&@z6IAuc7Mw!G=$RU;09UqZQ5-DW^=IgK~|esR{(=Dr>E` z)JcxgQ`K8x?4oTeM+AoEcL-RGb~SaKLS6;U9ZHe1Yec((+7(pbRm>)S^?6a@)pRsk zQ)whn2Vo5+I~PkZm<}?uq$?&AoDrso6X1{Igy0R8f@I{`z$u;>g6RVBdR}r;xfy~1 zE4({D5`$PYEGPzt^$F^R=UzTmVOi5pG|4`p5f&=E4v^4|fYeGvW1xh_klI7pnK6zA zb+-inXBAWs4g?80*I|@bMW5&?Xx))zDTQ46;T4GGCHsMi2?2MvBlSyq%noMzAu(Il zU~mTxNkzpoDso3OVLyeAh8%y}P;+v1G$RO7j&UfwsXD61Z#bD92 zlP|=7nTtjA7!ES8OpP5hRMBaE&fv~)8mfNTr<#|Mbx<+i#Dj2@AqFW=&b#Q0q{LL0 z54S{HI=NjZ-ANhveDVFXIKnV5OYxmH*umtjjQC+2YHkG+vY5pJ>COMS|zy1i7Mj3&j6@qB$v*9;8+F*FSE)rZQa-^95A9%n zhd1~L{_Y35gF@wz4G>92p+bS=x%9&R*z(1gTnO?Y^7wK4vWy_1P|>Iw0r#&N1XOtk z#+ziL!My1C>^RqL*r2F2`w{9`qlLG%wNuaVT__4{rfQ3k-fg7T+1U!|4c0z-2{PGPbke;`J zR8`=Lg@K@)ZOw543izsMW-NlR0}J1S90#RW**I@7yGDS!tW^MIP(c}4!W4yr6l{kORt3eNZf8SelHTbQ69{Xmh>d(rkCa|TnQ=t z&!_wZVW_K11*LzXLS7jProt*vY+>b+ce<8ZvE=3kZRJwsbAd+;L9hWw`hZ!@d8F*% z+ag2EsWzIoO0SzF_cxiP@i_3vqH`lx@q23oRDJ z=_ueo$NIAPbVuBx`oSl~_6smYaqK{OT-X6iICab*9x@e+QF->}mxl;6458<;o~FxjS9RjX)h++Jkn}qaFQO5NMR?Qvns zmjF0SK5Q`G`6cbdf)W$H?8F%#Gb^9;IirgC!Uv8Ct%x3(31wZ90)EQM(A_4W-@IO@ zOHt)o{7~085TRcbqZnJBP8%?`v>IX?VR&}tNI1bx!Z{7xlb&g)*u51{DP)wKpRTj% zW;vO&W=QNEEaxwlQC98xZg^~MXIEHX)Rv=AKwQGQ6L7-X^E=Gt%a;OY`n2Yv{4YOZ zz9#Z5WoB+WM?UE&c75tEM92rsz*X*cZf^J$kHH;L zE*t`ByTHD-#fQZ~Oa?@4$=B31u8Nt)S8<+#&g!28RNBm-L{ zs@oYu$1Gc-e8M;CvIN*V!ytJ93NdAedBZALumMA2waj~|9FIS3hs_mbUdM`qhE;S0 zGBojp7NsM0c!3ax36cadnpi0~iNS(<49Sn~n{Lnm zXec?nmqNj??C@526-7bTCexCAYNS;7Yev-G$AaAb2B1_2VHOcM0CpP9&ApK%qu}R?XC}JyQ3>PNUJG@+yz_)ckyw%P z7uNP~bsb35QlGz@Y^)e&A9ik%c!iv^{wqSO@WrREnq7aKK2oGxqz02S3e$pwjK_#v zOYQma)o6)Y0-f+0BlpNI^x|JLY;!$>e_|TmXc>9WVXDD#S8ffFji$G$O^Djv6e?>+ar7fO7MlsI7_NpT43 zerjTu+O$U=K%KrlAPVRBp>I`_QNb|Jmv5;wSWwiA4q_To{$yg$&#B{Qxau- zY+U9jf6aGQDv5kPy8V(|J&Q4<_WYb*M<-RLmwi|&TY^FBd@)@j`e1uUno3Fi?Ymr$ zOyO=8#cgLfH8Z@~$_p!cNqMF$r~zOT_NaHS4k>R*&rG|xe7kgZo0^;sdclS-TOc9! z0!3}DXva#yxJCn1{BFkjsg)@-rmEHiMxP-J*B3`S(KQzdUAzbR+`dS5*3$TRlH=Yn0sY|$I;4$%i zbgVTJgAhjdRK?@?v(k}>uRO}K38)$938!Fx6{hYGKRVq`(`UuA@ z)YKoUPV0+Mxi|0Se)jecAx64BHpd0t6uN}N(#=hfAx)1q*r;QBfnlEcpY< zP-H&3F6F;p%dQVI#g#B~BB>wOUpaFsY=ojGeZ?A!y3DbHU~rcs3=Z z3>%Kze=D{v?FbaGKq3d(CvAu}@YLgzZBSQP<%fiQ;ky0;mFC}2k%~v3`v+KehX$eH z`XhJB5KI34M40Oz$SIEf1jpdF2rN@~MazK&4IR`Ej;Ux~H}m%+g$vmARI z1{=wIR8T&1fHa0e-z3VYij&;#M+!)`&KpzE2S2$L_XrFfFFA`b0SRqz6?>pL7nF?_ zOlmV|j0nV0p(haLco4m-!b+M8M7HcKFpqp9o-k1Q@Pr&N33nQ?E7+WVwJ+uON zN{AfkD`)JnNHgC6=XhwQ2%sow-F&dPh{W~NM(t-fR^xBA#yD7d=NA^RUIN&b&9kVV zItgX0Ac|GYP_6W;;bMlj#nn;b##H*0-|!V+$Z%F8qc2^XN|pgu%k~Xx-rvsQuVydp zHu@C8lGSd@(E`76&adJ~e!rx@3026M_|-%oix2y(6nr-)nM66rs~JsBc<_Y_1T8JE z9{gP>nx){KNc9d%Asq+cc03S1D#{tv0IcQP64wUgF;ofEN$cqTZnSPrWjrM$#IJH> zWz3P53l<1?L*Xq=1t!|;57|n$#g@Q#T6VWPpc%m>KCwjqb9ZjxLv;4BpC}|Y zvSi?OI;+$I9)p0N&n_d#I=9al!BFx{EviLe<27N$=7U0@PZRy%!W>;{nE6lbWb(m? z{H#lj0FeS0tRo_FE(s8YC?`q6Vpirc>O*FfGbT$E4ue!n1Lu_7DT({dtj?_*=`A6)4 z5R+~Rw^Ez;FCZPUHdU*qh>tQVj%T$?tF0(RuJ_mj`XrojdDD7YF4SV*W5jDRIqBgo z^oHef4_Ikw2J&-dZHJPnc~fS}WE{U-%lkSaGCGsBZAeS&i{BR3#o54VNf)M*zq7#3 z@HPf9rE%=VR;N{=$hXKvQ<~PT?Wh#wglr0}qgC3&@;nD93N4AY=N=5*K9A*<>W!?m zxMQY;nzw4{ft?GSQqEQ|>E0OoJW8o5;vnXb@Q|(dwDzt-&_c;i3&Tp zZuvxIV*vQy)$LnPSlK$E<$Qjj!Ej|PjTGFv@e&*W`yeXrQ?%1c6{~>{LI;-*O5Jqe z+0^2aNU)ZUpAd^@pPHV|23eMr2EF8yhA~Yc{)nzrl%h1GUAGiS0H$u}FT-HsD+BC2 zi|IpQqMTgqM?cYE8>Cxp8RCdc>pj8{#ua8N-apHcUu*O(PS^^qMJZxKRTW6WzU^`k z#Sm0?KH-!)?`GrT${A0tKWgv`%}}>q$XqRCjaA(;)*?+gqNafQLt_Pse~h5QO4$TX zvNmIA$<&cl@5LBs!$$-nh%;K-%}gPFH*Knc3S>8J7lMUyM$e`jy1#vBx4H%elI;+L&N~mcr}QYfa62_$Y;<%;`Q{`IOR_|0Y9hc;P?0X->ulH%tb%?$!%?vx$BvS{ z;?^c^Ue>d_wX2{R0{GrDCYfWMQM%-591r4coOZZ~7wWOpvaU2xQ8a6C7bJ|LlZwB0 zkkrA5ez_=hEL{{9do_+ol=C}L!9r6qHP4Q2%?RS92y-vswDHV;c2E}k9e}eRWB%Vd zz@%~oi_>U zRYj+9ZF)X>U|QOLT8tANX&J09(eLE?amYhSV>Iu#AwUsporo!!TPgN*O}4jj_7m|G z^y+LWD?TO);r+=W!M|DcsqnA~8FUVIpxxXHYU`FyXaiw#@mQ5Snr`~KnX_*V_?y1D z{BvQNndl>vVc?J=EH1hYM{tEbJ|{ki+LoNsVOnXCM28~S<6~)@w|2O?pQokkiN-U1=ys;&VIRO*H1cm3`=w658;1g4 zTw=7Q>$lj2bqGET|6Gr$wie@e(q_nwv#_RE;tKkW{>t~qPw40V;gDjw8aN(?gdRoi zpJ8noCpL;tn2G&DzE1N^l-O-&Eh@vL1PUx27SIXJ+St1D~$JLSlR6-ccc8GMObr!2LSUo!PJecvb3%Mgz$+lpvR3a^7 zc*l+u?_6WA)4vYU0_cgyri3}k2|YV|8gYA9*`qCT6soaewNDcoh@Sy;a%?Z9Fxs?q zU=&ruzyZo`s)SZhvvx3LU1~)YYFH~BrnvBNSeDhw&C5&&w^;~IuecNet0wg<`v5m4krgWY!?+hmoM187CNN{wzyi7o)yBL`LRSt8G z8w5#1F+mgaC{-R-ft}NZo^da5e9SJE>$gBJ)d!y%^<$gc_3ocm0(UnQV|P}?a0tcq z$C`Fg{Jzf}(Yi?v# zSzBC0ZHU{fvTk~I{K{R#1?WuYL6T-zU1^xum<}Kbhj=b~FYZwrs@ANvTUlJj4B$h< z4}NC|HiB~Dm^ z{3q$U?!XNBR1Ai!b$m*sbmQyj{q|bt#^x+`sXZTxGKy}hs{A(qf+qC@(uE05fhB&J zc(1C)J4%Pj;IgR<$R+|7|gP9$Y8{_=4IC)FaY#5??2{V~}|+X8PNHizJp5 zMbktbFnEXyh|ZhG&m%(S$42o74t^7sIXIWO&m>#r91&rKR@h3;O}jm-qL4>sXezQ` z#ducRgjqgqRMHZbP?LXY+)1UeZ z-r&wPJjdVK=FIdLcg6UM6%{l3okLcg6KpABSY7WtOtM&=oQuQ(ZPq2$FD_F$S#n`W zm)MXo-qf)L`Ql!bc>0^67tMIvLQo5tD6#WI!?OkcsJTz{yK5*rE)b_H3DP$pH${HW zC1u_H@`b3Huj@ZQGzLJHK&eFE)s>USnf!lWuu@F#jEYMaQ==@e)>cf?q3WlX_IwmC zXb)a64DhJ@vyGGC(izO#N=h~fXMo_RVeE_Df`@sYvKu^{wzKwF1gU)HMy4OtZu+K@ zDV@n}S37@V=e^!(0kT)5Q>(uEo99UAU4sC&n#p-#WnfdCWRH)0PRoSd^#cj!9a_3i>z#V z=V0>|BMPPU`jf0$M8hOZKuEwnUDQ;S38+0=1M=4Z9>QmtD_C-0J*^-aoc3}$6Z z9KT~vR92WuvImfa7Z4S#&JmIR7F3FAepOt6qO9tBZ>84`OH+RU2U$r%-hd}R|(HBKY>gH zbo{qEM;&cpk3-a@_G6WYYZ!IjLgiPWcdaNzfD%%ow3@GVwIkSGi$#u&lRt|# z9Vx4{-S&qZ1^tqXesrss&KH|RsQhx1vm8~Agx846mRW{HrhId1aJP)dr4g-1Wmy8- z;Ry06H|igHtYn&rxB1`6rx0j_N~M~0$=Co)l#K%fMgwRVe0lr)UbC|0k-X$}9z~n8 zydtnF-P^mc7mgB-;ORIQmQfL09+3!D;K?qS(O{;;`=ldPr9ZJm5yWYax8>Uh5$CH? zYQE{XF!JKcH>FE+D~8;2Xd}qGfhIx)%yK0h#!+PPVT>>b!#vN{4nFND zAB*6eO+FRR{^|}aL3mMLab?%Rr%pWrq*qt^VqrCzagne|Yp`Z90qVx9lku5{F3`;S zyw$jmjXlwkfVWq!vXbUy0L@T%B)UlZ3fC3SLIc*OoEe)J_dUB^vuh|}n08-*ucRn| z^<)Kx3=%in)JgJcKdF_^hl_h}OW1rGlR-ACX2|K*k7zRgB(q}$Eorh20;&q6|W zn8#Zut{2!?C8j+a^K;m#U(fjspAjxzu$dhLYE-hQ>D8>%CXEJxlU%6M#;gOnyHWdC zbemN~X;^k>__6fz@Zd08V3mDPVK%*RF z_<@x1nvkrMef@-dN-lf{0ph-6FD9R|mBuOhF(tdV^0H)n(`Or&aRLjL&>SDn|HWGW z%>s2*=3R|iBwZ_&_m;cge|_wgKAQNycOu@vlMCLXa2{A_c9Q_iUixU;3H8k>CffBT z`6P0&GJia6Q(J&cr2z{&fTkK-z?oFGN#A!v4og07#}f&hbx5%Dnm?2LS_sX}y*i z68!(14r}VK|8Nf(O`ZsM%AkJ?4}1Xi ze|oIk(pKM*@QoLW5jpi;We3ng~kdqRN9|9}YqYUxI8OG=Y`IKIojCTIZKPoQPHDyKO7HDCUzOA>Jq(A8Y>Uwy|5CJ4#FSU9j z`US&Z&nYIkctt?HO|qSwKIH(C&z+7r8lz{6Ei*C#9=4#~_hEF;!)2X46J8Kl8?6V( zObaC^v%U3|y!*)c4thbLFt0FTNxPkaJ1YrDol{;K(J#_BZ+v~w)lAca0#!c$>GW>? zNV2jQ6{thh>TpUks$3PTjZ9AL&#&!|4$p&W+8EZ&%Y3aj7v~R;0=TR|COg)}G@8!U89uxGq9J ze=(U&kX>1iqbY>F8+e$@D&+jI#F2xTY>F3i_h5f^dfe)SgU)-w(R;Yu*YOy|jq)k+ z4+U`&#NuG;I`wWDa)5nL7goPXWW<68H{`nai2VR%H&~ykBhDU(LB+ZAgUNuUET*cIyI-G(|4NO~r$dYMjUc32?{hpRMRh zNU}l8FA6b6TxoO-`w}KT>{q7u^Mxkf^P8|q6QkzcEiEkzt{T87{xY*Tk$>-%uNFB$QRXAH!Zt!gIF+Ha3NqZG}{HDtCNoXH}p9gbI3HFhO) zFY$||ezzFFPTIHp=?V*Y#_>?1jK3~_@<&K&GE?h=d{mV-eRkiiM3$XIjF1y`Vn5zR zC;=zW-22gX-*Fzk$XKAGUrMBqQM%~c%guT~UUVN$a=P>(CdqdrRGu+N$%+0EX0$cT z61&-%Sn|>OyuvuG;>mVe7Imyj`#O`usKeHIt8GGwm4?TKG>;cEIZQcNONFcWCAIl`|-p^e;M5LT=3QargO^guhoINaZD(@t^DnA_W8D;g}KS;mhwF$bZh{mij zd06YoGMem&1K2ajlTADY9hW`@8K|ziUsq`0E5s-%WK8f1h0{ZBc-bd-gmyPZ+j<0H zCfq(7*af(reL?h%zhO#^Z3*su)7eY_N%oP?|2M)1kt`u(X$Tn(+jyfNeK^R`eovZ5)< zSF|OW>b!^dNoxqWUg@Yz`1>*gu9shbQkMWRe(C-Cx^xH+MVdG zax4sL+|lFJ<>%G%3q$idZXdd58@} zPzPHyK=1`WDIN&c*>JNc5Rqm|nHF{PzK_?hVzg1>L<#f#<{EY@4dpW7pRrRDH582q9*li~o z%j=J8IupX4Ji5FA518fqi^~t^;*YEIwyj&p@|f)?ney|yMpF3!AH^FpLozDJRCQ9$ zOZ79C<4FWj$4`7YDQ2`;^RhyNWz!b{RPmw$%Ma zrp@VdQB#o+<%mDNoF+>gHEUP9Cr*sgQuGYIR*4qWgbJt%I>$MsM7aT%S>m2Q6}$m} z&h|oM;oVW!ki+m@A^^2v;T9!2+nCILr`nde=K2 zkA|nc6LT>}zxnw0hv#C>MMIl|lc!39`Jd}93{{cCT@jI^KoDn`upS4P!=kB9+=OC) znqbf=E#-BA}2p++?qeZ zD))3slO~L-y@@~9o?OSuiaHW_nTSY~D0-A5)u&cqh&GasO#;XRj~s*aX=<9hd|BZmPC>H*z-j zlhw?;_%N6`K#0dT^S-rHf#ItSF8(l6JJY*PnR1T4o1AqL@ovjrK-+$O0 zuQQl+6^|tGh`l0}iN>=gxC=Mncvd75g7wPO|L~px@ose|edFN=(_7FyA=U3}<*96c z{j%;+=OdHmDzROI%HiQ?!)35ZbDfB|V-V|^VNX?V_PnTt@?2wh5V&gJnW5X~EPI$9 zw#;rex1XjZVIlG!1~+=23w_!UD!;hCg^-A0#w4nNHzr+Nb~j%FUtKFcek z0SNA))2Tx}nTzkczP?sUqS}7<{(xcRET=7Ahu2Y?_RRkC@#t6m^Xx19m%K%G=Q(W` zwBJfc;(^YA{)J>inTtZrWm{KE9AMm8mpncO14sX>F@M2lOhJ}2!HHC-Z=!Ic_}?$z z24q)!rdr;6eUmCxcSb3SMuO0~T@XfQpY{T$1Wb*|u zKV8NA;quq23oH8-wT=iNz|JiH=IeI$+hXWe>ES(zE_9fQ&u7D9aY*msKGFY_s99Y1X-=ZP?-3rjo>R7_ zREPMf=Hl-)EjD8#4-EO8c%HO`{xfHPq9;8t&#Xptx;mv)1aqn3F}52CprXa2EPaGQIjd zUT?6RHgkynKJl|D=;{aX;juvI)dP%M=&C;g>Qw+bE_>PtnA(2wM)WMIbWh^A-Y;@K zi5$kgVfUAqo~2aceA=}mK|&=w3;iFz*x9f7$oc%)@Fhl^|0ccdxgX4Z6covRT50X; zfKTfL&8fCJhr*}uZwf*i1p^AprUOGm_9;21TphL!C86-vZTOXU(sVE4IHNU?vMtnd zOl^Ud%mc{AT~HDLa&Sr6jp+ZqZ1(AHjK3kB$Ylv0gN@yz%4 zBxV>UkJVNB=^lyLLzcX78Mtq|1Y3*b zm6ja#_Y2y;foh^n!a@#+MsMaXxxKD4;H{7>+%}_K__qV!$OM&n`OehN8t2qh5!{&Q^d;3*y+rgys z*SgCxOQY9vZc-gZx0TB2gkH!Kc4%klboW7G;G)k|=e^$Y#+6~vLx+G10_pnXGqUj{ zzL2v9`~AK38xS$US^qc^tTZL_ad5`f_s6-gXnc|H)1+wE2SIguD*NX-*PrLg967Wf*F-l*BI=_eO3D=;<#W!&*X*WuG%ix8czeN&3 zFebg3?}6J^FYY;-U)2X5)={`TtplHKXVwpUv_)=44c1o~T40r-y!Ni+j(B;tv?zV7n45i37r{lGt^}owYDvn3`8%D4zEj8dg;-qhj zLo7_4Dfh6kpHhhLpZz_qL`sR`QSSyEKJ+ve96Oo~a z=}$Fzo=+35eUALmy`6hx+v2re+X=os1*;)Rl;4y{L~rijNLd@qpDH+_EY zYxPuj12uOd0!S37jw+D9wZ(a6=HcQ;Gc0WJ)swmE;T6fY@AOZ8&Ig2jTry`1M?Ovhd^P-CRZ+8=D? z=5F5eW)*k_$y_>ame4UyXSdGac@m1)k{NB?9L#g}@Hl8&&`^3^S?MXKhFo53c$X?A1 z1O)e(!tD#aPR}{z=)GBOhr*8wISN}HW17ordm;C21$%SL2i|$!=g5%@?VBUDzWd>? z{6puzesB`%oMnh?1*-M6dCY(xkUt_egUW6qS6x9ZJ`i3t(T<7LLldZ0HDm`&H4k3~ zvy&orjS2*V#=Au75HKVR=IQQ`{Yl^dZ0JdV#um;13>$L#Jk;|!)NN|Lo6`H>F);CMz8DHOchF?2LCfnD z^F~+fDv6>1H|JH3vgJrWU#jW_mKIO(fl0w!xN)Oe z&8A&sH?yxW*KdDo-87`Q8Pw9lAYR)H?QL7^y}}qVFr5{UdL3|1X{**~7`WtB)1>F! z*3k{*_jGpUrdQ(W?zknB4ZQd_gPTYhWrNJJ*1Vf_16~aP_)M=uN_0 zJkSibi?O^3UBq6RghQRTH`{ObWPCx;!Cf$Wu=Dk*-ot@bV2ijXtPj|8nqZP>A8dO? zwcT;1C4ZiG<{)kj{dzwU2<+P*Lx#Hl%IaG-R}nc1b671ebb65`>JBrSCaDiROV7XY ze7pz8fP+uZ$^_nyi`57Ib#;3x1P31!w8P+&eoGqUiZI^cwdGo?BGMEK$vtITo-(nz z%CV{1V~CarxKV`7j0=3Pr|Sd1Pd$7_wykvDa++AlH}Tpk≫t{oS6Y3WUXU@aXkk z;L@Huzd@hp>S=xJ-xUQGEw}Vqu~uGKUO}Q=;5{^rf{0-@Kf$^EbZb|!_T0zABN&yZ z;nr&K+9`7@7MPxc=^~Q#v#JyZJ?q7g8?-4kN{OmGW(3r{QBG#9K5Gt$5Bpy~Zoex1 zbLO{H4pnFeZFTP+V^g)FZt;@K7RWuPo3RY}g0CrxBleKcZ7VOe=yNXT z$&xZ1*E%f5;B8n07fv_|Gx0?+l$P`K-2Ecs>F(!QX4WD5dwuR@KD;!VXLB=ezd<|F zX2i|0(w=R zfs<%~E_xJMMfB#GqiiNyn@WS(4i;lcLbOKK#83phk1Ei5dP9VBrQK(9{H$e_Wb1?P zbY7=GVe4n-WX`HaEx zk;5ZOa;0qYLKpkgb22roFNZOy-`ma%S#1k@U5V=^a(SUo`Zp!|M@j>Yq&(lA3H2@L z)QIea?IvzAWPs0tkbMGTch}*WP-R~uM)1Cv6zynh+j3#hB#2k;n`ym8dz{s9T)UCO z_-di(f6?KRM9G7)L6h;lpO@K#j`wwQ8&AfeYS78|AtB=z2^O;$fPseY ztX#1eGV$+snTy1FR~k3t=@eIS!SFu>b37ISuw>{ z!{MPq1DI#el>6r3PGo@|p??!USPf75)e+E!lX;44>F2G1EDkZsu+GIyE6Ya;ysrsI zRNTA8im&2tU?XkbWS(#u-asR*-Isy~=?{>@;QcBiv$SHni_nYN-GR)+t!R^1wGI=o z^y@ER1PF*}L4f%sIZQG>cPDo7h4Aii$5)1i|7z*nM<21Nt{Y`tUnNqCAg#`(+ONBV z;dc>?jDuAL!@G(1gSg$DQOdssLttl8%Dn6^c ze3R?nbiNyi+i@p7d5-njG!h=X2rdF5K@#WFIeB2)_SXEQvUnS^LxFb(GGw_VG;*Gw zu5MOXN2#_cq^~xa$vwT~N=1Jl@Hsk<^7D@a3xmJb3wmIkZ!#Af?;uN2Vq@^= z%EG(j<>`vCKDc3h&}oVtFxWB93Ie)27=M$W=Ig|I5R9U_@ZgC`yaoU!TOO38SzKG_gG!-SxfZl+d)k$EzG(Uvl7! z=Gx5{E?u5z!|JiWi7U?~e6IHewy$UU%$_DZUsf>8yi&ki5S$HufRbc+`{A~o6a~J0 z%QH4?sC(oP=xSq!IMJcJPbO2JY^itPysh~>;TJ9$Esc&oO8rS$$Pdw#1%|J-&b%Sw zfSYRYsmAqsJZ;1P9h%Q|>N)h=?KeyEb8(^w!U+7Nc9dj^q>0eusLjV_x3peOxkA#M z7K?o+jk@0bEn7znuNw>)-(ISyu^W;LD-0{+$@HyU|9Y`S7TU4@s_${{rOK+e5ZW(J z|C*vk#07RifQ`aW=yssbSPnll9=8l&Zn2MrWi3!fP9AXaq^1;fn|+KwIa8y5yG8`x z0CPOv?YW(=6%c5AN=^?x-(QlMxu1q5k+(kddQ-_zKS!Z4!ti9!V&^963|re;(^1Yi z4(IQUJH3Z`ISH*=xw}%#3Zs&vvMNr;Q?Opb$m&8rA00d28W#3vXlwijfv~Nc(X?|S zlBv*}O}k}2aL-K5+LB&YUoS`Fgb$k$Z3g1KP4d|4IwfBhBt;%b()~{44ezR?V)*YD zIc1BSerNkauX<5jXS}FAEH^LXgZ*{a`vJP|et6xe_t-9qnZ^T*#LmlcPC-twMz5F4uec{woAXcaO_lmXP3xm;EU6>}33PglXcaiq~wEat^>Zwdq8 zao7dUt+i)AY+h_9&zCJ-a$%yDp-FKe*J&hY3y+51;rBpcpKY1x;Oj>0Le7<-RS_k< zK3v|ij_}b2W7n$*&OQ|G61n~8Huh{6?U#BoPVmgD54|1tacpPY z8vHfZSbjTjQPBC2+g+f*>+@V)+S;G6UUEH&;AOLVBx1fdA@IBpHW*3yjZAV{6>*j| z-s`iglVuXJxD5=d%_y~sE~r4JgwcO1wfrT(q*_tv^}Eh}Rp0K8P1lMpr_E-~JEkz8 z33BvGO?W>YYzF%@?Of%p&!Shc4OE96diR_NjsorgB{nRL*ak&*8;E~?W>pE@8^w$g7O*LA!SmU0u&Tqcl?z>-b z7%6-xomh%r4MYroZX{Juu9ZSuFmNdZF|&4<_nB&jLLryVzqit4T0FF{ zPH9@`3e~HS?DK%LMnt@KM56B_GPE4%`!BTn!@jOE$VP+-FfGbn zIbLzi`*8lJFfZr~m#NTwn&k1rw(vt9@$pc#g!|x`76&MFp{N|Va1@xzD<>UB>1(nq z>oUT|*zd-!9KW_3iLt74Sm?E?^uu+Z>Fs{l;iRz9M7Q|BW5l~Z+yU@zs)0*?zeWp>6wQ;caclU+tU+l zTK=}O6&v*|Zg0e2=f1x4Dd<*WmdoSNeay7*-JM$K{aUNk%!U!T3o*pMwU*_2H~qc& zr5Jp&8RY$xE5`nfs^`y7-|Q*E8f|Ci{FLv316ebI$c40-2mg_lVBdljfEat!n)MIR zYNq-rbn+hN{FFD}bXaNU+0| zs#Tb$K<1>#8DKqBaW1bx13+=&2EHRpE%sLxF^gD+s#W>o4HM^_O=KA zUD;K=A9OIggM{*?K_w9V+@2ib$Faq#y=M-m3%pRDh%iBHB8H`&b?d+_{z9?qNM7Je zn6S@M%_`Gb?*#}53>{1Ss0-txl(I)5Vx- zdiTrCkf*#RE_sb(F+rBEP79xWe-X+T-ou89r-l9Xs$T=F=;^av*fP16)AE(f*I!b3 z{bGS_2U&fP7;IXPwypFpVKIRQlyZ7B852#JG~$eMT=sjhX&jxMK*p4p zmKfQ;Pg#2m{q{=bXBjcKD61AZOv$gPRQWE&os1JU$=8rQ^;(85#S5R>{0N2G`tfQ* zb*YSvb~wDCF8-Bn*9T_>32K105CuIhsnxrpmGyi`g0=I;2mFXe>g~nv`1k@Exrv?z zXZABVfB_Xo<1{oh0?!QT>WqZbTUQXlZI~y!qH{_p#DnfR&48Yx z1|t`)usUb(Ri2m0+yM{XvoJ-gkC)xTymMcd>HjiDYkpN$ODv~2Wv}lo9w8Pr)k^az z(kBW-!gEHs@aPp9*hUY7=J{<{%$T1M5q!_DasN1r^6BZ1ABZYo_FIjWd;yV=yDtM$ zQfZH z-8$1Dtk7sV1N&fsugn?erqh@MoLiZblRZT<>Em@E-J}I+<#-h?iOw}ls!o%3mEb4r zl1#5~B$#>Ibe=CHZLQ1pU2)KVW!)r1{Zvb?krX}rc=+45ZNr8D@68MB53d9LyJ*I6 z*>um2r}u(gm>f^jb~4b>G5M4udMsUCb@j)((iH}U{Js~6b}5X=?&!wfZ<>fj0X9(~ zChv_B4RysuV&u^kRd~l~Ug)grSSHs|)177$M;=u~(=MrVIOZiYic zDD8W!c3llzpZocVj6bn<=qU`XqRP}e6ZCvsBoc>xe$Amg|McV(9SQ18!juui)JMLf z*~LTq^jtwBw75yf`9jZj2UJy_nQ1!BmN`U1VL`1bJrsw+hBk=tp4XuH9S%|dk zVM1MlCi~d6R1J8UjzK41o?m*=wG@8$2V_Q8k*PH`if(Yr^Tdbs|?dF1XWBe0Iana1!|IDjxLxMKJJ zZM=#3M_c)s_;;WJoIpqMOnIc*tCBuMZryXQ83&l z_MUBg!qW61OO%xh)+ZQaYeXF&h#e9O(q&(ngHdbs*%&XuYEQ0!4Yw~8gmw^IBOied z>i9a_*cb0y5dY2VB1L21m36QZ8G--c?{SE=%GBHnP3Hcp34)ah1)a*R^^Bt7ftl5b z=!T!=lxztag?v3dZq)D55>#A(LXI;_FTzOz7I+gNX-4Sz!>g?1{Ws9kge!S z{&RuS{*!9<{85p%kr>?N-Z+i5qUyfcUNv^d!G&0(4R7V1EN%8+%9GKZ#c}J9V6#K!T<0pXiBy zWql4p0n=`aCyQ99c&Y4C(U6ls6s&8$@3~#)AvYGi+)3ePzW4{AQ;pPhjZ00ZjpJg~ zdRtKsYI-dj{Hy`|6!C)-ITV-b^!|<9)x*&xNUJ(Q7E>~IrLUini~57Mf&p42&0gJE zEa+B3-6RCE1qzIo0qPJ^B0{4eri2g)LTyc8v}ojygRjqJtMDRNtGg(0P9!0F&GvK^Eb0I}gO58N?3#+K z%PX)wB0{TR1M}HZI_N&ATBP(sY2V`8+_uIWxnY82tjF*Lt#|xU+A*p0lIEj0pK5n% zuIIH~=re#1*JdpAJY|MJGNLc(=qcR8CF!z6)u9lbB#@&gAo99dN>llG z{ajcplP$SOAqWTP+boqj;>+rUc3LdXNI58bpR&#{RWuV3o~C_Iu9PwGB3^v@n>fF@ zn3$ktr<}vb@|s4*HU|sv2|e|7D~Hu6S(>&BqoBFg=1eL_fCWOKXBK#-0|NuYV%<3+ zsnN02uSI2BlwS}oKr%x=2KNP-zr&S$&ho`+okt~xH#%NHGA%d0nHsM*b%xX+^9w+V z8g~I9$BbG^lTrHfxX3w6OnXB{`DwffF81LBF1(MVw5jRRwcSRnZ=-Msxw;4e<~d~! zq^TufY=E`FTiS3uT&~x1uVer_@!a&KY~O#P;agAo?2h6=Zp{K&s(Uq9Mm*wTGEp{|aDW&l16PnJZ-LG_P7#YBRraUT5sr<{9f`k=+?i`@VId ziRuZ7qoZcsDfAZVF!8|l()T-lt@t*Whcby8efh&F8qm>RE3Y zLY4QhrsW9dGGogK=Srq7sZm(=^6}}c!;mZhyGP`f{n6LmxgV0I$@~;qG)Zz}LE4o` zC*vTP>0t12yWMFdPRO*8)bs2=eJ7)Cxx0eT*@-p^EWf#8d962^oafzT;z9`c`1#R( z5b)?2p?xG12;NvrgtMxW>E?H5q_{C8pO+}ZiNvMbwL zRIw}%6T63wxX!JD*6QVWM=C8Xvu%^fE>xw=AjZV2%;wdaolqQ|amE=~!Nmwk_A zVqaHSUTUc`>Gg4*$mX_kJUv}EGHgP@NlZ*CwOLb?yArLkGj}^0Wq*_gZ$4pve5x<~ UjmyPti|?EAS}q?U#v0X`Kz001CRR(hoa0AS++09d2A*qD(A zV+Fr4UwCdx#-0EG;g7!`tYl6?Y5?Fqjf0+%myx=fm^H+O$I1rs2F&B@;)bCH03@V+ z-K?ygz+Uukz;+IM7o=pFd@Cxi{?cw0& z$A6&wqyr6EL8!l^c+chxe~b{}9?(|Ci3q+r#-E zE8t(!f>3*u=H`M(hT-|7F80!(Pt)&HyGe`|}2%YRjPddd4> z-1v7u{G27O@$!lB@^kYFi}CXQi&PzA<6!Ie zzmSUjCFK_s!?68NQcTv^Sb16fKN8zmi`havT&yrYJGfZcfq`zWc8v7@jii_y#2Mm& zQH-$;^gqXy<>a(HAhr(9mORZN(1)a|>GufVf4htZlgk_yqVtZ>(*s-hhPv!~Y6m?fo|k z{=;wc|B+wQ!vV7kt(^aV%lW%E|E7|Gsi|p#LXh#H_6U?gU9j z>%S=gwqgADu*3iF2>eSd)Ennfo7G{6FNFbK~#je-A9o&3}(Puq)=A^S~TvEn}T&0Kk~A@~fA6zFB(<&@^WG z8NeTSnV9-wI@0gr{M2D+B@vW^++o3vOBj6Mv0|@8^Dktc7QE}1De$GNwm0FJPs(S9+#Ny;}x9V`N&#ZA&k!xvL z?9bJ+7;muLd%taLlQi5Az1y4O&}Z-==e?mJ1_V}X?Im8S4l)+1S=p+iHlM$85l z238riy4GI@_Gjz7K}rtklMUOT(=_K7ESK0%`Dn~_yk zzqZ9jPD8e`gzaIq0uoo)x7=h<+ndXIV>$zu*|g+z&z+e~oUZRz^>*3-P`X!1#K87P z)-QUx%&9_~c%b!@hgq(0uxYIk7l;*l+8o(9VOr;TGR0*)y*ORL7FERATBY0fCQ`)e zl@g_9kwDioKG*pgE2iDDa-m9#g@s8Sew&h>)dPEo>IWsWA(@w=mOrivJ*SnHQd*qg3WF7Arooe=gW4 zRB2i-Ybc;@b)>~Mx}eN8x9;H)-=~LrXSoL#*xK+Yb22HLE$d=u!L{bv;JfgnL9T#^2suuRaDx)`$$hWmCL+j zM?qwqwzm%pPvgDy-t^IPxYPE^aA@{IzCx^N`;lBDJIVFY1LL}~qj#xqGz6TuMBz0ZvZ5FLeQq@fS_Z&8n7!NFJ|fxF46MVh%o zF5)0@PGIrxWQyGMyQBA4EQKtEuOzY}>sN#u|IKt*MlNsZg{5)&(T_B<60TU%YvAjYTJ{4V|zDM%M2GU;2%NWP}% zUDn3NwV|c|Vk-GFVV};Zh->$8qjos_pz69PjE0cFA-X7jT;m(V0qkYAGL6oJh>YDNeWh$gRO6n9OrwN%EiD=ykb#vjiIX)Zfd4lnY*+FDv` z=YGO2vjQG#X*OK5lOx}su@3@Om`RR|m_eN4Pc(VVcmrk|wn<;8UppT-7nLl2{8px4 z{`ftUuz1`f`$K0ZC)cLEq@}~^iju+pelIcF`{69#wcHj%he>Mf6%=f_o>e^K_u4t7 zJlP1IU7V2$zHM&YHPCz}Tw7TvKXvvPc8*^3J4svBSnDLj;U`#_SzO%n5*4nn$WBZh zCfo68u0J_W0UDQxn@4@gXyRsWXlU%V{xm=T#f@M2pcRc;T6BL%A4V(-(3H5rUubae zl6n7@Sk}I#q`K-0VXF1#E*V?~0VDei1(3%*lT+-#4!<7|)`*i^`r}9&*j2;+R`) zX5PfcWx)Xy{FWtF!Go`iXz`N780(A($``#^*5aj#PET+s!~6<>zPKbF3`UhrC}Mf$maGaC80Kt z-K6|D#71S~ezv!Ip2%T9bdR`n+eKNTrZ{STRReaK_#hf~q@hy@S>m&vtxfG{kZ9gy zFggr8jG{xIcJKiJX=s@6f=8FsE_$%FZ^*pAhsmQUjm;)=<%0V_wFIX<^Y z7_8dytf!;ncbxv+#goziG<2zXtzmUo(xp3D`btsmvOJDsze*G4-I+u=)z;)T^ymV0 z8s35ocz)HCEpM7RJD0ywuFDv9uE0z)G}On=!LyHEJ-O=4`-LU8f`>W7PK2wCYxhpt zxrHsD@ivLtctsIRJQow*rhDIGleJbNj%j%vyODtWJm zdP$UOCs=rUg8}%}bNg2gT&VqW*Akh@7jWendoFrXuAcbz`o4JH2$6;FkZ;9Nm-Pil zguRn)07puD`3o`A*$i1cT<;zZ*y++m^|LDCejNf}Q}K)2z##<18X&L2>1s?+-^F%m zbAK}RFzrfamjG>i`%3gxhA?-fLnz~+Ax%=+Nsb@a)$a&VJ8`U7Y42+6rKWloX~b3K zAf5CnBK@X`F6>toUwF&H^WuRCSpL9%Y#4Nv&#l@FHU{;2zuM`k2|HPc>yFKJ8#^cAy+%%y>JFxZ9Syq?tE$6R(HTmMxvpTtp)Wbhj9{ZEIKDct;Un^Dty#V+>+P}A^;8Q$E13F+4A|( z3~O#Y!N_blI;g|CA3oIgenXQkHx;%$Luooyl_hyGwxMsD!ec%;Ly4NP#6P@i511T= zp~fFjrFkH$4=xnK?%_Q=!UyV5# zd_~)>d4Q0EJ|4;gEqy=;8AU4)-oSf@|Ljv)ZKY%R)m?|wSNr4qfkVm%0Ae=EAQLAa zcy1QKBe12TRBwaskBCErnCLF>FtEYIMeQ+qH-Ab!t|IVYNV+XYFUSy+homQ;cg94W zQUY5`#1DI<+ZR*w_E6PivL(_CK3s{1ZD4fkamFr9#A?dnJg?85@0fsPz-E_ZKRMuA zlc@JKzfUkzLPE6*2^_}dnwfiLbyZmLt=9W0bGYr#%gsrnw%WIlowdsS)gH}7cW7j6 zg>|qOzr@+ngpf=R%)(LB{j|@z-`wPz$xZbVYJIuI9rvr(lqlM0pNpFvc}(eZVhRmL zZy4@A0)4F&J`g(_(adXLh8ynqc)PLC+0H|0tdQ}DspqZh!Nji0I;8A!ott2aFVN%`ZQW!w#*Ea|6HuT-LuBPPqV2_jw z-?3`NtRY0gakjKa<7V44dPO0xw(<{SrnqQ%TVUrog0h0 z?=;+$r|tA@VIj-P%;8et)XjwP>Oi2{aPQD)-dQpo>K3*uKAR$Od^ZsMgo|BJs{N)j z^U#c_W(V`QaI>_DC9@f7hw|NpwZ3h;TUCXfueD~W6}w)lzK>%+nUeC`ubvd+e-z{z zCk*HBqBOhi9ZZll;-qiJnPNyjS+Wm zYOwK^zl{cQehl zYL$w<8_)Nm?)b5)o8_acswkCe+DF<;A3z;JJtG#qw5CNbHsth#${duYR zBtsZ&CV6}VL|vb2*A$&nLnUg+c-Ts50=6%nH*c0zD4WLm9T$4%)1jA3iB41x+RGl7 zfnAkb%7bPSl1oX^$FmS%NYjy%l%G77gAMumHYMP*-CAl23p=je_h~0c!0B8nnXHYu z>TbWFe%=8Abwz(-l{h$J2X#c$A>?`_dEt5-2tz>*0hdAN>)?~wL#j=r^!Z+{MBt5l zz%^(1uh%}`Gc! zS7D@@yCR55V85~nwQLgdTwo(>;CdRvx;nBwQUi`m0+XktaP$ueJ`PhYcRo#4oT9sE zL?~pzW`K5UJr>(jPYG~v!9jGSI%i^cQ8@Ia%9m3ywdjfG`30)Q)@Z6 zK)3j$!I!$~O$?MR9cS2<0~A!l+%&E00GuLH$c0GYBExCd5tfvX9mYyg>_ z&5>Zrdr2DENf+;_4^V%09%>@*0YdEI1cWbMVqok{wkX4gTE^$ST-boY)jlg*#S-o} z3MTIWlnrok676UA0Pz5NKuDyMvF z6H}9I=jZPux<(ck&ynRo*m5IWF@_Rx6Y#s!z?T^%58;duM|}PW(Ds(xh{FHmB0^(n z#`|exqr2M;PJx}+v*wJ_?{WvmJ=pC~Z$!Gsw^f#wHZs+pW^e+pXZCx{prd@KWxK$e zajwexCLXeTZknj;^-^iG0Qs}X_I1cWJ?yBmE+g)_?+z(v3g3@`gsPQjjk3FmQt3-C zm9bH1&;0F=booC<3zI3#02zx|zRf(kAXU_gaH?kCgOIJ+;=|xCVxZJYv=`FYFbH}} zhR(XRgx%aoi-)N{XJojP%V)n*+Bg=Qc zvNSixZKxmgeq9|k8$*G-yk@_U^hI7|XaYk!DW}Z6HQGr5uRDKI;0%Agy3M32PDmc^ z0l}arBT=`XZBHIaf8~Mt^BifmZ5{Wi6tuUN63`O?z6s^iHqr*&)n#=7JB~ICfh`AH zzx6FSLyY=GSIX!Xf|rRn+wWjgiwi>eK0{^S{5sO{8-W$&lL#HaFLTSK6=hsXNV!84 z9-wBfyj<>R{-l@?c1dAqmg2n{_NP;jT~R>(g{9QqrgY1CkF;pnIS*# zMuJa6KnP40H%N4>VaL(Q>|lTPjkvg2mc}NgA{TBCwhA!4nWGz0hI5*EF2rP%WqS>d zr!M+#Hj`>BBC`dACTm7V>vpT!ucLK%<*lNy0U4M=YG|5Af#8%ec5uGmAu-}H^4u`T zedek-=6M3r8EI)I>Nr|r2GiJHi_BL@ij`b_+~`$6APIK<^ZZy1fF{v=2BH{rOLtmWFzMh8l12I3Dl);uGy?Ixe8^B!-sk7LV zDv5)wC+VoH(a1!FSROq=&B=H^YgU2_|A^f9rN-A*>c5+vToG44Izv0HKpiP9enXqw z3(R(>wYs)6cW1gkj$3w3#9NcUq=R1A*aHAukpBB16(KH@#Ua&>n*lrEb0okkR}Rlx z!0UdO&-s>hv3mJ4F`FL+Pq4@VA&x^?QC3|&spk{4wwfItCT4eVVJPuIxxKjuh`REwYxT8w{{hS?v?0*Nc5eA;I_HJCunmo71Z>KjK;wq_WWoMk77;Q zHkZO^2yLZ+zF2@=6b8Ii@aEhY`QmR!^RGzzZ@pZu%18kF`H+3|EOb?)s1 zaUsorcezRtc)k4=_X+J|9c%_b&CxJx&c$sr5ru>q|F0(uVT2B<1{FHZE(BiB><^6v z59i&_Xrtf!S}?gBGnVc$!(wQN>&%O&X0uzB@)YSePAt2JL~JQIaV(Ia~;!c@<KbAEY6UM+Oaq#Y4)LSl-pl1xxXd4=sx!;5!X=RF@zC^Br(P(E0WWPh~C3+091_4 z_n(&Sc4KAJ&|t6*hA=>0MqVL>-%DHuudvmuI4Z#uuu=G9Fq@I>koPd&&3Y+H*=s56Sdf5tN_OtbH2T3tDU;&I$1Xt5m*>NM8 za-aOYXL#+Ic~yt)CuR1X03(YSn_;Xdqm0mt`7d~MpB-%LL&#!efWeh;0012oq#JMX zTr%CCWv{MS>lyVewr3g|5gkh0^G&Q8St^3&5BF-LFnVOLMHXCDo^=KO69;11R4$?H0bOz23Fc(UdPHx>p2n3${nGw$( z&s1m%`Gm;P)?~d@Ssvuzz-?YJMFi{S2+GRR?kKvGojnUgizc zXI*sQk#^IQZ#z32@V+IHH8&1#p?vUR|6qK(e0F4VO z6VQ~8`w?ymC9&+yyR{}Q(14=eWA2$zHJk?B`>00Tt2<-5bDa_tY=ne zT@*vNvt4FUTUR?)hgABw)!&}mB_+S!Mhm0{#aJU=Rb1St^PbMwe?4I(0 z3*TRT#Z=_AK}MJ>AfZ~jhYEl2Wt-Wku>w)bg2i!vg}Z`Ank!X_{*F|eW0gP^Ve*b| z%*PjBQH^RDk9)u3PzkpcPHLjW4yvyw?^^Htdw5CX4!l5(ejH$5i44C?G zH1_A0+E*${^f)0}@ttZfNSAvz8Z&2C4VHTORlcjdB7LO~zyW9$s)1(p8-ty6wRpj% zZ)MV!n_sIfhh`r6e(dI|)zmd64$>d6s&-8);sif$s3RgBBt~64i zPtsC}Bm)32Un|Q)lMxS0y=zcEA2dmu>a$rpO;zcLA>?>ui6+V;iK(~>eh;o6UzxX3 zmX(*gsJfT3RcuPKhyUL8Czh3&wqtbj+SNGar~LJ0 z7{9!}U=w%VS_*h3Wos^`sO+Jmpp9&L=d=b)v2d`Kb>*TWuL)C<1wu7SAz4%g3;2rtA`3Z7J&W!$RJnW?f<|@s z?|=`>z*4Thr{-sZF$|g`AKJL+eq_w8{ywq|2nu%0_{~kj_uc9qNUrjXfL7>NA&l$&L-!HO#S%8)lq#FKtb{c9Pv4E>y!eVg0&{@>~#6{ z87%WWoPzW{$5IG>=Bv3>4e56|E+@65FF3`zhZp86I+P=_O{<@y;jil z-P7W*)A`E)cfvBb+gey{pwpMaQWl1QvWdc^ABp0Dd#?(?eu^$GulR{S`$a2gJWDpo z<&Ei#vSO;^m+%=FO?D~x@+M0&^5+|Nw@rQ9R7!j=SBp`t3BcQxPfQBQ8(=Z7aBa*f z-bZSFf7hV8!ZngV`3ZoyiRCOSZ&kq{=hRJk+;r?0zgVp*B&QNoKlXuE?$o6#gn{d2uC|m(75sdm$X0#*n0;ka z$DE4LFV2}-*rOW)PFp2-s|xllM@7vzMrqIDkQI9A=M726uhF4A@cYM!lG zMYFoeuP|ZAWJg%4)+K!tSlB*xlRs=p2~(OAsJs)EYwDc7)-NY7j#Ul7;OURb%Dy0c z_W2$3W1ktMNqabcF3E3kRMl5^3iw6VZ=v6*#E>T5HC7YccdZ`7-p5w>QE7}sz)D5s zo5oM3yqZEs4kk4wTl;}1Q5R$--XlQ4M+JBl)CPwiKQLXYdSu3R2Io|!uY@nz6#+im zj203O!_fjL{jgp>f1nbAPmN7Z-W9PG*-9S$R3BP^i$xjdVwMf)lH}=VpfBgqp-ZSi zN2n_C7`^^+I@Zn0Scn7o!X_}&?theZ#@&>|qlxEQL=T-F3D0-XWCRr1=j{w{@RT>5 zuc~K-q^q$fh5W!28}=RadfGOI`?JI1b0(?-DypjW1Kl?36jKmmM6j;QG+BW5L%B4L zPC@UO{USYm!Mh5sbXnu!ERqFIg4VZ^`9a9vFe?5qPew^pzhei3kx z$a>nWk=wS|+(Zye#Jqet%KgNFq@W=@B{ea3pNwF@(6!=_u}lRZb8KViv_Cn^@H4*- zv@n7Eo)iLfVO?ZO>b0pU1UY)jvH^%yzQ-z%*1-;$x^2E7TEsJw8tg!MTr-plwd0Kt zOz9!jLGlQy3u})@P&s4jk${hEWgK5BGY#Qz0YS19LP{M29WmS1;eE5ZH`Y*DfK@<) zc)t?IQ)MHeU)6*9%nUfq-1@1&u|prR$M5AP&eW^1Lx3|$D|-Dr6;a7X+0D{4?lb1A->&B!pB6_=}Z6R}FX9Ra@U)*|f=QX3B`>Oo?Nxyfn;tP<#)eiQIbZlsJZ-o% ze|}Q%&y0*Pt^O^-g|>4}*SWDGx?+(m4d*}w+@{&R^c)qhAqBGbwIsYe`QxKOJ!A0?j6AmXoyEMIH+0Ia;Pz zpZJQTe4bf+3|BCf!%o_N9)rh_;_!kb^nq6l^9r8)ermpwt8pktMp^L4AT{%IO=cF) zt2V+IMefp)pnEF?WTSs>Br`s|deg^TtoH71Cf6Qa<09q1C&IyNDucWKFk$XT`lr;? z{gpnW{)TX39hL7cuByeu`Q@Vmq@4+5Vc8#xbj(h0+FBW1sBy7eGscq>vt4*YzB(Ky z$+ATpjOrzPjCjYV@hm?{g@NX6=xvCcN62Y~rvbT=J2kDmFo7S zrmp#CMHD#@YM#fBB(lb^K_iu{txZK<3J{P)9;Cz)pKQcE6Kv)EoY~j>i$6jmO^CUN zC5+n&*m^^(vaiQsYtor+tY?t)GYo7pnkel&7^Wh;{AF`Fi@zpRU2p>VMA3Dmn1zF0JZ!_JyLc^+U)7;qJF8O6$Pc2IJqO0GMrb1Pm*U2@ z-M02V595`T?A*@Olex~_YpJ*|yXE#WQjJAd_9#_97RaWaUc|yojH&W9D(#W8`k78* z&0je5qHIds2f8KDKjsrY>DH^P^pUXbXWJbLw7!gqLcM8S@mlctMDUx@#;WGPv z#|C;STh66ru3m9$G*Va7E1&pyK71(~Ij=k`&0CG4{YVloLmr-KZfXb|n<-$p>Uwb< ztx%94OI);*kx*taqesLch$x?|8cD7#Y+)+0A?qP!#|v}NC{~T05dOIuItt9dkLP^@ z9j`DgEVq9DH05z_l4XW~3!w}-@)y~2N23mZteLJCbcQ1^W2Pcb z+ugEZ3KtjBj0Z^$8Iz!%o~l?*uvlc({*8c&nOhN+zp|^40UJZuIe`^^T5VNRQ>=Y| zLo;_cagz&6J}q*Bda82KWa&GebrOJB;rqu22w6T2HWrz;Mzu}qzp5o?NPBsv5xi29I6`f2bup3fkzr(BQw&J?o}& zuAa$V$gBnpFdNh;;8JzN^aI^ld$JF@nVPDyF_3qArA}3*nO9bt=Y>5bGT`|P@dw@M8NKOBP91W$LTTtAl;VPGtbk_V5}^-GGZyF-X&OB6esO2O9kAPma%{CgFlW1-GH+6S1M z?~G)Rb&AIXe_3IW7%DD)ettH>00j(KWw-W0Tj0}&e@lv1Vp9|48Np~QNhJ>5nKmcK z09n8|;dj{Iw@)yN&)9f?g-1$W|8A{e=1L?f+8f}pX)CWRENv`oDJ(4okx>BpiYBV> zc52J+$X6GiWO?TB;LE3ey;~uLmChjUn4d17dv{GuFArd{Cbe$7HY&X0!tJO5nDeZD z#-CA`Ir`#a|LY?MXajffZ)(=;;1NMc1>pm^@8i$IIyMVxL=TPo&6wr#wC1Tk^Ovl( z0ZDRj!&^xn{vl!Vnl3A^`l68wgGlF87~ftm9p3aot6EOyrY!vyriR+j-loppw`Vj% zypi*Tb+`10Nu#E8(SBbrZ`}8Wu6NX(&iS7&HhBcOh_pY1w)U>TP%H1@+{&RUo!*>6 zVLr*-d-J@opfM~&kdH)AkM(KE+;h}|WRHAq>;8eMEu5x=2@BBBes=?ttZyIy09vJ5 zc4O%zIvD-v<1T&*NuF)#qK(M003kbQ)M?f3(zD+^q+x{0Euwz-EMC=8nbWtY1WQ3b z-Pae0+K!#*Fo;sCcvl7>8q~EvUHqn3YQPH%%Q!7KkBacU?h=Cb$-+K=TGKT7_G;X;dgE( z8cRL8xgD3q#dZ+v%!e;5uJSWAz0aNFg0H6`mRHX8+mt>i0%@s$EFu7X+lpledage< z$--mS1!|$+u&^LpyMlaA7x*WAmMrt^s=vVoi=&EVV*z671br3LIrr!PEb zdoFE-tIE1(c06S3(tUbF`8^_Irzjy`^Vn6|?bqz}!8=%RC4-}Xv3Wq(mRhyv6s4To z1ZUjsE-dC#4V(0K0DNA81JeuAl}RLZelDh(Y|J$D^(y629VV3S%X6hxiizvh62~ic zPjcKh;(`Mfl_(%t=u5go|Mk@r@DxwB*KN9`H2PV_j?jYQ<}Lt`w?2G_`UDqeu)du! z%raPWtzrZLDVN%BC%7r?hPVz}7V}aX2Pg)thp6)#cy5~|VPQtszabW!9hZ|3OMdm* z-Nm525p<>VnpWWYFeVY>8@T+phcD0v*$-NmS4GEc&925wIfN>zhD*|@;-Vk$yNjAUex>(SJEM z89jtXeJwU%!~6?P{YJy4#&hjIefb?(jYXo%X})*p1yR9!85`1PunXy$FUdpcaG&EN z;YFXf#YL?Q*5i?2d_YLW-Jdw3uUgpvq`u#GZfUVRHLMVuo{V9tI*tBv)b3qeHKB1K z2!c8~8+&;E_CenF&-M8+>D@l+p2L-wW*H07IldlP)erNh zcTZ(bGFoz(i?f7gv9vBm4iEi;gI+VtNy%(0^QO*m^d-L<5h0qD{xDKIVw^1Dv`P zfl@~b)_%s{GPB3(Y==5I(C)g?P2!Y@^K4B6AsGJ>2bTw;4U3K|_+aGq%#rn@1=Rxt z%&Jp-y<}Mup1`e%T0>6eYi4cS+)l7s1aco%L_g9+=5}Sgx3c>-c|eW9!X2pI$mxie5}BR*X;>Y+`4%?juxiIm|xt&m*O|G#VS~< zosI6!S7Bw6S5bXCMXc>Ny-rS3j$Kjr!t+^U+17JWcXZT)GCl^jMF>=K&t&RgTAJKD zm$Tieo~$kfb!w3F+GVKVh2(jxu}^majlIR?@g4diR47<4R#==>_-uQi+90xaOwqPL z))VI4M^~m(>Ho5JDtn?G^^QnrBZn{F=Dq3@4~gK z_g^EWQP;wGD+W`1ipioCty7TOKHb`~&-D_+y8}B$XUDKExnU~9 z8avn{Tw0%;pfhig^Lfwp=OmH(MA?4(S-&XS=B`IvbUoWI`crbI`pAib(ep6ZPyFXY zXNL2)w{>oo{RF_JfYph(p2CWtmFvUB<8to4cBohmYQ#Z0lQyXmXz6uT2o$_U1+s^2*9_uJ3lg z=wa?GM`7ci8R;d@0Wo&)%_h2e;{dFq(tf!}?TYGARR5~XRJ|x#cwE$T>7$rX`V-xL z6QQ~^OSRik>oB>n2|GlUy;_PmN6!a!A&IKvb$Bk3Vfj_9-ntMQYPyc=sE$BJOsCWa zt08))i-Wx|sT_5=D~<9fW%0Yqx&b0?Cmidc(t;OAiR-pq%S4?j-`lzyY1dtG8RRB# zA>hu_oqfGkS~EQmm9Ki;p6siuZ*5s8DlNXe?n=Jdzkyo1&+O3#rzUtp5a+WGmnvt@ zkM6@-jyjj7l-S|7`=|Nci|2tsOQx!5x1paMu$d&CCaI%MR@CfCIuh;o8)Yi>ScTHW z3oS|^+1`Kv2JP=k-yFapmJ9{+mzNIftmpvu!&)Z`#Qq>%)$FqA%dOs%Gsu!!pf1ax;7*}|5v zP2|)P47xlUJE=M8+L4n@X$LMgcRRuh5`6rV)f~oeT1P2k=M1e%#(E9AmW8f2gEV>% z7dE8!vrg)6WA|_HSvCUO`pzw(2gG(AF@fud0nPTU&SMvSZsX!y|4LxT)Z2i#F(S&xqV!KN=Wcyi3aQ8e*6GQVZOzwwXJi zWX{wH{I8VtvNhE4$AbVIF+9_Obnx#m+)2i~8Co z9S{dPT;t?Pn>D4(a33FGa&i*uSc{_fde!`AWguBEFzzOvc*P5miDbUF$+NiLx$Pa( zyX_RR*7Unz#`zN21?xI#JmVA}t>kc{4`xKY?`5_I&UCIFLZh-X= z-PfjEY<7k`VU@89`ZfP&h&oT7vMdQOs!_vWH#B&cV6SUn;b0I6HC?Zzml41gFw$LU z-2Pb%KX0flSjo#uPfdlOtpOcmN^a?HYP7j>kEg>t}UNL z&+>k1oKaJf_>lQ@yS#8#Vz+At-?X-H@T*z``UNC{v-)+=y%0mrp$jK$`XIe%-5^6O z0Kn+=d+M1V(bp~{DeOs$e;hi9NV=a*0{~`(bjCKPk31)K(H8S0a74NAxPV@D8MWZp z^!jb|c&HLHO^%rBP0>;ogRMeIE4zEboM~3a{Y?-hsqtXw;1XbEpy*_Sx~l(U1#IaK`{N2O!PZ^Oz^KP!~@G;^k>Uy|(D)%T`oF~IV8IX{>cXhq?9 zf=`~+I@VH!#NN7~A$Ig4G1O>s^_iI)9%lI&E8aKApP8YfjrZ0Cf?L1vi5jp~WFDC| z(NQpFR?o6T`r6X%K8u(>^JzQODfhoMFsWf3>i`BA$M=YC!m$a|0L32$pmAg-an;b@cVMBw1XXOULztHWC*ZG^- zig9jdsKQu@!vn>3zwrokTk5GLZ}8Bg>Y(vyAUFJHEbLc8v4|CdWB4>!0cx|6Is&`% zQAfvl1oUjmzaK+gHqMl1UJH$L2SKj3R^Q*VA#f=>m>#F_+@FV1l{rCOqcs7(#hPaD zrr^7#px)ulHi~UR2s$mx&l&HBkW{^SVcK|4)^ESNuJyaRgC8ps(S~H%x;Vsh`y;0F zA%lYqRa2G+@RLb!^kx-b7TLF5pi!%>)1go8RXvduY2YU5%T6ocs0G_@XK1 z)6Ww`Q$(?*E`ylNDmO9Jyj1qtrw)Vv1$e1^skF`dQFZdU1F*YBhy zubMa0+^^`vCQgq$V|o^@k$A*qch28OjTGABBE6}_qGKhs@2w_4;x17gXtK`~>jAi0 zBkflC7irOUNv?)rZkzt0(S|Ty==UF1tH($iE|SG_rN=%ZH2Cr_vwcU8K$hqUBJ^3J zs-k;0{q+2^u-Z*?tr2ulno4-|?~~%(>v33y=@S9to0YN3&D%>6d@Y~lDOq^?