From 8abdf182ca0c6b774adb99212ca143586890fbfd Mon Sep 17 00:00:00 2001 From: Samantha Robertson Date: Tue, 10 Nov 2020 13:18:48 -0800 Subject: [PATCH 01/49] Updating art for defender atp deployment and migration guides --- .../phase-diagrams/deployment-phases.png | Bin 0 -> 5744 bytes .../media/phase-diagrams/migration-phases.png | Bin 0 -> 5711 bytes windows/media/phase-diagrams/onboard.png | Bin 0 -> 1960 bytes windows/media/phase-diagrams/prepare.png | Bin 0 -> 1713 bytes windows/media/phase-diagrams/setup.png | Bin 0 -> 1508 bytes .../deployment-phases.md | 8 +++-- .../mcafee-to-microsoft-defender-migration.md | 8 +++-- .../mcafee-to-microsoft-defender-onboard.md | 4 +-- .../mcafee-to-microsoft-defender-prepare.md | 2 +- .../mcafee-to-microsoft-defender-setup.md | 2 +- .../microsoft-defender-atp/onboarding.md | 25 ++----------- .../prepare-