`8bFv zw%pCWwmW$M-qc+61@QW(_44QYfX2aqGcTMt$`hI`7+KIzSbuZTM;$q5i0Pw6ihX5+RQB!)g2byoSt6? z-X2A6E}HYA$BgS!WxqFAzewKlY0H0?`W(c-l&zKV{h%gA*h=TEiP%*^!ht5;)fj30 zMv#P^`fZYFuyOGMud>TYnqxSnB(9wO*$k?a|9CYt?3%g83Lu7*7Z)aSoPYw# zf)dR4Z6`-oqp`lIPfXV2zeoY^#ydmmL7Wk>!$P;Kn$kIg=$o#%b^&M~RZp1bFqL+a zv(K;yq##3duVi`Sgy{C*EN(-fhTYJ@&*#Y*L9Rs^^BnblXJ41<*t^qtxj4>k)Nf1J z-IRE};RB84tBiUTa&(DyxYQfHkMF>mlDB_0vzdk@>zm8pkrB}v9u$h^YdqUry!`Qw zsN)D#5k8RF6L_}?&ymc+E*R7*84$fr%agpX|9{YQ-tla`@BfcIYJ{S+_71i8Dh-Ml zHES2ORqQ=V?LC9qqr_H}*c3(Wy;o`NU8^X5$NTsB`pY9ZIp;~ln&GlEIEN0G5Sfq56P~`iE1Tj)oHi5lc0HNk5>G?wJVrp{B?|22^yomVk zE;<6l+3qTDIt)*yZE;fMJFd?eN99*r{HIn3=M-@LQwBTEx$H!b(RPme9@q3{WVBzm zsXDIS|29l?t&*H_!2%_qes+DIK?@Il+BTo)HEZcpM z=YzjduS|ITlTWg<=gUu_LEr_>PScj!=)17(YFRS>^(*N{>s=kCPF%3bOUt;ev487q zD?Wpi1qa@*#Y4s%Tz11qqvf&13EX%~sw$EOjN>H43fa}z)ZD_yK2EJHz_V-+K$`bUd}=l{fNh&HzhKK% zuT6XZf(eL)6KqgWsL$EjX#yWms6eH@DPtFnA$#B`vzDNClqR+IXh0mBN!eO~tw`?n ze;0IjpGHJ4zr`Z}XveiU%~x2ao;twir36(!t4snz2L2BYwPa#Dsg?( zc>wu**hAEz&eQ<;m`^J?pF*X_S~gi>>$O?(88F+GwD!xdXQZ+((k2Xm7CANkGI0R$|G3$hz~nk zMPO3gB8%|KEafiBL?cBg)p9JjFoi#|OcR26mc<8B?1vLYb>Rjo_9Ua2qa3!Q$f$9# z9PrBm#<4^duLBgmiG{BmDLR?WL)6^Ni@_`nO>ksmVe?=oNX9AJ5Y^A3;TArk=+kGU z*hP6Uv-rL%h7D7IAp7I*ey=1-?(B~-C}9s)ne*Sjt;(3m3B#fJqOO*|EiFxPKE2#% z^IUn?&8F6VourH{p41uY>3H}1Hq`93ZF`y!x3}X=SFF#8Q^!jEes{cG(3`@~Qu$XH zRXln>OZ*S|TxY6V8K|z`(nyTg9sd$LFfe=Bn>OUbX-Dy)4)Pl^;C=+YsJNu)t%cEW zJ=%J1cSe!srxD|yL^$}Q%0bY`ZEzpZ5^;3jq`)!4kNBA(_9dXYgsG)MJN^weE4TfH$Tk=Ek1>PP_Vbl>F1wZE=L!}* z`4yhLcMNV;Dng$v80^_C!UNRev{*nM z2L;3wv-6=W^Nm5%D+_-nANNXEdv6OB$AecubL(se(F z%y)C!|9$$he7lC@_~Pd0D8+lW9N~Joo*}cbznwJF+HT80t_PdOu8}~|&66cRqQMQb zg-P-gdNp)eW6>nhWE*=}_Hif5R4^x^w<#yl#OUW6`swARu_@Yv3cMmgC6J8UjDziA zTvIg1VC_=PMenDi#Ym0T0)2eU&XyqDI^jH-sunj635RWJ`?f#?sk`HM(@0+~(I zDOm60r5_yZ!*0oPx?29SIIh->*^yl5mCmcFz0kBihw}HaWzEIa1xu>*DT?Vv_!23K zyagC@BVtQ$Y$B3LZCWbrKXih!RpJs({0%1=f2;>+B4q>8e}6q zJbUw0j%;E=p@kBxopd|+87l=#emLwOgvjlVqI$H}6k)?09K)^}oQb4GY*{aQbQ`)#d}!znB)2=J+mJ%TvW$&aFA%hZ;K@3`Z@EflBPz+Oy41_yv4^{SrqMX z=})a+@W&Y8SwXkLh(q3`bZ;yNV-E*|#jFsSon!RX#PlY;{8Ut&DK$u@uz8W`)#=1) zcEGemmBQ|(-!oyJ(m!mgCUsDPHvf|?X%inU(_Kfpt1C~dRI^@Q8!uy8EKqrphg{aj zR_aO)+6_F30e%;O#ub!UrWFEVtJ?V-h1O%Mt3=>`Nw=8;jh6L zSM0yJTntVSXEyjpE44N&f2y)1i>|+JPH9Y<-FB%i{1#x1kUwheWqT_=xms^8@2eI$ zp+`qVMzOdcgk-&;)Z78h_JKn&V^ZW-HU1`Vw%BgeGt!wep25Efu+q{m6nDiii zy=B1fv1-C|n|t-f45I9glB;M{R7kK!P*7^)_L%7r?rp)HUIX?478o0ZFC3^L{@tXl z2qMn0DxoeGoRgyUTQ7~En3Ngz4{QEJPQkZpoMEb!T6eafLHBx8vcAH5tzskc58pgo zD7w7cI$Lt6)OKhL%?&4I3H8#oq_p?^(Uyp!$*%_jZROwjS+s%6a0F&EWL7Z^KJC7)eTq1ql)Lxj5JT1 z+fH+XUxT!#Bh}0zA*(}Lv;pK{saLQ7tMn;`CC|VALdG3y+R7WuRFq!CNu6w)kA6yh57%o7-AJ+g zaX7R23E5n#;{J-u(K)|6CWH}H?De}E-SNI#87~CVEDCp1l?_Kgs(t0&3Y9Pqf^geF zsEY4=PYnHdmTT53@!c(a5s%(}(dBpQ8?S?l-QC>_Ck{`&^k_DFset{VabpR9k;X& zzlE5`@wA&n9(8)Cs)(uUrlWwf8S7f7_3d}kH7e@V?F1dGzf2`0Ye@6Hldz}rZfyU; z=TC2NTi|1(IZ$#J4yU(1D|G4Tl@lc0ai}t0Cc97*JO682JoKFNcp)DNWN^a+AC)f9 z815OGW4OYxKY^j7y?{aiI{G^Anc?eU-=D4DyDyD|;eX(do;H6nv#E;7|HbBiQ1K7x zX=0K_y`7*T9Rm?0i3VgQf)hnJXUWUowzaE{vOnh-AfeIOEB{O-*2JByIIq>KDOfGD zAg4oShqNEw5&;!*u`_k4IYR}5(E$gQu#;T$?4`THsPWRf~(aN{IGdvn9+lvb#O9BTT{~=y^JHAs&t+DUy zu)4&BC87n{Io?Wrqb9j?CZGm6S65;=n#EBS66|d1LBmay?D6Z7r+PQ|$C5@VK)GeYJ6SYG7=k$DPJ`JG0OjpP_$6xcZ20rJ{@AZJURG@Kbhn_Mu`Lp=afW ztzzD4I^_Nvrr9nDsZ-iI4D`%8{Ex!pb9|O!(#@BfReBql)cIV_8cB+puH%R+Nh6>| zAYL>?P^lsMQt!(Jx2O{jbt} zU%dZ5t{to>__V0>FZZFM;<>d?KK%V7&%a+|2s$S1$_{In#pboYn~#68#gj;h=uI+$ zaZ(YalUEs8SW*2KP!a!cqm(>kQZELp!?PRybS53=B@AGfP7kBYPXB8O&}!x zelNrOWh%*@LvTgZx{6)Ko6$;@g?_K0-K;)rr%WnOduZncmn;Su-cACxl#o^i(Uyy-JFznEDSsw#r~wZTE=eP<}X> z4e;HKl=eIQIMU^4$84m(yq(DpLF7_ zmnIm&t79n}M$~qgQH}$cmEjyQnnLR0b%Kle;8&#r4Rx)|gJ@mYOcK(wpEWi|xPJ`i z1#wnYOsr23u&gXiz2j&PnwaPc`q#Q{4`5ki6FVHayxwy8==3j7Hqug`Sd`NnHKlY% zEib$8iA>kk#!NUT_gUFUWwT(}e9SV6e-*OH$v(taVw&@uPFdJte#)*{SwXdI=+b-X z75|*w4Q$|)I)BDP>l8rSep~uzPp4<+9!)cs+;uT*uz0sSP0sX=IIIoz54-U#rE`^o6hbB?|*bd*JCau?DNd3bo@z5Y;T_!%UJpKtwp6WE~Ha+bR6J6P>0en9^0 zmQnv{L4K8|zA0sxw za)j}#%Bq7Y`fm+VT`exu@eC*VD zNM)0-fU{4|bKD$7+C(bT+ziYTY)`(v6-^kv2`7y23pP$_f65>yVM^ly2J!YDkDkkP zbH;ciSM6xyX5rC13~Z!|sKQAOD3*)`O8@j~q5)r+SckI59w=8+&pnJIDzg>+29({Y z6NiGZ_RAk!WjZ^p{|W?m^Y_GydePGV0p}UZ|FLnQ8I`;Zl*jFo6NR#KPdz|s@!cCp z0_)d6$={T+2sIfd-T!bn1RqSy>OcQoP((;WApQR^IjRpGUCtglZkRTX?^#0j&xcH* zxbc1OMXMbztMpUPuae}E>F<1})8%1_FeFgZF8Ow?Q$~O~YS--nh@+87wbXH3URqgc zkEaSYqfF_3<>lXg`)tMR8|uLN?)HoBTfbDk(Au`FYO!?1p-jG01?jfg4UePM1}ebe#&k}Nho_PxC|6$K4)#5oxL|xMbh;G z+y*H`pe&Uktr$ED4 z1dxq6xP7}O3pu~`(}clF-9b-7$mE?xvnq#&y}hsGS&DA_?}2jKXn@&|qUvsE2sv{v zVux_)khynk5#m(EegscUO_?Hx+Gwkzz~V!4-6R_zAzRvXKdKMLv&3@nQ6Qvb3x_B2 zV}U~6-2l*JmRd17sUyx!EZh(=A}r z7J8gLQ0h4~SofUcqHjtUh#wIVhw#ahQXfSTS!)hh@aMDNh@X1!CssSZt1*u3DHx6= zylJN!6nxx{c@akGgs($}T!Tt&J0a~1yuEwcJ$pBVM~`tXloi9%Pad=SU!v%mmUH}< z;=#~KH}WGz47E9Y6klFQ2?e2;9|5YH{ZEM4_Jf1yFQq#s~vp^LAFi9=vwHLSUmLG=xtgF_Rk(Ty-}{V!M+0>*MGV|HWa(<+@w-CWimKrAlpovsN|`r2*$u`Ji+c5PZR zNuNL+L=BiFBUL1DHS(9A#P^ZIoNG+nFxRpay38y^QpJJV!R2pjxxN)`mF~m4I{NAQ zCh7bsF~0uo!C=w_CX_9Nx~05;36DWegS@w0++3afW4x;G%SoZ!zF%%l?fgXrB^gM% zkc2VXae{1E9B1RhLXmG<)};-^-{M4p8x(=yzg=w?0!=KUfpoFv6k_;b>4+e(-Qt^T z9~c97=iLdO^y(!rX|{V1>BdA*q(QZil4w; zl&6hSm|L_ft~*2Sx6Soj!>S0)MHEs^LcE)<`uU`j=nIqPlKLWjn7+Xai|-K{7&Olp zupmY6ikzyL-7NAE8CD#$(R{t4Tg_F)uDGCTxCCvq28>+iWdC$PK%o|}5yP$xdOz7_ z0QyIY4KuvG;t~scc4eX9x4Dk1Y16VeKXgSp8QeaRKqQ~ft)&XL_aWYFK68<|#idEIg?rj*T4N{ZC+M0wmp zj~1z%9Q2QfS{`#=>bUkp!G6pt=~j^mxNu4e)2kR$kPNO8>*G{g64;Qo-PyKt3?DSo z(jd{vCNEgN1sp9$_OUH#ERiky@xBTylBV%8ng)ikBh-M$QmXB;_$sKUw(|!Hj{jE$ zxECd9qep#*WjD!Xb{WV=&OanwF3v|JU2K}wAdA_on9#@qQ>G3;n# zcInmHB9M2fsAXte@7ygOKAHZZ$-6sjq-sQ)|1O12W&UEoGM6nm@=Uoiw9Hn4M(Xj+ z7;%LcN7WpKhwidMtz(v&xp_B(h?RnlP%mY})!M>>1yb|b%$I{bDy1KXsTjBnaQMmQ zCh~01f>DF7uJ*gmhdgvC3$9Pnm-#mV$tHS0u+~YGMor<=L2w!jML8^-T^N2TGFeF7 zIJsthajI!T8;p&qqs@}8^1&T?*2AttCjS*~s6loPu1HJP?EO{KwZ6X8`tM`hMj(9% zWtjO9EtFh-CpVfs{O6@FxY6kFUspj^YwO)J&r<{2=EIANDc1Sa4G&-9qd$8LFLA4W z&Q`}8In0*una@-hq;r!T{W_m=4~E!_aDKjMleWD6bthxhGiH_%H<`{5B9pIThFN}k zfycni)A5ZrW+CJ0+*V9}OS!<)$oMBuvqHQ`exjG!L&7P&?ABy z*)Zv9lQ(YZxBUvS=jSH#UFjbtq)!l=I?fXL$Jl$-qYv4%6)*;jI2tSRgl=S;Yg zHNg@JuwrlzOloZ8I=w5f$&E#f92y+1YW#uKXcbF#c_4pkHK*4xc(AmoViqdTa`TiOF!mn*=#N)*U9xlhK6|`%{Cx> zK*R`_T+xnFq6e+F9jhCumktuQaT$M8eONP0G0I2+&ezBCu5Ht&t4+hzx> z)Ir|flJ8C62L?YXgbC);FXcv0FcM1Tq(=?iRxTV0fja*_MN0s-+$#MPSkd)swX}Ao z%Tcat)Y)>y@ypE3Y%b zGZ{Hsr7z{Ng!yH(Az*}p!OhEAl%Qv)wZRDzqe6U$u!c%Nj>S$hD-jmAuFj>msCuowU z?DM*7-VYS5z}PwwIoZVxS_6fMMHmDASz95(Wh9NuSki35B7pw%+glRA@az@j%7~G} z5s&E(LAVT;rO+I}%gXS%uU$gh1Jq%mU=_0+E)&f`IousX@dcE9;2qUaoB)J`5ij3g zA27!kp|E^*4oekSKN)Ld!aKuq409FS8oQo9hgBoD?$^K<2(A_@677NqBxqI{x0QWv zQ=Qh{hNB(6^fh=o;ksCKw7YXI0r`v=Z})q*C5%@qHNdXL4l0z!Z4;8;sj|E!y{K2l zV32bfPs=;%*eQwuetB|yY~lqSpf2RYi;i4;NV_=0wWj7k?A{Ejq5k4GKEnP|7T5Cm zts^MCz2m`dQ)8(uzw@SwJZOJhK#)aNODvDVXz^AV!ol(xt!JzGwxhT0T8_CDYq6k5?VWvAce!BzA z70~v!jn40nxeZ#Iu|RV!sXPeEY!t>!#8+rZ0bp`Z|;{leUlrBK-pCMXcv9LBK> zUJh6bUva3eIASr6`tM1BpyZiCK;KkY$+?}R!rGq1$_ZDPu!S=3G~e;C`=95kw3uXI z@F|loudzdq?%qD!tKrHdTlu-;!xMbsw~9t?ge8p4ret~0U1$;~}HGGI0k7wtwHRY(TPD-o5) zhXR^P8Z{^0xd_5i%57lo+5~8lk%vD>fGi*@3X)((3y%Sl+^O9>+|lj0UT{W({?mgt z2kn-T)5{BmjqbEzju@g;WSGwYCHFxjU{b;sQI{tk$+W~j;C?yFSn?XU3^$^TQ6Qxv zO|~4rj53-({{M*Fb7BZW)rTm@)>K4dT3i3k%%q;(0(8;44CLZL|G>z6M-2^aoY-B6 zeDvlQ1Jv_``paO`q(}>3xliB9dVLZnIJRDcK%cvgA$lKE^Cv2w>O+9CmKJ}?zVw`v zXW`b@0Uq|Dk$#;To}(&@zZjl(XDid?Z~Tr&G7o5IVh;3=;EO2sqBNrq(`QtDjZ!%n zWXucxYH6-dCU5B7{+{6Q`%~Su8HQ$pgW_vUMh;G>rB3G{lgJ}?_%ot%YDwI{cjh7> zH;ZqXHy@E@928|l7&Ur+eL5z<+DFsR{+WzTR~|6B`}R&XUe%lc`YGzfP`vuk|0``; zFw89d2H|^HC|%UU{>#6@nVRH<+Q`J7{?_g#gA#?y zTM_AIohpiw#mXi17lMs6w3o-)fU4NOVAt4#C#4qr)I@+&G6_^DAa{t0C$|Q_oxHh` zXQa(NAIIU5yqxN~I?Y&+XeIIo+~+NTbCpjs(NNbD92?I!PL@mhH7dF{dEX{5mY8RZ zixtc@99xR8rED&<+wop{KB!Wp65pq#u2=Z1SEkPkH(3*f67;NVzz8&>j4A+uwj@(j z@By8VT0obc_j373xo%bCRi^H+$=6hLg5mxPFG-}Wu#m7D{xRs^T0HUcS=%DE_^Y}{ z#l~(QyQZWv#j$BHH3u$GGn+`(?y+cPm=Sja@^b2LQBuDm^U}mptNST3sGxu#z|>S$ zN)C8+6WM!sSS3R*Ai%k}=EmO(Sb~WWeJw5GhK2^DCtfejNGND7Mg~WvU4OajhJy|p zuOyzl{c{co^<}qr)lchueR2JB_VVA^qI9$WT99|ZZC^5XgD+q@h1!UbSFYA3KFiZrM7OcJcfMWy#TNnPb$&nUMLyhAoO1u& zp=pr1n}{w$-kz?G5^87Jq%p3s_pl^mXF9P@O)O<)XKQI|Uds!NZii`T8dy>K0Nnu6 zVKl#SiQOx?hR1E{>MGcD=PWZ_!=%+U4Kfs&4Gc4gd;-H!Wn7s&QuhSX-yUSlw(y}5 zG!wsnZ{F@n^BB2Y@5D>p{|m_ZyCoA6*$&2n!5`n?5pV;03BI{lllM*QU^aPt_ z`Bi66A4QQyT3B26y^KErr>ZamRib_`a-|c}SCU|?5)uns@B0#Sr~u3D%^N^8ZR81^ ze`LUmKWRv>KeLy&W)le89j-6!f0sJ$uYQaeC*7T023&z0ZbnoSo&M&916Q9E%Hp(j zij@D{FUQCP-hQvg8Y0)Vwp&&S3`auJ8*tuZVqz3U>rPb({S(#M6>$io)URu}3# zPFZbi59p5R-oXwOd2#i-(f0A(-7&`Pq>03x0BN9y661k zS2_qMQ6m$>$*H+9&s85EpX3&kEp5z1cT0F%J=nm?FlRB?<5m!Y}p$VJSMA%vx9 z@nB?NfAm0Tdx5~$JMPYz~#U?1XUjcCY3}4U%{7e zxTdNTKMVGn5&X3A=d0|Yb@0KhQ*!b&tF7M`_X5#91*KZ_WI#j+x=x}>mTX~*UKwLMZZn})_A z9%rj}&cB@?fH57{!}A=zmL*|aRr`nG3M*71#_|zX3sa&~*lK)e*s`{sw#!JmHJ4t) zhmm5sOZe}sfP>%3TigbB2S=;zve&Ekt5P7R9uWu85{&|$A`X0V^hHW+l3qQlHy+O^ z_JEEPjtn8doZZ;mIC266AX-XmK9bhTQla~c#n0|t;w%^%-n?Q1)&)JI^}!!=43?4< z?``b{ejNX5W%B)vfWJ_;3YN##N81S zfWKhDhz3GToC&_TO)u5fG7ld1{_v7vv&Gk9;f#v-?&3};R&}*wr}^yYm^;@vC*Zn& z_3rBRUb64q-df&=kRXM$c9w||)D*h{irNa(y?NFrWCk(E@(P`CkAXR&2* z#5+yAKvPymK}PvY&gkg>@(9cu1rxhIE^S)&R9k?MgIbZ-L3D8cVq5G`Hi{ER}P1(2qLM6MP!o zv*h6U_CqI8thi15znk3nf7>%hZc3tdf2(%{;s*)-CL`-V9PBo{xch`*x{sVf)_^g|Bet7m;Vz&fP-Hz586@8yq z05x$~P+~KWTmzdfdNfP3Fof`jeU&*ff#Qxd{iFu5o5%3&XEg`ZH`IH0y0a!jLixUo zrkUu~xqc>kDv8YXDhOgC#*voS;1v*cVlP5yej}YjOU_P?)_D~UmYpp9_Wxsf@(g64 z{|}>e*RtqT*AfHP&KEfjrJB8-Jcg!hSnsb$i`_@~&Rwt~d+ws2M)taB?0@47$GDX` z;hC2Kk+bmo^|j63s`m7DFGx=IVf*(Q1jRM zDRL8|!aPsvDL=MKeo_AA7j7h*k13IMK%qp1Au%!Spahz0tL2YJ)qD8q9Dei(NrAA5 z+U5FLIVhroa2dYqrt~XL78D1Z5TBaLg?lJVCKkTIPkThmj0;jkGoAnLBren2A`azy z1gg-hE|*{pR1j|=MJZm^vVlAb+iIH2@{7cB-f?(XFB3vFi%0j=3*a8QX{{HOh(_=O9DyNNX;yZtHy?9;e z%j=sjw;OFNkzG4%Sx#qjQ72njzVFaRU_zo`7+F*sa4Wf)T`_Ash*7t;POw4ny)*2W zldR$&c%G>|K(65M(eX6QfW=qQJM7VOLs!MuVG7;jV=ckz0t<<{J_qMd{Qfi)uS!ZJ zzuuBB`DFC>>nf^T?+)kANKs6O1YT9; zM2Rs#OdjoY<@`$O1_1+jERMR5n?v#IRrvFB7(x&eG!8|4LR-t``iI4R~gGUHix78Pgg+OIVD`5B92fsZ$behmC+ z(v}}5kezi`^`s2Tw`(5E$9OVyj9FXTrWU(4@cKFbKkE* zC|F)YNY*lH?ZU^HC_G;a=H9&{NQSQMDz4r7&7{Xro6m0d@4qDi?4R5@KD{wiOnouj zKOo{)Ly7sl)jSD0f-Zj&vMMGbw?-%p#Zir82ZL1nJ`=}gRdS4uOLaA9@VwU`G|7|o zXp04BfhWT`B4ddUc@45Ssr&cZrjH*e;J1J>W?aleI!7U>Fy>w6f4p#6zBvj=QQACf zm<sESRz13dy!d-wdX;EQ=M+GmVKn~A(I*3z4M*);bd_1bbZk{;LR~% z6x{sFgF5G8T|)z~%Kvw%9u`aOpBDdN$UDu^r2DB4A#&a4q=jT`Ckns_%9~0fqjEMF z07)!{AH&0a>wqF^J{%UVZTcY9nh%F2(zDF{r}v>NNRdz4QvSdqlgG+A{fApG+GK>C zD*_oER4Mg~B+W4IhtJT)sKapomm(FK(qO2LeHeN?DwX0tG1f8Rc`-3Qy|A0>rrf-Bm$sCawQP`W|=tU*dpkU#mA4GT}`D_IfQD{QD35wTb;n*C=ZY zyYKo&THG_~!&C2Ql%R*dpyLjXD}^I`_pRj3*I#Tg_m`YsVk)2C`SllkjB~qp@^01E zIREeKVM7E`n*ViueO7RyaQ}B~U!IdqHGOmNhdP!KlygUCs`V0e!X+(W9kDZ}l^;2ZFf+_7y~oF27xGe~1V;vasAx=l&Z= zLkB3paE@HbUf%cOIbBNKH*_0jia0d>U7Doz+0O;svorX=ozVb7(EZ=V?nRaq!t(>9NJ%MZ+I0)C6QlocI&yS#FE@>cILpE@u)WL zW;0gTWO4i~GyG7W<|~6io8Ne|kMcP}JBCd#FGDc^h!j~XlJSGXDo+jUh&cSwK_ zKB;U_E>;=#q^V2B2K^Ws(r&b+n=)qvBD3`AD!m{WtYHIxZ?>X+?O9p?%ENdym8Q4R z(sHY!q_qBdxk+!Hg~dy+jmi7V0M)M_Cf!!J=!}fe>v=lPkDj~{)7;Cs!KF3$dS@tW zcjx-+w`0f8j29n%H+9^e>U~+`bCDd*HS(D1|I+06*J-75gt9B!n5;Sym?<8zykzzc zceNSxP~3UjXIdW>-oL4QyFs%%w(t3*PG*PYQu1_=Q~CCg%--uDxia?4hx=!v9{2WY z%WS!A0XKNv=5RcTtMTlu+)MtB?PT)!Y&|c~s7=~#Svk9ohd9ZD7?5oS60Hs;cnKHt z*{m6yacKLsd2|M!XJ7)L6gPmjxQ2ffH~bcG7H{Hn5<8pQ@;jyD{^I0P+V|kloa6Oh zch|c{+i!xdzmO^QAU0}|<}C~rf%UPol})|1AI_70IDZH_WIj0aS~8f44->z{tOH_8hLNLe8CF@tz8hB#v(cQN0|=zY*~H=_YJVYFeCp1 z!e?nbR6;)czilTcp9P!_wrmC5T>&i@SAmv%D3%nD>ccj!bJg7T+iQhA&8>gevA*0A z49PlhgY%VutuL-FtBt>STK|;oSw9^#3AniOTuFZ)m&4b&+$!cZHF|%s_<6|F#Mf4K z9B(VWU%I3_fzJQV+hsl7+W*g?1kPy*pzNdw_$9?O0aIBi6dwU{*)J^~zA}9x24rCJ>*OD81|0P|K3}d)L8lgR z?y4sF%w7bv#>@Hot_brJf8Dy{{q-o&*b-ZO==N8ga+Nx6)dNpsvRm@mnp>}CZB2UV z@~Dqizum9r-v%e>8y+vJ@bB(>$Hw!x7VYz6{kd1@36Iqz+-Gj+2p)8@-E2x$nv3e| zu|O`arvsc}L~f!tt9Vb0kWL?C0lDzH7T`77)T>Tmf|8%256a;Av>Dz1`7~p~Wo737 z73th6HAl|_+N!uTrO!E)uu>@>wwu}^X7W$}p%yyodQkUevHt-GOE08#+~EI{oe~tB znm}0oU$-}e&m!#NO=l)}SQ~YhkKwEJ^kH1Pj!1`3EUIcfSoliy`|B_wCu2 ztD{5`I3OJ@DO#SQeRV3By^Wo&uf)l3tJlx_H^N=M=s*KO_PZf7YLE8GY@P;UqX(j^ zgRs~!ATkReiP!g?xVS_oU>ot0k(@;WEZOivLeq0(WC+^xV{H1{Os0>bG8l?1Xv~2y z`u@&+?6hYxNAr=`;=zFa3kDb+D#M75k5T;0KK%v$WFUqNX&^`)J&`hyko$=umJB*t zS@0`*TQnySjNURR9h8PPwrDAX7W$D8RO&{dNKc9#8+3?1?u(%V0{Jkqf%qQF;Tx%e z@OMlsv8eHxClnYk?TI2qDe-v;eZCTv1^on4T1hgJXxc$lviGf_XRP#?>qIgtvKot$4_}}opQIbGO z(Ge5vjUc>c=CYccN|>;5N=BZxpD<7GHYhsk1RrDP^y)wsP!Br$Wo4KZlCItAtaGAN_6Gsp zX#i1Ty^=wnd)LRqlU;Nyr+41?ZR0UCMUxag2Al#b3oJzgbL^9ee%gFA_Y;AlCu0T& zE8%}jIqT+F^JrNAkvBr%kbE{-1^cK$A6171V(5y|D&up+e)4opQ!_85gsd?^7$Z;H zg*&uV+(^^;ks2tFbc_;=o(FmYigCi_ba>^)(=gdF_l;5=q#9HiSg5VX>dZ>sv5G>t zd1K+)kTD0Q+=Z2r@t4>+n6f?wiL>ow$}eirV-nOl}Z+ zVk%4IFm)Kht~o@`=iX{Rr$uZnh_e}ch=G|!8w~`*!?G<_mP6oAV%l+V7sE-)noLEk zu2RNMLy=!;@e;VDlt2aPLq}MpiVSd21IO2Y6XhBo0tK**MV=2@#c0BA__4OzJhfoM z+8m^@K1+w~z7DI_lYk1W1T|6fGHvD}ZG*z3VEZkdxg_mt*2lE*BIzm?)>~lc1m1Oy z&gXIVCriAI1tl+XU&H1-Cso)KS(8h(`6*(t|DlCX&fhnE0>4XVeNs?fo(xXP%$!Xw zI`4*OF1D7|Pp>&ySp1#5VQZUcG8hmvudxZ^3D$)9zAyIW4h5&e``&5ve(F0Qf%3}l z_%5kgOZIDX(8ha9zEIT>-HPFx$b{gJ6d~3W_0Tc@p>;M5H%(;PYV_I<@^f*L;sJ*> zEW!b8T3l#E7a0VL;d||Y1wToAkBf_oj_RKBH+I#d?{yV6&!Kq3LqkcxGj0!@4Bs4~ zIar%iY9UGM*|Mw_?wU5Kp#^Q6d-HaOQ%Vscw$*O|=tA~rXu zn}6j}eQYGm3}z-35n`1QDkMyL)X9SOle7_(9Bg?$HCIT7hPs_gBJDJCaCmI1gia5) zE!IT#b3r39!5||WZdLVgnynCU0=>$jN;)eWAatI9vQS|M?kB0OGCh5WU@~NqOww4H zk(mVQz6&j5gam?cf3k|GO56fva#01G+T(BmV`*r}uoh&oZlc3M&ZVDHgD~5W-X4Sp z4NPB8?SU)F1d@SJV@4d{9yNRjo+4u-Z*uCe`j;-Y86F(jDfo;b z%%s|~SY7s+fy|mg@F?x5M|kv+zjxH}bOaqfBINMFMg~au=~-+bE)fEE`QWFplNuVk zVzsK7K7}Hb85d0x9|;L5U19}{{wI@IKXT|8L-(&la3C-7fjtwnWqNt1NE8%|2-(5c z5DLs0UVTjt)Ncu1QgT}4+Y;luS?QY{J*Nfh!t< zuSM3)y96}I)<1w(Lh;iEQ`#|*-D7Uc2OjS;92Py;siS%d)QUN2ihlx-1!dUcK|TV1 z#Qa2$cdl|r+*}1e@dLdl&>Pr#G=g(daB*QFeLzqL0|La1`QsNWIiggy^gwVp9GUXR zt8EEIRTO3hP-5*%5u~J%ArdV?Vcq$>z3lGdSz!)^!Afk3%-dhChQt^%5JQTClL!bHEddr$$I!#+HSSmc-8(T3tZ0TuLgREQ5;`8Yt_o7sRaE z-wML?8bE%xYQ|?a9>*Yx#|sE9!wQHPJx$9$8wf zWU?ti=vc6Cm1PJ!XRRO{b{0)s&ZIHPr)IEgszuX0PHwz}DGL|~?PnyJx$q=`k}vDX zJ8fO|nkMF_VBql&6)epMr@VZfQdg!CtE@DYGibv`ny1($h*YPSL$?_!(qt?xBxPp_ za*be1M}ooHT1A*pZTbu{&Dn_*c`}c>J^fY!Z2W^#HUW4w%Q0DsOwqnKE*oaV12Zkp z^c$r1IK4giY%2Ra6?834juaqZ2({H8Ia4))E%;_n#xEi`!q)1ZPofThtjuHsxz3~{ z!o$s@kgiB?Kw7E5?3p*rfZQAi0iZ6k~{KOp&JzWtanHq?{3MM?w3^MnHnXquq_J%i4=|$L4t1BRzRCP7zR<_aa(Dh{s90?;9?c(UNp@R<@RWO)BPWef|*e67X6uZxt4NW2BTZA|qcG zIy!7X8h1B0m%p1aCdY`N!oo~p7Zd+Z#V`A5N?@|4*`>|x=<2RfXBzmEl2QRJUAo%8 zZS(AITFZ8Q-FV3tVg%xe2`2FC#p06<#gqeuM1d4v6*4O+CE9=TkCa)YBeT`AT5eDV zed~fnauUOJKce9)LS8Y0g8~b1&p2`hK8KmJGvyOf$$gIuq{pqFB>8L?8On0VN*;Ml zYDj_+!5GC1&W}R;@n;38gBeIjNo1L^UgE;g!HUvy5tOp>F}N?$IDUf6Me9=4v_!S5rH@)IbdIevnh2jqa z^+KTM0(pKF9lO3RQOQ+&^+|*bnq3(g`~Rcqn*-wt*0(oy<7Q*0v29~x+qP|OW3(|F zH*RdZabv4V8r%Bz-uwIhJiBw|4Bweo&jY6l%MQJtiiy)u)lNy!E4^YaH;y6TsdwVp za8SsQgnPO;E zY7Ve6j{gyh&Qj(}_^xE#h*w}h$50LtcusgwvUG}b6JDN2dWE#~X))1~e^^l+d_Wj= zm6Z(1vRKJ6g>EH`B?={K?PF>nNm(kaBL!(hF-fl4nxcOfW_H5%x?0?8mb%=42vZ$; zTzvE9J)6p|IErCkZS58(6bgn^`8;j+jfiHmG1_lxRt<(n8Xz8#n8J0RDR#y2=93i3 zWXm;(ZyU_o_*=6kC2&ib>bsvqN($K4s$O@*i&Jw!ugQQ}H*JBQrA|@A1QlN*!vTxH{ppMB|YD{QWX}}K(YE*1q=~Rr?P*JSjTH6+AGD>6|IFm1G^u;r=DlPy-sNWSvn9!KC z%&^$fI^U5!lCTO6y3~%S*=U&^YH*~4$(QykF&eRz$@j>pvEh+9uA@R42}&`dIU4{L zVFB#lnxRSH3>Nm>5F7ugBIDbC!n6)qzKog=51?9<@WudyrTt?Ei%R~CFwIyMm04Av zj9QwU5imVal-?-j;5*f?O}|qwPqEVpQej!fuOt*Ake7FK#R4a@d^T9~inQVVCFgE8 zSC3;0(>j57U9M0%mX{^{Wq>tm6oY~%uR)O`S)sYc`YuZ-hGKwIeqXI1>Ei6n{<)xqh@CeYAHUk{sH-(+T=-!}bKZJ>d5J+Wl{vSCO8sZu7(y(Ta|3E(XXj6orD_Du zK$n&i(UvF-0H^mc>dMMmAYNBI{@6XH*_#^5EW*r9|VncE%$r^jf8*D@`?>AV0RIdw&u_gglDwK>`l`_HFtq~m>AfpD* zNJsEn`3y%w@q-l;$cjUx0FSsWA4NqjgDVLF$GMw8<0FUCz=TS|HX){nLnGRA4MVl{ z0bvp%{;`^fF8r9)fX0XIg$m`tucQtkpC>34!IhRIcbfuQhcUqAgpP?}!D6z4f5=K> zW)b-cY2gCuDV94>u$$`|ioW%;5>4*|dh4qfA3E`8#({5!*YD;I8&S6y>x1|p-ANUrTP z0V*I}wDa0vJEajILpmtyjcs^c5}F1FCj?AYsZ|Na5Cifj6m1Z$ra?gSr8F5*{Z3Lq zG*~%`{8RXtO?eSfV!&f5Ax?vb_Rkd8c3hIEMTh{1u(KMTtl7(1s?a=3uJO%t)J-_y zCVp&(rKr%LFEynt31jsz)Rr&R8p!nmxevdRVTki46vdk;*3lP@qC+ovW{1L0z88XAZQd3UrJ4LxH<){v@-pt_z$KejyObWRx%Yaz#ks0PoY2EpN4yeL7$VkC>(BK z9pwN~qKF}*t2c{%_zROmRcCSxvQW_GM9F~G1aPfP6Xihrlw=f9G8DUH0!}0b#8*JZ z1C*iIMs=*wM~K1T3;)qiYhgfUuHYiciOJXp6qo%8q@b-hXtQLspartmP_07qjUakR zDab{ure;UM+7QV0@*yW6tJsnj08q!{#OE1w$pOh6R>-iTQXxc8#n%6V7-i*(~ESAqFKcbtLQJ21~Wyid1@*6AZAZ zuI|(r^R_Y*3`CxkYM2#97SN#>WMYv8DYSg>O#XK?jx=UJQ!GMR3>c6zP$m8X0DlmA zGBXNd#GxYk?_)99N?^`;mQ2P6KeLv;*6(M|CXplS>j>LJxkOO@VM?HoBh=A;mMSyuA|- zec5ALF{nz^=n(WI*LyB-OuRyU_v7 zdoEMB$&R`k8$zBiD2G{P2;I}XOMdVaUY?$ZH+!KMgy7IPq(L%7=&dE(qd)bA8x=$K zTN*Su(!FZR%FYno7lYH2Z0kmFnj>Q7Pm25I+LCs8N~)S(H91A@uw5f~rh)e841%uQvlt*d`a{0r>G2omCKPF#lIvVrYsT+QU>bZV&XPMD-a?Eeoc7* zodon|ximCQ2qEJ&1qFN@IcBn5-Qk3!b>%`C6ET;1@2N#^GmIE=IHoBM7V9Eso)Q(A zsPwuSy$Z;ztdxv)NbxVUxH8sN+SwBJMifU{_&8$BGEJ5u2PZVMuIWE&Z74tFc(Oe56q^oeFgJwy9Mm@L8{xc##C z-3`3k2uuS#hE(%-biffHlp=04_iQg*IwPPOH()G9ksbPQ&G0eoqMxHQLTusfxGVX@d`HwVT67+d;DcP=6_{xMAJX?9-qSO^2W;?V4@B+~uO0Yr3_Jo{$~ zZEYD}G^7)q5LvWf8Xp>awXok2l5N-$u7Zi!G9ZBTLpPZWnu-<60qfAQOIi$TMsmOj zCB%^~Iteji01#>ci)o7z^9dYgOL1Cv1>tc}Q7-+mTLlNx%xW0nHEHRFf++g$ACoEI zCn7KV93W$`6)6daHCDMtGvvsIVgT2XsHX(i;Hx-3lCU9xs2K9hUoet7^$0ARq-W$O zs5?1w;)Ipus~NBGG5CGI#KlRJI5w5M3vxG}vP%_85xsdWZ^A zpyFb{gBlhs-Z&NihC0xc+to>cA_I(_^Hb_GrHz4L(-lZw z@j5&2>4M#4mw(oheY2D9XY&cxiMrW32kuH@*7nK))_Em|IZo{8K_4f^bi!byOrye z&nqrF-eMd*4$bah4olHwFII*n%xDqRYTXD;yBhK&+nfWEREu*FR+S+#vyfH6n!VK0 zwzNw7IbqL*oRgMG^?>_f~VpI;Mfl_Z94}uiw}YxdWNRD$NPf z$bxM3(u}V4n>QxJLEPEWlKrd!(=c7BV!xX;y}oB2E5a+LmSjrv7zprr6f-vZ_zke$ z3bLRMc;=GAvZ~Q2LAlxAt3eSE#n602j2U=XFI&+f1K^Mg@S2wE7c)Nb?q3u` zX9v@0l`-kx^B=5eWu2(1p`yZmf<0R-o|5DV(-d3#TS{(m2<)W^rDPrS%UP)DpO?z# z=Ae|AV{d}sZa0;~O){8ziR zzH#X{I_ke5F|Lu|<6Fhu-96ZYblyxz=fwmhi=)6_;nC(MJUoxO3}+CpI2Ac!3bl~y zb`%%xDIAlvC1)_`M|I~s3pr@MjkPn`vya19D^XAs+5;6!BJ{*VvgjNK0FwCNYBf-c z_r@w-N!(`|yf5FzXi@c_xB$S?F+Ss)UD`vl_b@o!flE8CjcG-^I@_#BantdcU$#J@ zz(7R?Ydp@N0B3dqXdW@^kFCPo#G!kto9~fR$BBeu){BNmuo@*lfCho_ zD39)QY+PNBGmc&7|u%nu9NBq$Cm7TnSSjgH?5urO+v zk;rHbee_(-u?{&qho3ClVKvapa?!dR!|;w5**8uTroQEJ-e5#27df1z9P4#X66+Ek zhPmgB??d%+#vklBInJ1-NBwJuXpbsE0iEBAO^vGUGOXA$*E@a5GUe^uzgj^~{$m59 zY8q6^Oxd*G)N}QvT4h}DbDU@ckOP8Cq_8|Wo#Worez&|j4~-^!+X|)XB6T2dvwMBn zrcQ-bkNY#HZnII_^x4^1e0<5At-}h{?E1T+Bp4%8!;Fzf&-;`ofMc>9vVUm4sp9Or znRj(zcW2Ug7#bQ16;TefT^V?5d#jh)wf&SCc@Q)OmfAL-pf0+hZHV-Ra(TS_&*xj0X;d&UD9)o2jV3hisLIa0 zT-O(??$q!B4u+=xWU*|OxfbPnrQrm0ZAGWNo#2QoavY4ExZ-5#u*ZspAG4YfhdX_5AksX??82_U zvFhmt@3FfUp+xc3Ufz%bVr}xe5rS;_X7Q~00{orTPIbKD97^+jH6%cLyT6fFwi*st zd=>&Dq)7ISJ)B$}B*5+da! zIq&RI9Vhf^?bMIrPCcS@-Bpz(Gaa-?H~~M*iK2eu_rt0`8qVEs#0lG>Ih4Wnr58v@M1Zxtb6KxV#M|$qSj_+!P2wPP zIv*5PXDSe@2uhGrm+j?tVJf7B7PTH{v#j^;*ZB3hgh!EJe|Z=nyEv@h7-DB&o+sBX&2q(X5z5~#-( zN>|ZybyhXmH7y{mV>TRWsl#pF;|LgramzsBzUds-ta5mSHYXK<#N$=9&t=KTGrP2# z^uCJfnm6wrxhoZ3jhj&9ph#$d1^Y_+Y^lZ_WN8oAun%`jvPP)%uR_lUP}5TFoI1d; zb1`I8@hBk1>0YT*;1{r3*XH$j__7M*-!$vH3*`Fpqj)$t5>Dqw-^`_)Bv32Ok-)2L z&2-5hcn;989tFUKq}#CBnp0Pw|6WNio1~sgT_3L3ug!K9Sd-+yR9rdvLq54Uo>{lK z!n5@dIO4fhC9N)RqsW>oJlnavBiQa~k-bW2j*3>K#!Oi#JacK8j3y2YyU}hR4gqA3 zyEVob`1UGpo4o{1=?_H=Pape1mM9!KCaaT!r;T@95NrIe{T}%6Z4fhL zNoBG`#(6#K=TfUnO`Z;>CK#awYDGQYm!xXmWl97nq?UwXASm|M{UjeDsgO$&8^Y&FD82$?Z3B zKa=Ok1`P2F$?W)0|B6*M7^b=8)nUiAxkjP0MpdHHfB35mDi9k?ngca8cemwy-DY!V zgWNBn%8~>un{SluvmdE$nNeO{iqTOHBesbwK~kX{QB++zKPr^LF`~Y9bcnb0ls)AXp(>1qqWcB zd5EJqRn#ObP5x*@3?ypYPh#fY%%WvOkKFu>YYh3cqKfN3((FT`SIgMK8_u#hh!L|M z=?KqKMXN==9A<83sPmn3c5#HueNdZLSpLKp(g<$X{MtVct6rPklMF*qZ-}SHHk*W> z>64pREgN-jK+Gu15{aUG0cB$@Egr>+NRVHj;pM6DUFvF{z?ya4yVT|P+)cs$}jcEThfUsq5;QN-PL?g)S0XZ?QEYXj6)C81}z zN7f_fYh5PIX}eq@%w{-@f8H_{4vBd31ZgwiN-9u&a|~@0Ktj~H5jRCVvD}bnV*(zg z>eX@T?I@*XAcd&p!=70Y{>%>uncQ;31I$bv{JO)^JaLDm(#VDWgDJ{oKa50pKhGEW z{bH~93&+jbS?U}I^V63sp;)$yjN-m60RsPDW5*}K}4grU8obI^_bet{2 z3(8Gd2{wU2Bw-Zgy|n~Zz2q>gXFGucL~(300#BuL1I?v!3UVU)p>>-652s6QtL@b- zY8+GiPH?t!xTTaP?Y(8u6Kmp{hi+L9go*m3s(WjWO?rwzY4_mAM#(8XSq~~K8iGbg z^%_O5=BL7P*D3pIJ?cWkA|BcwlJs}Kxv1r!3&J*CVl6B&K2gxyo%ZE&vT{bR?OH?@ zRAXl|5HDD`#4~A43RFln*ni?S+nbiuUFIMA!s14VTHPnxlDXDm`Hu|cq?|u-)8qM1 zqx?(t_qo}q@am6D-YpMMCY2D7~LWR_IC%SQ%vH%nqV-(%)1q)L54k z@xw0aot2Mh2ije-hPQuJpZYg<#M+#EYFY6C>DwRXoOE>%ud%O8%(X?7rz)BCF~KRO z2eudL4gJxQihAcY#DHA@Q70=nmHbUZ=J#u}CTBYS$mLr>h2?Q>=29fpQ4_gh&0IaI z4;}p#5oK}vo0A4&iKA9$xHlkxCHKtI`yTAo$#?he5jmmK&y8FEofXY-4jD|Wc0E^Tk$X*$wS%sk+~aKeu9FvOPp{8!-oE1mZ68GTMEQO-CLEV$k8bnkvPpIVQDA ztT*J=H{~zfhHl0w@)BVYR%0By?qqTI!DVABS(Tsk2nze-^uMWx9B%g;Mqk!mm zl4;XHt3QfM2U!&VI+p)vu*s)jY8J_BC@OcX=qbQ2)2P&fB1;8b%m>a!=`g1a$?Hs> zvm*}3W*UkX`#XC@G`nV%XRe;Bk6#n&-6kGgPxaPWRg~->YAMR8UwF6jQNo?kQ0Amm zNOY;&W@UN67g|$zP+T}n^AF*V+0fW9sjp?Jt`SCix&GrZCjwx!C4jO_qh~Q$_%0jO z`5IEA^dkOY=jdHrBWcs3 zI341+fJ;yrC#T$!bGBwrW}pa9#`Qaxu~P;}WGOT&vN$r-K@ zqIBw@f0VCqR@|wmKa;}vyxkvaA%Clb?_W=$)P;sE|= z&1#K)GT9OiD|3n6PYB=qa0B`r@oL}A2A8#L8ZMUq+2A~uTJngrtY8W(AOe_%bE+AA zzI<^?We|@7wdIWOvuDP=8_jq`Iw%pReU?b(z3wWlDn8%jS{DeF=rQNXQb>sd@L_LqM9d0 z;?R^+4qv#qY#ca9ewfqbz`1fIiu#)6gESe1NhwVT+yj7uCBC~iNr=n*?B=QtM+hr* zpeUj%eR7QHa8|^QBsZ_BZBeExS%`Gpza!S}R<}KmsxHmU&2=n1dmb!qR}YkFb#MMt zr~YgQCMeVVq{o#wW*e~eAgD}w-u2x=VtXOtTU|E><**kN=0-&JbfR{pd1p1vRSBB$at}hs+&&=nau|uv%{^3684x48h`4Q!;1aT zF1;&b+8m8$jGrFm{OE74{au!a)?!|exV`y)cc%gFD1sf}7Nf(3@2lJ}9Rr>mA2%~H zWP+AI7-__{JTyJ~Cvk}35#0*hV>W(D?n@w#WY2N52LDaV ztTCHeXXngUX3ioe^H)c6eI{`M*nc4f;@<>GOzB(`<@J$K^sv zGHTlQbH@1`y2k+<`W&VjZQW&?!GBub9omXkNnDw43kW(61{m4Q8p$cBjcSx>N22O9 zJq&ET1vksg>#H{}T8C`y#;RWmR%^;=$SArn$8PLYaTJBnYl?n`3=4y;_~LFf=!wU{ zzzzb~QpbxBG)P?z=pF%wf2BO$%)onVt7=Nx>A{an@lgFMIK0E zqlvH~(VIzgIG*O7+H8(kvPtDs6#9WX$*Gw43F48fy{og=19B#Qx5q`|)Wx-d(5Y7) zNEd5mmHjE7^$W>*x4}D$3J-)#6*opQl^DHW8&dRD@TaUTNTLu}3<&N%#4jxuu|=7y ztv#7&zcTeMl*{qk9prhda%GkZ4^`GXVkr69_qH}4R*rDgXmor7+g=EZcD zqV~)?vFNr6DrNgF~)rTle*WPH8VO(Xy@ZL_E?7WAxu#K0u2Sw!+rtL+{ z0__yHP2DyzG2F=6H1*t>WwvQ*etGG#RE*;Za1wEbsFJsxSt@qTTN81Z=Kdj3d4~{x z4L~#m)OPwJ48VXgM+871rMUNW^H5dksd-x*I;L*F=qJ%Ep3dd#33^5*L{;asJGt7e ztAdhqTu5vnJ3HCtI*^W%;+xv>i3h*Ee%hk*{9nWR>KO5Cf`YYCeECwfxQD8L+RE5@^n?aXi>o#*ZmZwHhKPcq2u zV!6&)r&g$3ByH6%aY5@=wO zhunn3HVm38$L>FGJ&f z1U1ssMtF+r;vk27ud{Cy5;tx0J_XzpcQFbcZL^{0thQMdc{~Z(!MLoq z;k@*8!_3f_Z8h0b7KN;+VJ7ckkwXE(Jb8pHX_z5UF7W-Vw`#g5S&0q9khyLprNL6JI?>%2i*x8lnl+f`nNKMNoNPbY z@OMG|tvR{`vKb*`1Z?4{_plRC4l9MFsQG6{k2VvJ+GPg`Uj~-oV8RAPA;yvKO_&(? zM@M3e0<|pnXiW2^9}D9k$u!H!+#ZwneyN$q3@8uwo?e_UHyQ}n9-dsa+3)ZGE-tY+AX}CS zAdEHv6jK*FbK5-yZcrZ5;t?N-!Za5MMJ$LL99NW%`-qLwK7j~C_5z%{+euSYHg4*n z|C~9f007ySoqC^eeMmiKgEOLo;z2o5rU6=N|9u7kM0?fhMrG-uG{OHT7!eg%;p2v` zD*huTF=0H2+RoT*_@sHI|5N_e7#>;+CJ`$3O!j|&14QZDmV_B}xYvlC31cANivtp{ z#{hYJPtE`H^*A7)m(PEvjmyB*V0EczH}~g%Ukm?XN1cgkNmN7dpCW7kKnUu9NrL6b z)^YUzy_B@?#s?-dk0k%^X8{1Z<1sHbn0Ou2|EpD06zn*Z?;QKz;+|w?1v(}L$a}TI zkU@d;8I8j1O1thq?WY98Ls5U1lLq<&|NAISOofXbH!^kj|2wO5W2bNlp`QA0yNW(h zm?;c~{r`^w#H-aXRcR4g91^BM|LdGA{YrzZ$Aibm+*gr*FMZ>R%KsfkpUgf?QXpNF zL+J@Io)Hd0_3(e&F}xgZ{2ZeKN{x+FYkPH@!~Sn~jjX7!A$+zq7Axn>C1wZ`|Ci@<%iY#}Mb;Na7W#RuC50aKoW3mn#`QrS) zZUX?&Zr||>EI1_yN?P}HAkO#kGjAy}4x$lMhExFHZrFangOQ`^Gt7{=^2i4@23^|e zm|By@owz70nTa$-ZVWP9o>JW}J$gUdN3Vqfve_0g^YYj2gP1|2SUM>x_M7JhM1Yag zjSD{P1@DV&AgVz`!YuLd z%Et`=JVwr{MKzPhmi$nn9gC{!hI`{azLk&|a-peY!7P~Ns@)PpjE(%JT@l%8A3sP% z>C*n}r}i1}^ZK7jpM)fZnU$ZDF#$kS3ydHmfq@!YI6BIF>K>k4z@~8bP>Keijd%L( zUuC^1*ur)#7GzV5#V#q8^iMCz6RLlAJ1qwX9!4#O4~fuX`)RhZNa7nR&l!z{WigIx z0stpD`OHhVNz2p;e!R^Mc5OkMidv@&<=OFPyaUN6*~YZe{?XBi%Tjm@=OX|yBo*S!WJkAwa2VVI(p|tjt(^Wxs6QW8GYEB*1 zpxg2h5_~j6_YPjsIBnwAqsPPzml2fg7#lxQp&{`*nBkeStntraPocV5%cYGThr zwMeJ?ciXJB`OaPUN@F5|?*=X$V&Uku0ak$+aU0jwv75eAM~AuYix1BF&avzH-2r`Y zhn+i}?wijy{`rI}xBW1c@R8MkAyypKRE>wNhl+< zTYgs}LARtLuSNP71{`KI#;ew?NxIQ-11)dzm$ZL`rqb4euM-b*f;O|KpEo!34c4Fm zPCBdsOV(2&H|q^kkMrnGw}0N4zu=qtU19kgml^l`_4b`3X}uG`%W;49Jq-5pBwxs9 zd^_5`*$SG%cNRIEKwZO6+ZpN+(K3Iv* z1_k)RM}i03>`A*Xz=vHHVfG*nrKh^=^OuuV#iGi0mnTX%kLK?mmlnnq0UO$z?^DVK z!cHuC-#LHI27*kz#<1$%A!B*ecr(SfSNQSJ5IV!@^(zyM&}YZ zI*WlLj6<0BSLjvdr&;V~L*JdY5pJ{;rpi3jWLI)tYedlyg^yiSC;%q@UJeKRC~&Vc zuO=^9o%ga=aY>lXq?HEqhiNj;^`%gYAO|R6DA{!?ayyP3V;*Ju=QvI^_0S_>$S?NG z8FZ1iN`X8xa5x~2(C)QPPFwh=O2O47tkN?a9PAE4&L#p_c3S4w7rE4H{@xh9QKD_NQ9H%FLk-rgM4S;t)2l z-zqr;G=-Zf(2Cvu(}wp5rMc-+4oNzaX;vvY5E@hTJ2#*g9&M8EH`AAo+wf^e{M7Yr zt*qv%&cnJgc!aNc-4~dA-Yr8nhhCPs#|K=M=Ygnr%*LH2LCyr+LN_xT56!DJaax^S!J*BGYH+58GBL@t7XA=LdK zLGhnFbZ$F(D#Sre-bu4IM&uA0zt3(tdVkRpYR@bAW7xGjE8l&&68!O}i2(tnWJbyI zkkO!dH0U|Kr_0eCYEH=gEa~eK zhOQ|+_8))YcBpABkFX>_J)uNYv6eyXjkBn@o}UhS%!KNq88M6)Wn!C@#urD0GQP}kCGrS_Hz zK=Ae?Uf=cvXf5)qQ;+}M&4PtCd$JrdSq0B1X9S6WMb@St-yDn>T(Svo_$5V2hGR$R zSPBKjb}3npps-qsG{syhmu9sAt)`&m@|Z`9Jl9xjI?F;vrlPJ`lNzHxU?_K+tL+~vH@B*P>vsV*3NcovRCSv(*5g+%|ZpElxW>s90q zy?evWvp*B6^r920|AWEtXJdnga*&nx$G0{^EgeGr7AMZZ!Sx{&|0Eaq)t9NM^{;#9f#8wQ@mjnZJ~HzdcoN)AJZPh z;k@7=*{luu&kvaj(%)q1&Z!*L$uP?iCoFz*2_{~+{vO$S=xgzY0i@)0dro#czn+$f zJf=|rMkia0oA@(1WiiQ=vxZ)3+IHUY?jLtqM7kkhSKIOEsZlR&@!8TbCS`|AM&Aa% z$!M|Gd+qtmZ}eCgrGE_W**`0_Zud8Qs+)x*=0e9;`wJhMR&>->eu)lck;|Z=#D&LX zcUl%4b=*|5G7O|!z1{tVZuL=EQht2!)%nd_>8$BAYF{@wc;{&{HOg~Rm$P>1x`I4n z=uRKG{2fl0kP`nnbO#dcpxxxw8%~Dh|FJQm^u8^Ky`2y%@;Yeaxq{X4`Elj#{k*|C zm@)ctaJt8L8awe2-6#dAsHQ8y@8yfP@m<7zqV~PueW7y>G9WSFP~>7wP4Kojw)+Vl zUM27teW|l`sh|tjm>mUd1QfasWBC|3xz~Hhu6;eP6Idj^Oz^GxNyTf}1)dQ4uwYU- zf2F>O)P`YBB8S0+%lq4`X!@6VLpy>Yzw_kDeCo7GsOQ13^>C4OE?ehC$?~IPyrqhv&#Uz-B&Hw$+5ZxN;_#UCr`mXLq?B^-PYm>(z z>tX16fA6h1#u~l5-A?THr~a0ngY%2`aZi`k!c(?DeC*7hHNm%OTgENh;agA3gy}GV z(d$v0NsIS1G?uu9(a8zpPO_s^T|yIf$ZPL&-xYy- z14=q0>zmr>#Gg`6>Y|S6EAB2{k^(O4hc30vUYM4Rm~odQfdt{}3F;sw_8)@3oXq=1 zET+Sx-fFb95TBY@Q0dC--wS=Uba=LvBGoEdoD(v-x<^~b%5Nu*1xWqfbg2E(Nj+ED zZpIUZJP!8=LHFy_Uvq<=b3(sf`0v)>*=JJw=OmG|Jq@u1Hzs8V_rf^~I$@S!04QuH zGUxQ!rStsB`Ca+eI(^>`jtebsQaMdeuhwe1ZjS7960i`u?sHmBr5?5dPGV1F;s=xk z7&)#V!<7?EtY$+;a$3zkJrq6OCiK81U02soCj8sF-o|d*mtidKf2+KfN8dDeXV>@r zcYsiNg!`3L<$b{$!jmGv-63P>an+M^eOenFa5rgx|GeFkPhfc8R$E1(dcybCAo94r zChgpLy44*h(e#pXVemAxJ(V8}xiOGXtKW6)R~ic(_8A-b4F&cMwB&XE@>{B|1SuD% z1)oqlAC-XU0&h>ed)`{o1AHFi61(q;_cz|pwz}E^{>@sG^sLQPqYKl$e9CNi|84yC z^c!k#^!q*I>vdW1`^LgUz(MwhO4m_#aFBF~@y&s9&_BU(|6M%e_X$!hwAQbIm;U)8 zEgowZJ%I~vzxD2$gWt>4)4!CQ`dnwY7^dmFZzKkvvY7o^W2-fs-$NC-iX}DD%S8_u za;@D#J0rzMmsvvB+NUG+`9LPx6vQBtI4^bG+erUd`%=5gIOaY5@@o0<+Faw`{nXWQ z-gEz6=AKz3{4$it+_j64zFxoIl1<|KB43> z-H~sbbb7r=&}S<*(K=ycAn@9>7$4js4^*5GRDwYXzmi9-g)`LF`PQV_a zjE8}XvzB}Nk5}WCq#f%|A4|1CXGL%J!MC}_TP_cKvysLhV{k9meSLQiTd(WFhdJFc z^=^l$!EyKe=fA?!5#1Cj1ijvH8QlH5z4C}b5ZyGpIT|!=;6GGx`OE#2>^P_z^!7EU zQ@PP?0Y>@T{^*V-Pi??)rp$$6p3A0_dv5=>C|xRk=YEadL!a)*4_S(YPk4vK0aS!c z>Q*hxqXS}=7_MbvDn%BVr{?y z&ch}{_x;O=+F{_|@XhM2?$f-cLhwky-;od3^J}h_kINqBF8_eUme&hymWuV4x8RS5 zEmVU3)sIu71|mg4_=?o|V$)C_4zoAKUg8V{7c4D(KRditwfgVx%3A2c2OF@5Oee=n21?(v4kBdp7c7kE3K z-gBs9U4`Lc@gAi^iwoPw_{6A(Wbd)cYQ!f;ULezcfeEr{mk%%gjLUc+KJgY z=)8cbV-nw&dFx^LW~<30V81s1XBF>@@z&hS=|WGSMb}cxIu<5iRK=6!IMaOmuF~DV zhvwl_b{cBDC^>9LCptdJ(!PoZqW&Y`rUuOZyp?dH~j5_eG0wvg{s-mQ{%!^q*67#H;8f{ ztJgm4Gg%7S@1OHG)VuywtR?!q#u~ReUqCoWPl~V;jf0LZ-hJkN-)0pI2z!jBGYcYf z8@ybdfT!M%-|+HQ@0N^T{~p*Ib^g;A(SIZpc~6muZ83H|g%>v|FUSy_hZd(Aa$c7zs_O{J7ImvfO0A* zp?0jc`>dAX;a_c4>GvMrhr~2G5ubx$(tzWwkH@TsyxE2$u=D$cGhX2No4=(lEbK(H zVyGtyo_a(nR3zGiq3_mrxruJaD>i=?4jCf|@C&-g_mC$%CjGiW&MYBpxZiU8%a)qI zeJv1eXmYPkf?s3~8$Y`D2drZdf?wt;gMCM?KJQ2yoMmAx3+Wg&xZ%!-LzOuBQ)>;!Szojd8zSK1l+K&(D{eZv{&^f(KZ#`YE4hY|j zu;d_P;NcNaQXZW?s6S}c;7OQ?S`yqCBx?Zhpn#Lb_P=4 zxpNq0pOM#p6%UgI$2yq?MGWS(zAgiN2#l@4KfNE`4p`V{&YESMT5rGQ8@KON#eSGa z+rt_GdJV?)g4eV^?y?g}y`DP~h0H>Uh!Mc5)jHP|$eF(!wG6#aEFl1SIxhX}F`rN) zW!Lr*E=WDld97-O3IRYf6*`%MvXHQl91S&{9GuV{s^91vYO6Q>48b3LgD^cEyS0gN zcUntmR1XAaL9XNN;=A*arP?S8NvUC;y(j6q;pT+Hi~59Mgq(q?RcH0?&&lPjnt=yk z5uw24FSSqC_INNH-0#m4-tiajq&=^u*HbKpf9}v*gl?tnZ|g{d&%ix3B!TCfW%n;L zsm6TXt~=58%x#vJuazXeHzeog+JOht*&E)0Cx^~Npw9d1THo_5=MBg1^IRFGiobSX z0G5sSo&JIv5+Ae+L*$9melrLE7H9{I(cg(_5V|cSNdP>XrJ&nsLafJlQjPr zrmm#_vb}nx&)o6U>YVpdH~o<9pYON6In?32LR8asRIzX%6ZEv4jZVMiv0}Mo{Pa)Y zg)~Tk*z;&$sh?}B`+kZckN-ITbAxFu_Jws^A}U(F>=cNV47qd|C9UaKaJTxV3SvFv z71++!;~M|-E!Jag!D;mC(EOE)85j0@yw>uVJgv+VZDLIh@uXoq*+Uug5Q1i7bNW zQC%J1>D6E-QijSFtLe46PorlH z9|7;=8>Vd)+Afk7)~9-0L;-f3vwHw2b{KFTdP2YrQd!R5gPY8*w1*m<`u9-07vqP} zx%-O;){dX{n?zh1w;DhnG1^Si%2}@K#@K|c*a1uPA*9;O7JmxllwVBX2@5g4OSh&x zY^8wlE#hz0ai412pI?H5wy#2WULUu8hFD%O$9{40ER9r)-Y9)wgxvy6*|jtJN`ZIxzgV1segS)4|tgTIu&mx3_vv9 z&wJia54!uibMZdk6ZkLVrx4B8Ff-v}k*D#c+Rle1Qgd{}yP4toxqXNBxA&}}xi=vU zIslnl{a6&LMSocRq28z=cGORHg|D42j@CI@w{}zgQido*&9|3)-90;*csM1W1Uw&p z{j>L$)nK;%v`T6ea6kJc51*LxenmvLCL+p&DrZ(EPwrx_=Ofxba$qlriN`7Ta*?Og z65VyXacv@O5t}U8v&V!u=It>lg1jJNu^hzoQkV z{eUJS_@HeB2$q5v1_%xj66>F^{>zUs)3b>sG*W`HTwRHG|8MwQq^m)r&z8h8WnwCN z@B?4%784!9^_z9>(^P}eo)*eZPKnID;6tnL>PdpozDXv_Et78Nw#n7)@s1F)&(_ro zQ(esTy35h&?XDe&}cdKyXAIOdnYvT|0Cd>~U03NZ}NG*3;zs947`6BsvpB(erpa;GJFD z@ralHaeaYqkQEaX-lm!UZiU-UYx#HVwEJt$$3~^|>&8WJ@YRdb5rs&cEO@?0|C*(z z`{c<~WNdNMW#4>3+)s(8GQl~>bz^iC+*Fhrh4d2_p68SHwS<05HHTa>Hywh9#Va52b|n4+LCllQ@`!`r(#jAo8#mT=(HOhcaEI`?5`~EuyNp60jk(^ck-hD^6Z6M3x@)l`I7opjJP`a1Xh1 zK9GL+S+X6O{d*xl$=C0COUQl?SPHTHoagIwS7euODMS$yg5y;Z)3WhiCbA{aYw>g> zPzw}#rS%+$Z+W|_sTeZ$ahvR=U-nnl{>HAb6ny{wH81_+avY+iH6=2`M~Ta+LWFa% z1WCl)-C)uk3e`JctXI=FT zrsdC53d-*4y3bz`flI$;x*+!+U-aPoT}GETnWZ3q7Kzt1@RAHMQD?6Ln5$Dj53#kYLvbtfHp%$IKu zU;p=~_xheNMHCpz4&7(qj{o}br!O7GtZf*n9_OiFeD>VeAAS0TU)Z$pn7!v5aOxq2 z@4WA%Q!f0TTJfgWxV4Cz3=xP3gkzg5(Y^n{hxwPBdgT7Ey<#m}aLBQ5e%qVy=J&kr z#N$8s{X6=PIO|~i!wLKDdHBA&pZ|>;DnQ2`<}EjQ^}I;7UGR+9(3if^7`@iz0BM&;`(^vJs{@o|^1-{~pk(6L16OLn|uw0W%FdP$;bB{Xf zMDfjYPdMqA58OK@dY8@Ld;cRA4SngfBM$iPQ+>xAa&X3oxM?CqW@_odN5iL%+~>IS zzA~OVc)#6x`m+8v&pqpx(U}(=HvaYVk2>*~w_aC1=z_Bk;=Y`;)DLBPVOMRG(WtTK zKGiF}eA#0|x%^juxObz!Y2^<-^!h^&J?zbAUi7C& z$2L9nhwoqeII}o{neOT77KK~B_xESN@#Hhk_~hu`#~-j;Kjb%6yEDl-i!23Q&e)AV zzxT>5ZmL^UW$MV&_DU{Uz8i~tGo5lxfed6c_xN|e^Qecve%kAf zKj!mSKkZ}_reJ>L9C+dx2b6#IcgG)f`kTH)$G+o@uSxyoD{njVz2Duk*YU@kaO!C% zF8aaqT(9D@KCEMD}`S3mrzpRG!CJ4{6$>wm+CK5$_E^0Q7j z>dZHs@}AHCuC)8f?>uSI^`AcB#G_CC>K*3WE;!Ed1L7P=dTha=dsw%B^KB=c^!n?= zW6nJ8#Mi#%_$`0t zr2{|z%4J6v4;fn!cQ=Jh{)cES1Q9&UOea7I#r>AH!O0nxNa|3;U*l@P+_1D5r7F3!fLhZMGCD% zVz(trT-TLSPNg=+s}7_H5IILeR1q;$iWH!p7-*Q5EDep8Bg0N6lMd69%CJpY9vjX3 zWTbm~Q>H2x#*5X+bkf<3D_B$<8!dTcr@Fc_R#@{186Xn^z2bN^GE(UT2Lgs+xmc?D z!0mKT)*xcc&yN;-u)2D>3>8E=a1{W6>QR~qwftz&7nz>4X$ZksSRNTIMuwZ}%BHxg zj1Cnd0K-kETnm8!2$*SNZEQI2D@^tFr7RW&Vc=EDWlz>qnn2XtmZc-#C#vO^D`a78 zsOSMQ?xwQoj2-01^2Hih$*!KPh`c}nLu|>b%hSK2FtWP)x>9a*<9~l@^}^S`<4q@< z`HjQlo|ElM*<3}Ds)y$?1TQyIkXEugl@b^!6&7}W{_D4htkTcFfDnwF5iU0utB%$eAP|S@KtIA4dQjVcV-7o|M z#i7wMFsHk}%Y>*}Di+JWnd!o;^CesW(m&%63loWNw>_-MWy z2s_o)n*qNXkq+4ws1ftwBs#>d7g0lJyqt|ark0FYsQ zxzn6y9guMB3qJW7Joc26uD|LJ!W{s$f0-P;!ivHSUN0i7lRw$3ADdcTa4 ziu4lzXx!DeC#7kB)-wAT=UBg~%V2uCDJ5xAKD|zsi*#`PP{9v`P=K6XkP1UP6YY}A{V^!&^4D{^Vi`nF|fLD^hZANo@198 z)tb^B(s-4d+3Q;z8qH^%At|X~O1HETSbsf9DZ)mWeS_oZ0va128h4eF0Ehspg%7lK zf6I)h4;GSYHowuCEwf0MkHR*q5B%zTzqonB8~^jGuU+8yLDZV6IoT#ny87?tcq-L6 zm!V~zG&@Fbc2-UY^S%`@UJ2`c!I&1tQ>v+t z8j+%wQPT=20U~D%rsnH3&svd6B#wXE+eNijolbaop4UHj?px1$$1CCcZiuLqs@1B2 z@5kqa|81Z-IomIqKh=b8I5Cl1@6PeOz}x$8Qccugu^qdai0b7t1_+Vw&pYAV!{(-CRO?t^b3iBmck+0) zR6V(4)bvwtqK2ttwhw%#yfW~_oF#kPJ*lu*g^2}58wo89nQqkTk7Y;lrWXl~=a5Jy z@Svj(zx&3&l**+U6UT@V z*ND(CEki`LatPD=es?k)%lyQ5ekjCDJD+33i1DffB8JtmE!Fx@Cbs*mvsVF-3#g22 zssI4I+N1&iAW{^1Q3x-eQ~&@V5SGDS31*@gF=E7s@k)RqS}=D$BZ@Z$#E20iMhpM| z&T!rOb%LRhOsBV&m|)`Qx~A&_8`l$$>JcSdKj*G3V@q~`mcyM|?=*vyniOF(O`V{L z^6FF&O(ejH|4;G0OeTk@9wE~xu<6flW}m29-y|Xc9eRk9yK7s~<{N5+tN=m>x*HFg zKPG3?&2N1=F=p5~SA%q%{1awu5lyZL8levzvrx0UnhBbL7DNgF7%~7a1w@Gk!mRc5gCyr0>-d8`g$alQVqK5-Jm0)0rcM5<^)3`YNi7ODHRYQV~lY{ z66zHpG99C>lp>{+KFyP8B6zehYQ&IXJwyZmK&proAw$L(03%XbaYw9Ax)!%+y}Ot` z^c7ntCu{Z?V!aiO=CGDx>Y+zU$!5$~y`>Bhm~JnTtOs8)&Jam^u*4gGpBP$Z+!_rfRyAf=R)k&+S^XDAFq5RhrwmTgO^lp$89g`~T>Fo!v69ad2RuzkgmLm8{mvm2xRJHYS8{95>V5y|*eEQ%BiQj+bsiA>tC>_R^0muiAx7zI%f z_065D0Jdz}@P)hLxJK92&}8SXLMvF^8LM5>??$k&y6{b9YwNOC=gMtR$Z`YNj^WG8_z9Vu((nwj|>lH zvRTjbyL4i@JMyhc|C36~@O$N7I>1GLv>J kN0^pvTZv?L^T^=;2jMDx{U7O!AOHXW07*qoM6N<$g3|{s>;M1& literal 0 HcmV?d00001 diff --git a/devices/surface-hub/images/sh2-uefi9.png b/devices/surface-hub/images/sh2-uefi9.png new file mode 100644 index 0000000000000000000000000000000000000000..4747c398c87d4631c3ad2452d9be5a8c4c14606d GIT binary patch literal 52448 zcmb@t1yozn(=U2(DBeO#p;%ie6nA$D#T|+S4-UbDdy5olDeh7%SaB!Cix&;k;O6dM)! z1as{B67mbj@x87K01$Nk{h-7%5l{dC#tUoB53V1S6a~#7_N*r65K}O#hrJ_`8UTdF zJRD8TY{9NHreI5J2a%VDP4JgA*5)EFb$FE6l^mtOR@U#moWUAi%9>_gwq^q6FU3S@ zggpe24D7+KCNv)Qb`CCr9wIOQ!B-G@{r553OPYU>xY~-ml=v%<=7W+djTFQgOvA&< z%VNgC%|pW{z{?)MB^!r;fB+jiCmSax3zCAx#nZvn#Dm4b<<-AANP}I> zoUI*QtsxFHe>s|%Lfl+MULr^OPZjJP|HIb7oO=`~Qe= zaee2GRO4R;`7fzmG(8=`Z0cYah?}z+_?kXU6TAOoK7V8LuloqTw{}5JtmnU?M+5BiuPZxintynVpo!Vv zNDz5x_SXf#<}d&C*!ut20{>(SwE`oV{y+G|KgnDm7OqeeXRw4N(pvu=*JDGDpY3nh z{!wEYhu{%>+*-uQd@pM-_H`A^CNJ0SC%Gcuu##V1JtK#z@_w1lQd+TJ`k ziKJ%+bEysn_OX};IYAS}C11R!QN9hS-wh|K`}PFNhbl*d^O&Z-spDmTWq)Igg2Kdw zSppa=&{+DT0W~JEGs=#y7F}HM|v#vK!*cw(sN(g8}ev5&mq|kWC@d_Hrv1vo@Wf=H# zl-($aB(d+Jek)__|L59sQCVohO&pu{luxo*6y9YgI5F|}uI~5m-{NR~i$!IalGxdB z;^o$xL$1^TxEap7b-^*W{37z~xax+mj9pp`X^vx&x83pRK`4FI zxrdzsefhpT8kQ`eCU+6U+2O`O<3@$IgZJ{i{=psMn+8>35zJ2GOL@Apq4IerKGmdP z(b`!!<)fhw2S;UoM+a|=jL5H}&aQcwKOF6+`(hEoohJ{jyN}-{KK!z$Y=k>4uYOae z<}%&;!?mcZo_&9dPpw##?((n{*ui?|RlIwlBa!ZX117xpcE7Z&Xz*z9M+r71kt zWW4ob*{mnhV=0%E3Op>8?h=~GYr2<2T-Pj8Zoav)*#rMD>Q0$)j4^EFdz3_M)`ORE z`df(fz-aL;A|+9Tr}AM*jtjw@dEVJErmgvKpF*vhTvrQgUFi2~c`dmW^QV5^=?KSq z`?!xu-fJEPdIEsz z?HtzPLGeIgNfk(Vy=55=edeE`chwOISzTmFognPX-1RjZ8rOZcQ8O?jbXQcMeW71{ z#HDc;F_9PXGT@YpDSH9KNQI|Wix={n8Wvnv+bFt)TL%m5PH7~!1m+x!?kN`sTk6GM zYhr6DmlL{qJ06vsJPuIJw%)Z|$D)XzT(6mdP?6m_?@v&dd9qP7Pu%duX-TBq>F~3Ji;2Mbzd>|-T$!)#lV?W~^B?xz-CMt*TQ~|dH)F=r$wxN<6 z>hGJDBNweA! zhgVn5Vcm_hOy;Z-`sM}UBKPK(g`*&>a#0rB#b-vWtc+EJ%~wX2?^L}1bia$wu2w^c zIZrzRhu3_E-u@snpUm)!Mea#VZ$tP|#lC1!KR9My_^ti5)Sgn7EIgv8a3Dbn_h{Z31)tAzRskr zdC0ub?4)3pd-D~cPSw!WcsjzExu3@|&*r<=>PG+skUq3*RF$@_1%5k#`$ftvp0=N{ z?QJqXn>)MQie_nI?vn}5&cl-b5`~$I4q)p0$OOv80)Qkr7yn}}jShIAc)j@-J)_;7 zD~Ml1?Ir~UH6s9o4Q;Utq5*(*tIJ|RaX+4?)WhAMHR;0HIW7ZJ})A? z+q}uLg0B@pL+K=XN7tKpS!SowTsK8@1YWE_9^TW2%$V+Nxg47nqn`*?q)$W->*{HIwUCZ%Dn4&*CneTnXq-aMrNz98ZWZ3Kv>Rgn2ET6B_;ym zR>K$N3-?|ez|TOoLq8j(Dm{_Sz~TenG7f=K4doy?PMMybUUWsL>8p?X!Np?UN0a4q zfP#_W=EskN*4xS9PP{n>x3>{J?z6L-JqI^-*VX&@EJFPPo1u$Fk^uiNWA)w5MbRIJ zNhX$Xcy)JDS{c>#`6raS9=zR$U*l(fX0W4Qy}0GpqaT}bK(CB`MnR%|PsNHg#<)Ny zhRxdvhe6`-RzDNu!gH7S=p7ro^1HMpr6NS zDzB)-(Zv_fa&vrAkJYz;+zkR5AY8N9q2`M*ec5(c{}3Ul`FPcKCb;e{kV0FTiEU3B zRdOcjhIQNI)6Ovbo^i9SaZ~1Tedog6$9;;S=Hp3PF<5lG@YVXL(uv zz3waOKwsXy5ww;j*m%}*SEGMWFt|8bqU+kv@~i*_ zcPBpwq`zB(8B_jsTVK?F+Pk-#?in2bh+p+k4RT*e! zSpSPVDp*EIAotC@07F-7Dg@!QW@Co#yQ6i}s+f!Pj*q5}4Yccasg z7k2(*wj(Vsrn8NrvDHGj!h5FcDuPW6H9{Y5Lm*AWZ2mcL2M-X`K3oneH;|??Cb3EvAlr zm!9r&k8y{EFW~NF(iH9Q3s%lZEos`->dSeQvoveQ2>I;s?INsSI!!c<#7vr+}cvMoWBegWIL?VT^+5GIGqK6@suxh zfNT2n>b?bAzz4luEdw6l>cCpZuoWpRwD+88?^EXSulHbTDBP)GP|LGOQ(}iMkR2ryflBERj>%W$+W03wyaffI(VWDayj9aN;EzKExb4nsaWH@F zO|Wd|?NWn0u1*T*P=J6sT{PXLpEy8(jP!^F@FnCjh#wUQnopo%z%TQPSt)Wu;V+yz zjwRx_jc^8jqlg>h57=P!=kY|0BX7z=+~Zd@IxZ=Tf%+(NnOls7=Ich356){qObLjdJUu@&*2U z!&aOVeB&Uo?a^WQRjX9b5Zso|)XnW^c!*1HRihG{NRIcC*|2*hihgW3GszL61kNj% zCKwSBq$d&6K zQaxdP)Z#k09{Ne3c3|C7*i}h;x;;@81iQ|uwCA>x6Z7|&)-XHJ9m#cGZH`93`RGX( z#54__pabtCcv$?;?t5>ud)}N!VgZLk!&GA}dD?v=~7XE#%Qq~&-R99Jd~!_Aj75^yz_S3j!j6PD3diI;dvS@V8p6hU)8sGm@f+c!~N8EZ=6+y9HMeTpyZitgZ-$m-aJ@sl4bHp><`YMoIt2FCzJi<_3z?&z;!z(6zXnevGeRYcOE^BNYrad-tt>a77SrZ&v6HU(*loCNgBi%O_mUH3yX? zm-@;UwXoLb6gW*E@3Y1{9s{?BEEFAy&~H4yC|dv#^X=`tIiR8qGF2Wp_+74G6KNL_ z-M>FyOv6UUL02FZb3T$|rJ~rsJ=y|7w6!!+K+C6XcSgl*3dWBbs|2BB+t_gjZ_C1| zeLKunWnM#-W1>_Twk9}OM6)5~FY>HF9NRAQESs*(%)bufDO?k%xuFe9X(yqCax?YD zQe69P!&r6ZxY7|3{oC`!KWK=1(uuD-%!4JgNV=b!dF{q9_u_=h9rt>cxNWzgAsyXj zHXgb&$|52XOq8OddWnl$tEDzCF6>Y@VIlNfOWGe}sKaQy>f-F{Dtw0%y6(@V>=s2N z`Cw(sx8L@v-JiF{?f~uEf&M0%C1|HbOeCx*fav<4p1gcme&{zX8ZVgpgp(OqS)k-C)rz`{W)MuGkh z{a*i5KXx)CI`ZzPF;b;}DX#y|_J8UBe{cW)r9nb?f>azkTP&JONlUXEC5++u>#u;= zgw{3nUo!|ECFK{v+R4O56`x2X;Kxc|;@C9cEbF~rj^$yc>tayP#}H=K5l53(9=Lw^ zkmpKAr0FWbOOF5YMNKh!fVG6b>YLbJb0P*unxC$8WU6j7Une$R6f#gmabgUioT}1% zuUNHL{h}oE^>KT(DovrY4SVwIYs)cWq+wi5Iat1{yC^#AMNYiNMd!zo#MbeRI&)Jl zrw@DceSIUPy-zhwsY@o}0N|FYV?Gc~04x*`nj9A@Z zQ!{$#AkJnog{j!q=aK4fiOTP5n?jM&h*{nZX(F06hr%Lz&49;}_Pw5-BlO0^YEszC zDdpLX-A~lrMl#etY<-c$CtV-R7E6srdP??_(A^Z)E{nSU!J)|Tie%})$EZL^Uyyp8 z?|wx01`(->IHzO2OK6GUt{__Jzfb$eta1waeZ?0=Z#I?Zf)GHL;7P|C?>3! zyur$5Rou+PO+q3pWDR_(OSVEXl6FD-V_|K?iAf}-Jc$QPGrm8%73g$%$(7H@&_*V* zh7WOJf?v$s;{ivWt&3~aN2}u40PRmVIx=hzAG)Rs#EqucB}NWvp#&u0*GmBHH|aaI z7A35Ucx}Pt-y4b{ALsn&v4e)(x(-i90{WJQH(8MZx7BG3le8~NZqOacsdMeg2hr6; z3<+$85UK0vDq{ew1nDe|xU!oQ|9?(*ea#O03{Fq?8^dd~0 zAuogrxoKyhrG-k_gY)Q#k?!_*#EM(KdY`B?A2W!Sl`N887a%})7%tf@(f9?bkhTs1r7 zJ*rN;_|IKJhPQm=Q8GCEghqwmtwUv7apGSGzoy*O{Adk>!31$3nW_?B%!3`j(;!IS zO>j?ElB;q4dQA7`jW;$ah6GXJr9y#bNJJ2Wvl@}|G5e#xhCqKA0%Yefqe8~=M)EDw zYy~;G%{TITsx~5ycQD@-#61R<(s0hl2|$kv>&jMC<1=x9PO@*wnN-6m1o7Gp_C@=# zE0jy6Wf#GN#FlkEs&weJ)$a3yh|`i3KgYWcgduV|TAyIB?D0QN4#2aSm(ZE0OA z7s)p6ckz2ij5s(?bKm0t2vi44GpSsa^*CU&G2hw6z{}mBS|SI%eg#riRN@>O#{97T z+3)`RZxVWgo*hJmT|d`qtmta0EKv(VpcLe2$m@~ccevue)|Zz^RQ8g~%5S9qx#kEL z+)VrM7094t(5njw?1og_WkN@qbq^vvP%03Ojd ztn&<#W)*sB>Np(R`?x~i>E0#d#Uj%pdOg*z!i6T^**3j$8eDWBDW6kH(l9Zo`P8ad z4(}OS85YF_L{CGLG7A;amZUyKE5pbSYS7lE6g2W1YA9vz1_RKoCwxIqXv z0{ikq(&(MnD~bp=r8n1K2l7t0B;Wk~McC@hiv8ZW(?<{|17(RE-XHCMT;uQW1rab@jK$+O?iSzp_>Xs2KzqB+7SU4U3Y2I2)Auy)g?j(91RK896xd0` zimAS-AEK;5waNSJ0L@S-$3P3?OKF8%Z$$Zg{r>zkCkoEB<4MteSurqYpVTD{$ocu@!0s6NsHIXXxNn_b~W2U+3Q-bLUto^ zcHUIe10;XbZM&+R#UQw;)`R$F%ilZl6l?BggPfmws&;KJ<55_sg{Lan8mFX&yf{J^xG|eHzl7} zdxGy;L)|>r{QJN#-bP_(H9uGRV%>$Y7T2p!ymeZRO9p12z9S*4D#I4H*##-3*9K-t z2es`dc+sb5OZ~($-ZoVVFXYL2p@5{vFI|1g-()DLfOJ-tXAA9u#S>{FkF16v}~;R8}!^!j3Z~GPaFuorugN=QZl8X55|{L9!>g&3uFmy4kGO zT^+pa__+~&_2QUHun+ojO1)v+y;ELVk5S~`$t$~Z|6NTf3%^ZO%)%n?yWrs)NAT3_j*IfN zfU^4=z|iE(RKMXAY+#IsW#wf-W*bjbe{^JfP~_T&+}G-o@6>2WT%%m_LxhacZ8$0L zy?!ueG2(^faz${k;^Z(8$=Ew>kBol33IQ}o=}1g(`KsG{yi16Gvdvjay!R-%{gs3( zU=fN#8~59>;#G~{^MCjN8dg^9NGDHek@JISl?Y7V!PTI-Oa0)ex;mw&*7|nX0IN?c zex`EvY%A_rPcwea1o$k9HFK8o_j~71l=;!w^BYG=9FYT!R}6G%E;J!;N%bf9iqCN4 zWX8i)jbYuLnY*$pkxr8Dbcw>LR@6I{9}{2(GdoQ@F-?&Pdr@I3+2LnR-2q1Ts-z|f z`@6d0z(xUS@ua`UEIR8YktRVOx^;l6qNOsZ%Lh79sq?Us;c;f$N0;(gaFa{RKTN%c zWS#i$!siqo_bD|8e z0Gc>Qy0wzxGe-qe3-=Nw&EU5XT|*ryTBU-QCxWRdL5;McJVI@68OW<&{Mv=JM{)GZ zxif*qTml)giR=pP-HY?5ss~C)BrdQzR4_~w@iD`BM43dUf8Hu74H_y5?;L=Kra6>P zyJXTGzv}h@bjyz69w8~lpg*%<`Mbf|ctO^U!%*?5rN*XVz{&ctQ7C|o*`v_NX zLoa-2=?`f}mSC|0q1Kx^mBIa)^rZ9sVuwG4X?+QWk$dQlI@*&$^KR=}XGIu{(;%;% zNesEz-lL2svgm5D=KMZuEPbX~+4&_UGkRar5N5{mO#wqi438E*1#4xe zMO#;j<2Yu;7KWw}?9JH_HG=8a-NKc72|tn*1TpmHcv*RC3H;(7H&Czcr*W58VBVsN z*CW&9SC!yQ8pJdL$1e^u+%+V8!-G>;883yg>>NUz$MS7IL0&$MbMiy z4tYsG_v>;zC~}il{wfGP0^X3_+FM@OSjN?j+~-L6yC`kn=cHrxQMi)({X!!~R~1$+ zm>muS&>4s(bo`As6F8sM%_>GTwU(91p#%b7@w8Ll{o&I>@OX0ba~cnzpii6Dy>Hu? zX_QIqW6VRvn3x}5!go?5!H}$f3S*mXur6KkQk^xlK-TH{7O0^hBn*(39=)GHK17P1I0*d{{m-`^{784PRaxSVluXx&UcM z5=n{$BTY0ESVwjDSQ4AK{h1z>{;{K&Agv}5!*V0cMe?1TRg16q7@2j$cQI!L1B4c) z>>zSk^<3=MSWB{qhNx_p98H1*efd`w$7UoY&wjO;*_-EqQR z;|CKCtt%?A{Kv&fEMivAaWzKbS2qVZq_3|oWy?aaS1PKoNuxcTd5F6bn51Uicc{zF z*RG2kn?v0m=tESG^^LG3V*QqqefuLVxxL#;)ZkK)j zZt9(aB*ey&$tbA#4%!towFD;4B(P~+BRKMVI=jM0Mk-e64SZls!AOJvVsbZm7nfPt z!%Z7PbUnMAwz|aiUrYG!0TQa+Q$=NekqbES(Xg=NEXZgdfx`c5a*HhWXfr~KC8f#- z`X^GqTlTK3#wC9@Eux*eh}tru8(o5ACXLvs%$Amwyeom!X5ku>5N$}Jwx>IV4)td+ zRpRV3^d-S(rm;`(;3gV$F0E-iM$J1DIOn;rEKFg;K@#w{Kj9nL+5SYREAJ9PSF#D_ zdPjti=959fcS@*;>Y%Cv|DD>AjZDVfa#2@Doj(_%h$idRoarhBS>*=SGeXT_o`)Gr zM4In(#}h%yD^&Z7z^n3w`m=Tn!df%{5q&7?ceDG^n>*j5`jjcdZ#^gDsQI$E36j(t zh&Ra9xZ7;A@ne>{bw6mJ&}cfYAjkZIe0!?pgv9q@YIT2&U+f1Oau)i+e6R5@ z?-VLluGpFze>-pXe6ExR%CP2IjmS!f@aU`dp)nSnQ!nOZ@87=#fD=A$p*x#3?!iNt zTQTsHJYVdgJy03p&u;sLIH1@8@*Xq5c)~&IM&iNq;6}m%VDP>8q+if1Zs=>%eD;hF zT$940Hd^6r34wNZ9A-LnYKmjujfKHrpKh9Ge7s0_AdIg6!M>Q&bbI-B8UIdqm ziMaO=QmYtM&BJHlFCkNI-`?Ow*riXmeWdpJ)8Q4u(7&79g=A&~%;A{%FqyX|!RBw%}pcgP&GW z66a0&tcrWmM*#SfKi}VPH?Js^;eQ?6c|-^j&ChbR^}V2ta?ySvzssIud%OG*L{Z?N z`3e8U7rT&aH){Cth|1vW#?@`ayoVpc$ak4oa*ORxXqo)WPg`5fS{nYs?o-#l(-Or% zm3*S*AipN}9Tg<->>`IP{uBkk2E>h5FNS?8L)V_x_75wF{^{r_XJ*0xfZFRQtk#98 zFUdwpI#aZhiu+DQ+uP5bM#7UZ_D5GKzp_+mSM01_@Oo69;2uA6kws2e>mOgu(2&0&zy9>Iq{#GZuFQKcwqieF-RjZ5;VMcUCY{( zCFN)0byXRY;p;zkIEx!XBq-1+RvpKFdR>5+^Xd8C)JNTXl;+;hyWIVaGU;4RZL6eL z!>i`S0>o#nk{U|5n`lLZ17Q4tJa}Da1ce?_KyZiI((f*FjS>ibf8Wn{EXIfHi1Ox1 zrJ6*XPnzS-yY=oPs5IWu3i^*LwTx+i0buHChZItBj^A5zd%mOZE#@>_IGfqrHtUMO z$PKlSu3IDc3hvT^LvLCcz8O||?ToXu)2S?^zIdJva~Yl^v~a7xN-y^M1Z~I1o%EY7 zc?4wP9-ogE-WWB155)n5wYnx54swe4K#xzvM=I6xG!pQTC1yxJKXmSD^18-osHk-< z-dkVU-9Sv_VmwuB(ubXXyY3K)+@_QGGn0u|x_Mo;lqbS(mZZMH8HF#R_32~eh_igo zMqwiNBK;eaRYX`>n1lM&4W0YpxtvI602jkc9HVvlF0kGqP_QA)who4dl+Bi_F$Za1 z`JiDhn#+pI-Mmt5fzjv%{)*S%^#RxgWWh)s1X^Hdij)WlGhRxgyeQr#!&Rv!Y`LnL zV}*zv?G0)a7+x<0uilt{24Y3Btv4eQ4_e^qZ4+ze0#ZZV)@}ffz0MM|VWp_k-VF=# zsKhynWoE@0+5{mD7f0FbR-1_45I-3)_Bu*HVHInD=VyZW>&i#WKfvyJTB4=4&hw3g zmO8fk{wXbNg{VYwjBjlU-3}+ZU*EMs(P=}Jjrgra7|tWxPW$M=_VdaX;K0V;x6yLS#Cy_!_+a_QN-~t_e6%3@kxi3<@QtD z6mK3*(y%ssFU&X+Tk?c14#nzwz%9pHYJhy9-52Z55m92gqCpacnJ-NX&z+A-82RSi zz8;Dhfu`T++w#W=Z?(@FUc!)d`8a>*joUZs#*=x3>>J7kyLi5M1<-Xhs2sL~N{kYK z6IA5l&S^U_@gs6#?E z5qTKm1-d|w7TkIefO+?XKHPWmY<$vZqb64XjC&Lic6gLpzsNIJh})Vp>c0 z9W@XSdH8QH34!|g&z)8Vf(8}pMhYoGQ(gEH0c?r00@N)Hj?;aNcPIu*kzLP8(3y}@gI>LF}zcn>hKZ}^{{q*BA z;@&mNY<^}>IYXPWJHRG$aWK6=Zuw>=+Ot^OwckqT3)P~YnudHRYahkoaNl+ULrQP< z@TB%s3TMo7W%lS6$lgU=^O-s-9)y}n{f}1Zr88(!OXVCBu$rrK9He@hPQv7(eA{oN zE8=xJ{~X;_L{q=geqvOqGryR;_`|85nKI(@P``bXq5ja9F)Y7}TdvG`FBz&Z%p6F1 zqj6%Js5lxC4}8q!HD@x_G5?)cKjgeMy*N~~W_PEcRT&+ivG$cc+i$omx)E#jwL^I# zy`X8h&EqPvxwn`53VC|<-ljd6P?(0ouRoW1hDN$bSM02#&T`PG*5+t5AL+Lqw=g_n z;5$J^)|Kn>l-)Q1uMn7g{p1#8uqxyiTcW?mPP z#~ng!enQY*+M=5-otVLKmWDg$n8s(poo8gzY!3UUI;}}ZW7nh#=Qi^W$UVT}nZoqZxeJLw1>$>B+f zW9V=YWaDX;v^nH7{a$J{vkURBH9t$4A1XB2Ok1QK3X2&=0`YqBJW-vi?)vt%Mr@yv zYvG4LH~oucvpQrI?w|Fp@uzvdZ>qt&~8x~w&cUB`}gd^>;>)}FpIG3SN$(tR~l-X9is0D*D`m!Ximje zVz>`R=u!4wPH~X^UPKH0P~`|?3jF;*uty;2Zx$KcPV$ zu$h{M^)}eJQ&r-PMnE7zGy|i6cCB6r(W^!sG*p_{T!pvHENzbV@GT9sezEts+$EVU z0&d2ZRfb1{QZak-WV}B>4q*cu~Mjc zcI&r!O`k8gVIg|QT&4k@1OqphxpYEG4ZR0~V&(JA*@csdUy@CM!;E!YUc1F|0nVIT z+eLpDndHamMqikpU^f^v(u4*5Y*DrpXUE~O-C$d2D40x320xpRVx2IKD z1T=1`>S9tNQ42+>f8`wh+`-s&ug|U07!0!9O{1_nwftO$bNp^0aiccAEOEtR>kuOxf3QjfJrmF<){%fF)XzOO*Jk9tR|plnfz z4j9|;*{y(|MZau<&t~#BOW|S6!yUSt26Hp(&kQO}$J**6%fcuBV6oLh_nYzcYvUT+ ze#bgLdc0zmD~a`t#jr)i?e!;ugM7K|ib^OVP+T%CZ@tA~fx~|}MP3K2BxNAskT&|E z*>em6VNw!aJx(gBpd=D28PX#r+=O!4tuiED8 zm`|S5EHhtC&*ohCT`!zKAgj)&F)k-c6BK-QJEcBQ1-8vuDBLrv_Pem(b(o~d^a@L~ zC?EXcHt(JVw>6_djSu?k#h3E?KetT7z8~K9bVuQ}Ui>P|QOWRMO2_9-UXN)wJ*F}P z#36$9?lXM-4RuiXNs9L12jSHMb*Yszwq~L1m|D*TK3npX6@vug(b4$Ntpwb!V}z?h zwJ;aY8+J>4yIqG_W*cpcs&rk3{I}tsF}Sw3{5QMLyKMXREHk(S8(k4IzVZ7*f_xZ1 zHJVKpRBo{5-0cN5%k&L0zU|&!pVjd-GTR42+_1}P!3UkDzaKYFoP0<6EGA2$e zA;s#kwx;TD+@g6=0Af7MhV>uu*s*pIPW2PuVjaAOyLML~bJ3_~IknDKn@{2Ze-p}H z(@gtmW6;R&Zj7AAeX46371;9nw#dH|J0|o_>V`wdj? z8>7V6@rjuG978$fi(HM#zt-2(+s>vk?$)I7p^v^4UwxURVy z9pLxi#y-k5a_jz?E0r~9Gw;@3@OpZa?RU+!Xyf6429ZUIWXn!H@QPqt_Z zr=RMq5}Iml;k;Wv>IKjx#l}L92w(Q9=~@rjV=;Ax>;;W{%#N*;atLPOJ-thh87vHo zjr&esp0D>i*kQw( zN==aj0QHSuP4LXC`#rv)=Y=H;ly_4zQT?s{GZp^v6r95pe6Q(wy*l=Wg$q=!Zi}h? zuWu6+p93`cI#9#uHS4z!PQk}3arB;@1B1Jp<2DByqD&LSSj8$%|r+19EY@E_CqRuJ~x1MEr=yE9Y8-A37No%$c6L2tWGtEVYvL z`r-_E95p}(Vwgkd4Q@L=8#8QWO`sI4hZ}DB?M4!2QfE?)R&PaybkC#wIdpx~<>lwK zJz0dzXchO?W1 zc&?pP->8MvckH_H$>otSjwPNbrD^1aVjmS46DTY{GPnkzu>;+KL`2x^1b6^HvMzx_ zki`K2@`0#ZFI+JvFE7gYO7wKkoN$13B!Z5DLepur*cs!k{|yPlDNmP}hxgqMmLcKC zM*#Y3)U@F4K&Kzm)YRZx5oK2v5sMn zWNtJz$q2PQ_S2uprr^;1EcSi4FR=(t4q#qzQIqVLY>YW)_${^_u6Wngpu{Q@J=Fg| z_m(fU({f1pMVhUE`-Xk+s=GGRVYwC3RQDjGk4qVd!8yIO&9%6)ogb6J`Nyf6PpaO*#?z@z53T?+763;ckLiKFP|G$OM+j)OY$ARzosjN zt99R&?H^myG-~LH0s*a9k7mK{)d0}Bar$eak=JqN2QyPZ-HiakZ2$vc%y7(jJjMZM z0^YYg@X(4p`6nm=rx}GNRywRhsC>NnAqFP>R3mzOCh_RG760YJVx zsMP4LdV*AT)H&zOo$`r2GIR|sRAf8Sob`h+0?4I}Swe+nTomo(Td)C|5LYw9a_B-v^X~l8o)F2VG0ARP7al%g3o~ zR0$XxKx_?WdWdN@=C?B%kDm$c-BTa#gE1G=_~0x@;2JLEkzYZhqd6=c@$H-k*6EFH z{!V)JR0*-da3Jd{$#~TQ2$*S%Gi-Q{{NvC7)usX|D?ER;>Y9L}e!UCpa8KBz?|G5h zf(Qj?=q9CKqQID39akj^5F2_X@9-lTbjP+s0Pu)9yyw<8JDIc9wvRWKXrR9+CztPZuAgCn& zDhj~yzm@VHFF27dE&SNsW|HQqk}XxgLHq$w^6$@VC|5p($Y>R(GbU|u(<4GIeFKXdPh1> zY~sVZ`_#W3>@$|ktbZ--CPTaQwUKMVlpaw0Y8Q0yhia5~>$AZk|Ht69KWdFJmK)N;Th_A%`zwad^QFnq*(qGHaY{~& z`CM*6Jho@@M*fxlGKq86X5SX4{0l|VvyKU_YN>cH;Q39u?gP0x7UjQ~o2*n$5Ggap zG?TA2Fu}^8gON6qQ$F9J_ZBcUr;o5;pfQ6-xE4Nmhf$|^sOW!L>#UYubn&qW_mJMK z6}E8jL@w@bCU8eKb!X|z8*j}%vxy9$$s(FN&}^p|+t0=|eR_A75P$vJ%L3U0I1?}H zLBm69ve6U)P_|1gVxQW-s^0bo>P!56?Q5c_fg|R((I$B@qqlEoHp&+2B=*K1P)%Ls zNKfP&Mfimgq%Gd6lL00jX773}aM+XzVYaOJqeAY=bNxbid-DRiaV6P2<$kyG*BNM` zuVo8n2ueS+E_3n1Tzus!5R#-fQ}Z-$b3f^Sh8>Akq7#qc>3fz9gb zz3XzLWatmpsRiwd2F?A+0?1%=;z zh9@<6OP5{ttc$HI_&yM$5ml=w-iOh3XTD}%ub0TO~xsnz` zXWEZBcXq0&P^0Ya$RC{MTfYEt3~y)kw^Q}kj>?WS6;>iDjyj%Q;o`Ms&6dzb1TTSuj8Dy)Dg5Al?54v5(Nhy;iGgjf6CykwNEUUK%oIb7$kgkK3XnN zQQKWiKF=$XQvc+DZK2KQ!2SmAnId;?{h0v6mI956t+$@RTNle?dv{ca5S3_kzv#!> zYCdJM(}B!`%DaP)O)a>$c60c0^Q=`1CixUkJyWjr*xp-R=J!4PQr|yQR;#T!%Xo5I zdzWt23`&zg9-@w;e%oTYauwR_2Us9 z zO03Agl)+)c(T)@OP4|6jztbx>UG z*RHu~tnr3GaCZ_Mg1ZEF2~KdAG#0dx-~@LK1WzEr-JM_|xQ9UF65OZX_p5X2cWS<= znwmK^!(UX(s=c4xk1V;b<=gK76kLW8h62FA{AV9-rDxrU|H6KeRANYayonR_RwzZD zF!mbmrJ_AuW`5%B;6nZZ0^V3@lKC3kjp3Pi_A=Ngid;{E>fBnXhyen(I!(~gB?zAh)0 zZWgr0fTu`u)$?nd^7nl7m22+3smkoN(b4|=PZB1Nz2xL~qhFItF2(%*_Titds;aB_ zI@w0Vn6}$0=q+4%8;g6q2K$;ltT8|G_kbrimZ$aDn{R(lapJZeluT#cNO!5$3l*5Adg z)GG@LzN^<$yrG98ojJS1)USM&YCm8q`#nQ zXPl`DQXKvVfD8hyL$so9>DXLfd2*hY1czKr$2pGULB&Y}A3F}?n5)zf8CYmY&aYa> zkbYWE%E_vVE~dSY8D&j%Wn%pMYXOWNhy8HRhEc#gE;{DfM`-v%1b+OIbNxc#98YPd zc8huY*|k8E{rxHV8Cui6n%~Nbt@-ji-@G>2-;%+AnfQ(?ZSAedKeaD|ucQaiXVV(* z1W$ey?Kad5Y*%F#1yqr?h6?0T5wW-ymY-g=8}JqJ_}-!pq&KqQt!6bH&jff^;Yob~ z^B{G)2#PrF)ARSQVWu{oZoPMqcTw*|Tfic=~+QYF1#?M)*l&P?mm z%qkTuU0Y_7^A`HZPa5`dDWmH z?7A@Os#>wD;o!Ih3}w!Qyt}gdRtrqMQIqtNA&auNomahM-7y?Ln#w-y<>2LLQfk|N z+E)y{X>7}f;FkZ=Lv&{a>hXnD!fwB&H6rBI?<|HP}+P!UFI?F>l@5 zYp3#o!8Tl(9|JAKf#+E!pX^;eEX*9@&}JL#9Gb_`vad3=UC11c5^0$2I#l2V$Gx)i z*NNquUpd!ICO*&_wL^jFGRgJF*-A7XFAI=)^DFC(Bqv#RwlTdoMmxBaX@8z^t)%L% zvmMR)ep9QzLhGsFknNX)=N(}@iKaR(fFw3Thg)Bv+6~!60lL2CdC8A3Q-0aJlWh+O zZ@yY@BG*#!qMpEXr)l}&r2bJkNU$I9%tK#W6}l`B?|^?6U)2WH7yG3|yjE}XRY^*) zwyeNZ#NCRZRyqO;Z%fQPRwNEMBL-5%QeLjt-`3F^;*D0X3t0I0WFd!TwTC!V*zpG$^fJuqZCTTkZ~PY&%>tzUN!X#xO;Jn0IZ2D}_(m880`MNg`05 zH*aCeaU|Hqu=Ec@UciQQRd*I>w|{@`ic{CGc1ya{D|D&sxDOT1%RbQvW=$lBiGnFO z>q&`=hR|U4xfBw>hfOS>n-LPfIWlyQ99&=lU9*xTS{B?)ac_q3D1sFir{EYj|b4Rqu`}gwc)MC%JA#;2@ z4@yNSXOPz4aw|#+(N}{czTWYj77BaHlZ~WThOo<*NCNduz8L+eN*T-y^)IIqpkEPVkNkSE*TlYC1Ljt+Dt$j)vxDpGC zBaT)Wj>gq){^sFwREt+OZD@E-9&FM`)|#a&EkChWid#DEEgmUW86NjIkK78+^kTqF zpZ)gq%QDTgyxFd+TR^V!Y~4RHT}Q=ic`Y*k1q#rh=(JCb&QiOz|KiwsuwBCEU3w4B zYi=)y05lAqB;W5W+a*5(gTJ&HoK{el*ezahe zj~5rmSK~{*bJ=K+LaQkd`lcV%;_Uy36J{vZF>O}8JS%aSX*FzzZyp~c#n{Zb)-myt z@49{eX3cZ*B8+QtFMN_7>R4))`8Jic*kgWZ>ML)f9%|lGc`zzz#z_j&r{pc!ctpqp zUVy|6W=e#W+|8UI@h4hK5lT*b$hktjL5O!qP?8nE@aPe~RU3}YF4$0rB120_qj4M6 zQG-wo8ZaJ=DUV!6TLR@83XyCoGzpO)NHc9}FhiC# zsOy22QV?KFVo*@IdO@+1s0vY1CDZXaKk&k~nm4v#505@6WXK(J17wVoO>_ z(erG3pPM}?_WD+{kVk<w-xX>_VjIVqX6fHAE>L`ybrwA{Y*_gNm)P-eho+!W4SP`CrwY@+YIy?-*1cY99gVl&5*Zc7!86nAO{uAe;(0dRpZ_pxn&*!#d;D9t z=yDq2`W{D*cV;L%+T{d%aw)%w#vd96T}bB) zYCazEt}@{|oYoCY9`MSv;N_swbZh&Ha`iH^bI`+-%Ri$hpf&x+T6PXoenG(NAQ|Sb zMQId|LVI&XOjJhK>2NB3ti_j}2NUjdmqxQUSgp`s+ku~ce6Ri3=`Cy9L0qD*T1`Xq z^h3FiR1o`H=jm6{3qwKGCy8%hj`+Wi_bqqg96{%2(WEcPGkdzPZJM_JJn%uhqmI3*QTg^;ZEK%g9IDZ8etJP?EAgDhB6K?(OGR<_m#x&Ls=0*A z-dqZi)o-uOuIblZX^dv8{==RUy1rgPz7zA@y{>_-IKYlyN3-LP zlkd;+7N&l+)ZA9PP(zP)H-qL)HvguK`~Gf$%44_fB`yH#MrV67w%CYD&@`fY0PyQ< z+C0EV=IjW14tt6yW&YqLIgmRSk#4A0+Qg2Ftg?#;m`z@jGd>yViSV|U=q}C zVDsl)l0lbx@St^>bD+x{21{Qg_Yz`1Eni?QY~SB4x-A~eg6*rO5)IgO*dGZPWuLWr z)$ym5=iYg|;>~9oJdJiXtt}7qmfI-9LciFx`z7}B?IdZDZ?Wt!Ky&x1(`&5BcJ-l7 z=&jowXi8B8Zfz*3hD~8d!;Mz4V9C%(FEC2@a-n8;B~YjIv(Kn^V~*zP*sW0Jke0n1Uj~hFo zdh^{b$fl8F);x54W+kSBW8z?ecEEEee-VLWVuZ|}P1jhg?k{8Ac@Doh>kGwl{5haT zLeJ;Cw#P~_KeKVc+k-qVX^OIfm@OA!5wQUFVs^^2zuS=7~vk@Mn(mX}Myz{x9 zh#f@T?YD%+KV8A~$|G6XQCDfF#421?!neeAqH4N4neF@+BHL;!ODWpT%w5l>t38|B zmjtTcbeK)^gqxAW>qwNccn0LHi*vkb#eP-U+KfU4Vt47Oa>QG^^&4Dn#tX%~EEEv% zpQ>G@t`}S9Y+S;4gvWT+zO${`P^fPHoZ|u4Y48T6a8iKLrT?kw?H>#b*{`R3iuCzy zmT&j~zArcaZ_B3NoBSDX?^z4A;-ui}o?KmRhX=)G#B@yA@f zS5*6b``e4s*VNy=kpgfFcsOYvjj8)g0RB+pXBO)G%Pj8xy9k1ICCpbjcz#ar5#3a8 zcr0;ngljfaQT_Z)e)f0pY|y2yy@_u95O(=jXfqWy%XSa9y0P1C{{jGfyM36uWL)O8 zRNH>U%UiB0HVeFa<|q-k5o54A6~HjOylt=Yi!fUgf`vM^R2o4z*6vMuE=Ikay@!%z z$=&p)?b713Fpm1U0eaja>!G+taYS8M6}=x^PR0+qX&aO6p#X^rw(l5e2OfZ~g@RG} z(&-mr1zT!o1=R}+6k#x(NpUK|#^-Z)r*ozfrHugasU53y<-8|GKi0mrly>!T$_WP6&t`7O^@1L?TeC~p)pWfBZ-%{o8c)4MM~Ve1*q=h+F0C#a%Zh<` zlM{FJ-CW?5Rz3&XI<3uGV z-|1ogvRC)EpK0rRSsnyMB^BBlNRo`H*IgfRC{yBKuE5PDEgcXUwVRt{vnmlNJp?LIvvkQ7>}s+# zlG%S-P!%46gzq!7bZ|LzV<3czMJ03yrR)IJZ{oApHBLa_W3qGTK7k@+UuaiO=}~rW1W63T=BG-yh3y#0GE_ zCP1C<%T}<>_q-o*N_<{$DW_AtQm*stTYyLP$MF@z?R!Ncrc?X=#I{@{W_jEElK$EJ z49zMl12esk#L zXB4hhkKcEFk={ErrJ8DEh|3hGL3~?&_k}}8s;i7PdaM4Zc z$PyvY-yEWNCA#@ETtEBd@sF^(6YW#b(y^X&;)y8=0x94O`M1(3@jod6!I+@c(r`q< z6?pHRkoy0iFT&P>D)tfNgB{l}Eu;ui1ayEh7y)MZpCp77-g`q-gvHkyQhlSkh#DmZKL)iaBGnAsug}zwp zfZFAAAWEAuuXmV>O&{jc%9h*Ob*2KpM^-v5Eq=I5$1HFYVCUGTh8PYGSg$pb&*$E{P@g5Hp6?9UDv35TX;zv-n?1FB*-wsN^L`Zrs#Df1_Fi^$eU&~(S+w$1x9d9;SM)|Xu0M9Ld4+E0#H)lL0v zyf;4``jI_EH8;yrgseWxX=N^9C2IQCIV-(Rf-qag4s zK4#Vhn)v6JAi|MxgPHe_&yeGy)cibLf(JDQ4vI&P#?)%SZuupCtkksrN-%{GEkAaT z9y?w16aKNSJD~S=&JuInJVFjX_YZiwqE=f=mH7RIwjJ|jU*};&W9h^yX*O+Z6L(X< zeo0|FLov-bM|M$?rIqJkj=}y5HlMb}s+VegrlRAlU8>i}%`$9R7TPTQK4j(P z+a_YL6n0ArVO{Ge+Tf4}Wz@QNa?&!-Fm#!fR5U2w?>B@)gjKL+1;vKFMTNx?LFhl$ z4~?5?`OhEu^3hc3IfRU=*BU)J)w!yItpD~Bg&yCzKDpqMvdw-qz25vA5Z+?dU|r>I%>>IvGE}Jq+2-PUj9Je6ouj!ql#ng!OBbT}HQ{b6&kW%5t4Wi&?FX`@ zjEtc2-LCsNDqjaqfsb`p<0Ee#R`4Wl6rx#6A5N;==>V8%v**Tr>V;G9&tie%`Cs z{;mt=^#-6S6UXiG>nY}i{sT1`kv=0tZF}^JGWa1p;ZS{yh*EXZJ&xFxt+3y`RF=8s>SXHR@+`xd+>A};g&ywvf zv6u~q(e+U!wXSk_U+SmV$3im3w`*|IH-vQ~&3;Y-mk8p{f`zTza@jO`e-w}vbetY9 zb}{bIX?I}yXOD5*;M-e$7vm>oR-ox>JpXnY)6!`!j$NqfP#!I{_f+eEK*2xIHK)W`2<0i&-mE@l^{=R^y|j!Cz~ipi4%TGG49iJEh*GN7&xK zd}5TuR*npAy0vXn=48cceb3sg9ghx+s?E-C)Vnvd1-@oCI`!+GibQXn=KEhiW4o@Z(7txR7NFWRm`@j9MC0mFJ~wS9?WW6u zt}6pE$(K&^qc72pzPMZGUQPbM%inWA24IpaRWq%3Dh6VRr-N60C?g%waG)(OR{Izi z!C8YULyCc0+w7GOs&YsJIhwZIt%*?Lw!S|U$)B*_X5J3HBHtiImS(1~Z5bDYuz^!3 z8pCMj*%xW?BvnQUvKkE(l%t5G5|CsKCPgo#ug=tyq46(^W@ZE?7nMT$llTzv5P$+1 zT9+v*{7Ib*02pwNY%)pLUoN8r|M|x7S#R7hJ@E0yUGI-3_%BcN0jukXuy_~0RU$Df{<@x4KyI<_L zFn!I|^DXsPBs{gkyW8hFiO3LOJj#wMJe#C*bk~XQ`{m~sc@InyLSz8QD2=79p6w{S zLP>7V3Y*7*Ap`}7ar|RZgr6#_jUiXTW*Gxw(Wjc{x@yl%$ehVLla2YMW4gHWF@yr@ zgB6!LqdK5wF7UDCXjv9G;Wi3^##qnqiiHl4Xa_bfOPPE=QO;c`?PO(tZVU}WLf%9I z3S_R@!c}?kJn{*Toc3mU1q$>IMRuY`!`>hY&^}+Q++%I|0koI?m1ZhM{YX_ST^pNjAwzt)@BosTDsjAAB#o6*}(|MY<6OLg6Wp zT=lZoaO_ytLmP8vz_tJ8X>`W#v!a`HZwU>*{SPKUfz`@ubS&x)cFXB(-n7~5G5@7T zqd5A(MtFzhlDk!CwLi3cg#~62%PWSZ{thP%JIv0W(;NkNOm=G->g|S zvT+@z5Y^%NrJwfdI?VJL2g$d$Mxx-UQxfkRW#p_tV}Bqi>23kwGtngq z^!cW%EgfBfJQq??5?rY{eweXZmeG3dkZ&WfXo1icZhKL&rDAeqyQwWyYLBdp_3g2) zwpDQjx%sAmC1vZ~C#on953|b9bpdd57P+Oc_ZF4Q@j_9n;;a5J<`Nn1b&!j zYx$=9bphcm0Wy|)@zBj6-~H^0x9_7=jpmvcadsSV0$Z(n^F9Y2I)UC$lK#vh?)kCHx>v1`8i}brPNlEcz#U5ZRj56^L)dZYXX%3+}TzU9V|8 z%JLsOyy{?#Z97}0;5Ltpi;2RWQ>z<9{86upL5(deQix>z-qnpAeOo$YMWw%eLA@$| zi7+g2`G{EG3Uwie(IWm|RBlgxu9F1eTIb?h52vcCv5tS_olXSeqzWarW# z!&uoy2v!d3pnV@E%)BnkupTc?&}@B-YWSI0$NQudgdL^ttT~tc@BZB3lKe%#I0_or z=`)Bo_PhJTyieeFd6?v+gQx0u^ECho5p}L`>)Xvum+%=oOg^q0K3Hm0Pw$)0nC;!m zV6j};##_rZNJ`0nn~c;2AtK67$jL}apb_}egdi^J-yYmh{zgzNdlIH2j07Zn5KlJH z!<%}we3A^|*nog<%q5vb3GY-aj=FS)*#`e$?~zDsj%X6+i0v)7>Jt%v&2KE(#`7n6 zBKhs!`t{Y4S%X;EJGG%74;Sxto^V8^|KIC;UjLV?`}$vn&;QB@{15NHg4;!zXtxcC)<;Eh60)wtwP zo4e;g6ZR;;J&@;f{b+0EOA9tf-I=Mcd^w7az{{?CAayN-qCLRty|EVSC1z&siQ;fB z@Kyu%TckHH3Z{t8@RPBr8DN04buTnyrqqTCG!qF}1VZ2GWCMGYfu zu_k?HF6oFbeeY|7?8>UO3FW5w8b@`t+Ma5#CXnb!Vo%2O&2sj#9+NH{^{tr~yTJ6f z-fL~{?b8ci5Tv{cHQTdr&&t=hJ4o_Fk-V-5cBjtVdEb0n(LcmXkD46*cQhm$-_a4f z1!$1{yK>;w zAs<%{`<&Sg@$8Y+zXk{qBZf?meK@_<1T}k@s72T-zL;|hYkQh?d`+};b10U~A$ry} zjh5>-n_0~%eqKrb)$k;LpQFW6v-#H6VRg0;RU!o6rEUA~EGs%5q5Aus)t{m0AKCr4 z@m2Xgm)BFF}b(ckmAj%!YnlkdB>Tw-$d+}L6}=I*$+Y8T|eEPoT=M6 zVxV8oZSo_@B1n%^!GFJ?HlXT zgA~6FL}{E~B5OYe%sT(79)gTZVTu7Ejrv z0g(&Xt74ov3zl8&6XK75YO(fVSwDW}FQl(w{WD2_yN@qDlAYYWc!B${rxp9Xp;Ie( zug&G^oCmv-7YTe4vT9)Ic2>sz8lfOTD5Fl zpRTHfHlySMOjlZNvsN#kwdn&nXD2J;8zOlx?z~oz ztJaK1o%OIXU}#Wzgym4a=dz8#-HZ9kiUV**DHxyi;d1zF@MY<48v5#Ne%mBg7d;jZC$MZkZatB93uHKPPLFc9{>J4&T?LD`w- z5Mk$>1M!ar8P|I*?5P4$a_B2-B$NJZ(*bHQ-<6Do%4+w!F9Jc!&36&;9jw!#Y;oZ1 zWL2M&V05cqiEDd3M26#2Q&`xQ_~WFuQNTujdSfnCeuCiXPsQ$%@QnGU#G=74=D>@E zLF)1A?T^{6)ZDkR4IkS1vm4T1x#phrE~i=_K3%N(dB=_^Znb)`Ke_LcN$?Y2itq0! zCXer|8$E8pYXfu4ws(YSUesAafACMVd%52Q@Ro2|-B_a4$K3R`O0uR}-<%n&Ey=#! ziPYSPQjNpu_w$x`_ytXNZ9gkJ%ZBIqTkQ_usH?tjktrQ_E=AAP&2C6ZtGa!A6i;4+ zE`B~9^Nb)FI@ECy1OM@+eS(O20Eg6XE8!)4ATBjvJpY%}QmsYM@9SaxJh3{N{t!}L z8&1xdFW)gt#z`bTDJPxc9giMs8NvTe#4z`d&8dRu{cm<726LBuOW(-d(8l0nPH(nR zO_;rDU1J~t$L_4}nL9mZe)HXfn`EPHI^xkYRm8qweX9boZ~WOMHXHMr zcWHXub1e;cf3WQK`aUallsQLa5$|Ngh}!VWY-iiY&K`5Vj?1G#G+4|yb*z&-d-jJTM=O`+XU_J=RWsAUWaNo|n6SgQ^_3Q}fINx!c4YM5B3F|@n~_dNdKiA5 z-`_-St@gE@7JGm}{WDG5^S$x7q2nl6s|7j_Y)lkZE23oNVq z)0Hb=CIB5K0Cx1>On!aMY49qAO7z>io4-sjr-;KDZ*k$fw$sv_+bQ^yCK;5)x8!v%M=Sp}*h$ zOBVm;372YP`-lDg-<%o$^Pr9YAD+nndgez_Vzv1vZT37xOG`7*?y!QWkRfkxGtb}(4d&?1Ro9T05;Ho~;3?7{$v`>{#{ z9M_!P(MqR4#j?w@z+#jML&MGlgBb+S8*2w+O4>KEfshIc_MP>H-i&fe_B@pW*f1zf zS0s&_D!eOr(hW%oR<{zZkbzcE8HSmoAq_(go9pkrQy0`2;m3gipFS6tMCcO)CbDb@ zBaa7bNGtqN26qYJv)IN)cz28?qJHWk-N<=1`N@wp+#ay&K8~yQy&P_cV7mkZlGmgCJAXtgLGqF>v zr&9SiiEHiSY-*#)gysu$KrzkPOQbl3`flKf-Q6T!&HiWqh=$8u$660U@)$~ zL)Pu4nyx{^t--eftRt#0;qf83Kw8o2>{66yzG)g;IOgL5-@xS0W?W43nmJ(IWK64eTG=_xzuI>8@ncmLm-1? zC@oC|fS}L-hWj0NMCP>LGLY<=z9yk?DXwe6cmbM%eaK0uCW@4cs!}L6El$DKaR^KT z0HH5T8Wu2`&Tlj_kf5-mJjVi@Rh1G$1`3KTu)E+$MSu=SN?5pVc!P#+vW1?VKk;MV zTMcAfKnX%fslrsicaMgj>HTr*yZngSHZ?sh0}1x8xmkPymvmCRr;CWrBNRd4t%|J* zu^a}>Z5$93x{t1Z^`fQ9F{`3HtJ}`W8A%BKHFH#GPDgIevuJp^<+fo=06<_xi*;U+ zc$h>C*~D<0%y|rCOj*%|aSf16vl8_{d%rdp+9ffN#15R47-5AyeJ#%_gjO!FfI*fo z+ahVA0f-uw?u-y@%;s$@_kf`5O@Rj6PFBf&OCi*NMm|~5HkMb+Uq=d|Ts4{IkFy7C z3yH6l%VLbg%?h>9! zq?bt$4!nru@QD2ppU6J2@~z*4<Cj}m5?M0X|%p!7C>oIzQNKX(Yl>xG8M`oRZ+6tT?nfw zZn|3q7&i290u5UK5PB`}6KR;)o80|E6SVH3Cdo2{!iWIV7%LxNbA%8zlFo1}3jxtW z^7`cmrJyieopg(R2WX<4H=run#5(2^to_D%5r-7s=NP_L1 zZ+prAzHe`-BFB-}Ogg|thl?&>);|ZMhJG@igkQ|p;i8(wAKQldYnlNrnO+Jg_Cv-{E?0kE9nH<{Lv)ASdw?!}j5EsmI|!0RMbndZx% zc%jklP|J;=K{}0nbvp@@rtMs_trcQW{N-r^37fsPQi13AiMrrID2aMA0-J!1oQMfz z9o-9`p@9NBImKx;leT6-DGhuN6&1b#R7!R#DhLQE zcgemm+!%tQR9;fiZ9YkTZZxKsyzt}Wm6RAoG41m zvpAhRHtojVzK08J~gw*U#($A$@)va4{Wf zK@OB{s76swI@Uf6ED59(j5jOEMG^FXH?d`ti6VzG$91S&b&bq>Sc9&ET2GTRK$48Lp2Z@4(=te?RZIBlugRk4ljAL#$E zRKz6(F~n04f(OGS#A&}5BmE?`Y++H{m{m<;kXBHb?pZ6OFm0}238B#nCXnu7ri-q) z4iFEWntvBoxtqhQnZ#g_2K@g0J3BjjZ{Gn?EQG2F0IIsAmPs#_YhDf~WMyq%-BhrR zZvG}3P}OEFMk|`KdbOWbRS~^( zXc3EWV#Cbn20WxA`yJ{Romvp9DZ(5`Do8~ohhaFU_C(RyLkF8;oIrJY&%v><(DH{3 zFT8~YENSQOkKl`BJrB&?cW|@{r4<*~)FqOFIC=S9kD~UVf@%Nt2bmZc6$@DuwNyM_ z!bOdZq!GMb@#?uv_lQPm)NY4H=s-{AEi~6;W4gTIS+8sUu$7Bb89EFRqq7{n7kj7; zrClC1I}ByYX9`C9H6*yvRj$dU$)$i;eE_!5$&JcYgG&bi<+!sKC^98#V1~I#TY)rf zv?WnFw+itkfw5|BDPkNRI3ZXAq-Rj5bNPb8NfNckv&0uvV?xK*ro|O)4q>ODVL3~{ zMUliqLzN=7qL&aYqyZyZv#7!m{rE7ZJqC!_Fk}gPf}Vvb@uYf=8||q{VWCL=VLz1t zqbJD4$YKx+S|g0|QTk{kpn_sY2y7+GP-M4-1?Cyefx%|*?`!r}O&}43Oanxtk)ew* zxIqwGq#q*+7@k$}Zdh_i@n8vuny>L3nabtmA{9~iT?wgWMMV|{M!s%XcAlG}$s8+D zoP2Es%i;#reM4noic*qO{nWrf_(@_-)ovj}xZh~+2ORm(0;OO{NnKsUrnnozqEJKe z{S~60iE1;z|W_l^ej0k-f$SvI8BrU%!l^rCzh;! zB+WZIF8<{R9AV_tMr_=D3cA5RU{_KKr#K8W$qY5!>en!uQrrPnu5qCvLcY{8HaHoV zQd5b0P^~%dK24aPgrJ+r7ACU_@;DfM(%-b=eI#U%1c@dGn(KxmX(=kY+C^$9C6~~< z)jQa0tc@|(RD!fA$+AQH0j4I%Wdf20n$&0rL8_a^%oKtk!iX}ZMz|G zGT?0%t`0(sj87yeB6>NlJC2Oh&G3%t!&N-8n_5aQ{-A@Ye zx&At3gjd(g{3_8EI{K1|>g9&?s7R@O0k1idL?VhsiV&Q=mo!2|R_!uVq?rBCf2l}; zKxo^Zj|`)DqkCp{mp!hUCA!eAAwv)zUC8n&p=5tbQ!|9+!<`C=Wg$b>52lzIM1Y$B z6BUG%JZx1f!l#OJr2{}hHPw{VWqS&)@fU#JhQZjtNN8c)vWf+uvPTFr513G}EcnEY0ss)$ z8ivXt!jf`q6c9iLo0wp&^El>8jjBNb&9q@66u4E$VQ-YpFhAu)kmz^YedkUsM~YJb zxoIG^v2O-$)KW4<(jof%RPz>uN&CRUkl|!l)C9;yg~MGWb0ImA2=M|Dcv=Xc4*{~& z2Tb^Nlpi#^%ra>KSnwRl^{PNj-0; zmzS*)tYc;tFMVE#Do^t%rnOVW8$ky~PQM-+HYKwyd#khJeCR6~Knv}*<03O0RPK4g z32Od6>{L}<$r#p$h)A0%5sI5Wm%|58q)zVqFFZYMV&n+r0-1r_19Ms!<3bQLBD=DO&lCJe4sN9lCap_t*WZ1Itr}bYuBHtq6;9u zh>Pn-F$NQAC1KJ|a)n1kgomSf^wNYCKx%TWnGnoLO+KUJgQF=A6H`uF!o=$iby6Z} z4SD`w&ZB#WyLrM7-(aJQ%qd)QNI)*>jj@ZHV6j6MX_Q<3=oB)bF@QoGUE$Cn!NFa9;(Aj)kslDLm-#ZLeOuR z!U;=nZQ7Cmtc!%{z_hYs=4uddSOIn`r2k}bgaHJ>X9Zn-VCg^Ak-t-*_WmA$$09j& zR0V$%2~&}ykxanXV5NZ_1~Xeq8^_;qd_su~K_Qh%1!QPZ2#wc4s4ycI2&Mv&G#Ek{ ziG~WIJ5J%yg&ogJA_XTV1sE4ef(eyMB#wNgn-nl;V>L!lHBeH6IlE3_G$D`<_$TQ^ z{0(AGj`I21BnAtXI}x^F&*e{_q<~32_UpWKWMPbM4`E9qJ-W=#DQLZlm9nAm_p#hd z4c7kn+JwDapBVb19biytd*Re13(aXy-5IL`RSk8)kCsH3Kk=M0&@A4g=wg4~Fn;qv z6mT2oH{sOpc=;QHc0r|tqKkeDIZfKP;PWu%ji}`hPm>icon0S@^d4HKu6TO#ZooKw zBAAhZr0NAF+DB*l!hJ+54Tl!otuhXvJnoCMR0#^eOOV*pwCs`cQ(Bz!&?(K@KFcP< zW+9jp3X%Q;6_V5ZY%sy4GQx7ze4am=@{^U_D4x57Jedf-_hWKiqjf@%eHiYY~X`${HTY z^?@rqmNqp&MeFf(0)dNB--Ko=oi+xeBqH24kN}~B&A;--GUzcbEK|t*A!Th>Q3jFy z421c0e4DNaFRPHmfG`k}%E>1}2o=JBqn0kpl5)w+I)0QV3?yk9h~by)I@I(>qDE9u zf`z(}8(0&q{+Z^%g9d>hPf{2S9VWG;hBP?w(@A6)4XZN^t=uyqS_K${0UPydk{xmA zgh*RszhpxpiVjn{U?2>prDIkL*HW8$O~-DmfX~VpMn|ha zf*7=AFio!;4Nn|8BmP1Z*EeeuY&^Qmh z=W6{4W6t>Gg~N+0;+^)w$4Qdg&E-iy#X^)=i&D5thJsRfOaut!;^ZuO0`2Y00c95q zR%cf0=nC!az<;gZ0J5h0;`PG0a3(N0&WM zfvjYhgnZ{%xl~I>J_}RxJe_9X+3*|DD)Ml6ORk7WdlI$jEDAoqYNe~44u2fCwVj)} z+qZlzwovQhb54;mev>QX#@5Qw@6Ni~#Y>?Y(xm(z8+}T-gUl(ZLQukeaW2aQYY*kr; z{qLBNxHk4CO;!SPG>0UrM})cN6hU4%Pm&(N4#mF$rOG(O{CGBeW-Ls@(9hHnhM7g^ zG{2c#u1jAk_r+Xh@fX z+Z{FwMQQ}LVg>9EqZ(Bbd8;pL8=;9LiEXVtYR6;|ATt`e2{c`NpB=?XsP?f&vQQX0 zb|nnCBA8D@{y-B!5-V>l-e!0xSU_i_vdFlb=PsjhbV%y3dKs9c`7vTjz}q333(Oct z9wS|(vDz%Mh=lNO*QY>t7z$KLL&A|fBqeAOxTyr$?uV+nnt;8fK z8I2#B=!ho?RLOA6sIF6c|6ZWEh7ldN51V4u)xnUE-d$;7{wmeVw7G#?nYfIJ<7apM z^p(h>>!<}a33!Y+ZA&kGda!KIhSh9vBp zJnX?)rORm0P|Kc*BDezl%&pv`&yw`$slO;Q>O?W+lyS)t$Xo~~xns%~nor)N{u06h zl#wvKhsR%S4meaov1KLX(D$h@`(8@S@G;`t$lJ%JqP|iANN~WWUb2k@E8q?Gm1!|8 zdXkdnTD~u?|4tH{ZoyMJOi4)|KY({3ElD`HG{+jQXyp`q_?%>1sZ zf8YVGY?HxkBPAs(ElAs;S7f5`_)*7@rqI%;nyQ+9J3>(!_Whl>n?rd^ix8z656@?T z#C-XWN*kz}mslyvg6pfR>vMBOcFfZ^3#qCDss8%yCH5Pp0y@d7y#kCe(i$w0qHwUN z{i%$4`}}V*wxlc#m0kPRL^(0`m!&WYTkKjDG0cnf-u(V^ql>o4?<|qxN0>CUVmoiQJT&90dn@eyTNR{FsKd9YKJA z?049EvN@%x3NMZW9|0%>xDYYo0@6KQ>k!)MPx-ZlR=Dk6^x=d?;l%R3?eDaf{w71iVO zw{9b*N|C8qo|@#TaxJF*PsWRAmbB#uT#_+P#FcX{G^XnK^UXEC$I(nN?TIaN%1X7E zV3FHEaRK7lmHLoE9FDVUANvsg~O3~7fn9Q+mTvIplF6i`%Sm+2L9?UYRwl)re zB_0Tw;rkF)>ag9o8rxw*N;=U`4fsCjd09jb#5-$6YuJF_T`4C1P0x%&Dun%v;nAap zT&j4|1Dn6l;WWRtQMNdgkm8QYxNgy9_v*R-v`h|qa3-L)`AN#QV}F3hIp}q6Eu-q@ zLmzQoiA}ydOy4_NRW+WVZA%STvNQqqEiCGMp7G&R)uyirq{+xd#fNiM&S=77x?`jv z{sB){WQs1W!i}x)7tBp+TUuWo=BOWKJBkyo{VrWoQQtzVVP~lTYJfC$wdO;sL5Z@| zyt|ZWMw%v6=5{KS$X26V?_>1e#2OpJ{*dbVm7aE>sIgz#f^!s~aY7S01UA7IJ^Al& z(AaL8N2`o{3aY>>TXN$bDI85tEChv&hk{L%fH8Bz*P{~RWXn$LDmE| zsWa|Ji3)2IlalAHaYn)@GOn550X&SMc|wWB2Y$iM95f}BZAfwG)x_Ojh|BPsjAFVA zoMeD_BZ6)JZ~z%@MnIqdN1>6_pCTb$_N*V3Ieqx-i0K;=(tS!;vBI3Vv6%~*6@*+7 z_=dlEGA@5eBT9yhGI<)qNkiN@e>#PF6gsc|TE6SNO=L=upSxQ7(TNO@(O@bi>+ol^ zfX#(8&p0arOQAGeFt|*svewu*t_bG*MqEs25DN#srKU7J7}dh^7!B=y9!tkD9cjQ1 zWFW7nj}PNwM!w+7Cm?XleXXRLV|71_G6(>G$0r6@&e%%I8wd6ma&zP$g*#%oGKOx2 zEv3Mn3cZWXV`$3qO>C|@R$@ej;IYfeM4SJOx2yvv>^!fPOX}8Yh5pPf)We~?XJH}y zi_M$=;YmRRKOfJ3c@&R>ebcd)X{E%4gp?Q=0Mr^)Iswx3vzM~)uC8(m3u`OQVpk>W zYV+bIc%2-^OBc_q(L`1swO_JUsee(9l`dXZmaT~|&OoIJn9}71nkm}Z$dA%-3SPRc zeSY_mGH@QRa0Zc21AF=|fF2gIdHDZ=R7>%JOk=Y+LrG8saeJk!P4Qq>$|22hc4Wfb zR7Jj&7%WW8{V0#)s~^S~I3kM)(!~X5@87@2Ug3GFaHk}i_+%YT5y-VVg+n#O#Ve_m_~V^O(Wv}Qd> zQkeX^fg>LMU*c^IehI(*Fv|WC2?W~buF*VAM`%{_?q{Pqi&Guj;`HK`x*`K$QJZ$U z0_rD$#9dU5<_6;X%qv%)(; zRQV6m!AKNXyd@exxcmLx#M=_cz5`sxy*~+aHgX8TQQ*+J!{MA-fU(w15#sp*py~b+k$VjUTyZA|v zE(;LNJn;*L20ZLs_$(u8cs6z#pUw}OU*yzTwrO!h$kV4|4L+FS!twe<;K zvZ54NJ{}{W6P_g#Ku?;%%^D||Fjc5G%z_0VAH?bY2VF?+1KX!&Ns|= zw8z30iE%wWcCN<(3|nniafa&*rHC*B^giap0|eAwsTKG5LZR8zt)dPpQoUQsK4BzJ zt0AoLs_UDrX3}QL(go-=0aV$77h4Zxizs+k0%vW!-s7#67nQzEK!iHC9MY2!Imbn9 zRSO#o+AKR5DQ+WQSl(wNgC|B83g`W%THFs3-n)OU()Lp8-D+`{dmR) zx9`TM;wp{Z6eVNSV?{p3?;Q5>p!c*c9z zLp>dVx&vIWJrP!+&ad5(IK-1zHBA4yrEo&+PzrJNaI67k8 zirT(vG6dv}|J)AV`M~n^Bj6w?_;c8dSOu=^8H8=uP%0UZR#yjNeM64Y_6`$Do)Z6| z)9Wg;tFU&64C5fQUT89&QvlDA7Ws6#KhgD&O9xn0;^>)kSllER1KfFcK*0D9qkB8! zoni^|gx-lxcf|$Xal&|YWhgWGbm{GsRfA+qxRsWup@528?lsZBB*Bd=v5+Zfq>Eu{JTA1SgeIm^#iaS;B&)$CmQz*x!b*emX5#$j!oq z)0D8)v#AN7_94l^_eoTXbd#*7JxFd};Zrk9BZ1-fepC(+p|beKaE^>_W+yQeks##QnS@#&(*O-5**x~4m`{Jfr7 zHF`Y3J&)UE!5r92boZsSzgJ2URk6}(KQbVcvs73t;8;;rTVbx6KHlhWfruNhyP}8u-msedleV!zTY3K& zJm$B)U!Bn?vR=En33`v*sYJ+Bm!qmq3O_Os4=9zMz<751edgem7N_cqneWC=>$>G- zI4I$7Wcm;f?NGPM4;ncL#&-A-DIdN||L`hW3$wUJlm%;Re}>@)MR5v7^9i}j7^??~ zux_y!#meb2W{DR{Lf7tFgw>H27KH9lHNwVa272>7PClWFFt1P)U6289Bsk)A$Nr(dQKG z`~6wl86{&v&jL&;^bH+1lvZ8wy$X=GKLi140Z67prs2P1)CxZeOfp)d^pa$F6irM` z^r!mG+)?2+A04X{g}!(}ERnr4=N6V_s-skl!oI64eEC>)sZ@c^|zyRbjg)!G~BVkvLF$${BellxPC=XF|wA!m>LuP72=%psI1JmmT9jlAZ zv^z;6hl^*Egq%)~)5uNhd!O2y7-n8AN|{bT$xC3{CenQB@8xTIcvpZkcSfu3Gw9_5 zKTv*?m$GfP1MRdrXk;jExlS1YK-YT)qz&4(NT2TO>QugVViR_zR%cM}|Ki9p$+j9M zn-4!@!Y~V5Kg!8S0iC~-Pd&WGyR)0?i~tLLh=Z6xxbrm{_AG3x14N`1$qTSXdB>^E^%n`)o`*%i$z?(~NTf1Lx1<)TyZY}*~;6D;Hzlq0of5Ecz z3+bZg$myKpiKgS*HNKzKCKJUoF_x>DMzVf+oY;i@V;lSuBAkg{RARrq^YlJSH&#os z=g#vO&)TzAbk}`}9=?Ro&^VjKy;@^F1oU17$Y^|YnpyUbGw*WnA}h8R#+0x?0t_e3 zyG$An?FvF_5=nrdu3xpv;%3L)ToM-AzW&v`I*?DiXP45l{uaC3E8_U%OBrGlY&}+8 zrn{e4A(dv~DR(rQ1QnG$ zcLAd%Eq&7ls8IVP@3Lb~EaUoS(-=WooazlLD+WxcanVcPH{r z0UZrymDJkrX#O*T2+^qIp%FoB# zYScSi!i?`mn+jy~Dd6)HY2B=@8hwu$N*pX{!%B$dDK#uXV}wihkD6{rD7^k{H(_0M z3@h%8R3Pi|xOdV&BLM3#s;Df*G^v!17e|tsZN;l~3QjzPk%}3^L!iDH_R=zaVQA>JBSO zfAeI_P6fALbwed~ThzlYjcH|E9{TNMVolu$sA;Y6>+g*X_3M9G*)}Q?+gFY;GsvBn zuQ67|fk`t}EP>(g^sOORj;maBI4ZOMy*_o+{3#j~ROv?aNC$Ql0BZ8sSBfEI08I!s zVn_hHHNl|a7#@xQG+k3=QAx6=FARUbA*s#oVxO{oT*v8KO5Ga%oy%n8x!kx~9)<~d zqP&{8Z_k;pBr51B&mD5Na}iNy+kMtwq5rElRC4~4q)rqzZo;7Cl>2aRnEpcHD^g2x z3v&8Q_r^wsVGE^BR-UjGGk`Hpk_3;ugg6Uc_amj;FBY)o4O1<1Jw~a|U*;CL^a({# z=o&{|zftBvo;!Oh{$1YFF1=AmNJ=n(j*2{^DgCAx5OWEUFR6TPjU#Wuf5XOIN{Ud| zM5AQ}lXhp&px}JXNeMTOPJY9??}jYRd4Ov*M){%3%7R%_r0pY$5TRL~1g1FrgI=eO zMtTW_eWAqsv9ICAo~KWmf0BmXn3e)fQIpN{brrn;*y_oc^W z+BtoS@OfO33IeLAh3OiKwwx-QOIT>gp}$cQsHHWk5w!2ts_2E_s8J)RVMC;- zg1IzZLzX0MJ2xKHQ-|h-l6lvf?~t2Z z*ROt2!JoV~KbeIH266X!*>qtcLgD)+t&sx9zu(yBzi?>+RAvnrnwpxtVZ6rO__IJR z;{v^1%K~|iH=AH*m2WEY^20WLI8wu*#SWR3AC@!L3n*92BqcH5{pVg#Bf4&2t~C2^ z96m10G$ksCCI2&KR01ja{|pKCt^dQH#nI6JXMm{xeNd9B4)bR))5d0oc{-S(OAcWF zKVGdQ?Em8;A-)Bxi;LkgC>}_n! zJw4x3wV(P;KJ?bA{r7Cc5>eQ{9y4mjuhzD<3MEB@e;(oeci(QwG%*Fx$p3=O|J~Ds zB=~E)sJ_=CTKnY~e8$jAqw!A4(_H`s02hHRt?^#P^NJ)o%_VXD?L)*S{Yo-^q;mHr zJZ%V|NP3%-Bcteo_~J6VF~OrwkUdPQq)nvoa_iJsfJ)&34zJ(~3@@&L2(Y)&H6>)M ze7HtC#cgP7+VIfo3e>mWt_y+fzi|#UI1cSnt0xTM^I1RC?-8cKShfx}HdyCcc#i;p zFXfNi?1yonN&bO2^i#B^$}SnX?Cx@glhl=YRzfEA%G^0~>ed78!BKo8a)yT>@q1C? z5m?V2GC+70lK%@^165+q$6kvZ@O$dU>#pNBYS_8R2hO$;k4Hb`PYW}|x&Z1~h=4;% zltP-a!T6lQ&9#+r*f5gx;Y!-aklfQ#%Iiu=aTnG23b+Et<&E#&axR6$uH4(uM{deO zRBGWu`XiN8j(;)PzmLBxgm>Ao^aiSvtr~hTUY{I#B4X?fil`~@@G-mt02r^m-}9UI z$P3XR07~f&S_`zl3-?ll8r<_+W6&Gte!HIQ}9|1+qH$BaV8E{B28So#G~(PjdPKVY5yxm4!Oo)3_+>V@?Q-R=>x!(UtK?%mXMv~$ZCc|bO84Uk*7NDI zDiC=0@ACS35NPO!5;$667gvy#RSVf`4Oe^KPNV8L%wIIQIn6EDsBP$d5PRJB)HU`x z0aCTTJR}5meC9A*o=`@D6L$g4dn!i_1zlF!Z(L1c8Q*N>791oF&bg8zGI6ILr||`x zLd4$cf_)B`6JG4J{iW;(VhI(9@gtUI@$@@4_JbaiKt2Ear%Xi_tzbYtb(!#PXt(DH z!D1)$^6l{io@K*abL)xt>^pkh#^o#o!d-osulBOtUbW$S(gZQek8AqFb>)2jH@dd{ zSxVQ~bzM%(b@8${W)MJ4sNx~=+GG#$-^Du912;AuNdnZ@J(}xGd)#%S64`#JPmgRa zWSIt7rcorQ!-PLmjJwVU1`NG#>e}C$37E)_(7rSBtl*D{KJVCz-p;Q^#WPK4$fV~a zxhtz?k2Z^(&)=E&odC0fAC+3X{J_7G*m%P*?4)5u;+(TU$E}*TecVHzsnOHkb>^tG zvV3ufqZ0x#ev1uq9=11GvbdT zj4J1cA_h|m>?qk3bw!fm2x?Tuui_eeBVhuOok(8{$TQzwdrpJ)fJLOJ;uU?-I$|zI zFLm!{rD^RBl~E-siooDeMtJH%Wes8p@itv6dqeab5CO1$WT(w{@f&5h6ZyD=}8o{w6Me>u1Gdb@$B1FHMz@C z&XGzHBN)saPmKzvUP}h}Qi-{1oo*+4IB!MP@fZMBXJct>PhxA{^wNQ}WS(BQR()TDuBox*U*3#Yb1CKNkh^)L!A7V=893uQ8 zRi-vNxT>V_8TpzdN928fd1R{{gze%K975XMiEIS|+=|Yrr|5OohSog4yahb<^oRxPdkgN^O}Fpel28mj_N-m~OT-^MGBh+WTwPhQ zeXFV~Hiq9x--oxCg~0FtDmFrt53}zft?Q!Otp_J* zIi$t!e9k3gurR?ODiWAi|x@Ts2424jh9-4LC-; zhl1|T6PD?A={fP9O@CqTbQsZu2cOWVbQu_IX)xx@1(g8Ctw=*2GbvbPeX%|14O$3| zAzi&bZdflnj9cP_PL3HSLPN4P>f89#Xh#0J{re2dMG>n%{N~C{LZpfe{q3xe&3*ZJll2PMi;aiIQ2fM8yQOByH<}Ar@V-v zl<9c0al2~>@uC+G`e9GKSNPdDnS z+W_*pQq+u*R_v#{yIP_wnczxpHuuki8%onE(9CoRF61f_JC9Vu*o-j(o04(*d!+%A z+r97GMeJ0-4@v;_)nOW0V!+d4_jUH2EZlF%&9#`03|-tNd9v*M^|v=zGkBRTr1M6} zofZICa8Z+0_jehp?dBoASV*+hP&Slwe{4A=_c$^rQw29H*7$b49@~q$4WJ3GG@sm4 zBR6-6YX8=g()uMDS9^j{#w_i!c!5TvTz>jRS2vNK%))$e&xEXTk4eh{CU_|F@Ru6o zc|XFP=HPQxW-O3JpIfeMr&$9_-TnM^1y^P==l)(9uL9p8Q))U{Q5^EK=iW?Cf$p*u zn16HgJs+*SK5uDVhgmS}bzW8J2GGR)JiP_68MJ)8zfX*S&QA!RfZy`E-SWR;LBHlb zTu>PU032^;cP9I)Adl0b;7c#~tZvK zHc!}GDTN5NFzI;z%kwUYzSNGMORNcGQc`K;;p5$(RJWcIFY)wSJ6dgZR9Cl{nM?d$ z*uGpyVc5=E6XfP^pDx&CxPY}H=`8FJm1)vs=YF+pdOwV!YII%2!4~pO2-lkDqc%Nj zPv8LFo8I5YO0pi85oG{CY<1C8J$AjxV)l#4_mSqr+lq``e69R-Cf?-*T=%CA@7wag zh9Eb&GzD$qjkYf9Pq5K^%X9+Hca6cViXnW3-+*X`vMJ*?Ah&A|J9J1xV2n)RY^zk~uP~!-)U7sv8dX5noZ1&_3ecRlA zpN~}MYI7o%Rby~B6G!B?ZX2yuNf(BIyEtLx{}{>SARM5>^6ti2?+y%EDUrd<9Wn8} zf0YC2cX%D-EMDErCfPP;u?Bctd}C=jQsK0}`UTCZURlXsAQdt&pM&}f{&_EeSQwYH z-biaG#xz?zE*fNjr^2D%+W0peo6VY>@A7;eiyXv0d*HinN4yw@H%>X zJ>?5NvK5eAJ?}AnxMWKbbDR2>tw2=ZZ**qS^H}Hnc1EYf4K)f(d07MX+=AZDdgZA6 z?q#07r{xrMACR@YIlgXZnXLZudVL-;U6L#Zd5*fejtfm!dKxE9nVzd-2?gxMV>X;! zh_NmG;3Mbl@U>Y^B@hW}&ZGT>uWn;@J?SS)2N7*yS&-1y6Yg1uV|&=BG{agF2sQIf5RbNgSQf zHb+keQ;(qQrk>ZwyPmgx3bpzCpaG^6R*^=>3%ap{Wp@LM+nJtq2vR~?`DYfM)K6W! zSdfeBsC^PB1s>8SH9j{fU&7jB@J8nk@4aOx<+O55HC3+Hb+y8S6~}3w$6OwA@Kwi67@;n&i1%6G z_JwC%&+T(xbb-I$$d~oXGk$mU6|cnwAlXHueVyP($U1l4#Mi3=C$J&t=|#8uxh9%2 z@JsKn>*{YC^UXJ*VlNNneCrKmwOx)r%PL}>2a_mgT}LUpop=yev)S9B;On|Kud8sZ zm#ZzSk!7N(-09%AiI$g#LDSk#NkS6FL9Riu!5fYlyZxssWMkv zYc9Uu)?5WYmexJrPs_bs{4sDlUS+Q|yvq`M-u3Qz*qsRWzmIGe$jT3ja9R$U;KRe= z_I2JaK$xR7IGc$EnKX9alr$70z?3C@d`5Leg`wZO;g^51blC4)*4nalk!dAl1#Hqe z_A9+z#_>YqI7}8Bx4JuY9a?ge)GJW{1^r|n`FKcQZ|B1sREbyqLR_wu>zwsmO#*Fe zxbNbo@;);(zZCXxn6^kedTA~HdFpwjIeIl+e{!>1U>YL)T@TqW);FWzuVO!C_YiQa9~HKAGqd4gB#h zD-f`c`rLYOFqB!B^t0{B#s__abDX=Q+stcD*{=Lgju_o$t+YNUGY|e3|`PvW47_h0p@lq&E-MY8K54wJ|WS7y~>lI zH*D-{^z8V2sQmY`v^AJi?aMB0%S&E=q<8$7p3xM0aQ&F@-Z)``4<@!WLzbs;Znz71 z;ZRYWEE3TV;*{etHLJw?zw5y-4wlOzcdWj)KMH>~aSJx|1Su^pXkYh@!~tD^=k837 zr;*%^r-dg7t4$Oy`GX2s6Q|_tK9alAV?E7ZURfBPhaf%f)A-b*i9G>Z4~6~Ru19sn zQ$c4*BWmnMmzXudH&o6>KP~5f4-%PXKV|!O`vc|d)?a#pi=JMBjc-r;CwSlP_nwXS zn)sd%9J^95ApYA&SkK1-UKi1m`@`?|2#~{y3LK^{v)|z&{_uO(B64{*0HbiLC7o%ULqwoIuv_J)#cVF!hZrzEm6Mo#~#+VxKvDn?gfH4Ywe(4XspY|-j z6ZXGb$9lE8xybSqYuPH{csX5BQj2-t1oFRF$ZEk9yMabt1;I3-d#0-?eYZOG4`kFl z+Q^7DdSsuD9a%O49lW+`g8i<~SZbY&>s9kEpGx0Co`NraH+c8>t@L;%o7f){T*?dP z=g3zh!8nTeYYx+L4HL$j)6;|>|7m@>8if*ewRS;9^)pXO$yqq>{#fjwrLs$xO^ABg zq5R`YBgJhDv6`nRSIQMFWw*Fa0K(ni)#JOn)*rF?C}TZglSuensBJkI zYpu$De5{2xOJ-qmrmAM28#sp(Coq@0*^;TI2*`OU+i(2xL&4tSuibg9J@T!EVkB>=^-bzA1YKqd^*kijmZ~{T z+Lsl6D#OKRZ{dE(Tex_wni7eN$=mU%h2l7Qc3&<{cndcbcL?z|x+_^b(*WOUSrUhD zO5BhP6Mix=s8E4eTa$ zo&On{ayVYk5!~K}$*cAK8ZzMiHC&btA30&3-j;C>DIt{r**EF@GVfOW*3Y zbB94C$)|bBBZFEaHmwOG{9(}7+SK;|ZNw<}3>^G?no?@t{-`OnUYVECAhIQteOj=` z!Xe~;OD|^CL@wqyY8kA;2lAYdW0yxC+J#3P(yMkn?QA~N~N{YF^gSSNe;tDhEo`PHLvdYrasB zw-GC^@<;D+0YX!gG@*ljT_b+B!!vTbw&P#+>|)d72< zuQsmQ)B+xhb&Y)P|6XRaWzN>VJon@YusQkHo)gRkN(M@x0Uh?W!g}E+@6Y+(uKGugFEjcBPQuEmg6+C$F*%IutyX{I zxEo#ytfGixueq}h-N6B3iun6qUb_M+h{(n58h~#f{DC` zF^U61&I4(VuOG8a)H$A~K~8Na;X}&YT^@IT55*u|xODqZ1t;?qzRyq2ozTLLSHHWv zx}G1ZOSKFEYCKe5MSbszR04I<9rVwWnjW+}D--|0XbqPa7F#Tof+s(`L$5r|?`qpB zsBPTAI2W0OgKIsKwJzW;w|(d`g$V*V%t-%V{DAA^X>Q!}_XA+w}e=u*-r_+Z#t}hk2eeM z0xG6rHQjby(CJyr^J!+!l&OZ;Sr}cB&}sL@D&N}qw^gEUuYda1JlE{66KdTp6|?&` zHh=M8y-qM(OS~*>uebJ~-RvVN>2_2lS(FoT6iJo6@((<*#|j0N233b|IVr6v$~k`9 zOTOiNX915KEzi$<-=YjvMXfjHDx742*n==<_J@1y)uX?~xpRvzsdG*NSEGH%%!4MH zHVluO@`A$ZaIVZ2T7bP(a}y^s9uZZs4>sp9IS;+7N(#D&^UizQHJz9uuJJ^!Z)kh; zT{Kd^du*xWKM4CK))toUe)5!PeA&-Zdq19J8f_~F3Ru`BY7)EYYBA+GJEjsl={(6% zB4hhz8)wZD4f3&E)2OZ@oO|@@ZKu#RQ+;y%vi75G=tJF;I zo0DF0rh=fcDPcp}v?q$c-x+^Md2Aa3*}PqB`wsQIY}AyzMEITso$cN)-DDZLY!C%K zd0g3MQ6*s+xg4ihll%XPb~Z}3aLp+C8D%jPyuDM775MZ5HR3r7L%RN>1o71AIJoWc zdkXG!-`LGEeohb~@|V>rQXQ-a*{nGHI`=n%1MqtiT0GPVh1BM>ZL$ypaxy@}TU8#>GP-tOoQG98nl66jd27x*B3FKUw#V^$##6HpWVB-L+obdUv-3cBdM zVi$b6`i7D|NaEPASFo~h^)fao{JL28Ip3@A!gZh=9M-30F`Fnx&@JkG>bv-C$>?{y zcJN+B;fYAM=SlVM@<^5Zbvb&^*k=-j&@!p*)_6#BsBZtTBPhVl*eoO_=(C0DYXQ}I zdzp1>@WBM6>#=oKRp2N`?YVK5!sq!`=q%VZdcE!X?#*q)wmkp#l|_sS_DejSJB0Lr$8Q--|;^-$MKQBqzu0 z^^cded7qG!d5h69uPn-qh3UAg_IS1h4212#@6hf|#+IqN_R=%>O#DV3tb?K5H?p)v zTz3A0oKO=#?bE3<(YJAyjVA=xJrszm`SAr+@aCx6EBGkJ*E%l{CQY96{Pzahv-9jL zra%8Y*#gR#%l`TaZs~Jr;DFleP0wp5m!>oBsea?`3Fu*NZA)mw{WV+H#Os2g=c;A= z`l?Q}<7B!H6uh-ew0>TFTVM|*Nn{~L*fK16xj%Sp5PSPALu7ne;s0o5o$tTpzjq^g zPL(ww^pGZI!UH`_qAcwY#dU%<3J~SvP(9xIx~sL{e&%dbP#71sU8xo7@mrsmx+c?* z#PVN#QvK=;D}@skxR2D3t%}~iYR!cqM4*Dg?Q&$5;hY0F+$qWc#l(nVBk9y)x#H~xJM7M}&ZF>!E9E;a8=92ZT?cv)+_(Vs^&5H;}9a6ze zi2N8ukvJVy_FYzZ$g|q$v-O3!B0&TrncJ=qzb5Ov@?JTzAJ=E4hT;$n%FsWQ~EOmG<()U-S#&J=nq#0~d+N@d?~W40#E9 zlE(}&QKXB8j+8l^(aNgy3jwmap)MQN1eqquCD6>9Xkq%~P@&#MfLcftEc zX;}jx#&vmgQ8|1gRCWL?BM~2%qY?R=#pJ@98bcDNT+R3{&*My-Fh*n1s5~rds)Sp> zP+^WiB|j|d;Ap~6Qi*4gWX^NlJY6Ivz;4)VT3VaH2sJdP(2Zq&5rh*Xo$v?GHO;S5 z;^D_<9{TJIZ@84~={|dw1;0NSYjnSPeMRdSnz$fn2-#_A*30BsFSy%}6w% zEK=1cyH3$UGzljB87Y09ohZprFtTeDGV&!mY3yJ-YCUTU@rdC?-h2qP*DcYY*1Mcq zPfxGzMvqFf!(WbV@zHD|9Y!(c^bOdOgQLg=XDR6M|4d$i^)wJsR*{{~R@3xr3<*TY zowiJ_|M3Nkp`jM99Rxw2^F#e~Pfn9^Wz{+*)7GQ0!s4x4QYlL4^N3oix5jiued)Th zMnnKr*wqet9L+6ti@+9E*Od7%x|><|GreYWAZ>VfwZ9EDT`K^{0{P?C4cv`4GCAiZ zg8zppJ!*4W8ocqiIkO?S&}MhvI2Clz&W)veiDcsO^IKdMtC}mLv1lP8(w#uO9bp9_ zK@6gX3;R#}ucoQ|T;Vf_F*7EUfdFX$WikSAg35Kg!!)Rp6G1IyoGQDPAaniU zsH0%%w%Pf0v+r}iSLYY-WxvkFUxMJQGX`j>CkgzNLYvvYh%5svL-BoF#UJ2QI=-N4 z_fXQ5=NuW1T8P_y#^O{|VVkn=Y!>NA>$|GFrDujL1%l)h!}0gfyLM@-X32O_b|1xo>i~|IizO&oj$i_-5zf z9WgY6Z=ix4zNZQ+u_;))K6J5Rp-RxHu!&6l^#*AWD>v}_#q%J$_2ba%i4>FykLp-8 zR&mU2vl<*QCN|`d`CHV4HJvDsiy*pmzhc91vfQJ;YPGJ2UIVwDH&-83V;qDHI48HC z(LWQa{IKQ!0M^bh1isaEfwL&G#e*jRY7uaNJnx(i%DT+%=>CH?@iE2h?;*Fl4S*tEO?_rlG>30I_W*zm2Lm_& zb|loG00TvhB^@nm9rJ%6Qz4Cws)Ddd_&?yJXw+l(#o+5QL#L_I=s>s-X$@`WyfBRR zUg6c7HX~a!Cc3q&Ay;YC-ju_rs9LKLbuF5ZN>ZdLSCJ(m76=-gveo7jCCVVN+u}{( zKlA?;2Lbs0N5wQKcWlcO`^z^i1W;8WzUS@ba!o=AN~xwY+i_8Px&#zGa>f4+`cN_? zB;@}h(gufj{qMIMIu64b=gx`Q#O_@%|8E8Q)jpVc1o93Z4;#q+zS z9yg~x!uS|Mkwsfz)i1yOaQ{25`NF(5$Xh}+#p?TiwT8}n??opP;qJA2n?>sE=kI!2 znQ`n%v(?3mo^hsKasD*OSR9C!OlBYYuODsfxcHinUuaWOD8taT*EVnY%R`U9?~*HB&tXhqj4DcTxm`*y3 - No | | -| ☐ |**Device-friendly name**| | | -| ☐ |**Device host name**| | | -| ☐ |**Affiliation**| - None
          - Active Directory affiliation
          - Azure Active Directory | | -| ☐ |**Microsoft Teams Mode**| - Mode 0
          - Mode 1
          - Mode 2 | | -| ☐ |**Device Management**| - Yes, Microsoft Intune
          - Yes, other mobile device manager [MDM]
          - None | | -| ☐ |**Proxy**| - Automatic configuration
          - Proxy server
          - Proxy auto-config (PAC) file | | -| ☐ |**Proxy authentication**| - Device account credentials
          - Prompt for credentials | | -| ☐ |**Password rotation**| - On
          - Off | | -| ☐ |**Skype for Business additional domain names (on-premises only)**| | | -| ☐ |**Session timeout time**| | | -| ☐ |**Session timeout action**| - End session
          - Allow resume | | -| ☐ |**My meetings and files**| - Enabled
          - Disabled | | -| ☐ |**Lock screen timeout**| | | -| ☐ |**Sleep idle timeout**| | | -| ☐ |**Bluetooth**| - On
          - Off | | -| ☐ |**Use only BitLocker USB drives**| - On
          - Off | | -| ☐ |**Install additional certificates (on-premises only)**| | [Using certificates for AADJ on-premises single-sign on](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert) | -|☐ |**Windows update**| - Windows Update for Business
          - Windows Server Update Services [WSUS] | [Deploy updates using Windows Update for Business](https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb)
          [Get Started with Windows Server Update Services (WSUS)](https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) | -|☐ |**Surface app speaker setting**| - Rolling stand
          - Wall-mounted | | -|☐ |**IP Address**| - Wired — DHCP
          - Wired — DHCP reservation
          - Wireless — DHCP
          - Wireless — DHCP reservation | | +|**Item**|**Response**|**Learn more**| +|:------ |:------ |:----- | +|**Device account name**| | | +|**Device account UPN**| | | +|**ActiveSync Policy**| | | +|**Calendar processing configuration completed**| ☐ Yes
          ☐ No | | +|**Device-friendly name**| | | +|**Device host name**| | | +|**Affiliation**| ☐ None
          ☐ Active Directory affiliation
          ☐ Azure Active Directory | | +|**Microsoft Teams Mode**| ☐ Mode 0
          ☐ Mode 1
          ☐ Mode 2 | | +|**Device Management**| ☐ Yes, Microsoft Intune
          ☐ Yes, other mobile device manager [MDM]
          ☐ None | | +|**Proxy**| ☐ Automatic configuration
          ☐ Proxy server
          ☐ Proxy auto-config (PAC) file | | +|**Proxy authentication**| ☐ Device account credentials
          ☐ Prompt for credentials | | +|**Password rotation**| ☐ On
          ☐ Off | | +|**Skype for Business additional domain names (on-premises only)**| | | +|**Session timeout time**| | | +|**Session timeout action**| ☐ End session
          ☐ Allow resume | | +|**My meetings and files**| ☐ Enabled
          ☐ Disabled | | +|**Lock screen timeout**| | | +|**Sleep idle timeout**| | | +|**Bluetooth**| ☐ On
          ☐ Off | | +|**Use only BitLocker USB drives**| ☐ On
          ☐ Off | | +|**Install additional certificates (on-premises only)**| | [Using certificates for AADJ on-premises single-sign on](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert) | +|**Windows update**| ☐ Windows Update for Business
          ☐ Windows Server Update Services [WSUS] | [Deploy updates using Windows Update for Business](https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb)
          [Get Started with Windows Server Update Services (WSUS)](https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) | +|**Surface app speaker setting**| ☐ Rolling stand
          ☐ Wall-mounted | | +|**IP Address**| ☐ Wired — DHCP
          ☐ Wired — DHCP reservation
          ☐ Wireless — DHCP
          ☐ Wireless — DHCP reservation | | ## Surface Hub 2S post-deployment checklist |**Check**|**Item**|**Response**|**Learn more**| |:------|:-------|:---------|:----------| -| ☐ |**Device account syncing**| - Yes
          - No | | -| ☐ |**Bitlocker key**| - Saved to file (no affiliation)
          - Saved in Active Directory (AD affiliation)
          - Saved in Azure AD (Azure AD affiliation) | | -| ☐ |**Device OS updates**| - Completed | | -| ☐ |**Windows Store updates**| - Automatic
          - Manual | | -| ☐ |**Microsoft Teams scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions
          - Able to join audio
          - Able to join video
          - Able to share screen || -| ☐ |**Skype for Business scheduled meeting**| - Confirmation email received
          - Meeting appears on start screen
          - One-touch join functions correctly
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | -| ☐ |**Scheduled meeting when already invited**| - Meeting declined | | -| ☐ |**Microsoft Teams ad-hoc meeting**| - Invite other users work
          - Able to join audio
          - Able to join video
          - Able to share screen | | -| ☐ |**Skype for Business scheduled meeting**| - Invite other users work
          - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM | | -| ☐ |**Microsoft Whiteboard**| - Launch from Welcome / Start screen
          - Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | -| ☐ |**Incoming Skype/Teams call**| - Able to join audio
          - Able to join video
          - Able to share screen
          - Able to send/receive IM (Skype for Business only) | | -| ☐ |**Incoming live video streams**| - Maximum 2 (Skype for Business)
          - Maximum 4 (Microsoft Teams) | | -| ☐ |**Microsoft Teams Mode 0 behavior**| - Skype for Business tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | -| ☐ |**Microsoft Teams Mode 1 behavior**| - Teams tile on Welcome/Start screen
          - Can join scheduled Skype for Business meetings (Skype UI)
          - Can join scheduled Teams meetings (Teams UI) | | -| ☐ |**Microsoft Teams Mode 2 behavior**| - Teams tile on Welcome / Start screen
          - Can join scheduled Teams meetings
          - Fail to join Skype for Business meetings | | +|**Device account syncing**| ☐ Yes
          ☐ No | | +|**Bitlocker key**| ☐ Saved to file (no affiliation)
          ☐ Saved in Active Directory (AD affiliation)
          ☐ Saved in Azure AD (Azure AD affiliation) | | +|**Device OS updates**| ☐ Completed | | +|**Windows Store updates**| ☐ Automatic
          ☐ Manual | | +|**Microsoft Teams scheduled meeting**| ☐ Confirmation email received
          ☐ Meeting appears on start screen
          ☐ One-touch join functions
          ☐ Able to join audio
          ☐ Able to join video
          ☐ Able to share screen || +|**Skype for Business scheduled meeting**| ☐ Confirmation email received
          ☐ Meeting appears on start screen
          ☐ One-touch join functions correctly
          ☐ Able to join audio
          ☐ Able to join video
          ☐ Able to share screen
          ☐ Able to send/receive IM | | +|**Scheduled meeting when already invited**| ☐ Meeting declined | | +|**Microsoft Teams ad-hoc meeting**| ☐ Invite other users work
          ☐ Able to join audio
          ☐ Able to join video
          ☐ Able to share screen | | +|**Skype for Business scheduled meeting**| ☐ Invite other users work
          ☐ Able to join audio
          ☐ Able to join video
          ☐ Able to share screen
          ☐ Able to send/receive IM | | +|**Microsoft Whiteboard**| ☐ Launch from Welcome / Start screen
          ☐ Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | +|**Incoming Skype/Teams call**| ☐ Able to join audio
          ☐ Able to join video
          ☐ Able to share screen
          ☐ Able to send/receive IM (Skype for Business only) | | +|**Incoming live video streams**| ☐ Maximum 2 (Skype for Business)
          ☐ Maximum 4 (Microsoft Teams) | | +|**Microsoft Teams Mode 0 behavior**| ☐ Skype for Business tile on Welcome/Start screen
          ☐ Can join scheduled Skype for Business meetings (Skype UI)
          ☐ Can join scheduled Teams meetings (Teams UI) | | +|**Microsoft Teams Mode 1 behavior**| ☐ Teams tile on Welcome/Start screen
          ☐ Can join scheduled Skype for Business meetings (Skype UI)
          ☐ Can join scheduled Teams meetings (Teams UI) | | +|**Microsoft Teams Mode 2 behavior**| ☐ Teams tile on Welcome / Start screen
          ☐ Can join scheduled Teams meetings
          ☐ Fail to join Skype for Business meetings | | diff --git a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md index 6c4860e38e..c5b60ade8b 100644 --- a/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md +++ b/devices/surface-hub/surface-hub-2s-secure-with-uefi-semm.md @@ -42,16 +42,24 @@ Unlike other Surface devices, you cannot use an MSI file or a Win PE image to ap ## To configure UEFI on Surface Hub 2S -1. Start the UEFI Configurator and on the first screen, choose **Configuration Package**. -2. To add the certificate to your package, you must have a valid certificate with the private key in a .pfx file format to sign and protect the package. Select **+ Certificate Protection.** -3. Enter the certificate’s private key’s password. -4. After importing the private key, continue creating the package. -5. Choose **Hub** and **Surface Hub 2S** as the target for the UEFI configuration package. -6. Choose the components and settings you want to activate or deactivate on Surface Hub 2S. -7. Use the USB option to export the file. -8. Insert and choose the USB drive you’d like to use for this package. The USB drive will be formatted and you lose any information you have on it. - -Upon successful creation of the package, the Configurator will display the last two characters of your certificate’s thumbprint. You need these characters when you import to the configuration to Surface Hub 2S. +1. Start the UEFI Configurator and on the first screen, choose **Configuration Package**.

          +![* Start the UEFI Configurator and choose Configuration Package*](images/sh2-uefi1.png)

          +2. To add the certificate to your package, you must have a valid certificate with the private key in a .pfx file format to sign and protect the package. Select **+ Certificate Protection.**
          +![* Select + Certificate Protection *](images/sh2-uefi2.png)

          +3. Enter the certificate’s private key’s password.
          +![* Enter the certificate’s private key’s password *](images/sh2-uefi3.png)

          +4. After importing the private key, continue creating the package.
          +![* Continue creating the package *](images/sh2-uefi4.png)

          +5. Choose **Hub** and **Surface Hub 2S** as the target for the UEFI configuration package.
          +![* Choose Hub and Surface Hub 2S as the target for the UEFI configuration package *](images/sh2-uefi5.png)

          +6. Choose the components and settings you want to activate or deactivate on Surface Hub 2S.
          +![* Choose the components and settings you want to activate or deactivate *](images/sh2-uefi6.png)

          +7. Use the USB option to export the file.
          +![* Use the USB option to export the file *](images/sh2-uefi8.png)

          +8. Insert and choose the USB drive you’d like to use for this package. The USB drive will be formatted and you lose any information you have on it.
          +![* Insert and choose the USB drive for your package *](images/sh2-uefi9.png)

          +9. Upon successful creation of the package, the Configurator will display the last two characters of your certificate’s thumbprint. You need these characters when you import to the configuration to Surface Hub 2S.
          +![* Successful configuration of package *](images/sh2-uefi10.png)
          ## To boot into UEFI From 08ebb04e5f53064ceff746aa72fdf4375b916a6d Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 18 Jun 2019 15:57:24 -0700 Subject: [PATCH 282/303] Updated per task3241517 --- .../mdm/new-in-windows-mdm-enrollment-management.md | 8 ++++++++ windows/client-management/mdm/wifi-csp.md | 7 +++++-- 2 files changed, 13 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 0f9b975e5d..a600310ce3 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1445,6 +1445,14 @@ For details about Microsoft mobile device management protocols for Windows 10 s

          WiFi CSP

          Deprecated the following node in Windows 10, version 1607:

          +
            +
          • DisableInternetConnectivityChecks
          • +
          +
          diff --git a/windows/client-management/mdm/wifi-csp.md b/windows/client-management/mdm/wifi-csp.md index a9b74522ef..95e472b974 100644 --- a/windows/client-management/mdm/wifi-csp.md +++ b/windows/client-management/mdm/wifi-csp.md @@ -9,7 +9,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 10/24/2018 +ms.date: 06/18/2019 --- # WiFi CSP @@ -79,7 +79,10 @@ If it is an IPvFuture address, then it must be specified as an IP literal as "\[ Supported operations are Get, Add, Delete, and Replace. **DisableInternetConnectivityChecks** -Added in Windows 10, version 1511.Optional. Disable the internet connectivity check for the profile. +> [!Note] +> Deprecated in Windows 10, version 1607. + +Added in Windows 10, version 1511. Optional. Disable the internet connectivity check for the profile. Value type is chr. From 33ae836b8390cf791e97060c398f06b663342e58 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 18 Jun 2019 16:30:59 -0700 Subject: [PATCH 283/303] Updated the deprecated note text --- windows/client-management/mdm/wifi-csp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/wifi-csp.md b/windows/client-management/mdm/wifi-csp.md index 95e472b974..8b233ba1e3 100644 --- a/windows/client-management/mdm/wifi-csp.md +++ b/windows/client-management/mdm/wifi-csp.md @@ -80,7 +80,7 @@ Supported operations are Get, Add, Delete, and Replace. **DisableInternetConnectivityChecks** > [!Note] -> Deprecated in Windows 10, version 1607. +> This node has been deprecated since Windows 10, version 1607. Added in Windows 10, version 1511. Optional. Disable the internet connectivity check for the profile. From da9ab90d5b141d19fb630d26ffc81f753c08acd1 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 18 Jun 2019 16:58:54 -0700 Subject: [PATCH 284/303] Updated phone authentication and Surface power settings --- .../surface-hub-2s-phone-authenticate.md | 4 +-- ...timal-power-settings-on-Surface-devices.md | 30 +++++++++++++++---- 2 files changed, 26 insertions(+), 8 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-phone-authenticate.md b/devices/surface-hub/surface-hub-2s-phone-authenticate.md index ba3e26231f..c40c5f96ce 100644 --- a/devices/surface-hub/surface-hub-2s-phone-authenticate.md +++ b/devices/surface-hub/surface-hub-2s-phone-authenticate.md @@ -1,6 +1,6 @@ --- -title: "Configure phone authentication for Surface Hub 2S" -description: "Learn how to simplify signing in to Surface Hub 2S using phone authentication." +title: "Configure Easy Authentication for Surface Hub 2S" +description: "Learn how to simplify signing in to Surface Hub 2S using Easy Authentication on your mobile device." keywords: separate values with commas ms.prod: surface-hub ms.sitesec: library diff --git a/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md b/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md index c0a2890973..e234bd2db5 100644 --- a/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md +++ b/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md @@ -1,5 +1,5 @@ --- -title: Maintain optimal power settings +title: Best practice power settings for Surface devices description: This topic provides best practice recommendations for maintaining optimal power settings and explains how Surface streamlines the power management experience. ms.prod: w10 ms.mktglfcycl: manage @@ -12,7 +12,7 @@ ms.reviewer: manager: dansimp --- -# Maintain optimal power settings on Surface devices +# Best practice power settings for Surface devices Surface devices are designed to take advantage of the latest advances in mobile device energy consumption to deliver a streamlined experience @@ -22,9 +22,20 @@ components, momentarily waking up system components to handle background tasks -- such as an incoming email or network traffic -- before returning to a low power idle state (S0ix). +## Summary of recommendations for IT administrators + +To ensure Surface devices across your organization fully benefit from Surface power optimization features: + +- Exclude Surface devices from any existing power management policy settings and let the Surface default policy control the power policy and behavior of the device. +- If you must manage the power profile of devices across your network (such as in highly managed organizations), use the powercfg command tool to export the power profile from the factory image of the Surface device and then import it into the provisioning package for your Surface devices. For more information, refer to [Configure power settings](https://docs.microsoft.com/windows-hardware/customize/power-settings/configure-power-settings). +- Always use the newest available version of the drivers and firmware for your devices and for the version of Windows 10 they're running. For more information, refer to [Deploying the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) +- Avoid creating custom power profiles or adjusting advanced power settings not visible in the default UI (**System** > **Power & sleep**). For more information, refer to User best practices for extended battery life in this document. + +## Background + The way Surface implements power management differs significantly from the earlier OS standard that gradually reduces and turns off power via a -series of sleep states (S1, S2, S3). +series of sleep states; for example, cycling through S1, S2, S3, and so on. Instead, Surface is imaged with a custom power profile that replaces legacy sleep and energy consumption functionality with modern standby @@ -36,6 +47,11 @@ works in conjunction with Windows power manager to allocate or throttle only the exact amount of power required for hardware components to function. +## Utilizing the custom power profile in Surface + +If you go into the power options on a surface device, you'll see that there's a single power plan available. This is the custom power profile. And if you go to the advanced power settings, you’ll see a much smaller subset of power options compared to a generic PC running Windows 10. Unlike generic devices, Surface has firmware and custom components to manage these power options. + + ## Modern Standby The algorithmically embedded custom power profile enables modern standby @@ -78,6 +94,7 @@ experience by delivering a single power plan (balanced) that replaces the multiple power plans from standard Windows builds. ### Simplified power settings user interface + Surface provides a simplified UI in accord with best practice power setting recommendations. In general, it's recommended to only adjust settings visible in the default user interface and avoid configuring advanced power settings or Group Policy settings. Using the default screen and sleep timeouts while avoiding maximum brightness levels are the most effective ways for users to maintain @@ -145,13 +162,14 @@ To learn more, see: # Learn more -- [Modern +- [Modern standby](https://docs.microsoft.com/windows-hardware/design/device-experiences/modern-standby-wake-sources) -- [Customize the Windows performance power +- [Customize the Windows performance power slider](https://docs.microsoft.com/windows-hardware/customize/desktop/customize-power-slider) -- [Battery +- [Battery saver](https://docs.microsoft.com/windows-hardware/design/component-guidelines/battery-saver) +- [Deploying the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md) \ No newline at end of file From 75b05810cf75d85c7e2fd2bca0143e57464bf693 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:05:45 -0400 Subject: [PATCH 285/303] typo: oganization -> organization --- devices/surface-hub/install-apps-on-surface-hub.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/install-apps-on-surface-hub.md b/devices/surface-hub/install-apps-on-surface-hub.md index e19bfc00dd..748f1a9181 100644 --- a/devices/surface-hub/install-apps-on-surface-hub.md +++ b/devices/surface-hub/install-apps-on-surface-hub.md @@ -158,7 +158,7 @@ To deploy apps to a large number of Surface Hubs in your organization, use a sup ## Summary -There are a few different ways to install apps on your Surface Hub depending on whether you are developing apps, evaluating apps on a small number of devices, or deploying apps broadly to your oganization. This table summarizes the supported methods: +There are a few different ways to install apps on your Surface Hub depending on whether you are developing apps, evaluating apps on a small number of devices, or deploying apps broadly to your organization. This table summarizes the supported methods: | Install method | Developing apps | Evaluating apps on
          a few devices | Deploying apps broadly
          to your organization | | -------------------------- | --------------- | ------------------------------------- | ---------------------- | From b672e0be2f5b37c04593e69c969f543ddb4922a8 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:15:39 -0400 Subject: [PATCH 286/303] chore: ms:topic -> ms.topic --- browsers/edge/includes/allow-address-bar-suggestions-include.md | 2 +- browsers/edge/includes/allow-adobe-flash-include.md | 2 +- browsers/edge/includes/allow-clearing-browsing-data-include.md | 2 +- browsers/edge/includes/allow-config-updates-books-include.md | 2 +- browsers/edge/includes/allow-cortana-include.md | 2 +- browsers/edge/includes/allow-dev-tools-include.md | 2 +- browsers/edge/includes/allow-enable-book-library-include.md | 2 +- browsers/edge/includes/allow-ext-telemetry-books-tab-include.md | 2 +- browsers/edge/includes/allow-extensions-include.md | 2 +- browsers/edge/includes/allow-full-screen-include.md | 2 +- browsers/edge/includes/allow-inprivate-browsing-include.md | 2 +- .../edge/includes/allow-microsoft-compatibility-list-include.md | 2 +- browsers/edge/includes/allow-prelaunch-include.md | 2 +- browsers/edge/includes/allow-printing-include.md | 2 +- browsers/edge/includes/allow-saving-history-include.md | 2 +- .../edge/includes/allow-search-engine-customization-include.md | 2 +- browsers/edge/includes/allow-shared-folder-books-include.md | 2 +- browsers/edge/includes/allow-sideloading-extensions-include.md | 2 +- browsers/edge/includes/allow-tab-preloading-include.md | 2 +- .../edge/includes/allow-web-content-new-tab-page-include.md | 2 +- browsers/edge/includes/always-enable-book-library-include.md | 2 +- .../includes/configure-additional-search-engines-include.md | 2 +- .../edge/includes/configure-adobe-flash-click-to-run-include.md | 2 +- browsers/edge/includes/configure-autofill-include.md | 2 +- .../configure-browser-telemetry-for-m365-analytics-include.md | 2 +- browsers/edge/includes/configure-cookies-include.md | 2 +- browsers/edge/includes/configure-do-not-track-include.md | 2 +- .../includes/configure-edge-kiosk-reset-idle-timeout-include.md | 2 +- browsers/edge/includes/configure-favorites-bar-include.md | 2 +- browsers/edge/includes/configure-favorites-include.md | 2 +- browsers/edge/includes/configure-home-button-include.md | 2 +- .../includes/configure-kiosk-mode-supported-values-include.md | 2 +- .../includes/configure-microsoft-edge-kiosk-mode-include.md | 2 +- browsers/edge/includes/configure-open-edge-with-include.md | 2 +- browsers/edge/includes/configure-password-manager-include.md | 2 +- browsers/edge/includes/configure-pop-up-blocker-include.md | 2 +- .../configure-search-suggestions-address-bar-include.md | 2 +- browsers/edge/includes/configure-start-pages-include.md | 2 +- .../includes/configure-windows-defender-smartscreen-include.md | 2 +- .../edge/includes/disable-lockdown-of-start-pages-include.md | 2 +- browsers/edge/includes/do-not-sync-browser-settings-include.md | 2 +- browsers/edge/includes/do-not-sync-include.md | 2 +- .../edge/includes/enable-device-for-dev-shortdesc-include.md | 2 +- .../includes/ie11-send-all-sites-not-in-site-list-include.md | 2 +- browsers/edge/includes/keep-fav-sync-ie-edge-include.md | 2 +- .../man-connections-win-comp-services-shortdesc-include.md | 2 +- browsers/edge/includes/prevent-access-about-flag-include.md | 2 +- .../includes/prevent-bypassing-win-defender-files-include.md | 2 +- .../includes/prevent-bypassing-win-defender-sites-include.md | 2 +- .../includes/prevent-certificate-error-overrides-include.md | 2 +- browsers/edge/includes/prevent-changes-to-favorites-include.md | 2 +- .../edge/includes/prevent-first-run-webpage-open-include.md | 2 +- .../edge/includes/prevent-live-tile-pinning-start-include.md | 2 +- .../includes/prevent-localhost-address-for-webrtc-include.md | 2 +- .../includes/prevent-turning-off-required-extensions-include.md | 2 +- .../prevent-users-to-turn-on-browser-syncing-include.md | 2 +- browsers/edge/includes/provision-favorites-include.md | 2 +- .../includes/search-provider-discovery-shortdesc-include.md | 2 +- browsers/edge/includes/send-all-intranet-sites-ie-include.md | 2 +- browsers/edge/includes/set-default-search-engine-include.md | 2 +- browsers/edge/includes/set-home-button-url-include.md | 2 +- browsers/edge/includes/set-new-tab-url-include.md | 2 +- browsers/edge/includes/show-message-opening-sites-ie-include.md | 2 +- browsers/edge/includes/unlock-home-button-include.md | 2 +- .../edge/shortdesc/allow-a-shared-books-folder-shortdesc.md | 2 +- .../edge/shortdesc/allow-address-bar-drop-down-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md | 2 +- .../shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md | 2 +- .../allow-configuration-updates-for-books-library-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-cortana-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-developer-tools-shortdesc.md | 2 +- .../allow-extended-telemetry-for-books-tab-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-extensions-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-fullscreen-mode-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-inprivate-browsing-shortdesc.md | 2 +- .../shortdesc/allow-microsoft-compatibility-list-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-prelaunch-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-printing-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-saving-history-shortdesc.md | 2 +- .../shortdesc/allow-search-engine-customization-shortdesc.md | 2 +- .../edge/shortdesc/allow-sideloading-of-extensions-shortdesc.md | 2 +- browsers/edge/shortdesc/allow-tab-preloading-shortdesc.md | 2 +- .../shortdesc/allow-web-content-on-new-tab-page-shortdesc.md | 2 +- .../allow-windows-app-to-share-data-users-shortdesc.md | 2 +- browsers/edge/shortdesc/always-show-books-library-shortdesc.md | 2 +- .../shortdesc/configure-additional-search-engines-shortdesc.md | 2 +- .../configure-adobe-flash-click-to-run-setting-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-autofill-shortdesc.md | 2 +- .../configure-browser-telemetry-for-m365-analytics-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-cookies-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-do-not-track-shortdesc.md | 2 +- .../shortdesc/configure-enterprise-mode-site-list-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-favorites-bar-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-favorites-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-home-button-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-kiosk-mode-shortdesc.md | 2 +- .../configure-kiosk-reset-after-idle-timeout-shortdesc.md | 2 +- .../shortdesc/configure-open-microsoft-edge-with-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-password-manager-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-pop-up-blocker-shortdesc.md | 2 +- .../configure-search-suggestions-in-address-bar-shortdesc.md | 2 +- browsers/edge/shortdesc/configure-start-pages-shortdesc.md | 2 +- .../configure-windows-defender-smartscreen-shortdesc.md | 2 +- .../edge/shortdesc/disable-lockdown-of-start-pages-shortdesc.md | 2 +- .../edge/shortdesc/do-not-sync-browser-settings-shortdesc.md | 2 +- browsers/edge/shortdesc/do-not-sync-shortdesc.md | 2 +- .../keep-favorites-in-sync-between-ie-and-edge-shortdesc.md | 2 +- .../shortdesc/microsoft-browser-extension-policy-shortdesc.md | 2 +- .../shortdesc/prevent-access-to-about-flags-page-shortdesc.md | 2 +- ...nt-bypassing-windows-defender-prompts-for-files-shortdesc.md | 2 +- ...nt-bypassing-windows-defender-prompts-for-sites-shortdesc.md | 2 +- .../shortdesc/prevent-certificate-error-overrides-shortdesc.md | 2 +- .../edge/shortdesc/prevent-changes-to-favorites-shortdesc.md | 2 +- .../prevent-edge-from-gathering-live-tile-info-shortdesc.md | 2 +- .../prevent-first-run-webpage-from-opening-shortdesc.md | 2 +- .../prevent-turning-off-required-extensions-shortdesc.md | 2 +- .../prevent-users-to-turn-on-browser-syncing-shortdesc.md | 2 +- .../prevent-using-localhost-ip-address-for-webrtc-shortdesc.md | 2 +- browsers/edge/shortdesc/provision-favorites-shortdesc.md | 2 +- browsers/edge/shortdesc/search-provider-discovery-shortdesc.md | 2 +- .../edge/shortdesc/send-all-intranet-sites-to-ie-shortdesc.md | 2 +- browsers/edge/shortdesc/set-default-search-engine-shortdesc.md | 2 +- browsers/edge/shortdesc/set-home-button-url-shortdesc.md | 2 +- browsers/edge/shortdesc/set-new-tab-url-shortdesc.md | 2 +- .../show-message-when-opening-sites-in-ie-shortdesc.md | 2 +- browsers/edge/shortdesc/unlock-home-button-shortdesc.md | 2 +- browsers/includes/available-duel-browser-experiences-include.md | 2 +- browsers/includes/helpful-topics-include.md | 2 +- .../import-into-the-enterprise-mode-site-list-mgr-include.md | 2 +- browsers/includes/interoperability-goals-enterprise-guidance.md | 2 +- 130 files changed, 130 insertions(+), 130 deletions(-) diff --git a/browsers/edge/includes/allow-address-bar-suggestions-include.md b/browsers/edge/includes/allow-address-bar-suggestions-include.md index ab2f7a396f..f075672055 100644 --- a/browsers/edge/includes/allow-address-bar-suggestions-include.md +++ b/browsers/edge/includes/allow-address-bar-suggestions-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-adobe-flash-include.md b/browsers/edge/includes/allow-adobe-flash-include.md index 6747a07952..47675924db 100644 --- a/browsers/edge/includes/allow-adobe-flash-include.md +++ b/browsers/edge/includes/allow-adobe-flash-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-clearing-browsing-data-include.md b/browsers/edge/includes/allow-clearing-browsing-data-include.md index c760771868..ec7ff3d7af 100644 --- a/browsers/edge/includes/allow-clearing-browsing-data-include.md +++ b/browsers/edge/includes/allow-clearing-browsing-data-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-config-updates-books-include.md b/browsers/edge/includes/allow-config-updates-books-include.md index c8bfafc686..fca13de5c1 100644 --- a/browsers/edge/includes/allow-config-updates-books-include.md +++ b/browsers/edge/includes/allow-config-updates-books-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-cortana-include.md b/browsers/edge/includes/allow-cortana-include.md index a214284ce3..87550112f5 100644 --- a/browsers/edge/includes/allow-cortana-include.md +++ b/browsers/edge/includes/allow-cortana-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-dev-tools-include.md b/browsers/edge/includes/allow-dev-tools-include.md index c45ed8ab89..7370de307b 100644 --- a/browsers/edge/includes/allow-dev-tools-include.md +++ b/browsers/edge/includes/allow-dev-tools-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-enable-book-library-include.md b/browsers/edge/includes/allow-enable-book-library-include.md index 9fd30cb289..d892c3d905 100644 --- a/browsers/edge/includes/allow-enable-book-library-include.md +++ b/browsers/edge/includes/allow-enable-book-library-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md b/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md index 041dbcc3fc..30259b83ac 100644 --- a/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md +++ b/browsers/edge/includes/allow-ext-telemetry-books-tab-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-extensions-include.md b/browsers/edge/includes/allow-extensions-include.md index 88e44401f9..6660627600 100644 --- a/browsers/edge/includes/allow-extensions-include.md +++ b/browsers/edge/includes/allow-extensions-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-full-screen-include.md b/browsers/edge/includes/allow-full-screen-include.md index 893caa3d51..ba637f1429 100644 --- a/browsers/edge/includes/allow-full-screen-include.md +++ b/browsers/edge/includes/allow-full-screen-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-inprivate-browsing-include.md b/browsers/edge/includes/allow-inprivate-browsing-include.md index 57684b112b..f43aab10d5 100644 --- a/browsers/edge/includes/allow-inprivate-browsing-include.md +++ b/browsers/edge/includes/allow-inprivate-browsing-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-microsoft-compatibility-list-include.md b/browsers/edge/includes/allow-microsoft-compatibility-list-include.md index 1774a96433..5b39b04e69 100644 --- a/browsers/edge/includes/allow-microsoft-compatibility-list-include.md +++ b/browsers/edge/includes/allow-microsoft-compatibility-list-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-prelaunch-include.md b/browsers/edge/includes/allow-prelaunch-include.md index 4121c136de..4783fabcdc 100644 --- a/browsers/edge/includes/allow-prelaunch-include.md +++ b/browsers/edge/includes/allow-prelaunch-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-printing-include.md b/browsers/edge/includes/allow-printing-include.md index 395ccab5bb..6e90a9ba1e 100644 --- a/browsers/edge/includes/allow-printing-include.md +++ b/browsers/edge/includes/allow-printing-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-saving-history-include.md b/browsers/edge/includes/allow-saving-history-include.md index 926c625142..4e73c88d31 100644 --- a/browsers/edge/includes/allow-saving-history-include.md +++ b/browsers/edge/includes/allow-saving-history-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-search-engine-customization-include.md b/browsers/edge/includes/allow-search-engine-customization-include.md index 213f8ea19f..f20a225e30 100644 --- a/browsers/edge/includes/allow-search-engine-customization-include.md +++ b/browsers/edge/includes/allow-search-engine-customization-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-shared-folder-books-include.md b/browsers/edge/includes/allow-shared-folder-books-include.md index a36ba01cb6..a08c2cba46 100644 --- a/browsers/edge/includes/allow-shared-folder-books-include.md +++ b/browsers/edge/includes/allow-shared-folder-books-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-sideloading-extensions-include.md b/browsers/edge/includes/allow-sideloading-extensions-include.md index db295e9481..07d1c525e6 100644 --- a/browsers/edge/includes/allow-sideloading-extensions-include.md +++ b/browsers/edge/includes/allow-sideloading-extensions-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-tab-preloading-include.md b/browsers/edge/includes/allow-tab-preloading-include.md index f1f79bda9c..ee7f9516ad 100644 --- a/browsers/edge/includes/allow-tab-preloading-include.md +++ b/browsers/edge/includes/allow-tab-preloading-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/allow-web-content-new-tab-page-include.md b/browsers/edge/includes/allow-web-content-new-tab-page-include.md index ac9e26abee..ece2371a32 100644 --- a/browsers/edge/includes/allow-web-content-new-tab-page-include.md +++ b/browsers/edge/includes/allow-web-content-new-tab-page-include.md @@ -5,7 +5,7 @@ ms.date: 11/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/always-enable-book-library-include.md b/browsers/edge/includes/always-enable-book-library-include.md index f1953cf341..07520e5e81 100644 --- a/browsers/edge/includes/always-enable-book-library-include.md +++ b/browsers/edge/includes/always-enable-book-library-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-additional-search-engines-include.md b/browsers/edge/includes/configure-additional-search-engines-include.md index 4845c13f9d..eded5c46f3 100644 --- a/browsers/edge/includes/configure-additional-search-engines-include.md +++ b/browsers/edge/includes/configure-additional-search-engines-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md b/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md index 8815d323d1..7c438030e5 100644 --- a/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md +++ b/browsers/edge/includes/configure-adobe-flash-click-to-run-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-autofill-include.md b/browsers/edge/includes/configure-autofill-include.md index b151c79f48..a7ff9c2481 100644 --- a/browsers/edge/includes/configure-autofill-include.md +++ b/browsers/edge/includes/configure-autofill-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md index 47a1913697..48a83c90eb 100644 --- a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md +++ b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-cookies-include.md b/browsers/edge/includes/configure-cookies-include.md index 763646944e..d47147ae74 100644 --- a/browsers/edge/includes/configure-cookies-include.md +++ b/browsers/edge/includes/configure-cookies-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-do-not-track-include.md b/browsers/edge/includes/configure-do-not-track-include.md index 42afad9fa1..793e75ded8 100644 --- a/browsers/edge/includes/configure-do-not-track-include.md +++ b/browsers/edge/includes/configure-do-not-track-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md b/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md index bb5cb307bb..4d4aea6068 100644 --- a/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md +++ b/browsers/edge/includes/configure-edge-kiosk-reset-idle-timeout-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-favorites-bar-include.md b/browsers/edge/includes/configure-favorites-bar-include.md index 35f0cefa19..6fdeb3ee83 100644 --- a/browsers/edge/includes/configure-favorites-bar-include.md +++ b/browsers/edge/includes/configure-favorites-bar-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-favorites-include.md b/browsers/edge/includes/configure-favorites-include.md index 88b284d0ae..4c2ab722f9 100644 --- a/browsers/edge/includes/configure-favorites-include.md +++ b/browsers/edge/includes/configure-favorites-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-home-button-include.md b/browsers/edge/includes/configure-home-button-include.md index 9796369a9f..2535093959 100644 --- a/browsers/edge/includes/configure-home-button-include.md +++ b/browsers/edge/includes/configure-home-button-include.md @@ -5,7 +5,7 @@ ms.date: 10/28/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md b/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md index 3578afcf88..94d35f50ca 100644 --- a/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md +++ b/browsers/edge/includes/configure-kiosk-mode-supported-values-include.md @@ -5,7 +5,7 @@ ms.date: 10/27/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md b/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md index 0a8662e724..adc3dbf183 100644 --- a/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md +++ b/browsers/edge/includes/configure-microsoft-edge-kiosk-mode-include.md @@ -5,7 +5,7 @@ ms.date: 10/27/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-open-edge-with-include.md b/browsers/edge/includes/configure-open-edge-with-include.md index 966a8be23e..02f0daa65a 100644 --- a/browsers/edge/includes/configure-open-edge-with-include.md +++ b/browsers/edge/includes/configure-open-edge-with-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-password-manager-include.md b/browsers/edge/includes/configure-password-manager-include.md index 35cba0ce23..d00435cb52 100644 --- a/browsers/edge/includes/configure-password-manager-include.md +++ b/browsers/edge/includes/configure-password-manager-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-pop-up-blocker-include.md b/browsers/edge/includes/configure-pop-up-blocker-include.md index 1595f8fc6f..686626f719 100644 --- a/browsers/edge/includes/configure-pop-up-blocker-include.md +++ b/browsers/edge/includes/configure-pop-up-blocker-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-search-suggestions-address-bar-include.md b/browsers/edge/includes/configure-search-suggestions-address-bar-include.md index e81aff3cec..1ce9d5cd0a 100644 --- a/browsers/edge/includes/configure-search-suggestions-address-bar-include.md +++ b/browsers/edge/includes/configure-search-suggestions-address-bar-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-start-pages-include.md b/browsers/edge/includes/configure-start-pages-include.md index 04b7eeddd9..6a64d182d4 100644 --- a/browsers/edge/includes/configure-start-pages-include.md +++ b/browsers/edge/includes/configure-start-pages-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/configure-windows-defender-smartscreen-include.md b/browsers/edge/includes/configure-windows-defender-smartscreen-include.md index 0deb5b8f82..2ac6bed0d3 100644 --- a/browsers/edge/includes/configure-windows-defender-smartscreen-include.md +++ b/browsers/edge/includes/configure-windows-defender-smartscreen-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/disable-lockdown-of-start-pages-include.md b/browsers/edge/includes/disable-lockdown-of-start-pages-include.md index d5eaa236e5..a3ac6f4795 100644 --- a/browsers/edge/includes/disable-lockdown-of-start-pages-include.md +++ b/browsers/edge/includes/disable-lockdown-of-start-pages-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/do-not-sync-browser-settings-include.md b/browsers/edge/includes/do-not-sync-browser-settings-include.md index 2ec6bea84d..97cbb929bd 100644 --- a/browsers/edge/includes/do-not-sync-browser-settings-include.md +++ b/browsers/edge/includes/do-not-sync-browser-settings-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/do-not-sync-include.md b/browsers/edge/includes/do-not-sync-include.md index 255d83e1be..9220d8aeff 100644 --- a/browsers/edge/includes/do-not-sync-include.md +++ b/browsers/edge/includes/do-not-sync-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/enable-device-for-dev-shortdesc-include.md b/browsers/edge/includes/enable-device-for-dev-shortdesc-include.md index 686e6b552c..724125788a 100644 --- a/browsers/edge/includes/enable-device-for-dev-shortdesc-include.md +++ b/browsers/edge/includes/enable-device-for-dev-shortdesc-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- [Enable your device for development](https://docs.microsoft.com/windows/uwp/get-started/enable-your-device-for-development): Developers can access special development features, along with other developer-focused settings, which makes it possible for them to develop, test, and debug apps. Learn how to configure your environment for development, the difference between Developer Mode and sideloading, and the security risks of Developer mode. diff --git a/browsers/edge/includes/ie11-send-all-sites-not-in-site-list-include.md b/browsers/edge/includes/ie11-send-all-sites-not-in-site-list-include.md index e20c31d301..539b1cd2fd 100644 --- a/browsers/edge/includes/ie11-send-all-sites-not-in-site-list-include.md +++ b/browsers/edge/includes/ie11-send-all-sites-not-in-site-list-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- >*Supported versions: Internet Explorer 11 on Windows 10, version 1607 or later*
          diff --git a/browsers/edge/includes/keep-fav-sync-ie-edge-include.md b/browsers/edge/includes/keep-fav-sync-ie-edge-include.md index dc17580d47..b9747450d8 100644 --- a/browsers/edge/includes/keep-fav-sync-ie-edge-include.md +++ b/browsers/edge/includes/keep-fav-sync-ie-edge-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/man-connections-win-comp-services-shortdesc-include.md b/browsers/edge/includes/man-connections-win-comp-services-shortdesc-include.md index 594b69a5ec..4b65a2458c 100644 --- a/browsers/edge/includes/man-connections-win-comp-services-shortdesc-include.md +++ b/browsers/edge/includes/man-connections-win-comp-services-shortdesc-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- [Manage connections from Windows operating system components to Microsoft services](https://docs.microsoft.com/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services): Learn about the network connections from Windows to Microsoft services. Also, learn about the privacy settings that affect the data shared with either Microsoft or apps and how to manage them in an enterprise. You can configure diagnostic data at the lowest level for your edition of Windows and evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment. diff --git a/browsers/edge/includes/prevent-access-about-flag-include.md b/browsers/edge/includes/prevent-access-about-flag-include.md index cf2adc30cc..93304f083b 100644 --- a/browsers/edge/includes/prevent-access-about-flag-include.md +++ b/browsers/edge/includes/prevent-access-about-flag-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md b/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md index 077eca88ab..2b060c7550 100644 --- a/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md +++ b/browsers/edge/includes/prevent-bypassing-win-defender-files-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md b/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md index 95d1c0a7ec..6205a87584 100644 --- a/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md +++ b/browsers/edge/includes/prevent-bypassing-win-defender-sites-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-certificate-error-overrides-include.md b/browsers/edge/includes/prevent-certificate-error-overrides-include.md index 5957d7ca37..ac77b6172a 100644 --- a/browsers/edge/includes/prevent-certificate-error-overrides-include.md +++ b/browsers/edge/includes/prevent-certificate-error-overrides-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-changes-to-favorites-include.md b/browsers/edge/includes/prevent-changes-to-favorites-include.md index 30a902cbbf..dbbcc9e0c9 100644 --- a/browsers/edge/includes/prevent-changes-to-favorites-include.md +++ b/browsers/edge/includes/prevent-changes-to-favorites-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-first-run-webpage-open-include.md b/browsers/edge/includes/prevent-first-run-webpage-open-include.md index 50e5ffbe36..9e693510a8 100644 --- a/browsers/edge/includes/prevent-first-run-webpage-open-include.md +++ b/browsers/edge/includes/prevent-first-run-webpage-open-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-live-tile-pinning-start-include.md b/browsers/edge/includes/prevent-live-tile-pinning-start-include.md index 86777ec60f..ac35679bf6 100644 --- a/browsers/edge/includes/prevent-live-tile-pinning-start-include.md +++ b/browsers/edge/includes/prevent-live-tile-pinning-start-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md b/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md index d66fd0ae7d..fd33129000 100644 --- a/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md +++ b/browsers/edge/includes/prevent-localhost-address-for-webrtc-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-turning-off-required-extensions-include.md b/browsers/edge/includes/prevent-turning-off-required-extensions-include.md index 68042aad34..7d06a1e1d9 100644 --- a/browsers/edge/includes/prevent-turning-off-required-extensions-include.md +++ b/browsers/edge/includes/prevent-turning-off-required-extensions-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md b/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md index 3a06e77d5d..e7f4651365 100644 --- a/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md +++ b/browsers/edge/includes/prevent-users-to-turn-on-browser-syncing-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/provision-favorites-include.md b/browsers/edge/includes/provision-favorites-include.md index 5fb77898e4..75062bb691 100644 --- a/browsers/edge/includes/provision-favorites-include.md +++ b/browsers/edge/includes/provision-favorites-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/search-provider-discovery-shortdesc-include.md b/browsers/edge/includes/search-provider-discovery-shortdesc-include.md index 019cbc16f0..a09dedbcc5 100644 --- a/browsers/edge/includes/search-provider-discovery-shortdesc-include.md +++ b/browsers/edge/includes/search-provider-discovery-shortdesc-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- [Search provider discovery](https://docs.microsoft.com/microsoft-edge/dev-guide/browser/search-provider-discovery): Microsoft Edge follows the OpenSearch 1.1 specification to discover and use web search providers. When a user browses to a search service, the OpenSearch description is picked up and saved for later use. Users can then choose to add the search service to use in the Microsoft Edge address bar. diff --git a/browsers/edge/includes/send-all-intranet-sites-ie-include.md b/browsers/edge/includes/send-all-intranet-sites-ie-include.md index f12f7f392d..ebb90441ae 100644 --- a/browsers/edge/includes/send-all-intranet-sites-ie-include.md +++ b/browsers/edge/includes/send-all-intranet-sites-ie-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/set-default-search-engine-include.md b/browsers/edge/includes/set-default-search-engine-include.md index 5620ea5e8b..06b6b084e5 100644 --- a/browsers/edge/includes/set-default-search-engine-include.md +++ b/browsers/edge/includes/set-default-search-engine-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/set-home-button-url-include.md b/browsers/edge/includes/set-home-button-url-include.md index 355240ff1a..5d3549e402 100644 --- a/browsers/edge/includes/set-home-button-url-include.md +++ b/browsers/edge/includes/set-home-button-url-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/set-new-tab-url-include.md b/browsers/edge/includes/set-new-tab-url-include.md index a53dd93220..b8521a3c98 100644 --- a/browsers/edge/includes/set-new-tab-url-include.md +++ b/browsers/edge/includes/set-new-tab-url-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/show-message-opening-sites-ie-include.md b/browsers/edge/includes/show-message-opening-sites-ie-include.md index bb626be0cf..6601f43c65 100644 --- a/browsers/edge/includes/show-message-opening-sites-ie-include.md +++ b/browsers/edge/includes/show-message-opening-sites-ie-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/includes/unlock-home-button-include.md b/browsers/edge/includes/unlock-home-button-include.md index bf30d5d9ed..022ba40f20 100644 --- a/browsers/edge/includes/unlock-home-button-include.md +++ b/browsers/edge/includes/unlock-home-button-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md b/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md index 8b9845345f..00da0e5de3 100644 --- a/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md +++ b/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge does not use a shared folder by default but downloads book files to a per-user folder for each user. With this policy, you can configure Microsoft Edge to store books from the Books Library to a default, shared folder in Windows, which decreases the amount of storage used by book files. When you enable this policy, Microsoft Edge downloads books to a shared folder after user action to download the book to their device, which allows them to remove downloaded books at any time. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy. Also, the users must be signed in with a school or work account. diff --git a/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md b/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md index 2a5773c6f9..2e877de455 100644 --- a/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md +++ b/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge shows the Address bar drop-down list and makes it available by default, which takes precedence over the Configure search suggestions in Address bar policy. We recommend disabling this policy if you want to minimize network connections from Microsoft Edge to Microsoft service, which hides the functionality of the Address bar drop-down list. When you disable this policy, Microsoft Edge also disables the _Show search and site suggestions as I type_ toggle in Settings. diff --git a/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md b/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md index d4c81bfe8f..c3aa88d8c1 100644 --- a/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md +++ b/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Adobe Flash is integrated with Microsoft Edge and runs Adobe Flash content by default. With this policy, you can configure Microsoft Edge to prevent Adobe Flash content from running. diff --git a/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md b/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md index b62ac92d82..5515b7a283 100644 --- a/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md +++ b/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge does not clear the browsing data on exit by default, but users can configure the _Clear browsing data_ option in Settings. Browsing data includes information you entered in forms, passwords, and even the websites visited. With this policy, you can configure Microsoft Edge to clear the browsing data automatically each time Microsoft Edge closes. diff --git a/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md b/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md index 658351c9e1..329f024f3f 100644 --- a/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md +++ b/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge automatically updates the configuration data for the Books library. Disabling this policy prevents Microsoft Edge from updating the configuration data. If Microsoft receives feedback about the amount of data about the Books library, the data comes as a JSON file. diff --git a/browsers/edge/shortdesc/allow-cortana-shortdesc.md b/browsers/edge/shortdesc/allow-cortana-shortdesc.md index 4b9008b8a0..035f849a7f 100644 --- a/browsers/edge/shortdesc/allow-cortana-shortdesc.md +++ b/browsers/edge/shortdesc/allow-cortana-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Since Microsoft Edge is integration with Cortana, Microsoft Edge allows users to use Cortana voice assistant by default. With this policy, you can configure Microsoft Edge to prevent users from using Cortana but can still search to find items on their device. diff --git a/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md b/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md index faedf6e98c..43fb795cdd 100644 --- a/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md +++ b/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows users to use the F12 developer tools to build and debug web pages by default. With this policy, you can configure Microsoft Edge to prevent users from using the F12 developer tools. diff --git a/browsers/edge/shortdesc/allow-extended-telemetry-for-books-tab-shortdesc.md b/browsers/edge/shortdesc/allow-extended-telemetry-for-books-tab-shortdesc.md index 914207eace..56e23ae4da 100644 --- a/browsers/edge/shortdesc/allow-extended-telemetry-for-books-tab-shortdesc.md +++ b/browsers/edge/shortdesc/allow-extended-telemetry-for-books-tab-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, and depending on the device configuration, Microsoft Edge gathers basic diagnostic data about the books in the Books Library and sends it to Microsoft. Enabling this policy gathers and sends both basic and additional diagnostic data, such as usage data. diff --git a/browsers/edge/shortdesc/allow-extensions-shortdesc.md b/browsers/edge/shortdesc/allow-extensions-shortdesc.md index d179b84a0c..8276b06760 100644 --- a/browsers/edge/shortdesc/allow-extensions-shortdesc.md +++ b/browsers/edge/shortdesc/allow-extensions-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows users to add or personalize extensions in Microsoft Edge by default. With this policy, you can configure Microsoft to prevent users from adding or personalizing extensions. diff --git a/browsers/edge/shortdesc/allow-fullscreen-mode-shortdesc.md b/browsers/edge/shortdesc/allow-fullscreen-mode-shortdesc.md index cdd6d92c32..cb47a5d149 100644 --- a/browsers/edge/shortdesc/allow-fullscreen-mode-shortdesc.md +++ b/browsers/edge/shortdesc/allow-fullscreen-mode-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows fullscreen mode by default, which shows only the web content and hides the Microsoft Edge UI. When allowing fullscreen mode, users and extensions must have the proper permissions. Disabling this policy prevents fullscreen mode in Microsoft Edge. diff --git a/browsers/edge/shortdesc/allow-inprivate-browsing-shortdesc.md b/browsers/edge/shortdesc/allow-inprivate-browsing-shortdesc.md index 9a26485bd0..1340e13406 100644 --- a/browsers/edge/shortdesc/allow-inprivate-browsing-shortdesc.md +++ b/browsers/edge/shortdesc/allow-inprivate-browsing-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge allows InPrivate browsing, and after closing all InPrivate tabs, Microsoft Edge deletes the browsing data from the device. With this policy, you can configure Microsoft Edge to prevent InPrivate web browsing. diff --git a/browsers/edge/shortdesc/allow-microsoft-compatibility-list-shortdesc.md b/browsers/edge/shortdesc/allow-microsoft-compatibility-list-shortdesc.md index e1f32efc92..35a86bfd85 100644 --- a/browsers/edge/shortdesc/allow-microsoft-compatibility-list-shortdesc.md +++ b/browsers/edge/shortdesc/allow-microsoft-compatibility-list-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- During browser navigation, Microsoft Edge checks the Microsoft Compatibility List for websites with known compatibility issues. If found, users are prompted to use Internet Explorer, where the site loads and displays correctly. Periodically during browser navigation, Microsoft Edge downloads the latest version of the list and applies the updates. With this policy, you can configure Microsoft Edge to ignore the compatibility list. You can view the compatibility list at about:compat. diff --git a/browsers/edge/shortdesc/allow-prelaunch-shortdesc.md b/browsers/edge/shortdesc/allow-prelaunch-shortdesc.md index f12cb4858a..a8437f2035 100644 --- a/browsers/edge/shortdesc/allow-prelaunch-shortdesc.md +++ b/browsers/edge/shortdesc/allow-prelaunch-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start Microsoft Edge. You can also configure Microsoft Edge to prevent from pre-launching. diff --git a/browsers/edge/shortdesc/allow-printing-shortdesc.md b/browsers/edge/shortdesc/allow-printing-shortdesc.md index 667479bcab..288599efdd 100644 --- a/browsers/edge/shortdesc/allow-printing-shortdesc.md +++ b/browsers/edge/shortdesc/allow-printing-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows users to print web content by default. With this policy, you can configure Microsoft Edge to prevent users from printing web content. diff --git a/browsers/edge/shortdesc/allow-saving-history-shortdesc.md b/browsers/edge/shortdesc/allow-saving-history-shortdesc.md index fd31328000..00be5b8c4d 100644 --- a/browsers/edge/shortdesc/allow-saving-history-shortdesc.md +++ b/browsers/edge/shortdesc/allow-saving-history-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge saves the browsing history of visited websites and shows them in the History pane by default. Disabling this policy prevents Microsoft Edge from saving the browsing history. If browsing history existed before disabling this policy, the previous browsing history remains in the History pane. Disabling this policy does not stop roaming of existing browsing history or browsing history from other devices. diff --git a/browsers/edge/shortdesc/allow-search-engine-customization-shortdesc.md b/browsers/edge/shortdesc/allow-search-engine-customization-shortdesc.md index 526626c5dc..fab9a56cff 100644 --- a/browsers/edge/shortdesc/allow-search-engine-customization-shortdesc.md +++ b/browsers/edge/shortdesc/allow-search-engine-customization-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users can add new search engines or change the default search engine, in Settings. With this policy, you can prevent users from customizing the search engine in Microsoft Edge. diff --git a/browsers/edge/shortdesc/allow-sideloading-of-extensions-shortdesc.md b/browsers/edge/shortdesc/allow-sideloading-of-extensions-shortdesc.md index a91dfe1299..588e9f64f9 100644 --- a/browsers/edge/shortdesc/allow-sideloading-of-extensions-shortdesc.md +++ b/browsers/edge/shortdesc/allow-sideloading-of-extensions-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge allows sideloading, which installs and runs unverified extensions. Disabling this policy prevents sideloading of extensions but does not prevent sideloading using Add-AppxPackage via PowerShell. You can only install extensions through Microsoft store (including a store for business), enterprise storefront (such as Company Portal) or PowerShell (using Add-AppxPackage). diff --git a/browsers/edge/shortdesc/allow-tab-preloading-shortdesc.md b/browsers/edge/shortdesc/allow-tab-preloading-shortdesc.md index 44b6908b0d..ec10c36e78 100644 --- a/browsers/edge/shortdesc/allow-tab-preloading-shortdesc.md +++ b/browsers/edge/shortdesc/allow-tab-preloading-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows preloading of the Start and New Tab pages during Windows sign in, and each time Microsoft Edge closes by default. Preloading minimizes the amount of time required to start Microsoft Edge and load a new tab. With this policy, you can configure Microsoft Edge to prevent preloading of tabs. diff --git a/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md b/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md index eb0b507062..5d9a75ed5a 100644 --- a/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md +++ b/browsers/edge/shortdesc/allow-web-content-on-new-tab-page-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 11/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge loads the default New Tab page and lets the users make changes. If you disable this policy, a blank page loads instead of the New Tab page and prevents users from changing it. diff --git a/browsers/edge/shortdesc/allow-windows-app-to-share-data-users-shortdesc.md b/browsers/edge/shortdesc/allow-windows-app-to-share-data-users-shortdesc.md index 668b843424..2c63762356 100644 --- a/browsers/edge/shortdesc/allow-windows-app-to-share-data-users-shortdesc.md +++ b/browsers/edge/shortdesc/allow-windows-app-to-share-data-users-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- With this policy, you can configure Windows 10 to share application data among multiple users on the system and with other instances of that app. Data shared through the SharedLocal folder is available through the Windows.Storage API. If you previously enabled this policy and now want to disable it, any shared app data remains in the SharedLocal folder. diff --git a/browsers/edge/shortdesc/always-show-books-library-shortdesc.md b/browsers/edge/shortdesc/always-show-books-library-shortdesc.md index 27ac63ba69..a9e0bdb003 100644 --- a/browsers/edge/shortdesc/always-show-books-library-shortdesc.md +++ b/browsers/edge/shortdesc/always-show-books-library-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge shows the Books Library only in countries or regions where supported. With this policy, you can configure Microsoft Edge to show the Books Library regardless of the device’s country or region. diff --git a/browsers/edge/shortdesc/configure-additional-search-engines-shortdesc.md b/browsers/edge/shortdesc/configure-additional-search-engines-shortdesc.md index 9ecbac9a8c..57fc82b0a1 100644 --- a/browsers/edge/shortdesc/configure-additional-search-engines-shortdesc.md +++ b/browsers/edge/shortdesc/configure-additional-search-engines-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users cannot add, remove, or change any of the search engines in Microsoft Edge, but they can set a default search engine. You can set the default search engine using the Set default search engine policy. However, with this policy, you can configure up to five additional search engines and set any one of them as the default. If you previously enabled this policy and now want to disable it, disabling deletes all configured search engines. diff --git a/browsers/edge/shortdesc/configure-adobe-flash-click-to-run-setting-shortdesc.md b/browsers/edge/shortdesc/configure-adobe-flash-click-to-run-setting-shortdesc.md index 5e0153a64e..d409c6374c 100644 --- a/browsers/edge/shortdesc/configure-adobe-flash-click-to-run-setting-shortdesc.md +++ b/browsers/edge/shortdesc/configure-adobe-flash-click-to-run-setting-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge supports Adobe Flash as a built-in feature rather than as an external add-on and updates automatically via Windows Update. By default, Microsoft Edge prevents Adobe Flash content from loading automatically, requiring action from the user, for example, clicking the **Click-to-Run** button. Depending on how often the content loads and runs, the sites for the content gets added to the auto-allowed list. Disable this policy if you want Adobe Flash content to load automatically. diff --git a/browsers/edge/shortdesc/configure-autofill-shortdesc.md b/browsers/edge/shortdesc/configure-autofill-shortdesc.md index a60ce8d196..74af7970c6 100644 --- a/browsers/edge/shortdesc/configure-autofill-shortdesc.md +++ b/browsers/edge/shortdesc/configure-autofill-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users can choose to use the Autofill feature to populate the form fields automatically. With this policy, you can configure Microsoft Edge, when enabled to use Autofill or, when disabled to prevent using Autofill. diff --git a/browsers/edge/shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md b/browsers/edge/shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md index d4d0ac2611..3f8d400ca5 100644 --- a/browsers/edge/shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md +++ b/browsers/edge/shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge does not send browsing history data to Microsoft 365 Analytics by default. With this policy though, you can configure Microsoft Edge to send intranet history only, internet history only, or both to Microsoft 365 Analytics for enterprise devices with a configured Commercial ID. diff --git a/browsers/edge/shortdesc/configure-cookies-shortdesc.md b/browsers/edge/shortdesc/configure-cookies-shortdesc.md index f814e14ff7..eeb223000b 100644 --- a/browsers/edge/shortdesc/configure-cookies-shortdesc.md +++ b/browsers/edge/shortdesc/configure-cookies-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows all cookies from all websites by default. With this policy, you can configure Microsoft to block only 3rd-party cookies or block all cookies. diff --git a/browsers/edge/shortdesc/configure-do-not-track-shortdesc.md b/browsers/edge/shortdesc/configure-do-not-track-shortdesc.md index cb296d0c5e..68e1b83ac2 100644 --- a/browsers/edge/shortdesc/configure-do-not-track-shortdesc.md +++ b/browsers/edge/shortdesc/configure-do-not-track-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge does not send ‘Do Not Track’ requests to websites asking for tracking information, but users can choose to send tracking information to sites they visit. With this policy, you can configure Microsoft Edge to send or never send tracking information. diff --git a/browsers/edge/shortdesc/configure-enterprise-mode-site-list-shortdesc.md b/browsers/edge/shortdesc/configure-enterprise-mode-site-list-shortdesc.md index 94042574fc..f98aa94435 100644 --- a/browsers/edge/shortdesc/configure-enterprise-mode-site-list-shortdesc.md +++ b/browsers/edge/shortdesc/configure-enterprise-mode-site-list-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge does not support ActiveX controls, Browser Helper Objects, VBScript, or other legacy technology. If you have sites or apps that use this technology, you can configure Microsoft Edge to check the Enterprise Mode Site List XML file that lists the sites and domains with compatibility issues and switch to IE11 automatically. You can use the same site list for both Microsoft Edge and IE11, or you can use separate lists. By default, Microsoft Edge ignores the Enterprise Mode and the Enterprise Mode Site List XML file. In this case, users might experience problems while using legacy apps. These sites and domains must be viewed using Internet Explorer 11 and Enterprise Mode. diff --git a/browsers/edge/shortdesc/configure-favorites-bar-shortdesc.md b/browsers/edge/shortdesc/configure-favorites-bar-shortdesc.md index 97f0e78a2e..661818a582 100644 --- a/browsers/edge/shortdesc/configure-favorites-bar-shortdesc.md +++ b/browsers/edge/shortdesc/configure-favorites-bar-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge hides the favorites bar by default but shows it on the Start and New Tab pages. Also, by default, the Favorites Bar toggle, in Settings, is set to Off but enabled letting users make changes. With this policy, you can configure Microsoft Edge to either show or hide the Favorites Bar on all pages. diff --git a/browsers/edge/shortdesc/configure-favorites-shortdesc.md b/browsers/edge/shortdesc/configure-favorites-shortdesc.md index 2d468ccb48..34e0cded8f 100644 --- a/browsers/edge/shortdesc/configure-favorites-shortdesc.md +++ b/browsers/edge/shortdesc/configure-favorites-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Discontinued in Windows 10, version 1809. Use the **[Provision Favorites](../available-policies.md#provision-favorites)** policy instead. diff --git a/browsers/edge/shortdesc/configure-home-button-shortdesc.md b/browsers/edge/shortdesc/configure-home-button-shortdesc.md index 0f6419d1b9..17d1b68784 100644 --- a/browsers/edge/shortdesc/configure-home-button-shortdesc.md +++ b/browsers/edge/shortdesc/configure-home-button-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge shows the home button and by clicking it the Start page loads by default. With this policy, you can configure the home button to load the New Tab page or a URL defined in the Set Home Button URL policy. You can also configure Microsoft Edge to hide the home button. diff --git a/browsers/edge/shortdesc/configure-kiosk-mode-shortdesc.md b/browsers/edge/shortdesc/configure-kiosk-mode-shortdesc.md index 1b52679ba6..37ca79a2c7 100644 --- a/browsers/edge/shortdesc/configure-kiosk-mode-shortdesc.md +++ b/browsers/edge/shortdesc/configure-kiosk-mode-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Configure how Microsoft Edge behaves when it’s running in kiosk mode with assigned access, either as a single-app or as one of many apps running on the kiosk device. You can control whether Microsoft Edge runs InPrivate full screen, InPrivate multi-tab with a tailored experience for kiosks, or normal browsing in Microsoft Edge. diff --git a/browsers/edge/shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md b/browsers/edge/shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md index 001c3b4adc..767c933e7c 100644 --- a/browsers/edge/shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md +++ b/browsers/edge/shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- You can configure Microsoft Edge kiosk mode to reset to the configured start experience after a specified amount of idle time in minutes (0-1440). The reset timer begins after the last user interaction. Once the idle time meets the time specified, a confirmation message prompts the user to continue, and if no user action, Microsoft Edge kiosk mode resets after 30 seconds. Resetting to the configured start experience deletes the current user’s browsing data. diff --git a/browsers/edge/shortdesc/configure-open-microsoft-edge-with-shortdesc.md b/browsers/edge/shortdesc/configure-open-microsoft-edge-with-shortdesc.md index 4877cdc1ca..cf69dd8af8 100644 --- a/browsers/edge/shortdesc/configure-open-microsoft-edge-with-shortdesc.md +++ b/browsers/edge/shortdesc/configure-open-microsoft-edge-with-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge loads a specific page or pages defined in the Configure Start Pages policy and allow users to make changes. With this policy, you can configure Microsoft Edge to load either the Start page, New Tab page, previously opened pages. You can also configure Microsoft Edge to prevent users from changing or customizing the Start page. For this policy to work correctly, you must also configure the Configure Start Pages. If you want to prevent users from making changes, don’t configure the Disable Lockdown of Start Pages policy. diff --git a/browsers/edge/shortdesc/configure-password-manager-shortdesc.md b/browsers/edge/shortdesc/configure-password-manager-shortdesc.md index 403f568244..f0b41c5b0f 100644 --- a/browsers/edge/shortdesc/configure-password-manager-shortdesc.md +++ b/browsers/edge/shortdesc/configure-password-manager-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge uses Password Manager automatically, allowing users to manager passwords locally. Disabling this policy restricts Microsoft Edge from using Password Manager. Don’t configure this policy if you want to let users choose to save and manage passwords locally using Password Manager. diff --git a/browsers/edge/shortdesc/configure-pop-up-blocker-shortdesc.md b/browsers/edge/shortdesc/configure-pop-up-blocker-shortdesc.md index ec0fca3a7e..a34c788e1e 100644 --- a/browsers/edge/shortdesc/configure-pop-up-blocker-shortdesc.md +++ b/browsers/edge/shortdesc/configure-pop-up-blocker-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge turns off Pop-up Blocker, which opens pop-up windows. Enabling this policy turns on Pop-up Blocker preventing pop-up windows from opening. If you want users to choose to use Pop-up Blocker, don’t configure this policy. diff --git a/browsers/edge/shortdesc/configure-search-suggestions-in-address-bar-shortdesc.md b/browsers/edge/shortdesc/configure-search-suggestions-in-address-bar-shortdesc.md index a999cf65cb..71b3e06d0d 100644 --- a/browsers/edge/shortdesc/configure-search-suggestions-in-address-bar-shortdesc.md +++ b/browsers/edge/shortdesc/configure-search-suggestions-in-address-bar-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users can choose to see search suggestions in the Address bar of Microsoft Edge. Disabling this policy hides the search suggestions and enabling this policy shows the search suggestions. diff --git a/browsers/edge/shortdesc/configure-start-pages-shortdesc.md b/browsers/edge/shortdesc/configure-start-pages-shortdesc.md index 80f486f35e..6cf35edc0e 100644 --- a/browsers/edge/shortdesc/configure-start-pages-shortdesc.md +++ b/browsers/edge/shortdesc/configure-start-pages-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge loads the pages specified in App settings as the default Start pages. With this policy, you can configure one or more Start pages when you enable this policy and enable the Configure Open Microsoft Edge With policy. Once you set the Start pages, either in this policy or Configure Open Microsoft Edge With policy, users cannot make changes. diff --git a/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md b/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md index cdf984bdc5..600d2e2986 100644 --- a/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md +++ b/browsers/edge/shortdesc/configure-windows-defender-smartscreen-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge uses Windows Defender SmartScreen (turned on) to protect users from potential phishing scams and malicious software by default. Also, by default, users cannot disable (turn off) Windows Defender SmartScreen. Enabling this policy turns on Windows Defender SmartScreen and prevent users from turning it off. Don’t configure this policy to let users choose to turn Windows defender SmartScreen on or off. diff --git a/browsers/edge/shortdesc/disable-lockdown-of-start-pages-shortdesc.md b/browsers/edge/shortdesc/disable-lockdown-of-start-pages-shortdesc.md index f1799516a7..3f0ebb72c4 100644 --- a/browsers/edge/shortdesc/disable-lockdown-of-start-pages-shortdesc.md +++ b/browsers/edge/shortdesc/disable-lockdown-of-start-pages-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, the Start pages configured in either the Configure Start Pages policy or Configure Open Microsoft Edge policies cannot be changed and remain locked down. Enabling this policy unlocks the Start pages, and lets users make changes to either all configured Start page or any Start page configured with the Configure Start pages policy. diff --git a/browsers/edge/shortdesc/do-not-sync-browser-settings-shortdesc.md b/browsers/edge/shortdesc/do-not-sync-browser-settings-shortdesc.md index 60b95651ca..b269a7f3e3 100644 --- a/browsers/edge/shortdesc/do-not-sync-browser-settings-shortdesc.md +++ b/browsers/edge/shortdesc/do-not-sync-browser-settings-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, the “browser” group syncs automatically between user’s devices and allowing users to choose to make changes. The “browser” group uses the _Sync your Settings_ option in Settings to sync information like history and favorites. Enabling this policy prevents the “browser” group from using the Sync your Settings option. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option. diff --git a/browsers/edge/shortdesc/do-not-sync-shortdesc.md b/browsers/edge/shortdesc/do-not-sync-shortdesc.md index 5aecbf86be..2fe09c0260 100644 --- a/browsers/edge/shortdesc/do-not-sync-shortdesc.md +++ b/browsers/edge/shortdesc/do-not-sync-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge turns on the _Sync your settings_ toggle in **Settings > Device sync settings** letting users choose what to sync on their devices. Enabling this policy turns off and disables the _Sync your settings_ toggle preventing the syncing of user’s settings between their devices. If you want syncing turned off by default in Microsoft Edge but not disabled, enable this policy and select the _Allow users to turn syncing on_ option. diff --git a/browsers/edge/shortdesc/keep-favorites-in-sync-between-ie-and-edge-shortdesc.md b/browsers/edge/shortdesc/keep-favorites-in-sync-between-ie-and-edge-shortdesc.md index 027fc09c15..0b377e56b6 100644 --- a/browsers/edge/shortdesc/keep-favorites-in-sync-between-ie-and-edge-shortdesc.md +++ b/browsers/edge/shortdesc/keep-favorites-in-sync-between-ie-and-edge-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge does not sync the user’s favorites between IE and Microsoft Edge. Enabling this policy syncs favorites between Internet Explorer and Microsoft Edge. Changes to favorites in one browser reflect in the other, including additions, deletions, modifications, and ordering of favorites. diff --git a/browsers/edge/shortdesc/microsoft-browser-extension-policy-shortdesc.md b/browsers/edge/shortdesc/microsoft-browser-extension-policy-shortdesc.md index 967221cc52..4b4a459339 100644 --- a/browsers/edge/shortdesc/microsoft-browser-extension-policy-shortdesc.md +++ b/browsers/edge/shortdesc/microsoft-browser-extension-policy-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- [Microsoft browser extension policy](https://docs.microsoft.com/legal/windows/agreements/microsoft-browser-extension-policy): diff --git a/browsers/edge/shortdesc/prevent-access-to-about-flags-page-shortdesc.md b/browsers/edge/shortdesc/prevent-access-to-about-flags-page-shortdesc.md index 4bc1eb0947..7bf20983de 100644 --- a/browsers/edge/shortdesc/prevent-access-to-about-flags-page-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-access-to-about-flags-page-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users can access the about:flags page in Microsoft Edge, which is used to change developer settings and enable experimental features. Enabling this policy prevents users from accessing the about:flags page. diff --git a/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-files-shortdesc.md b/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-files-shortdesc.md index de9891f1b2..f6b222fde2 100644 --- a/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-files-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-files-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge allows users to bypass (ignore) the Windows Defender SmartScreen warnings about potentially malicious files, allowing them to continue downloading the unverified file(s). Enabling this policy prevents users from bypassing the warnings, blocking them from downloading of the unverified file(s). diff --git a/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-sites-shortdesc.md b/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-sites-shortdesc.md index 74db5c4863..d04429bef8 100644 --- a/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-sites-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-bypassing-windows-defender-prompts-for-sites-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge allows users to bypass (ignore) the Windows Defender SmartScreen warnings about potentially malicious sites, allowing them to continue to the site. With this policy though, you can configure Microsoft Edge to prevent users from bypassing the warnings, blocking them from continuing to the site. diff --git a/browsers/edge/shortdesc/prevent-certificate-error-overrides-shortdesc.md b/browsers/edge/shortdesc/prevent-certificate-error-overrides-shortdesc.md index 53dc4ea3e4..c73e676517 100644 --- a/browsers/edge/shortdesc/prevent-certificate-error-overrides-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-certificate-error-overrides-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge, by default, allows overriding of the security warnings to sites that have SSL errors, bypassing or ignoring certificate errors. Enabling this policy prevents overriding of the security warnings. diff --git a/browsers/edge/shortdesc/prevent-changes-to-favorites-shortdesc.md b/browsers/edge/shortdesc/prevent-changes-to-favorites-shortdesc.md index a8948ce133..b635ee64e8 100644 --- a/browsers/edge/shortdesc/prevent-changes-to-favorites-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-changes-to-favorites-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users can add, import, and make changes to the Favorites list in Microsoft Edge. Enabling this policy locks down the Favorites list in Microsoft Edge, preventing users from making changes. When enabled, Microsoft Edge turns off the Save a Favorite, Import settings, and context menu items, such as Create a new folder. Enable only this policy or the Keep favorites in sync between Internet Explorer and Microsoft Edge policy. If you enable both, Microsoft Edge prevents users from syncing their favorites between the two browsers. diff --git a/browsers/edge/shortdesc/prevent-edge-from-gathering-live-tile-info-shortdesc.md b/browsers/edge/shortdesc/prevent-edge-from-gathering-live-tile-info-shortdesc.md index 037888e82c..bba9ec1ad5 100644 --- a/browsers/edge/shortdesc/prevent-edge-from-gathering-live-tile-info-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-edge-from-gathering-live-tile-info-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge collects the Live Tile metadata and sends it to Microsoft to help provide users a complete experience when they pin Live Tiles to the Start menu. However, with this policy, you can configure Microsoft Edge to prevent Microsoft from collecting Live Tile metadata, providing users with a limited experience. diff --git a/browsers/edge/shortdesc/prevent-first-run-webpage-from-opening-shortdesc.md b/browsers/edge/shortdesc/prevent-first-run-webpage-from-opening-shortdesc.md index 107a995e49..c156c94126 100644 --- a/browsers/edge/shortdesc/prevent-first-run-webpage-from-opening-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-first-run-webpage-from-opening-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, when launching Microsoft Edge for the first time, the First Run webpage (a welcome page) hosted on Microsoft.com loads automatically via an FWLINK. The welcome page lists the new features and helpful tips of Microsoft Edge. With this policy, you can configure Microsoft Edge to prevent loading the welcome page on first explicit user-launch. diff --git a/browsers/edge/shortdesc/prevent-turning-off-required-extensions-shortdesc.md b/browsers/edge/shortdesc/prevent-turning-off-required-extensions-shortdesc.md index 2671634c1b..35b0859dc6 100644 --- a/browsers/edge/shortdesc/prevent-turning-off-required-extensions-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-turning-off-required-extensions-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge allows users to uninstall extensions by default. Enabling this policy prevents users from uninstalling extensions but lets them configure options for extensions defined in this policy, such as allowing InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically. If you enabled this policy and now you want to disable it, the list of extension package family names (PFNs) defined in this policy get ignored after disabling this policy. diff --git a/browsers/edge/shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md b/browsers/edge/shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md index 3355fa7456..037c535aa8 100644 --- a/browsers/edge/shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. With this policy, though, you can prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy. For this policy to work correctly, you must enable the Do not sync browser policy. diff --git a/browsers/edge/shortdesc/prevent-using-localhost-ip-address-for-webrtc-shortdesc.md b/browsers/edge/shortdesc/prevent-using-localhost-ip-address-for-webrtc-shortdesc.md index 9615cd17b6..3a25de844f 100644 --- a/browsers/edge/shortdesc/prevent-using-localhost-ip-address-for-webrtc-shortdesc.md +++ b/browsers/edge/shortdesc/prevent-using-localhost-ip-address-for-webrtc-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge shows localhost IP address while making calls using the WebRTC protocol. Enabling this policy hides the localhost IP addresses. diff --git a/browsers/edge/shortdesc/provision-favorites-shortdesc.md b/browsers/edge/shortdesc/provision-favorites-shortdesc.md index 321eae15f4..0d84ac76c1 100644 --- a/browsers/edge/shortdesc/provision-favorites-shortdesc.md +++ b/browsers/edge/shortdesc/provision-favorites-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, users can customize the Favorites list in Microsoft Edge. With this policy though, you provision a standard list of favorites, which can include folders, to appear in the Favorites list in addition to the user’s favorites. Edge. Once you provision the Favorites list, users cannot customize it, such as adding folders for organizing, and adding or removing any of the favorites configured. diff --git a/browsers/edge/shortdesc/search-provider-discovery-shortdesc.md b/browsers/edge/shortdesc/search-provider-discovery-shortdesc.md index 7940263779..8524933996 100644 --- a/browsers/edge/shortdesc/search-provider-discovery-shortdesc.md +++ b/browsers/edge/shortdesc/search-provider-discovery-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge follows the OpenSearch 1.1 specification to discover and use web search providers. When a user browses to a search service, the OpenSearch description is picked up and saved for later use. Users can then choose to add the search service to use in the Microsoft Edge address bar. diff --git a/browsers/edge/shortdesc/send-all-intranet-sites-to-ie-shortdesc.md b/browsers/edge/shortdesc/send-all-intranet-sites-to-ie-shortdesc.md index 6cdc361e42..3b17cd7e5f 100644 --- a/browsers/edge/shortdesc/send-all-intranet-sites-to-ie-shortdesc.md +++ b/browsers/edge/shortdesc/send-all-intranet-sites-to-ie-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, all websites, including intranet sites, open in Microsoft Edge automatically. Only enable this policy if there are known compatibility problems with Microsoft Edge. Enabling this policy loads only intranet sites in Internet Explorer 11 automatically. diff --git a/browsers/edge/shortdesc/set-default-search-engine-shortdesc.md b/browsers/edge/shortdesc/set-default-search-engine-shortdesc.md index c3eeaf2045..958dd67138 100644 --- a/browsers/edge/shortdesc/set-default-search-engine-shortdesc.md +++ b/browsers/edge/shortdesc/set-default-search-engine-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge uses the search engine specified in App settings, letting users make changes at any time unless the Allow search engine customization policy is disabled, which restricts users from making changes. With this policy, you can either remove or use the policy-set search engine. When you remove the policy-set search engine, Microsoft Edge uses the specified search engine for the market, which lets users make changes to the default search engine. You can use the policy-set search engine specified in the OpenSearch XML, which prevents users from making changes. diff --git a/browsers/edge/shortdesc/set-home-button-url-shortdesc.md b/browsers/edge/shortdesc/set-home-button-url-shortdesc.md index 18f35b15b0..67e62738a6 100644 --- a/browsers/edge/shortdesc/set-home-button-url-shortdesc.md +++ b/browsers/edge/shortdesc/set-home-button-url-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, Microsoft Edge shows the home button and loads the Start page, and locks down the home button to prevent users from changing what page loads. Enabling this policy loads a custom URL for the home button. When you enable this policy, and enable the Configure Home Button policy with the _Show home button & set a specific page_ option selected, a custom URL loads when the user clicks the home button. diff --git a/browsers/edge/shortdesc/set-new-tab-url-shortdesc.md b/browsers/edge/shortdesc/set-new-tab-url-shortdesc.md index 2b73a00927..a909cbbdc7 100644 --- a/browsers/edge/shortdesc/set-new-tab-url-shortdesc.md +++ b/browsers/edge/shortdesc/set-new-tab-url-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge loads the default New Tab page by default. Enabling this policy lets you set a New Tab page URL in Microsoft Edge, preventing users from changing it. When you enable this policy, and you disable the Allow web content on New Tab page policy, Microsoft Edge ignores any URL specified in this policy and opens about:blank. diff --git a/browsers/edge/shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md b/browsers/edge/shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md index e338769c79..5ae8a12782 100644 --- a/browsers/edge/shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md +++ b/browsers/edge/shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md @@ -5,6 +5,6 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- Microsoft Edge does not show a notification before opening sites in Internet Explorer 11. However, with this policy, you can configure Microsoft Edge to display a notification before a site opens in IE11 or let users continue in Microsoft Edge. If you want users to continue in Microsoft Edge, enable this policy to show the _Keep going in Microsoft Edge_ link in the notification. For this policy to work correctly, you must also enable the Configure the Enterprise Mode Site List or Send all intranet sites to Internet Explorer 11, or both. diff --git a/browsers/edge/shortdesc/unlock-home-button-shortdesc.md b/browsers/edge/shortdesc/unlock-home-button-shortdesc.md index db100006b2..722998c5bf 100644 --- a/browsers/edge/shortdesc/unlock-home-button-shortdesc.md +++ b/browsers/edge/shortdesc/unlock-home-button-shortdesc.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- By default, when you enable the Configure Home Button policy or provide a URL in the Set Home Button URL policy, Microsoft Edge locks down the home button to prevent users from changing the settings. When you enable this policy, users can make changes to the home button even if you enabled the Configure Home Button or Set Home Button URL policies. diff --git a/browsers/includes/available-duel-browser-experiences-include.md b/browsers/includes/available-duel-browser-experiences-include.md index d3e189245d..03e5488335 100644 --- a/browsers/includes/available-duel-browser-experiences-include.md +++ b/browsers/includes/available-duel-browser-experiences-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- ## Available dual-browser experiences diff --git a/browsers/includes/helpful-topics-include.md b/browsers/includes/helpful-topics-include.md index 93f3628760..e4a5e68376 100644 --- a/browsers/includes/helpful-topics-include.md +++ b/browsers/includes/helpful-topics-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- diff --git a/browsers/includes/import-into-the-enterprise-mode-site-list-mgr-include.md b/browsers/includes/import-into-the-enterprise-mode-site-list-mgr-include.md index 9116168ca3..1954c6ad4e 100644 --- a/browsers/includes/import-into-the-enterprise-mode-site-list-mgr-include.md +++ b/browsers/includes/import-into-the-enterprise-mode-site-list-mgr-include.md @@ -5,7 +5,7 @@ ms.date: 10/02/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager. diff --git a/browsers/includes/interoperability-goals-enterprise-guidance.md b/browsers/includes/interoperability-goals-enterprise-guidance.md index ab1b9bf4be..6c3e1563c8 100644 --- a/browsers/includes/interoperability-goals-enterprise-guidance.md +++ b/browsers/includes/interoperability-goals-enterprise-guidance.md @@ -5,7 +5,7 @@ ms.date: 10/15/2018 ms.reviewer: manager: dansimp ms.prod: edge -ms:topic: include +ms.topic: include --- ## Interoperability goals and enterprise guidance From b3a148de6ad8ffe9ea51c1dcc15e309faa535c04 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:20:16 -0400 Subject: [PATCH 287/303] fix: windows/deployment/planning/windows-10-enterprise-faq-itpro.md Add missing author metadata by searching other articles ms.author --- windows/deployment/planning/windows-10-enterprise-faq-itpro.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/planning/windows-10-enterprise-faq-itpro.md b/windows/deployment/planning/windows-10-enterprise-faq-itpro.md index 0382d9a133..f8e27483fe 100644 --- a/windows/deployment/planning/windows-10-enterprise-faq-itpro.md +++ b/windows/deployment/planning/windows-10-enterprise-faq-itpro.md @@ -6,7 +6,7 @@ ms.prod: w10 ms.mktglfcycl: plan ms.localizationpriority: medium ms.sitesec: library -author: +author: greg-lindsay ms.date: 08/18/2017 ms.reviewer: manager: laurawi From 5d91559474c914a026f2f16a6c22a08137f2bee6 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:28:03 -0400 Subject: [PATCH 288/303] typo: credentails -> credentials --- education/get-started/finish-setup-and-other-tasks.md | 2 +- .../hello-for-business/hello-how-it-works-provisioning.md | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/education/get-started/finish-setup-and-other-tasks.md b/education/get-started/finish-setup-and-other-tasks.md index 64361b412b..b627f66098 100644 --- a/education/get-started/finish-setup-and-other-tasks.md +++ b/education/get-started/finish-setup-and-other-tasks.md @@ -198,7 +198,7 @@ Adding a new device to your cloud-based tenant is easy. For new devices, you can Depending on the organization's policy, the user may be asked to update the password. -5. After the user's credentails are validated, the window will refresh and will now include an entry that shows the device is now connected to the organization's MDM. This means the device is now enrolled in Intune for Education MDM and the account should have access to the organization's resources. +5. After the user's credentials are validated, the window will refresh and will now include an entry that shows the device is now connected to the organization's MDM. This means the device is now enrolled in Intune for Education MDM and the account should have access to the organization's resources. **Figure 8** - Device is connected to organization's MDM diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md index 0492d0e9fc..a3ff61d617 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-provisioning.md @@ -85,7 +85,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Azure Active Directory Web Account Manager plug-in.
          Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Azure MFA services provides the second factor of authentication. If the user has performed Azure MFA within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they are not prompted for MFA because the current MFA remains valid.
          Azure Active Directory validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | | B | After receiving a ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pre-generation pool, which includes attestation data. This is the user key (ukpub/ukpriv). | | C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Azure Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Azure Active Directory returns a key ID to the application, which represents the end of user key registration. | -| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys. | +| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys. | | E | The registration authority validates the public key in the certificate request matches a registered key for the user.
          If the public key in the certificate is not found in the list of registered public keys, certificate enrollment is deferred until Phase F completes. The application is informed of the deferment and exits to the user's desktop. The automatic certificate enrollment client triggers the Azure AD Web Account Manager plug-in to retry the certificate enrollment at 24, 85, 145, 205, 265, and 480 minutes after phase C successfully completes. The user must remain signed in for automatic certificate enrollment to trigger certificate enrollment. If the user signs out, automatic certificate enrollment is triggered approximately 30 minutes after the user's next sign in.
          After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate. | | G | The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application. | | H | The application receives the newly issued certificate and installs the it into the Personal store of the user. This signals the end of provisioning. | @@ -105,7 +105,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Azure Active Directory Web Account Manager plug-in.
          Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Azure MFA services provides the second factor of authentication. If the user has performed Azure MFA within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they are not prompted for MFA because the current MFA remains valid.
          Azure Active Directory validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | | B | After receiving a ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pre-generation pool, which includes attestation data. This is the user key (ukpub/ukpriv). | | C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Azure Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Azure Active Directory returns a key ID and a key receipt to the application, which represents the end of user key registration. | -| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the key receipt and certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys. | +| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the key receipt and certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys. | | E | The registration authority validates the public key in the certificate request matches a registered key for the user.
          If the public key in the certificate is not found in the list of registered public keys, it then validates the key receipt to confirm the key was securely registered with Azure.
          After validating the key receipt or public key, the registration authority signs the certificate request using its enrollment agent certificate. | | F | The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application. | | G | The application receives the newly issued certificate and installs the it into the Personal store of the user. This signals the end of provisioning. | @@ -124,7 +124,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Azure Active Directory Web Account Manager plug-in.
          In a federated environment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
          Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Azure MFA services (or a third party MFA service) provides the second factor of authentication.
          The on-premises STS server issues a enterprise token on successful MFA. The application sends the token to Azure Active Directory.
          Azure Active Directory validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | | B | After receiving a ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pre-generation pool, which includes attestation data. This is the user key (ukpub/ukpriv). | | C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Azure Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Azure Active Directory returns a key ID and a key receipt to the application, which represents the end of user key registration. | -| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the key receipt and certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys. | +| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the key receipt and certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys. | | E | The registration authority validates the public key in the certificate request matches a registered key for the user.
          If the public key in the certificate is not found in the list of registered public keys, it then validates the key receipt to confirm the key was securely registered with Azure.
          After validating the key receipt or public key, the registration authority signs the certificate request using its enrollment agent certificate. | | F | The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application. | | G | The application receives the newly issued certificate and installs the it into the Personal store of the user. This signals the end of provisioning. | @@ -152,7 +152,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, |A| The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Enterprise Device Registration Service (EDRS). The application makes the request using the Azure Active Directory Web Account Manager plug-in.
          In an on-premises deployment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
          Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Azure MFA server (or a third party MFA service) provides the second factor of authentication.
          The on-premises STS server issues a enterprise DRS token on successful MFA.| | B| After receiving a EDRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pre-generation pool, which includes attestation data. This is the user key (ukpub/ukpriv).| |C | The application sends the EDRS token, ukpub, attestation data, and device information to the Enterprise DRS for user key registration. Enterprise DRS validates the MFA claim remains current. On successful validation, the Enterprise DRS locates the user's object in Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. The Enterprise DRS returns a key ID to the application, which represents the end of user key registration.| -|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys.| +|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
          The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
          After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys.| |E | The registration authority validates the public key in the certificate request matches a registered key for the user.
          After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate.| |F |The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application.| |G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning.| From d0ee07ed73f0e713e483d6d42d5de8c160c97f4a Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:29:01 -0400 Subject: [PATCH 289/303] typo: persion -> person --- education/get-started/finish-setup-and-other-tasks.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/get-started/finish-setup-and-other-tasks.md b/education/get-started/finish-setup-and-other-tasks.md index 64361b412b..f35b3ee528 100644 --- a/education/get-started/finish-setup-and-other-tasks.md +++ b/education/get-started/finish-setup-and-other-tasks.md @@ -105,7 +105,7 @@ If you need to make changes or updates to any of the apps or settings for the gr After completing the basic setup for your cloud infrastructure and confirming that it is up and running, it's time to prepare for additional devices to be added and enable capabilities for the user to use. ### Enable many devices to be added by a single person -When a device is owned by the school, you may need to have a single persion adding many devices to your cloud infrastructure. +When a device is owned by the school, you may need to have a single person adding many devices to your cloud infrastructure. Follow the steps in this section to enable a single person to add many devices to your cloud infrastructure. From 061ac15e7ad411959fe387af75608e40658905f7 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:30:56 -0400 Subject: [PATCH 290/303] typo: Accesss -> Access --- education/get-started/inclusive-classroom-it-admin.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/get-started/inclusive-classroom-it-admin.md b/education/get-started/inclusive-classroom-it-admin.md index a67cc68626..8f65cb8599 100644 --- a/education/get-started/inclusive-classroom-it-admin.md +++ b/education/get-started/inclusive-classroom-it-admin.md @@ -22,7 +22,7 @@ You will also learn how to deploy apps using Microsoft Intune, turn on or off Ea 1. [Inclusive Classroom features](#features) 2. [Deploying apps with Microsoft Intune](#intune) -3. [How to show/hide the Ease of Accesss settings for text in Windows 10](#ease) +3. [How to show/hide the Ease of Access settings for text in Windows 10](#ease) 4. [How to change your Office 365 account from monthly, semi-annual, or yearly](#account) ## Inclusive Classroom features From e3aa003819b2824e9c0babee294c8b17b3d30ac1 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:32:11 -0400 Subject: [PATCH 291/303] tyop: scenaro -> scenario --- education/get-started/use-school-data-sync.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/get-started/use-school-data-sync.md b/education/get-started/use-school-data-sync.md index c6192599ba..6a025b3ff4 100644 --- a/education/get-started/use-school-data-sync.md +++ b/education/get-started/use-school-data-sync.md @@ -74,7 +74,7 @@ To learn more about the CSV files that are required and the info you need to inc 5. In the **Sync options** screen: - 1. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. + 1. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenario that applies to you. For this walkthrough, select **New users**. 2. In the **Import data** section, click **Upload Files** to bring up the **Select data files to be uploaded** window. 3. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. 4. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. From 6c2e87c619138a4babe13b8649f5b97535779e11 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 19 Jun 2019 02:48:54 -0400 Subject: [PATCH 292/303] typo: backgroudn -> background --- education/trial-in-a-box/itadmin-tib-get-started.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/trial-in-a-box/itadmin-tib-get-started.md b/education/trial-in-a-box/itadmin-tib-get-started.md index 253c4ded12..216eba31f2 100644 --- a/education/trial-in-a-box/itadmin-tib-get-started.md +++ b/education/trial-in-a-box/itadmin-tib-get-started.md @@ -104,7 +104,7 @@ If you've previously used Set up School PCs to provision student devices, you ca - This setting also increases the maximum storage to 100% of the available disk space. This prevents the student's account from being erased if the student stores a lot of files or data or if the student doesn't use the PC over a prolonged period. - **Let guests sign-in to these PCs** allows guests to use student PCs without a school account. If you select this option, a **Guest** account button will be added in the PC's sign-in screen to allow anyone to use the PC. - **Enable Windows 10 Autopilot Reset** enables IT admins to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen any time and apply original settings and management enrollment the student PC is returned to a fully configured or known approved state. For more info, see [Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset). - - **Lock screen background** shows the default backgroudn used for student PCs provisioned by Set up School PCs. Select **Browse** to change the default. + - **Lock screen background** shows the default background used for student PCs provisioned by Set up School PCs. Select **Browse** to change the default. 7. **Set up the Take a Test app** configures the device for taking quizzes and high-stakes assessments by some providers like Smarter Balanced. Windows will lock down the student PC so that students can't access anything else while taking the test. From 0ac9f13b24513a21fe4b073f7af3eb64fb48889b Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 19 Jun 2019 10:29:36 -0700 Subject: [PATCH 293/303] fix redirect --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7254840960..17c712c167 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -672,7 +672,7 @@ }, { "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", -"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", +"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", "redirect_document_id": true }, { From 0aa4ebe396023d3b02889836fc4ef6e1ce93bad6 Mon Sep 17 00:00:00 2001 From: Michael Niehaus Date: Wed, 19 Jun 2019 10:35:48 -0700 Subject: [PATCH 294/303] Update existing-devices.md Modified to indicate that Windows Autopilot for existing devices supports both Azure AD Join and Hybrid Azure AD Join. --- .../deployment/windows-autopilot/existing-devices.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index fb3a5b3593..87042516a3 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -19,12 +19,12 @@ ms.topic: article **Applies to: Windows 10** -Modern desktop management with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices. The apps you need for work can be automatically installed. Your work profile is synchronized, so you can resume working right away. +Modern desktop deployment with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices. The apps you need for work can be automatically installed. Your work profile is synchronized, so you can resume working right away. -This topic describes how to convert Windows 7 or Windows 8.1 domain-joined computers to Azure Active Directory-joined computers running Windows 10 by using Windows Autopilot. +This topic describes how to convert Windows 7 or Windows 8.1 domain-joined computers to Windows 10 devices joined to either Azure Active Directory or Active Directory (Hybrid Azure AD Join) by using Windows Autopilot. >[!NOTE] ->Windows Autopilot for existing devices only supports user-driven Azure Active Directory profiles. Hybrid AAD joined devices and self-deploying profiles are not supported. +>Windows Autopilot for existing devices only supports user-driven Azure Active Directory and Hybrid Azure AD profiles. Self-deploying profiles are not supported. ## Prerequisites @@ -117,7 +117,7 @@ See the following examples. | CloudAssignedTenantId (guid, required) | The Azure Active Directory tenant ID that should be used. This is the GUID for the tenant, and can be found in properties of the tenant. The value should not include braces. | | CloudAssignedTenantDomain (string, required) | The Azure Active Directory tenant name that should be used, e.g. tenant.onmicrosoft.com. | | CloudAssignedOobeConfig (number, required) | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 | - | CloudAssignedDomainJoinMethod (number, required) | This property should be set to 0 and specifies that the device should join Azure AD. | + | CloudAssignedDomainJoinMethod (number, required) | This property specifies whether the device should join Azure Active Directory or Active Directory (Hybrid Azure AD Join). Values include: Active AD Join = 0, Hybrid Azure AD Join = 1 | | CloudAssignedForcedEnrollment (number, required) | Specifies that the device should require AAD Join and MDM enrollment.
          0 = not required, 1 = required. | | ZtdCorrelationId (guid, required) | A unique GUID (without braces) that will be provided to Intune as part of the registration process. ZtdCorrelationId will be included in enrollment message as “OfflineAutoPilotEnrollmentCorrelator”. This attribute will be present only if the enrollment is taking place on a device registered with Zero Touch Provisioning via offline registration. | | CloudAssignedAadServerData (encoded JSON string, required) | An embedded JSON string used for branding. It requires AAD corp branding enabled.
          Example value: "CloudAssignedAadServerData": "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"CloudAssignedTenantDomain\":\"tenant.onmicrosoft.com\"}}" | @@ -301,6 +301,9 @@ The Task Sequence will download content, reboot, format the drives and install W ![refresh-2](images/up-2.png) ![refresh-3](images/up-3.png) +>[!NOTE] +>If joining devices to Active Directory (Hybrid Azure AD Join), it is necessary to create a Domain Join device configuration profile that is targeted to "All Devices" (since there is no Azure Active Directory device object for the computer to do group-based targeting). See [User-driven mode for hybrid Azure Active Directory join](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join) for more information. + ### Register the device for Windows Autopilot Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. Once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. You can enable automatic registration for an assigned group using the **Convert all targeted devices to Autopilot** setting. For more information, see [Create an Autopilot deployment profile](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-deployment-profile). From 3017be9ae7d0d9e92c8999da606824ad236252d6 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 19 Jun 2019 10:36:15 -0700 Subject: [PATCH 295/303] fixing redirect for device-security --- .openpublishing.redirection.json | 5 +++++ windows/device-security/index.md | 3 --- 2 files changed, 5 insertions(+), 3 deletions(-) delete mode 100644 windows/device-security/index.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 17c712c167..1fe80284d7 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -15036,6 +15036,11 @@ "source_path": "windows/hub/release-information.md", "redirect_url": "/windows/release-information", "redirect_document_id": true +}, +{ +"source_path": "windows/device-security/index.md", +"redirect_url": "/windows/security/threat-protection", +"redirect_document_id": true } ] } diff --git a/windows/device-security/index.md b/windows/device-security/index.md deleted file mode 100644 index be91262028..0000000000 --- a/windows/device-security/index.md +++ /dev/null @@ -1,3 +0,0 @@ ---- -redirect_url: https://docs.microsoft.com/windows/security/threat-protection/ ---- \ No newline at end of file From a8be54d2d4596413a8c5bbf6180b8e4d9a7397d2 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 19 Jun 2019 13:54:35 -0700 Subject: [PATCH 296/303] a few fixes and tweaks --- .../manage-windows-upgrades-with-upgrade-readiness.md | 11 +++++------ .../upgrade/upgrade-readiness-additional-insights.md | 2 +- .../deployment/windows-autopilot/existing-devices.md | 4 ++-- .../deployment/windows-autopilot/self-deploying.md | 5 ++--- .../windows-autopilot/windows-autopilot-whats-new.md | 3 +++ 5 files changed, 13 insertions(+), 12 deletions(-) diff --git a/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md b/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md index 66da87eb73..7822a9c866 100644 --- a/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md +++ b/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md @@ -40,9 +40,8 @@ The Upgrade Readiness workflow steps you through the discovery and rationalizati ## **Related topics** -[Upgrade Readiness architecture](upgrade-readiness-architecture.md)
          -[Upgrade Readiness requirements](upgrade-readiness-requirements.md)
          -[Upgrade Readiness release notes](upgrade-readiness-requirements.md#important-information-about-this-release)
          -[Get started with Upgrade Readiness](upgrade-readiness-get-started.md)
          -[Use Upgrade Readiness to manage Windows upgrades](use-upgrade-readiness-to-manage-windows-upgrades.md)
          -[Troubleshoot Upgrade Readiness](troubleshoot-upgrade-readiness.md)
          +[Upgrade Readiness architecture](upgrade-readiness-architecture.md)
          +[Upgrade Readiness requirements](upgrade-readiness-requirements.md)
          +[Upgrade Readiness release notes](upgrade-readiness-requirements.md#important-information-about-this-release)
          +[Get started with Upgrade Readiness](upgrade-readiness-get-started.md)
          +[Use Upgrade Readiness to manage Windows upgrades](use-upgrade-readiness-to-manage-windows-upgrades.md) \ No newline at end of file diff --git a/windows/deployment/upgrade/upgrade-readiness-additional-insights.md b/windows/deployment/upgrade/upgrade-readiness-additional-insights.md index e7672a7634..09a0e88f33 100644 --- a/windows/deployment/upgrade/upgrade-readiness-additional-insights.md +++ b/windows/deployment/upgrade/upgrade-readiness-additional-insights.md @@ -93,4 +93,4 @@ Office add-ins provides a list of the Microsoft Office add-ins in your environme ## Related topics -[Upgrade Readiness release notes](upgrade-readiness-release-notes.md) +[Manage Windows upgrades with Upgrade Readiness](manage-windows-upgrades-with-upgrade-readiness.md) diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md index 87042516a3..c177340864 100644 --- a/windows/deployment/windows-autopilot/existing-devices.md +++ b/windows/deployment/windows-autopilot/existing-devices.md @@ -91,7 +91,7 @@ See the following examples. Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON ``` - See the following sample output: + See the following sample output: (use the horizontal scroll bar at the bottom to view long lines)
               PS C:\> Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
               {
          @@ -124,7 +124,7 @@ See the following examples.
              |         CloudAssignedDeviceName (string, optional)         |                                                                          The name automatically assigned to the computer.  This follows the naming pattern convention that can be configured in Intune as part of the Autopilot profile, or can specify an explicit name to use.                                                                           |
           
           
          -5. The Autopilot profile must be saved as a JSON file in ASCII or ANSI format. Windows PowerShell defaults to Unicode format, so if you attempt to redirect output of the commands to a file, you must also specify the file format. For example, to save the file in ASCII format using Windows PowerShell, you can create a directory (ex: c:\Autopilot) and save the profile as shown below:
          +5. The Autopilot profile must be saved as a JSON file in ASCII or ANSI format. Windows PowerShell defaults to Unicode format, so if you attempt to redirect output of the commands to a file, you must also specify the file format. For example, to save the file in ASCII format using Windows PowerShell, you can create a directory (ex: c:\Autopilot) and save the profile as shown below: (use the horizontal scroll bar at the bottom if needed to view the entire command string)
           
               ```
               Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON | Out-File c:\Autopilot\AutopilotConfigurationFile.json -Encoding ASCII
          diff --git a/windows/deployment/windows-autopilot/self-deploying.md b/windows/deployment/windows-autopilot/self-deploying.md
          index bcddf84201..38159d4743 100644
          --- a/windows/deployment/windows-autopilot/self-deploying.md
          +++ b/windows/deployment/windows-autopilot/self-deploying.md
          @@ -1,5 +1,5 @@
           ---
          -title: Windows Autopilot Self-Deploying mode (Preview) 
          +title: Windows Autopilot Self-Deploying mode
           description: Windows Autopilot deployment
           keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
           ms.reviewer: mniehaus
          @@ -15,10 +15,9 @@ ms.collection: M365-modern-desktop
           ms.topic: article
           ---
           
          -
           # Windows Autopilot Self-Deploying mode
           
          -**Applies to: Windows 10, version 1809 or later**
          +**Applies to: Windows 10, version 1903 or later**
           
           Windows Autopilot self-deploying mode enables a device to be deployed with little to no user interaction. For devices with an Ethernet connection, no user interaction is required; for devices connected via Wi-fi, no interaction is required after making the Wi-fi connection (choosing the language, locale, and keyboard, then making a network connection).  
           
          diff --git a/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md b/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md
          index 9f414b3464..40285c5f1b 100644
          --- a/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md
          +++ b/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md
          @@ -42,6 +42,9 @@ Windows Autopilot [self-deploying mode](self-deploying.md) enables a zero touch
           
           You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required. 
           
          +>[!NOTE]
          +>Window 10, version 1903 is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
          +
           ## Related topics
           
           [What's new in Microsoft Intune](https://docs.microsoft.com/intune/whats-new)
          From b39950ca01b2611d7428662beb69be8b1357a6b8 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Wed, 19 Jun 2019 14:01:38 -0700 Subject: [PATCH 297/303] final project changes --- devices/surface-hub/TOC-old.md | 55 ------- devices/surface-hub/TOC.md | 8 +- devices/surface-hub/index-old.md | 61 ------- devices/surface-hub/index.md | 2 +- devices/surface-hub/surface-hub-2s-account.md | 4 +- devices/surface-hub/surface-hub-2s-connect.md | 4 +- .../surface-hub-2s-deploy-apps-intune.md | 20 ++- devices/surface-hub/surface-hub-2s-deploy.md | 2 +- .../surface-hub-2s-install-mount.md | 16 +- .../surface-hub-2s-phone-authenticate.md | 3 +- .../surface-hub/surface-hub-2s-quick-start.md | 15 +- .../surface-hub-2s-service-update.md | 15 -- .../surface-hub-2s-site-planning.md | 2 +- .../surface-hub/surface-hub-2s-techspecs.md | 7 +- .../surface-hub/surface-hub-2s-whats-new.md | 8 +- devices/surface/TOC-old.md | 15 -- devices/surface/get-started.md | 4 +- devices/surface/index-new2.md | 150 ----------------- devices/surface/index-old.md | 63 ------- devices/surface/index.md | 154 ++++++------------ ...timal-power-settings-on-Surface-devices.md | 1 - 21 files changed, 96 insertions(+), 513 deletions(-) delete mode 100644 devices/surface-hub/TOC-old.md delete mode 100644 devices/surface-hub/index-old.md delete mode 100644 devices/surface-hub/surface-hub-2s-service-update.md delete mode 100644 devices/surface/TOC-old.md delete mode 100644 devices/surface/index-new2.md delete mode 100644 devices/surface/index-old.md diff --git a/devices/surface-hub/TOC-old.md b/devices/surface-hub/TOC-old.md deleted file mode 100644 index 058ddefab4..0000000000 --- a/devices/surface-hub/TOC-old.md +++ /dev/null @@ -1,55 +0,0 @@ -# [Microsoft Surface Hub](index.md) -## [What's new in Windows 10, version 1703 for Surface Hub?](surfacehub-whats-new-1703.md) -## [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) -## [Prepare your environment for Microsoft Surface Hub](prepare-your-environment-for-surface-hub.md) -### [Surface Hub Site Readiness Guide](surface-hub-site-readiness-guide.md) -### [Physically install Microsoft Surface Hub](physically-install-your-surface-hub-device.md) -### [Create and test a device account](create-and-test-a-device-account-surface-hub.md) -#### [Online deployment](online-deployment-surface-hub-device-accounts.md) -#### [On-premises deployment (single forest)](on-premises-deployment-surface-hub-device-accounts.md) -#### [On-premises deployment (multiple forests)](on-premises-deployment-surface-hub-multi-forest.md) -#### [Hybrid deployment](hybrid-deployment-surface-hub-device-accounts.md) -#### [Online or hybrid deployment using Skype Hybrid Voice environment](skype-hybrid-voice.md) -#### [Create a device account using UI](create-a-device-account-using-office-365.md) -#### [Microsoft Exchange properties](exchange-properties-for-surface-hub-device-accounts.md) -#### [Applying ActiveSync policies to device accounts](apply-activesync-policies-for-surface-hub-device-accounts.md) -#### [Password management](password-management-for-surface-hub-device-accounts.md) -### [Create provisioning packages](provisioning-packages-for-surface-hub.md) -### [Admin group management](admin-group-management-for-surface-hub.md) -## [Set up Microsoft Surface Hub](set-up-your-surface-hub.md) -### [Setup worksheet](setup-worksheet-surface-hub.md) -### [First-run program](first-run-program-surface-hub.md) -## [Manage Microsoft Surface Hub](manage-surface-hub.md) -### [Remote Surface Hub management](remote-surface-hub-management.md) -#### [Manage settings with an MDM provider](manage-settings-with-mdm-for-surface-hub.md) -#### [Monitor your Surface Hub](monitor-surface-hub.md) -#### [Windows updates](manage-windows-updates-for-surface-hub.md) -### [Manage Surface Hub settings](manage-surface-hub-settings.md) -#### [Local management for Surface Hub settings](local-management-surface-hub-settings.md) -#### [Accessibility](accessibility-surface-hub.md) -#### [Change the Surface Hub device account](change-surface-hub-device-account.md) -#### [Device reset](device-reset-surface-hub.md) -#### [Use fully qualified domain name with Surface Hub](use-fully-qualified-domain-name-surface-hub.md) -#### [Wireless network management](wireless-network-management-for-surface-hub.md) -### [Install apps on your Surface Hub](install-apps-on-surface-hub.md) -### [Configure Surface Hub Start menu](surface-hub-start-menu.md) -### [Set up and use Microsoft Whiteboard](whiteboard-collaboration.md) -### [End a Surface Hub meeting with End session](i-am-done-finishing-your-surface-hub-meeting.md) -### [Sign in to Surface Hub with Microsoft Authenticator](surface-hub-authenticator-app.md) -### [Save your BitLocker key](save-bitlocker-key-surface-hub.md) -### [Connect other devices and display with Surface Hub](connect-and-display-with-surface-hub.md) -### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md) -### [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md) -### [Using a room control system](use-room-control-system-with-surface-hub.md) -### [Implement Quality of Service on Surface Hub](surface-hub-qos.md) -### [Using the Surface Hub Recovery Tool](surface-hub-recovery-tool.md) -### [Surface Hub SSD replacement](surface-hub-ssd-replacement.md) -## [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) -## [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) -## [Top support solutions for Surface Hub](support-solutions-surface-hub.md) -## [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) -## [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) -## [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) -## [Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) -## [Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) -## [Change history for Surface Hub](change-history-surface-hub.md) \ No newline at end of file diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 2a580770fb..d54e783b10 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -8,7 +8,7 @@ ### [Operating system essentials (Surface Hub) ](differences-between-surface-hub-and-windows-10-enterprise.md) ## Plan -### Surface Hub 2S Site Readiness Guide +### [Surface Hub 2S Site Readiness Guide](surface-hub-2s-site-readiness-guide.md) #### [Site planning for Surface Hub 2S](surface-hub-2s-site-planning.md) #### [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) #### [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) @@ -17,17 +17,15 @@ #### [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) #### [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) ### [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) -### [Configure phone authentication for Surface Hub 2S](surface-hub-2s-phone-authenticate.md) +### [Configure Easy Authentication for Surface Hub 2S](surface-hub-2s-phone-authenticate.md) ## Deploy ### [Surface Hub 2S deployment checklist](surface-hub-2s-deploy-checklist.md) ### [Create Surface Hub 2S device account](surface-hub-2s-account.md) -### [Deploy Surface Hub 2S](surface-hub-2s-deploy.md) +### [Create provisioning packages for Surface Hub 2S](surface-hub-2s-deploy.md) ### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md) ### [Configure Surface Hub 2S with PowerShell](surface-hub-2s-configure-with-powershell.md) ### [Create Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) -### [First time setup on Surface Hub 2S](surface-hub-2s-startup.md) -### [Deploy apps with Microsoft Intune](surface-hub-2s-deploy-apps-intune.md) ## Manage ### [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) diff --git a/devices/surface-hub/index-old.md b/devices/surface-hub/index-old.md deleted file mode 100644 index 82f19b1a90..0000000000 --- a/devices/surface-hub/index-old.md +++ /dev/null @@ -1,61 +0,0 @@ ---- -title: Microsoft Surface Hub admin guide -description: Documents related to the Microsoft Surface Hub. -ms.assetid: 69C99E91-1441-4318-BCAF-FE8207420555 -ms.prod: surface-hub -ms.sitesec: library -author: jdeckerms -ms.author: jdecker -ms.topic: article -ms.date: 09/07/2017 -ms.localizationpriority: medium ---- - -# Microsoft Surface Hub admin guide - ->[Looking for the Surface Hub admin guide for Windows 10, version 1607?](https://download.microsoft.com/download/7/2/5/7252051B-7E97-4781-B5DF-58D4B1A4BB88/surface-hub-admin-guide-1607.pdf) - ->[Looking for the user's guide for Surface Hub?](https://download.microsoft.com/download/3/6/B/36B6331E-0C63-4E71-A05D-EE88D05081F8/surface-hub-user-guide-en-us.pdf) - - -
          Microsoft Surface Hub is an all-in-one productivity device that is intended for brainstorming, collaboration, and presentations. In order to get the maximum benefit from Surface Hub, your organization’s infrastructure and the Surface Hub itself must be properly set up and integrated. The documentation in this library describes what needs to be done both before and during setup in order to help you optimize your use of the device.![image of a Surface Hub](images/surfacehub.png)
          -  - -## Surface Hub setup process - -In some ways, adding your new Surface Hub is just like adding any other Microsoft Windows-based device to your network. However, in order to get your Surface Hub up and running at its full capacity, there are some very specific requirements. Here are the next topics you'll need: - -1. [Prepare your environment for Surface Hub](prepare-your-environment-for-surface-hub.md) -2. [Gather the information listed in the Setup worksheet](setup-worksheet-surface-hub.md) -2. [Physically install your Surface Hub device](physically-install-your-surface-hub-device.md) -3. [Run the Surface Hub first-run setup program (OOBE)](first-run-program-surface-hub.md) - - - -## In this section - -| Topic | Description | -| --- | --- | -| [What's new in Windows 10, version 1703 for Surface Hub?](surfacehub-whats-new-1703.md) | Discover the changes and improvements for Microsoft Surface Hub in the Windows 10, version 1703 release (also known as Creators Update). | -| [Differences between Surface Hub and Windows 10 Enterprise](differences-between-surface-hub-and-windows-10-enterprise.md) | This topic explains the differences between the operating system on Surface Hub and Windows 10 Enterprise. | -| [Prepare your environment for Microsoft Surface Hub](prepare-your-environment-for-surface-hub.md) | This section contains an overview of the steps required to prepare your environment so that you can use all of the features of Surface Hub. See [Intro to Surface Hub](intro-to-surface-hub.md) for a description of how the device and its features interact with your IT environment. | -| [Set up Microsoft Surface Hub](set-up-your-surface-hub.md) | Set up instructions for Surface Hub include a setup worksheet, and a walkthrough of the first-run program. | -| [Manage Microsoft Surface Hub](manage-surface-hub.md) | How to manage your Surface Hub after finishing the first-run program. | -| [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) | -| [How Surface Hub addresses Wi-Fi Direct security issues](surface-hub-wifi-direct.md) | This topic provides guidance on Wi-Fi Direct security risks, how the Surface Hub has addressed those risks, and how Surface Hub administrators can configure the device for the highest level of security. | PowerShell scripts to help set up and manage your Surface Hub. | -| [Top support solutions for Surface Hub](support-solutions-surface-hub.md) | These are the top Microsoft Support solutions for common issues experienced using Surface Hub. | -| [Troubleshoot Microsoft Surface Hub](troubleshoot-surface-hub.md) | Troubleshoot common problems, including setup issues, Exchange ActiveSync errors. | -| [Troubleshoot Miracast on Surface Hub](miracast-troubleshooting.md) | Learn how to resolve Miracast issues. | -| [Useful downloads for Surface Hub administrators](surface-hub-downloads.md) | This topic provides links to useful Surface Hub documents. | -| [Change history for Surface Hub](change-history-surface-hub.md) | This topic lists new and updated topics in the Surface Hub documentation library. | - - - -## Additional resources - -- [Surface Hub update history](https://support.microsoft.com/help/4037666/surface-surface-hub-update-history) -- [Surface Hub help](https://support.microsoft.com/hub/4343507/surface-hub-help) -- [Surface IT Pro Blog](https://blogs.technet.microsoft.com/surface/) -- [Surface Playlist of videos](https://www.youtube.com/playlist?list=PLXtHYVsvn_b__1Baibdu4elN4SoF3JTBZ) -- [Microsoft Surface on Twitter](https://twitter.com/surface) - diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md index a99060c42a..6f051de2d4 100644 --- a/devices/surface-hub/index.md +++ b/devices/surface-hub/index.md @@ -12,7 +12,7 @@ description: "Get started with Microsoft Surface Hub." --- # Get started with Surface Hub -Microsoft Surface Hub 2S is an all-in one productivity device for brainstorming, collaboration, and presentations. Use the links to content below to learn how to plan, deploy, manage, and support your Surface Hub devices. +Surface Hub 2S is an all-in-one digital interactive whiteboard, meetings platform, and collaborative computing device that brings the power of Windows 10 to team collaboration. Use the links below to learn how to plan, deploy, manage, and support your Surface Hub devices.
          • diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index 9597d7284e..348bce4e21 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -25,9 +25,9 @@ Complete advanced configuration tasks using Windows PowerShell. For example: For more information, see [Configure Surface Hub 2S accounts with PowerShell](surface-hub-2s-configure-with-powershell.md). -## Create account using Office 365 portal +## Create account using Microsoft 365 admin center -1. In the Microsoft 365 Admin Center, go to Resources and choose Rooms & Equipment and then click +Room. +1. In the Microsoft 365 admin center, go to **Resources** and choose **Rooms & Equipment** and then select **+ Room**. 2. Provide a name and email address for the device account. Leave remaining settings unchanged in the default state. diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index eec4f12605..f83a4e0b1c 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -17,10 +17,10 @@ Surface Hub 2S lets you connect external devices, mirror the display on Surface ## Connect external PCs and related devices -You can display content from your devices to Surface Hub 2S. If the source device is Windows-based, that device can also provide TouchBack and InkBack, which takes video and audio from the connected device and presents them on Surface Hub 2S. If Surface Hub 2S encounters a High-Bandwidth Digital Content Protection (HDCP) signal, such as a Blu-ray DVD player, the source is displayed as a black image. To display your content without violating HDCP requirements, use the keypad of Surface Hub 2S to directly choose the external source via a wired connection such as USB-C or HDMI. +You can display content from your devices to Surface Hub 2S. If the source device is Windows-based, that device can also provide TouchBack and InkBack, which takes video and audio from the connected device and presents them on Surface Hub 2S. If Surface Hub 2S encounters a High-Bandwidth Digital Content Protection (HDCP) signal, such as a Blu-ray DVD player, the source is displayed as a black image. > [!NOTE] -> Surface Hub-2S will use the video input that you select until a new connection is made, the existing connection is disrupted, or the Connect App is closed. +> Surface Hub-2S uses the video input selected until a new connection is made, the existing connection is disrupted, or the Connect App is closed. ## Recommended wired configurations for connecting to Surface Hub 2S diff --git a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md index 03473f2577..c7cbab0851 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md +++ b/devices/surface-hub/surface-hub-2s-deploy-apps-intune.md @@ -28,23 +28,29 @@ You can install additional apps to fit your team or organization's needs. You can deploy Universal Windows Platform (UWP) apps to Surface Hub 2S using Intune, easing app deployment to devices. -1. To deploy apps, enable MDM for your organization. In the Intune portal, select **Intune** as your MDM Authority (recommended). +1. To deploy apps, enable MDM for your organization. In the Intune portal, select **Intune** as your MDM Authority (recommended).
            ![Choose MDM authority](images/sh2-set-intune5.png) -2. Enable the Microsoft Store for Business in Intune. Open Intune, select **Client apps** > **Microsoft Store for Business.** +2. Enable the Microsoft Store for Business in Intune. Open Intune, select **Client apps** > **Microsoft Store for Business.**
            ![Enable Store for Business](images/sh2-deploy-apps-sync.png) -3. In Intune open **Microsoft Store for Business** and select **Settings** > **Distribute** > **Management tools**. Choose **Microsoft Intune** as your management tool. +3. In Intune open **Microsoft Store for Business** and select **Settings** > **Distribute** > **Management tools**. Choose **Microsoft Intune** as your management tool.
            ![Add Intune as your management tool](images/sh2-set-intune8.png) 4. In Microsoft Store for Business, select **Settings** > **Shop** > **Shopping Experience**, and then select **Show offline apps**. Offline apps refer to apps that can be synced to Intune and centrally deployed to a device. 5. After enabling Offline shopping, you can acquire offline licenses for apps that you can sync to Intune and deploy as Device licensing. 6. In **Intune** > **Client apps** > **Microsoft Store for Business**, select **Sync**. -7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Select **Assignments** > **Add group**. ![*Assigning apps to groups *](images/sh2-assign-group.png)
            -8. Under assignment type, choose **Required**. +7. In the Client apps page, search for the app in the apps list. Assign the apps to the desired device group or groups. Select **Assignments** > **Add group**.
            + +![*Assigning apps to groups *](images/sh2-assign-group.png)
            + +8. Under assignment type, choose **Required**.
            + ![*Assigning apps to groups *](images/sh2-add-group.png)
            -9. For the selected groups, choose **Device licensing** and then select **OK** and save the assignment. -![*Assigning apps to groups *](images/sh2-apps-assign.png)
            + +9. For the selected groups, choose **Device licensing** and then select **OK** and save the assignment.
            + +![*Assigning apps to groups *](images/sh2-apps-assign.png) diff --git a/devices/surface-hub/surface-hub-2s-deploy.md b/devices/surface-hub/surface-hub-2s-deploy.md index 9046d56858..59d66af7f3 100644 --- a/devices/surface-hub/surface-hub-2s-deploy.md +++ b/devices/surface-hub/surface-hub-2s-deploy.md @@ -17,7 +17,7 @@ You can use Windows Configuration Designer (WCD) to create provisioning packages ### Install Windows Configuration Designer -Install Windows Configuration Designer from the Windows Assessment and Deployment Kit (ADK) for Windows 10. Download and install the [ADK for Windows 10, version 1703](https://go.microsoft.com/fwlink/p/?LinkId=845542) . For more information, see [Download and install the Windows ADK](https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install) +Install Windows Configuration Designer from the Windows Assessment and Deployment Kit (ADK) for Windows 10. Download and install the [ADK for Windows 10, version 1703](https://go.microsoft.com/fwlink/p/?LinkId=845542). For more information, see [Download and install the Windows ADK](https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install). ### Add certificates diff --git a/devices/surface-hub/surface-hub-2s-install-mount.md b/devices/surface-hub/surface-hub-2s-install-mount.md index a3269296d3..5640e07bc4 100644 --- a/devices/surface-hub/surface-hub-2s-install-mount.md +++ b/devices/surface-hub/surface-hub-2s-install-mount.md @@ -17,11 +17,19 @@ Surface Hub 2S is designed for ease of mobility with a form factor that enables You can mount Surface Hub 2S with the certified wall mount or the certified mobile stand, both developed in partnership with Steelcase. Both fully integrate with the design of Surface Hub 2S, enabling unimpeded access to the compute cartridge along with all I/O ports and power. -For more information, see [Officially licensed third-party accessories](http://licensedhardware.azurewebsites.net/surface) and view installation demos from the Surface product team: - -- [Unboxing and set up](https://youtu.be/fCrxdNXvru4) -- [Steelcase mobile stand and APC battery set up](https://youtu.be/VTzdu4Skpkg) +For more information, see [Officially licensed third-party accessories](http://licensedhardware.azurewebsites.net/surface) and view installation demos from the Surface product team at [Steelcase mobile stand and APC battery set up](https://youtu.be/VTzdu4Skpkg). ![Surface Hub 2S on Roam Mobile Stand](images/sh2-mobile-stand.png)
            If you’re not using licensed accessories, see [Customizing installation of Surface Hub 2S](surface-hub-2s-connect.md). + +| 1. **Set up your mount first** | | +|:------ |:-------- | +| Leave your Surface Hub in the box until the mount is set up and mounting hardware is applied. Mount is not included. Your mount is sold separately. | ![* Set up your mount first *](images/sh2-setup-1.png)
            | +| 2. **Attach hardware to the Surface Hub** | | +| Mounting hardware and specific instructions are found in the box for your mount. | ![* Attach hardware to the Surface Hub *](images/sh2-setup-2.png)
            | +| 3. **Remove the instructional label before mounting.** | | +| Get someone to help you lift and mount your Surface Hub. Make sure to hold and lift the Surface Hub from the bottom. | ![* Remove the instructional label before mounting *](images/sh2-setup-3.png)
            | +| 4. **Attach accessories and power on** | | +| Install accessories and attach power cable as shown. See guides on the screen cling. Remove cling wrap from the screen. Press the power button to power on. | ![* Attach accessories and power on *](images/sh2-setup-4.png)
            | + diff --git a/devices/surface-hub/surface-hub-2s-phone-authenticate.md b/devices/surface-hub/surface-hub-2s-phone-authenticate.md index c40c5f96ce..fddd72900c 100644 --- a/devices/surface-hub/surface-hub-2s-phone-authenticate.md +++ b/devices/surface-hub/surface-hub-2s-phone-authenticate.md @@ -15,7 +15,8 @@ ms.localizationpriority: Normal Easy Authentication simplifies signing-in to your meetings and files on Surface Hub 2S. -Note: Easy Authentication requires that your primary email address must match your UPN. +> [!NOTE] +> Easy Authentication requires that your primary email address must match your UPN. ## To set up Easy Authentication diff --git a/devices/surface-hub/surface-hub-2s-quick-start.md b/devices/surface-hub/surface-hub-2s-quick-start.md index fcd3dcdc8f..87103e79f6 100644 --- a/devices/surface-hub/surface-hub-2s-quick-start.md +++ b/devices/surface-hub/surface-hub-2s-quick-start.md @@ -20,17 +20,9 @@ ms.localizationpriority: Normal 3. In the base of the Surface Hub 2S, open the accessories box containing the setup guide, Surface Hub 2 pen, Surface Hub 2 camera, and the power cable. 4. On the back of the Surface Hub, there's an instructional label showing you where to attach the mounting hardware. Install them in place and remove the label. -| 1. **Set up your mount first** | | -|------ | -------- | -| Leave your Surface Hub in the box until the mount is set up and mounting hardware is applied. Mount is not included. Your mount is sold separately. | ![* Set up your mount first *](images/sh2-setup-1.png)
            | -| 2. **Attach hardware to the Surface Hub** | | -| Mounting hardware and specific instructions are found in the box for your mount. | ![* Attach hardware to the Surface Hub *](images/sh2-setup-2.png)
            | -| 3. **Remove the instructional label before mounting.** | | -| Get someone to help you lift and mount your Surface Hub. Make sure to hold and lift the Surface Hub from the bottom. | ![* Remove the instructional label before mounting *](images/sh2-setup-3.png)
            | -| 4. **Attach accessories and power on** | | -| Install accessories and attach power cable as shown. See guides on the screen cling. Remove cling wrap from the screen. Press the power button to power on. | ![* Attach accessories and power on *](images/sh2-setup-4.png)
            | +See this video for more information about [unboxing and set up](https://youtu.be/fCrxdNXvru4). -## Install and adjust pen +## Install and adjust pen 1. Attach Surface Hub 2 pen magnetically to your preferred side of the device. @@ -41,9 +33,10 @@ ms.localizationpriority: Normal ![*Adjust the slider to change pen pressure *](images/sh2-pen-pressure.png)
            ## Install camera + Remove the lens cling from the camera and attach it to the USB-C port on the top of the Surface Hub 2S. ## Start Surface Hub 2S 1. Insert the power cable into the back of the device and plug it into a power outlet. Run the cable through any cable guides on your mounting solution and remove the screen clang. -2. To begin, press the power button on the bottom right. To learn more about running the out of the box (OOBE) setup of Surface Hub 2S, see [Out-of-box startup for Surface Hub 2S](surface-hub-2s-startup.md). +2. To begin, press the power button on the bottom right. diff --git a/devices/surface-hub/surface-hub-2s-service-update.md b/devices/surface-hub/surface-hub-2s-service-update.md deleted file mode 100644 index 75d2e652c6..0000000000 --- a/devices/surface-hub/surface-hub-2s-service-update.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: "Servicing and updating Surface Hub 2S" -description: "Learn more about servicing and updating in Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal -ROBOTS: NOINDEX, NOFOLLOW ---- - -# Servicing and updating Surface Hub 2S \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index 0986c0fe3d..6837b360bc 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -19,7 +19,7 @@ Designed for team collaboration, Surface Hub 2S can transform the way you work ## Room considerations -Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beam-forming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity guidance to determine if you need to plan for peripherals. +Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, 8-element microphone array, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity guidance to determine if you need to plan for peripherals. | **Room size** | **Participants** | **Proximity** | **Additional peripherals** | diff --git a/devices/surface-hub/surface-hub-2s-techspecs.md b/devices/surface-hub/surface-hub-2s-techspecs.md index 67b81fde8a..fe9ecec1c7 100644 --- a/devices/surface-hub/surface-hub-2s-techspecs.md +++ b/devices/surface-hub/surface-hub-2s-techspecs.md @@ -13,15 +13,13 @@ ms.localizationpriority: Normal # Surface Hub 2S tech specs -## General specs - |**Item**|**Details**| |:------ |:--------- | -|**Size**| 29.2" x 43.2" x 3.0” (741 mm x 1097 mm x 76 mm) | +|**Dimensions**| 29.2" x 43.2" x 3.0” (741 mm x 1097 mm x 76 mm) | |**Weight**| 61.6 lbs. (28 kg) | |**Resolution**| 3840 x 2560 | |**Display**| PixelSense Display, 3:2 aspect ratio, 10-bit color, 15.5 mm border, anti-glare, IPS LCD | -|**Compute**| Quad-core 8th Generation Intel Core i5 processor, 8 GB RAM, 128 GB SSD 1 | +|**Processor**| Quad-core 8th Generation Intel Core i5 processor, 8 GB RAM, 128 GB SSD 1 | |**Graphics**| Intel UHD Graphics 620 | |**Wireless**| Wi-Fi 5 (IEEE 802.11 a/b/g/n/ac compatible) Bluetooth Wireless 4.1 technology
            Miracast display | |**Connections**| USB-A
            Mini-DisplayPort 1.2 video output
            RJ45 gigabit Ethernet (1000/100/10 BaseT)
            HDMI video input (HDMI 2.0, HDCP 2.2 /1.4)
            USB-C with DisplayPort input
            Four USB-C (on display) | @@ -29,7 +27,6 @@ ms.localizationpriority: Normal |**Audio/Video**| Full-range, front facing 3-way stereo speakers
            Full band 8-element MEMS microphone array
            Microsoft Surface Hub 2 Camera, 4K, USB-C connection, 90-degree HFOV | |**Pen**| Microsoft Surface Hub 2 Pen (active) | |**Software**| Windows 10
            Microsoft Teams for Surface Hub 2
            Skype for Business
            Microsoft Whiteboard
            Microsoft Office (Mobile)
            Microsoft Power BI 2 | -|**Connections**| USB-A
            Mini-DisplayPort video output
            RJ45 Gigabit Ethernet
            HDMI video input
            USB-C with DisplayPort input
            Four USB-C (on display) | |**Exterior**| Casing: Precision machined aluminum with mineral-composite resin
            Color: Platinum
            Physical Buttons: Power, Volume, Source | |**What’s in the box**| One Surface Hub 2S
            One Surface Hub 2 Pen
            One Surface Hub 2 Camera
            2.5 m AC Power Cable
            Quick Start Guide | |**Warranty**| 1-year limited hardware warranty | diff --git a/devices/surface-hub/surface-hub-2s-whats-new.md b/devices/surface-hub/surface-hub-2s-whats-new.md index 3b46fffc8f..7efb9ca4b3 100644 --- a/devices/surface-hub/surface-hub-2s-whats-new.md +++ b/devices/surface-hub/surface-hub-2s-whats-new.md @@ -17,13 +17,13 @@ Surface Hub 2S is an all-in-one collaboration canvas that’s built for teamwork |**Capability**|**Summary**|**Learn more**| |:-------|:------|:----| -|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

            Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware at the firmware level. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)

            [Surface Enterprise Management Mode](https://docs.microsoft.com/surface/surface-enterprise-management-mode) | +|**Mobile Device Management and UEFI manageability**| Manage settings and policies using a mobile device management (MDM) provider.

            Full integration with Surface Enterprise Management Mode (SEMM) lets you manage hardware components and firmware. | [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)

            [Surface Enterprise Management Mode](https://docs.microsoft.com/surface/surface-enterprise-management-mode) | |**Cloud and on-premises coexistence**| Supports on-premises, hybrid, or online. | [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) | |**Reset and recovery**| Restore from the cloud or USB drive. | [Recover and reset Surface Hub 2S](surface-hub-2s-recover-reset.md) | |**Microsoft Whiteboard**| Ofice 365 integration, intelligent ink, and Bing search bring powerful new capabilities, enabling a persistent digital canvas shareable across most browsers, Windows and iOS devices. | [Announcing a new whiteboard for your Surface Hub](https://techcommunity.microsoft.com/t5/Office-365-Blog/Announcing-a-new-Whiteboard-for-your-Surface-Hub/ba-p/637050) | |**Microsoft Teams Meeting Room License**| Extends Office 365 licensing options across Skype for Business, Microsoft Teams, and Intune. | [Teams Meeting Room Licensing Update](https://docs.microsoft.com/MicrosoftTeams/room-systems/skype-room-systems-v2-0) | |**On-screen display**| Adjust volume, brightness, and input control directly on the display. | | -|**Sensor-activated Connected Standby**| Doppler sensor activates Connected Standby after 1 minute of inactivity.

            Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | +|**Sensor-activated Connected Standby**| Doppler sensor activates Connected Standby after 1 minute of inactivity.

            Manage this setting remotely using Intune or directly on the device from the Settings app. | [Surface Hub 2S tech specs](surface-hub-2s-techspecs.md) | |**Surface Hub pen**| Ergonomically redesigned and easily attachable on the sides of the device. | | |**Surface app for Surface Hub 2S**| Change audio settings and view your device's information from the Surface app | | |**Ready for tomorrow**| Removable cartridge facilitates upgrading to new features. | | @@ -40,7 +40,7 @@ The following table details the differences between Surface Hub and Surface Hub |**Component**| **Surface Hub 55”**|**Surface Hub 84”**| **Surface Hub 2S**| |:----- |:---- |:---- |:----- | |**Form Factor**| 55” | 84” | 50” | -|**Size**| 31.75” x 59.62” x 3.38”
            (806.4 mm x 1514.3 mm x 85.8 mm) | 46.12” x 86.7” x 4.15”
            (1171.5 mm x 2202.9 mm x 105.4 mm) | 29.2" x 43.2" x 3.0"
            (741 mm x 1097 mm x 76 mm) | +|**Dimension**| 31.75” x 59.62” x 3.38”
            (806.4 mm x 1514.3 mm x 85.8 mm) | 46.12” x 86.7” x 4.15”
            (1171.5 mm x 2202.9 mm x 105.4 mm) | 29.2" x 43.2" x 3.0"
            (741 mm x 1097 mm x 76 mm) | |**Weight**| 105 lbs. (48 kg) | 280 lbs. (127 kg) | 61.6 lbs. (28 kg) | |**Display**| Resolution:
            1920 x 1080 @ 120 Hz
            Contrast ratio:
            1300:1
            Touch:
            100-point multi-touch
            Projective Capacitance optically bonded sensor | Resolution:
            3840 x 2160 @ 120 Hz
            Contrast Ratio:
            1400:1
            Touch:
            100-point multi-touch
            Projective Capacitance optically bonded sensor | Resolution:
            3840 x 2560 @ 60 Hz | |**Aspect Ratio**| 16:9 | 16:9 | 3:2 | @@ -61,5 +61,3 @@ The following table details the differences between Surface Hub and Surface Hub > [!NOTE] > The NFC reader available in the original Surface Hub is discontinued in Surface Hub 2S and is no longer available. - -To learn more about what’s new in Surface Hub 2S, see [Behind the design: Surface Hub 2S](https://techcommunity.microsoft.com/t5/Surface-IT-Pro-Blog/Behind-the-design-Surface-Hub-2S/ba-p/464099). diff --git a/devices/surface/TOC-old.md b/devices/surface/TOC-old.md deleted file mode 100644 index e333b838b1..0000000000 --- a/devices/surface/TOC-old.md +++ /dev/null @@ -1,15 +0,0 @@ -# [Surface](index.md) - -### [Surface Pro Tech specs](https://www.microsoft.com/surface/devices/surface-pro/tech-specs) -### [Surface Book Tech specs](https://www.microsoft.com/surface/devices/surface-book/tech-specs) -### [Surface Studio Tech specs](https://www.microsoft.com/surface/devices/surface-studio/tech-specs) -### [Surface Go Tech specs](https://www.microsoft.com/surface/devices/surface-go/tech-specs) -### [Surface Laptop 2 Tech specs](https://www.microsoft.com/surface/devices/surface-laptop/tech-specs) -### [Windows Autopilot and Surface devices](windows-autopilot-and-surface-devices.md) -### [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsc.md) -### [Long-Term Servicing Branch for Surface devices](ltsb-for-surface.md) -### [Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) -### [Considerations for Surface and System Center Configuration Manager](considerations-for-surface-and-system-center-configuration-manager.md) -### [Deploy Surface app with Microsoft Store for Business](deploy-surface-app-with-windows-store-for-business.md) -### [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) -### [Ethernet adapters and Surface deployment](ethernet-adapters-and-surface-device-deployment.md) diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md index 4269e7f06d..0013b51394 100644 --- a/devices/surface/get-started.md +++ b/devices/surface/get-started.md @@ -63,7 +63,7 @@ Harness the power of Surface, Windows, and Office connected together through the
          @@ -137,7 +137,7 @@ Harness the power of Surface, Windows, and Office connected together through the

          Discover Surface tools

          -

          Surface Diagnostic Toolkit for Business

          +

          Surface Diagnostic Toolkit for Business

          SEMM and UEFI

          Surface Brightness Control

          Surface Data Eraser

          diff --git a/devices/surface/index-new2.md b/devices/surface/index-new2.md deleted file mode 100644 index b6709b00f1..0000000000 --- a/devices/surface/index-new2.md +++ /dev/null @@ -1,150 +0,0 @@ ---- -title: Microsoft Surface documentation and resources -layout: HubPage -hide_bc: true -description: Surface and Surface Hub documentation for admins & IT professionals -author: robmazz -ms.author: robmazz -manager: laurawi -ms.topic: hub-page -keywords: Microsoft Surface, Microsoft Surface Hub, Surface documentation -localization_priority: Normal -audience: ITPro -ms.prod: Surface -description: Learn about Microsoft Surface and Surface Hub devices. ---- - diff --git a/devices/surface/index-old.md b/devices/surface/index-old.md deleted file mode 100644 index e559820d25..0000000000 --- a/devices/surface/index-old.md +++ /dev/null @@ -1,63 +0,0 @@ ---- -title: Surface (Surface) -description: -ms.assetid: 2a6aec85-b8e2-4784-8dc1-194ed5126a04 -ms.localizationpriority: high -ms.prod: w10 -ms.mktglfcycl: manage -ms.pagetype: surface, devices -ms.sitesec: library -author: heatherpoulsen -ms.author: jdecker -ms.topic: article -ms.date: 10/16/2017 ---- - -# Surface - - -This library provides guidance to help you deploy Windows on Microsoft Surface devices, keep those devices up to date, and easily manage and support Surface devices in your organization. - -For more information on planning for, deploying, and managing Surface devices in your organization, see the [Surface TechCenter](https://technet.microsoft.com/windows/surface). - -## In this section - -| Topic | Description | -| --- | --- | -| [Deploy Surface devices](deploy.md) | Get deployment guidance for your Surface devices including information about MDT, OOBE customization, Ethernet adaptors, and Surface Deployment Accelerator. | -| [Surface firmware and driver updates](update.md) | Find out how to download and manage the latest firmware and driver updates for your Surface device. | -| [Considerations for Surface and System Center Configuration Manager](considerations-for-surface-and-system-center-configuration-manager.md) | Get guidance on how to deploy and manage Surface devices with System Center Configuration Manager. | -| [Deploy Surface app with Microsoft Store for Business](deploy-surface-app-with-windows-store-for-business.md) | Find out how to add and download Surface app with Microsoft Store for Business, as well as install Surface app with PowerShell and MDT. | -| [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) | Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. | -| [Manage Surface UEFI settings](manage-surface-uefi-settings.md) | Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. | -| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. | -| [Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) | Learn how to investigate, troubleshoot, and resolve hardware, software, and firmware issues with Surface devices. | -| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. | -| [Top support solutions for Surface devices](support-solutions-surface.md) | These are the top Microsoft Support solutions for common issues experienced using Surface devices in an enterprise. | -| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. | - - -## Learn more - -[Certifying Surface Pro 4 and Surface Book as standard devices at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/849/Certifying-Surface-Pro-4-and-Surface-Book-as-standard-devices-at-Microsoft) - - - - -  - -## Related topics - - -[Surface TechCenter](https://technet.microsoft.com/windows/surface) - -[Surface for IT pros blog](http://blogs.technet.com/b/surface/) - -  - -  - - - - - diff --git a/devices/surface/index.md b/devices/surface/index.md index c3557eb9db..b6709b00f1 100644 --- a/devices/surface/index.md +++ b/devices/surface/index.md @@ -16,128 +16,70 @@ description: Learn about Microsoft Surface and Surface Hub devices.

          Microsoft Surface

          -

          Learn how to plan, deploy, and manage Microsoft Surface and Surface Hub devices.

          -

          +

          Learn how to plan, deploy, and manage Microsoft Surface and Surface Hub devices.

          @@ -172,20 +114,20 @@ description: Learn about Microsoft Surface and Surface Hub devices.
          -
        • +
        • - Chat + Need help?
          @@ -197,12 +139,12 @@ description: Learn about Microsoft Surface and Surface Hub devices.
        • -
        +
      -
    +
- \ No newline at end of file + diff --git a/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md b/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md index e234bd2db5..6dcd9db277 100644 --- a/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md +++ b/devices/surface/maintain-optimal-power-settings-on-Surface-devices.md @@ -7,7 +7,6 @@ ms.sitesec: library author: dansimp ms.author: dansimp ms.topic: article -ms.date: 01/17/2019 ms.reviewer: manager: dansimp --- From 3c05ed1630c70b62d5ecc11e01b1a20bae52daf2 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 19 Jun 2019 14:06:51 -0700 Subject: [PATCH 298/303] added or later --- windows/deployment/windows-autopilot/self-deploying.md | 2 +- .../deployment/windows-autopilot/windows-autopilot-whats-new.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/windows-autopilot/self-deploying.md b/windows/deployment/windows-autopilot/self-deploying.md index 38159d4743..09ecd98706 100644 --- a/windows/deployment/windows-autopilot/self-deploying.md +++ b/windows/deployment/windows-autopilot/self-deploying.md @@ -38,7 +38,7 @@ Self-deploying mode is designed to deploy Windows 10 as a kiosk, digital signage Because self-deploying mode uses a device’s TPM 2.0 hardware to authenticate the device into an organization’s Azure AD tenant, devices without TPM 2.0 cannot be used with this mode. The devices must also support TPM device attestation. (All newly-manufactured Windows devices should meet these requirements.) >[!NOTE] ->If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error. (Hyper-V virtual TPMs are not supported.) +>If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported).. Also note that Window 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. In order to display an organization-specific logo and organization name during the Autopilot process, Azure Active Directory Company Branding needs to be configured with the images and text that should be displayed. See [Quickstart: Add company branding to your sign-in page in Azure AD](https://docs.microsoft.com/azure/active-directory/fundamentals/customize-branding) for more details. diff --git a/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md b/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md index 40285c5f1b..57c91a67e4 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-whats-new.md @@ -43,7 +43,7 @@ Windows Autopilot [self-deploying mode](self-deploying.md) enables a zero touch You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required. >[!NOTE] ->Window 10, version 1903 is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. +>Window 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. ## Related topics From 06d5970104c1717930d89d05bb7d9eb14b04f5bf Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Wed, 19 Jun 2019 14:41:55 -0700 Subject: [PATCH 299/303] added more public PR --- .../windows-autopilot/autopilot-faq.md | 49 ++++++++++--------- .../windows-autopilot/self-deploying.md | 3 ++ 2 files changed, 28 insertions(+), 24 deletions(-) diff --git a/windows/deployment/windows-autopilot/autopilot-faq.md b/windows/deployment/windows-autopilot/autopilot-faq.md index 9df667a4bc..59296c932d 100644 --- a/windows/deployment/windows-autopilot/autopilot-faq.md +++ b/windows/deployment/windows-autopilot/autopilot-faq.md @@ -93,15 +93,15 @@ A [glossary](#glossary) of abbreviations used in this topic is provided at the e ## The end user experience -| Question | Answer | -|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| How do I know that I received Autopilot? | You can tell that you received Windows Autopilot (as in the device received a configuration but has not yet applied it) when you skip the selection page (as seen below), and are immediately taken to a generic or customized sign-in page. | -| Windows Autopilot didn’t work, what do I do now? | Questions and actions to assist in troubleshooting: Did a screen not get skipped? Did a user end up as an admin when configured not to? Remember that AAD Admins will be local admins regardless of whether Windows Autopilot is configured to disable local admin Collection information – run licensingdiag.exe and send the .cab (Cabinet file) file that is generated to AutopilotHelp@microsoft.com. If possible, collect an ETL from WPR. Often in these cases, users are not signing into the right AAD tenant, or are creating local user accounts. For a complete list of support options, refer to [Windows Autopilot support](autopilot-support.md). | -| If an Administrator makes changes to an existing profile, will the changes take effect on devices that have that profile assigned to them that have already been deployed? | No. Windows Autopilot profiles are not resident on the device. They are downloaded during OOBE, the settings defined at the time are applied. Then, the profile is discarded on the device. If the device is re-imaged or reset, the new profile settings will take effect the next time the device goes through OOBE. | -| What is the experience if a device isn’t registered or if an IT Admin doesn’t configure Windows Autopilot prior to an end user attempting to self-deploy? | If the device isn’t registered, it will not receive the Windows Autopilot experience and the end user will go through normal OOBE. The Windows Autopilot configurations will NOT be applied until the user runs through OOBE again, after registration. If a device is started before an MDM profile is created, the device will go through standard OOBE experience. The IT Admin would then have to manually enrol that device into the MDM, after which—the next time that device is “reset”—it will go through the Windows Autopilot OOBE experience. | -| What may be a reason why I did not receive a customized sign-in screen during Autopilot? | Tenant branding must be configured in portal.azure.com to receive a customized sign-in experience. | -| What happens if a device is registered with Azure AD but does not have an Windows Autopilot profile assigned? | The regular AAD OOBE will occur since no Windows Autopilot profile was assigned to the device. | -| How can I collect logs on Autopilot? | The best way to collect logs on Windows Autopilot performance is to collect a Windows Performance Recorder (WPR) trace during OOBE. The XML file (WPRP extension) for this trace may be provided upon request. | +|Question|Answer| +|----|-----| +|How do I know that I received Autopilot?|You can tell that you received Windows Autopilot (as in the device received a configuration but has not yet applied it) when you skip the selection page (as seen below), and are immediately taken to a generic or customized sign-in page.| +|Windows Autopilot didn’t work, what do I do now?| Questions and actions to assist in troubleshooting: Did a screen not get skipped? Did a user end up as an admin when configured not to? Remember that AAD Admins will be local admins regardless of whether Windows Autopilot is configured to disable local admin Collection information – run licensingdiag.exe and send the .cab (Cabinet file) file that is generated to AutopilotHelp@microsoft.com. If possible, collect an ETL from WPR. Often in these cases, users are not signing into the right AAD tenant, or are creating local user accounts. For a complete list of support options, refer to [Windows Autopilot support](autopilot-support.md). | +| If an Administrator makes changes to an existing profile, will the changes take effect on devices that have that profile assigned to them that have already been deployed? |No. Windows Autopilot profiles are not resident on the device. They are downloaded during OOBE, the settings defined at the time are applied. Then, the profile is discarded on the device. If the device is re-imaged or reset, the new profile settings will take effect the next time the device goes through OOBE.| +|What is the experience if a device isn’t registered or if an IT Admin doesn’t configure Windows Autopilot prior to an end user attempting to self-deploy? |If the device isn’t registered, it will not receive the Windows Autopilot experience and the end user will go through normal OOBE. The Windows Autopilot configurations will NOT be applied until the user runs through OOBE again, after registration. If a device is started before an MDM profile is created, the device will go through standard OOBE experience. The IT Admin would then have to manually enrol that device into the MDM, after which—the next time that device is “reset”—it will go through the Windows Autopilot OOBE experience.| +|What may be a reason why I did not receive a customized sign-in screen during Autopilot? |Tenant branding must be configured in portal.azure.com to receive a customized sign-in experience.| +|What happens if a device is registered with Azure AD but does not have an Windows Autopilot profile assigned? |The regular AAD OOBE will occur since no Windows Autopilot profile was assigned to the device.| +|How can I collect logs on Autopilot?|The best way to collect logs on Windows Autopilot performance is to collect a Windows Performance Recorder (WPR) trace during OOBE. The XML file (WPRP extension) for this trace may be provided upon request.| ## MDM @@ -127,21 +127,22 @@ A [glossary](#glossary) of abbreviations used in this topic is provided at the e ## General -| Question | Answer | -|------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| If I wipe the machine and restart, will I still receive Windows Autopilot? | Yes, if the device is still registered for Windows Autopilot and is running Windows 10, version 1703 7B and above releases, it will receive the Windows Autopilot experience. | -| Can I harvest the device fingerprint on existing machines? | Yes, if the device is running Windows 10, version 1703 and above, you can harvest device fingerprints for registration. There are no plans to backport the functionality to previous releases and no way to harvest them on pre-Windows 10 Windows 10, version 1703 devices that have not been updated to Windows 10, version 1703. | -| What is Windows 10, version 1703 7B and why does it matter? | Windows 10, version 1703 7B is a Windows 10, version 1703 image bundled with cumulative updates. To receive Autopilot, clients **must** run Windows 10, version 1703 7B or later. These cumulative updates contain a critical fix for Autopilot. Consider the following:

Windows Autopilot will not apply its profiles to the machine unless AAD credentials match the expected AAD tenant. For the Windows 10, version 1703 release, it was assumed that would be determined by the domain name, so the domain name used to register (for example contoso.com) should match the domain name used to sign in (for example user@contoso.com). But what happens if your tenant has multiple domains (for example us.contoso.com, or fr.contoso.com)? Since these domain names do not match, the device will not be configured for Autopilot. However, both domains are part of the same AAD tenant, and as such it was determined the matching scheme was not useful. This was improved upon by making use of the tenant ID. By using the tenant ID, we can determine that if the user signs into a domain with a tenant matching the one they registered with, we can safely consider this to be a match. The fix for this problem already exists in Windows 10, version 1709 and was backported into the Windows 10, version 1703 7B release.

**Key Take-Aways**: When using pre-Windows 10, version 1703 7B clients the user’s domain **must** match the domain they registered with. This functionality is found in Windows 10 version 1709 clients using build >= 16215, and Windows 10, version 1703 clients >= 7B. | -| What is the impact of not updating to 7B? | See the detailed scenario described directly above. | -| Is Windows Autopilot supported on other SKUs, e.g. Surface Hub, HoloLens, Windows Mobile. | No, Windows Autopilot isn’t supported on other SKUs. | -| Does Windows Autopilot work after MBR or image re-installation? | Yes. | -| Can machines that have reimaged a few times go through Autopilot? What does the error message "This user is not authorized to enroll" mean? Error code 801c0003. | There are limits to the number of devices a particular AAD user can enroll in AAD, as well as the number of devices that are supported per user in Intune. (These are somewhat configurable but not “infinite.”) You’ll run into this frequently if you reuse the devices, or even if you roll back to previous virtual machine snapshots. | -| What happens if a device is registered to a malicious agent? | By design, Windows Autopilot does not apply a profile until the user signs in with the matching tenant for the configured profile via the AAD sign-in process. What occurs is illustrated below. If badguys.com registers a device owned by contoso.com, at worst, the user would be directed to sign into badguys.com. When the user enters their email/password, the sign-in information is redirected through AAD to the proper AAD authentication and the user is prompted to then sign into contoso.com. Since contoso.com does not match badguys.com as the tenant, the Windows Autopilot profile will not be applied and the regular AAD OOBE will occur. | -| Where is the Windows Autopilot data stored? | Windows Autopilot data is stored in the United States (US), not in a sovereign cloud, even when the AAD tenant is registered in a sovereign cloud. This is applicable to all Windows Autopilot data, regardless of the portal leveraged to deploy Autopilot. | -| Why is Windows Autopilot data stored in the US and not in a sovereign cloud? | It is not customer data that we store, but business data which enables Microsoft to provide a service, therefore it is okay for the data to reside in the US. Customers can stop subscribing to the service any time, and, in that event, the business data is removed by Microsoft. | -| How many ways are there to register a device for Windows Autopilot | There are six ways to register a device, depending on who is doing the registering:

1. OEM Direct API (only available to TVOs)
2. MPC via the MPC API (must be a CSP)
3. MPC via manual upload of CSV file in the UI (must be a CSP)
4. MSfB via CSV file upload
5. Intune via CSV file upload
6. Microsoft 365 Business portal via CSV file upload | -| How many ways are there to create an Windows Autopilot profile? | There are four ways to create & assign an Windows Autopilot profile:

1. Through MPC (must be a CSP)
2. Through MSfB
3. Through Intune (or another MDM)
4. Microsoft 365 Business portal

Microsoft recommends creation and assignment of profiles through Intune. | -| What are some common causes of registration failures? |
1. Bad or missing Hardware hash entries can lead to faulty registration attempts
2. Hidden special characters in CSV files.

To avoid this issue, after creating your CSV file, open it in Notepad to look for hidden characters or trailing spaces or other corruptions. | +|Question|Answer +|------------------|-----------------| +|If I wipe the machine and restart, will I still receive Windows Autopilot?|Yes, if the device is still registered for Windows Autopilot and is running Windows 10, version 1703 7B and above releases, it will receive the Windows Autopilot experience.| +|Can I harvest the device fingerprint on existing machines?|Yes, if the device is running Windows 10, version 1703 and above, you can harvest device fingerprints for registration. There are no plans to backport the functionality to previous releases and no way to harvest them on pre-Windows 10 Windows 10, version 1703 devices that have not been updated to Windows 10, version 1703.| +|What is Windows 10, version 1703 7B and why does it matter?| Windows 10, version 1703 7B is a Windows 10, version 1703 image bundled with cumulative updates. To receive Autopilot, clients **must** run Windows 10, version 1703 7B or later. These cumulative updates contain a critical fix for Autopilot. Consider the following:

Windows Autopilot will not apply its profiles to the machine unless AAD credentials match the expected AAD tenant. For the Windows 10, version 1703 release, it was assumed that would be determined by the domain name, so the domain name used to register (for example contoso.com) should match the domain name used to sign in (for example user@contoso.com). But what happens if your tenant has multiple domains (for example us.contoso.com, or fr.contoso.com)? Since these domain names do not match, the device will not be configured for Autopilot. However, both domains are part of the same AAD tenant, and as such it was determined the matching scheme was not useful. This was improved upon by making use of the tenant ID. By using the tenant ID, we can determine that if the user signs into a domain with a tenant matching the one they registered with, we can safely consider this to be a match. The fix for this problem already exists in Windows 10, version 1709 and was backported into the Windows 10, version 1703 7B release.

**Key Take-Aways**: When using pre-Windows 10, version 1703 7B clients the user’s domain **must** match the domain they registered with. This functionality is found in Windows 10 version 1709 clients using build >= 16215, and Windows 10, version 1703 clients >= 7B. | +|What is the impact of not updating to 7B?|See the detailed scenario described directly above.| +|Is Windows Autopilot supported on other SKUs, e.g. Surface Hub, HoloLens, Windows Mobile.|No, Windows Autopilot isn’t supported on other SKUs.| +|Does Windows Autopilot work after MBR or image re-installation?|Yes.| +| Can machines that have reimaged a few times go through Autopilot? What does the error message "This user is not authorized to enroll" mean? Error code 801c0003. |There are limits to the number of devices a particular AAD user can enroll in AAD, as well as the number of devices that are supported per user in Intune. (These are somewhat configurable but not “infinite.”) You’ll run into this frequently if you reuse the devices, or even if you roll back to previous virtual machine snapshots.| +|What happens if a device is registered to a malicious agent? |By design, Windows Autopilot does not apply a profile until the user signs in with the matching tenant for the configured profile via the AAD sign-in process. What occurs is illustrated below. If badguys.com registers a device owned by contoso.com, at worst, the user would be directed to sign into badguys.com. When the user enters their email/password, the sign-in information is redirected through AAD to the proper AAD authentication and the user is prompted to then sign into contoso.com. Since contoso.com does not match badguys.com as the tenant, the Windows Autopilot profile will not be applied and the regular AAD OOBE will occur.| +|Where is the Windows Autopilot data stored? |Windows Autopilot data is stored in the United States (US), not in a sovereign cloud, even when the AAD tenant is registered in a sovereign cloud. This is applicable to all Windows Autopilot data, regardless of the portal leveraged to deploy Autopilot.| +|Why is Windows Autopilot data stored in the US and not in a sovereign cloud?|It is not customer data that we store, but business data which enables Microsoft to provide a service, therefore it is okay for the data to reside in the US. Customers can stop subscribing to the service any time, and, in that event, the business data is removed by Microsoft.| +|How many ways are there to register a device for Windows Autopilot|There are six ways to register a device, depending on who is doing the registering:

1. OEM Direct API (only available to TVOs)
2. MPC via the MPC API (must be a CSP)
3. MPC via manual upload of CSV file in the UI (must be a CSP)
4. MSfB via CSV file upload
5. Intune via CSV file upload
6. Microsoft 365 Business portal via CSV file upload| +|How many ways are there to create an Windows Autopilot profile?|There are four ways to create & assign an Windows Autopilot profile:

1. Through MPC (must be a CSP)
2. Through MSfB
3. Through Intune (or another MDM)
4. Microsoft 365 Business portal

Microsoft recommends creation and assignment of profiles through Intune. | +| What are some common causes of registration failures? |
1. Bad or missing Hardware hash entries can lead to faulty registration attempts
2. Hidden special characters in CSV files.

To avoid this issue, after creating your CSV file, open it in Notepad to look for hidden characters or trailing spaces or other corruptions.| +| Is Autopilot supported in all regions/countries? |
Autopilot only supports customers using public Azure. Public Azure does not include the three entities listed below:
- Azure Germany
- Azure China
- Azure Government
So, if a customer is set up in global Azure, there are no region restrictions. For example, if Contoso uses global Azure but has employees working in China, the Contoso employees working in China would be able to use Autopilot to deploy devices. If Contoso uses Azure China, the Contoso employees would not be able to use Autopilot.| ## Glossary diff --git a/windows/deployment/windows-autopilot/self-deploying.md b/windows/deployment/windows-autopilot/self-deploying.md index 09ecd98706..48841e967b 100644 --- a/windows/deployment/windows-autopilot/self-deploying.md +++ b/windows/deployment/windows-autopilot/self-deploying.md @@ -67,4 +67,7 @@ When performing a self-deploying mode deployment using Windows Autopilot, the fo - Remain at the logon screen, where any member of the organization can log on by specifying their Azure AD credentials. - Automatically sign in as a local account, for devices configured as a kiosk or digital signage. +>[!NOTE] +>Deploying EAS policies using self-deploying mode for kiosk deployments will cause auto-logon functionality to fail. + In case the observed results do not match these expectations, consult the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation. From efbb9004976fd5a58c851bbd1b233413b111e487 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 19 Jun 2019 14:53:22 -0700 Subject: [PATCH 300/303] Wednesday changes --- devices/surface-hub/surface-hub-2s-connect.md | 2 +- .../surface-hub-2s-deploy-checklist.md | 84 +++++++++---------- .../surface-hub-2s-site-planning.md | 2 +- .../surface-hub/surface-hub-2s-techspecs.md | 1 - 4 files changed, 44 insertions(+), 45 deletions(-) diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md index eec4f12605..8cbac3d2bc 100644 --- a/devices/surface-hub/surface-hub-2s-connect.md +++ b/devices/surface-hub/surface-hub-2s-connect.md @@ -17,7 +17,7 @@ Surface Hub 2S lets you connect external devices, mirror the display on Surface ## Connect external PCs and related devices -You can display content from your devices to Surface Hub 2S. If the source device is Windows-based, that device can also provide TouchBack and InkBack, which takes video and audio from the connected device and presents them on Surface Hub 2S. If Surface Hub 2S encounters a High-Bandwidth Digital Content Protection (HDCP) signal, such as a Blu-ray DVD player, the source is displayed as a black image. To display your content without violating HDCP requirements, use the keypad of Surface Hub 2S to directly choose the external source via a wired connection such as USB-C or HDMI. +You can display content from your devices to Surface Hub 2S. If the source device is Windows-based, that device can also provide TouchBack and InkBack, which takes video and audio from the connected device and presents them on Surface Hub 2S. If Surface Hub 2S encounters a High-Bandwidth Digital Content Protection (HDCP) signal, such as a Blu-ray DVD player, the source is displayed as a black image. > [!NOTE] > Surface Hub-2S will use the video input that you select until a new connection is made, the existing connection is disrupted, or the Connect App is closed. diff --git a/devices/surface-hub/surface-hub-2s-deploy-checklist.md b/devices/surface-hub/surface-hub-2s-deploy-checklist.md index e35778871a..128d337602 100644 --- a/devices/surface-hub/surface-hub-2s-deploy-checklist.md +++ b/devices/surface-hub/surface-hub-2s-deploy-checklist.md @@ -15,49 +15,49 @@ ms.localizationpriority: Normal ## Surface Hub 2S pre-deployment checklist -|**Item**|**Response**|**Learn more**| -|:------ |:------ |:----- | -|**Device account name**| | | -|**Device account UPN**| | | -|**ActiveSync Policy**| | | -|**Calendar processing configuration completed**| ☐ Yes
☐ No | | -|**Device-friendly name**| | | -|**Device host name**| | | -|**Affiliation**| ☐ None
☐ Active Directory affiliation
☐ Azure Active Directory | | -|**Microsoft Teams Mode**| ☐ Mode 0
☐ Mode 1
☐ Mode 2 | | -|**Device Management**| ☐ Yes, Microsoft Intune
☐ Yes, other mobile device manager [MDM]
☐ None | | -|**Proxy**| ☐ Automatic configuration
☐ Proxy server
☐ Proxy auto-config (PAC) file | | -|**Proxy authentication**| ☐ Device account credentials
☐ Prompt for credentials | | -|**Password rotation**| ☐ On
☐ Off | | -|**Skype for Business additional domain names (on-premises only)**| | | -|**Session timeout time**| | | -|**Session timeout action**| ☐ End session
☐ Allow resume | | -|**My meetings and files**| ☐ Enabled
☐ Disabled | | -|**Lock screen timeout**| | | -|**Sleep idle timeout**| | | -|**Bluetooth**| ☐ On
☐ Off | | -|**Use only BitLocker USB drives**| ☐ On
☐ Off | | -|**Install additional certificates (on-premises only)**| | [Using certificates for AADJ on-premises single-sign on](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert) | -|**Windows update**| ☐ Windows Update for Business
☐ Windows Server Update Services [WSUS] | [Deploy updates using Windows Update for Business](https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb)
[Get Started with Windows Server Update Services (WSUS)](https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) | -|**Surface app speaker setting**| ☐ Rolling stand
☐ Wall-mounted | | -|**IP Address**| ☐ Wired — DHCP
☐ Wired — DHCP reservation
☐ Wireless — DHCP
☐ Wireless — DHCP reservation | | +|**Item**|**Response**| +|:------ |:------ | +|**Device account name**| | +|**Device account UPN**| | +|**ActiveSync Policy**| | +|**Calendar processing configuration completed**| ☐ Yes
☐ No | +|**Device-friendly name**| | +|**Device host name**| | +|**Affiliation**| ☐ None
☐ Active Directory affiliation
☐ Azure Active Directory | +|**Microsoft Teams Mode**| ☐ Mode 0
☐ Mode 1
☐ Mode 2 | +|**Device Management**| ☐ Yes, Microsoft Intune
☐ Yes, other mobile device manager [MDM]
☐ None | +|**Proxy**| ☐ Automatic configuration
☐ Proxy server
☐ Proxy auto-config (PAC) file | +|**Proxy authentication**| ☐ Device account credentials
☐ Prompt for credentials | +|**Password rotation**| ☐ On
☐ Off | +|**Skype for Business additional domain names (on-premises only)**| | +|**Session timeout time**| | +|**Session timeout action**| ☐ End session
☐ Allow resume | +|**My meetings and files**| ☐ Enabled
☐ Disabled | +|**Lock screen timeout**| | +|**Sleep idle timeout**| | +|**Bluetooth**| ☐ On
☐ Off | +|**Use only BitLocker USB drives**| ☐ On
☐ Off | +|**Install additional certificates (on-premises only)**| | +|**Windows update**| ☐ Windows Update for Business
☐ Windows Server Update Services [WSUS] | +|**Surface app speaker setting**| ☐ Rolling stand
☐ Wall-mounted | +|**IP Address**| ☐ Wired — DHCP
☐ Wired — DHCP reservation
☐ Wireless — DHCP
☐ Wireless — DHCP reservation | ## Surface Hub 2S post-deployment checklist -|**Check**|**Item**|**Response**|**Learn more**| -|:------|:-------|:---------|:----------| -|**Device account syncing**| ☐ Yes
☐ No | | -|**Bitlocker key**| ☐ Saved to file (no affiliation)
☐ Saved in Active Directory (AD affiliation)
☐ Saved in Azure AD (Azure AD affiliation) | | -|**Device OS updates**| ☐ Completed | | -|**Windows Store updates**| ☐ Automatic
☐ Manual | | +|**Check**|**Response**| +|:------|:---------| +|**Device account syncing**| ☐ Yes
☐ No | +|**Bitlocker key**| ☐ Saved to file (no affiliation)
☐ Saved in Active Directory (AD affiliation)
☐ Saved in Azure AD (Azure AD affiliation) | +|**Device OS updates**| ☐ Completed | +|**Windows Store updates**| ☐ Automatic
☐ Manual | |**Microsoft Teams scheduled meeting**| ☐ Confirmation email received
☐ Meeting appears on start screen
☐ One-touch join functions
☐ Able to join audio
☐ Able to join video
☐ Able to share screen || -|**Skype for Business scheduled meeting**| ☐ Confirmation email received
☐ Meeting appears on start screen
☐ One-touch join functions correctly
☐ Able to join audio
☐ Able to join video
☐ Able to share screen
☐ Able to send/receive IM | | -|**Scheduled meeting when already invited**| ☐ Meeting declined | | -|**Microsoft Teams ad-hoc meeting**| ☐ Invite other users work
☐ Able to join audio
☐ Able to join video
☐ Able to share screen | | -|**Skype for Business scheduled meeting**| ☐ Invite other users work
☐ Able to join audio
☐ Able to join video
☐ Able to share screen
☐ Able to send/receive IM | | -|**Microsoft Whiteboard**| ☐ Launch from Welcome / Start screen
☐ Launch from Microsoft Teams | [Microsoft Whiteboard](https://whiteboard.microsoft.com/) | -|**Incoming Skype/Teams call**| ☐ Able to join audio
☐ Able to join video
☐ Able to share screen
☐ Able to send/receive IM (Skype for Business only) | | -|**Incoming live video streams**| ☐ Maximum 2 (Skype for Business)
☐ Maximum 4 (Microsoft Teams) | | -|**Microsoft Teams Mode 0 behavior**| ☐ Skype for Business tile on Welcome/Start screen
☐ Can join scheduled Skype for Business meetings (Skype UI)
☐ Can join scheduled Teams meetings (Teams UI) | | -|**Microsoft Teams Mode 1 behavior**| ☐ Teams tile on Welcome/Start screen
☐ Can join scheduled Skype for Business meetings (Skype UI)
☐ Can join scheduled Teams meetings (Teams UI) | | -|**Microsoft Teams Mode 2 behavior**| ☐ Teams tile on Welcome / Start screen
☐ Can join scheduled Teams meetings
☐ Fail to join Skype for Business meetings | | +|**Skype for Business scheduled meeting**| ☐ Confirmation email received
☐ Meeting appears on start screen
☐ One-touch join functions correctly
☐ Able to join audio
☐ Able to join video
☐ Able to share screen
☐ Able to send/receive IM | +|**Scheduled meeting when already invited**| ☐ Meeting declined | +|**Microsoft Teams ad-hoc meeting**| ☐ Invite other users work
☐ Able to join audio
☐ Able to join video
☐ Able to share screen | +|**Skype for Business scheduled meeting**| ☐ Invite other users work
☐ Able to join audio
☐ Able to join video
☐ Able to share screen
☐ Able to send/receive IM | +|**Microsoft Whiteboard**| ☐ Launch from Welcome / Start screen
☐ Launch from Microsoft Teams | +|**Incoming Skype/Teams call**| ☐ Able to join audio
☐ Able to join video
☐ Able to share screen
☐ Able to send/receive IM (Skype for Business only) | +|**Incoming live video streams**| ☐ Maximum 2 (Skype for Business)
☐ Maximum 4 (Microsoft Teams) | +|**Microsoft Teams Mode 0 behavior**| ☐ Skype for Business tile on Welcome/Start screen
☐ Can join scheduled Skype for Business meetings (Skype UI)
☐ Can join scheduled Teams meetings (Teams UI) | +|**Microsoft Teams Mode 1 behavior**| ☐ Teams tile on Welcome/Start screen
☐ Can join scheduled Skype for Business meetings (Skype UI)
☐ Can join scheduled Teams meetings (Teams UI) | +|**Microsoft Teams Mode 2 behavior**| ☐ Teams tile on Welcome / Start screen
☐ Can join scheduled Teams meetings
☐ Fail to join Skype for Business meetings | diff --git a/devices/surface-hub/surface-hub-2s-site-planning.md b/devices/surface-hub/surface-hub-2s-site-planning.md index 0986c0fe3d..6837b360bc 100644 --- a/devices/surface-hub/surface-hub-2s-site-planning.md +++ b/devices/surface-hub/surface-hub-2s-site-planning.md @@ -19,7 +19,7 @@ Designed for team collaboration, Surface Hub 2S can transform the way you work ## Room considerations -Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, beam-forming microphones, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity guidance to determine if you need to plan for peripherals. +Designed for interactive use in smaller conference rooms and huddle spaces, Surface Hub 2S provides a 4K camera, 8-element microphone array, crystal clear speakers, and a brilliant 4K+ resolution display. Optimizing the user experience in larger spaces with more people further away from the display may require peripherals such as an extra camera, microphone, or room systems solution such as Microsoft Teams Rooms. Use the following proximity guidance to determine if you need to plan for peripherals. | **Room size** | **Participants** | **Proximity** | **Additional peripherals** | diff --git a/devices/surface-hub/surface-hub-2s-techspecs.md b/devices/surface-hub/surface-hub-2s-techspecs.md index 67b81fde8a..5b5146c8fa 100644 --- a/devices/surface-hub/surface-hub-2s-techspecs.md +++ b/devices/surface-hub/surface-hub-2s-techspecs.md @@ -29,7 +29,6 @@ ms.localizationpriority: Normal |**Audio/Video**| Full-range, front facing 3-way stereo speakers
Full band 8-element MEMS microphone array
Microsoft Surface Hub 2 Camera, 4K, USB-C connection, 90-degree HFOV | |**Pen**| Microsoft Surface Hub 2 Pen (active) | |**Software**| Windows 10
Microsoft Teams for Surface Hub 2
Skype for Business
Microsoft Whiteboard
Microsoft Office (Mobile)
Microsoft Power BI 2 | -|**Connections**| USB-A
Mini-DisplayPort video output
RJ45 Gigabit Ethernet
HDMI video input
USB-C with DisplayPort input
Four USB-C (on display) | |**Exterior**| Casing: Precision machined aluminum with mineral-composite resin
Color: Platinum
Physical Buttons: Power, Volume, Source | |**What’s in the box**| One Surface Hub 2S
One Surface Hub 2 Pen
One Surface Hub 2 Camera
2.5 m AC Power Cable
Quick Start Guide | |**Warranty**| 1-year limited hardware warranty | From 21cfd5f5a8ce033b950622015ccd4b37a23b6dc9 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 19 Jun 2019 15:52:10 -0700 Subject: [PATCH 301/303] Moved powershell config into create account --- devices/surface-hub/TOC.md | 7 +-- devices/surface-hub/surface-hub-2s-account.md | 55 ++++++++++++++++--- ...urface-hub-2s-configure-with-powershell.md | 54 ------------------ 3 files changed, 51 insertions(+), 65 deletions(-) delete mode 100644 devices/surface-hub/surface-hub-2s-configure-with-powershell.md diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index d54e783b10..8c02df9195 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -11,11 +11,11 @@ ### [Surface Hub 2S Site Readiness Guide](surface-hub-2s-site-readiness-guide.md) #### [Site planning for Surface Hub 2S](surface-hub-2s-site-planning.md) #### [Surface Hub 2S quick start](surface-hub-2s-quick-start.md) -#### [Installing and mounting Surface Hub 2S](surface-hub-2s-install-mount.md) +#### [Install and mount Surface Hub 2S](surface-hub-2s-install-mount.md) #### [Customizing installation of Surface Hub 2S](surface-hub-2s-custom-install.md) #### [Setup worksheet](setup-worksheet-surface-hub.md) #### [Surface Hub 2S ports and keypad overview](surface-hub-2s-port-keypad-overview.md) -#### [Connecting to Surface Hub 2S](surface-hub-2s-connect.md) +#### [Connect devices to Surface Hub 2S](surface-hub-2s-connect.md) ### [Prepare your environment for Microsoft Surface Hub 2S](surface-hub-2s-prepare-environment.md) ### [Configure Easy Authentication for Surface Hub 2S](surface-hub-2s-phone-authenticate.md) @@ -24,11 +24,10 @@ ### [Create Surface Hub 2S device account](surface-hub-2s-account.md) ### [Create provisioning packages for Surface Hub 2S](surface-hub-2s-deploy.md) ### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md) -### [Configure Surface Hub 2S with PowerShell](surface-hub-2s-configure-with-powershell.md) ### [Create Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) ## Manage -### [Managing Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) +### [Manage Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) ### [Local management for Surface Hub 2S settings](local-management-surface-hub-settings.md) ### [Manage device account password rotation](surface-hub-2s-manage-passwords.md) ### [Manage Windows updates](manage-windows-updates-for-surface-hub.md) diff --git a/devices/surface-hub/surface-hub-2s-account.md b/devices/surface-hub/surface-hub-2s-account.md index 348bce4e21..b27050385f 100644 --- a/devices/surface-hub/surface-hub-2s-account.md +++ b/devices/surface-hub/surface-hub-2s-account.md @@ -17,13 +17,11 @@ Creating a Surface Hub device account (also known as a Room mailbox) allows Surf Unlike standard Room mailboxes that remain disabled by default, you need to enable the Surface Hub 2S device account to sign on to Microsoft Teams and Skype for Business. Surface Hub 2S relies on Exchange ActiveSync, which requires an ActiveSync mailbox policy on the device account. Apply the default ActiveSync mailbox policy that comes with Exchange Online. -Complete advanced configuration tasks using Windows PowerShell. For example: +Create the account using the Microsoft 365 admin center or by using PowerShell. You can use Exhange Online PowerShell to configure specific features including: -- If the default ActiveSync mailbox policy has already been modified by someone else or another process, you will likely have to create and assign a new ActiveSync mailbox policy using Exchange Online PowerShell. -- You need to configure calendar processing for every Surface Hub device account using PowerShell. -- If you want Surface Hub 2S to send a custom auto reply in response to scheduling requests, you need to configure that using Exchange Online PowerShell. - -For more information, see [Configure Surface Hub 2S accounts with PowerShell](surface-hub-2s-configure-with-powershell.md). +- Calendar processing for every Surface Hub device account. +- Custom auto replies to scheduling requests. +- If the default ActiveSync mailbox policy has already been modified by someone else or another process, you will likely have to create and assign a new ActiveSync mailbox policy ## Create account using Microsoft 365 admin center @@ -43,8 +41,51 @@ For more information, see [Configure Surface Hub 2S accounts with PowerShell](su ![Assign Office 365 license](images/sh2-account5.png) -## Finalize setup via PowerShell +### Finalize setup via PowerShell - **Skype for Business:** For Skype for Business only (on-premises or online), you can enable the Skype for Business object by running **Enable-CsMeetingRoom** to enable features such as Meeting room prompt for audio and Lobby hold. - **Calling features:** Regardless of your Office 365 licensing configuration, run *Enable-CsMeetingRoom* to enable features such as **Meeting room prompt for audio** and **Lobby hold**. - **Calendar:** Set **Calendar Auto processing** for this account. + +## Create account using PowerShell +Instead of using the Microsoft Admin Center portal, you can create the account using PowerShell. + +### Connect to Exchange Online PowerShell +``` +$365Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.outlook.com/powershell -Credential (Get-Credential) -Authentication Basic –AllowRedirection $ImportResults = Import-PSSession $365Session +``` + +### Create a new Room Mailbox + +``` +New-Mailbox -MicrosoftOnlineServicesID account@YourDomain.com -Alias SurfaceHub2S -Name SurfaceHub2S -Room -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String "" -AsPlainText -Force) +``` + +### Set Calendar Auto processing + +``` +Set-CalendarProcessing -Identity "account@YourDomain.com" -AutomateProcessing AutoAccept -AddOrganizerToSubject $false –AllowConflicts $false –DeleteComments $false -DeleteSubject $false -RemovePrivateProperty $false -AddAdditionalResponse $true -AdditionalResponse "This room is equipped with a Surface Hub" +``` + +### Assign a license + +``` +Connect-MsolService +Set-Msoluser -UserPrincipalName account@YourDomain.com -UsageLocation IE +Set-MsolUserLicense -UserPrincipalName "account@YourDomain.com" -AddLicenses "contoso:MEETING_ROOM" +``` + +## Connect to Skype for Business Online using PowerShell + +### Install prerequisites + +- [Visual C++ 2017 Redistributable](https://aka.ms/vs/15/release/vc_redist.x64.exe) +- [Skype for Business Online PowerShell Module](https://www.microsoft.com/en-us/download/confirmation.aspx?id=39366) + +``` +Import-Module LyncOnlineConnector +$SfBSession = New-CsOnlineSession -Credential (Get-Credential) +Import-PSSession $SfBSession -AllowClobber +Enable the Skype for Business meeting room +Enable-CsMeetingRoom -Identity account@YourDomain.com -RegistrarPoo(Get-CsTenant).Registrarpool -SipAddressType EmailAddress +``` \ No newline at end of file diff --git a/devices/surface-hub/surface-hub-2s-configure-with-powershell.md b/devices/surface-hub/surface-hub-2s-configure-with-powershell.md deleted file mode 100644 index c60383433b..0000000000 --- a/devices/surface-hub/surface-hub-2s-configure-with-powershell.md +++ /dev/null @@ -1,54 +0,0 @@ ---- -title: "Configure Surface Hub 2S accounts with PowerShell" -description: "Learn how to configure Surface Hub 2S accounts with PowerShell" -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- -# Configure Surface Hub 2S online accounts with PowerShell - -## Connect to Exchange Online PowerShell - -``` -$365Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.outlook.com/powershell -Credential (Get-Credential) -Authentication Basic –AllowRedirection $ImportResults = Import-PSSession $365Session -``` - -## Create a new Room Mailbox - -``` -New-Mailbox -MicrosoftOnlineServicesID account@YourDomain.com -Alias SurfaceHub2S -Name SurfaceHub2S -Room -EnableRoomMailboxAccount $true -RoomMailboxPassword (ConvertTo-SecureString -String "" -AsPlainText -Force) -``` - -## Set Calendar Auto processing - -``` -Set-CalendarProcessing -Identity "account@YourDomain.com" -AutomateProcessing AutoAccept -AddOrganizerToSubject $false –AllowConflicts $false –DeleteComments $false -DeleteSubject $false -RemovePrivateProperty $false -AddAdditionalResponse $true -AdditionalResponse "This room is equipped with a Surface Hub" -``` - -## Assign a license - -``` -Connect-MsolService -Set-Msoluser -UserPrincipalName account@YourDomain.com -UsageLocation IE -Set-MsolUserLicense -UserPrincipalName "account@YourDomain.com" -AddLicenses "contoso:MEETING_ROOM" -``` - -## Connect to Skype for Business Online using PowerShell - -### Install prerequisites - -- [Visual C++ 2017 Redistributable](https://aka.ms/vs/15/release/vc_redist.x64.exe) -- [Skype for Business Online PowerShell Module](https://www.microsoft.com/en-us/download/confirmation.aspx?id=39366) - -``` -Import-Module LyncOnlineConnector -$SfBSession = New-CsOnlineSession -Credential (Get-Credential) -Import-PSSession $SfBSession -AllowClobber -Enable the Skype for Business meeting room -Enable-CsMeetingRoom -Identity account@YourDomain.com -RegistrarPoo(Get-CsTenant).Registrarpool -SipAddressType EmailAddress -``` From 4d57f0dd0f53bcb54a26c2537c06e4f23d380f95 Mon Sep 17 00:00:00 2001 From: Robert Mazzoli Date: Wed, 19 Jun 2019 15:57:43 -0700 Subject: [PATCH 302/303] fixed broken bookmark --- devices/surface-hub/surface-hub-authenticator-app.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/surface-hub-authenticator-app.md b/devices/surface-hub/surface-hub-authenticator-app.md index 289d4a99c3..2ffa84dd12 100644 --- a/devices/surface-hub/surface-hub-authenticator-app.md +++ b/devices/surface-hub/surface-hub-authenticator-app.md @@ -56,7 +56,7 @@ Currently, you cannot use Microsoft Authenticator to sign in to Surface Hubs tha >[!NOTE] >If Company Portal is installed on your Android device, uninstall it before you set up Microsoft Authenticator. After you set up the app, you can reinstall Company Portal. > ->If you have already set up Microsoft Authenticator on your phone and registered your device, go to the [sign-in instructions](#signin). +>If you have already set up Microsoft Authenticator on your phone and registered your device, go to the sign-in instructions. 1. Add your work or school account to Microsoft Authenticator for Multi-Factor Authentication. You will need a QR code provided by your IT department. For help, see [Get started with the Microsoft Authenticator app](https://docs.microsoft.com/azure/multi-factor-authentication/end-user/microsoft-authenticator-app-how-to). 2. Go to **Settings** and register your device. From dccc82f5ca6aeb7a5814b6400385bbe4c8696ea3 Mon Sep 17 00:00:00 2001 From: DocsPreview <49669258+DocsPreview@users.noreply.github.com> Date: Wed, 19 Jun 2019 17:53:01 -0700 Subject: [PATCH 303/303] One more issue added for 2012 product version (#521) --- windows/release-information/status-windows-server-2012.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml index a7ddbf6451..0a868e774c 100644 --- a/windows/release-information/status-windows-server-2012.yml +++ b/windows/release-information/status-windows-server-2012.yml @@ -60,6 +60,7 @@ sections: - type: markdown text: "
This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

+ @@ -80,6 +81,7 @@ sections: - type: markdown text: "
SummaryOriginating updateStatusLast updated
Some devices and generation 2 Hyper-V VMs may have issues installing updates
Some devices and generation 2 Hyper-V virtual machines (VMs) may have issues installing some updates when Secure Boot is enabled.

See details >
June 11, 2019
KB4503285
Mitigated
June 19, 2019
04:57 PM PT
Event Viewer may close or you may receive an error when using Custom Views
When trying to expand, view or create Custom Views in Event Viewer, you may receive an error and the app may stop responding or close.

See details >
June 11, 2019
KB4503285
Mitigated
June 13, 2019
02:21 PM PT
IE11 may stop working when loading or interacting with Power BI reports
Power BI reports that contain line charts with markers may cause Internet Explorer 11 to stop working

See details >
May 14, 2019
KB4499171
Mitigated
June 13, 2019
02:21 PM PT
Japanese IME doesn't show the new Japanese Era name as a text input option
If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.

See details >
April 25, 2019
KB4493462
Mitigated
May 15, 2019
05:53 PM PT
+
DetailsOriginating updateStatusHistory
Some devices and generation 2 Hyper-V VMs may have issues installing updates
Some devices and generation 2 Hyper-V virtual machines (VMs) may have issues installing KB4503285 or later updates when Secure Boot is enabled.

Affected platforms:
  • Server: Windows Server 2012
Workaround: Disabling Secure Boot should allow the update to install as expected. You can enable Secure Boot again after installation is complete.

Next steps: We are working on a resolution and will provide an update in an upcoming release.

Back to top
June 11, 2019
KB4503285
Mitigated
Last updated:
June 19, 2019
04:57 PM PT

Opened:
June 19, 2019
04:57 PM PT
Event Viewer may close or you may receive an error when using Custom Views
When trying to expand, view, or create Custom Views in Event Viewer, you may receive the error, \"MMC has detected an error in a snap-in and will unload it.\" and the app may stop responding or close. You may also receive the same error when using Filter Current Log in the Action menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.

Affected platforms:
  • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Workaround: To mitigate this issue, see KB4508640.

Next steps: We are working on a resolution and estimate a solution will be available in late June.

Back to top
June 11, 2019
KB4503285
Mitigated
Last updated:
June 13, 2019
02:21 PM PT

Opened:
June 12, 2019
11:11 AM PT
IE11 may stop working when loading or interacting with Power BI reports
Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.


Affected platforms:
  • Client: Windows 7 SP1; Windows 8.1
  • Server: Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2

Workaround: To mitigate the issue with Power BI reports, the report needs to be republished with markers turned off. Markers can be turned off by selecting the line chart that is having issues and going to the Visualizations pane. Then on the Format tab under Shapes, set the Show marker slider to off.

Next steps: We are working on a resolution and estimate a solution will be available in late June.

Back to top
May 14, 2019
KB4499171
Mitigated
Last updated:
June 13, 2019
02:21 PM PT

Opened:
June 07, 2019
02:57 PM PT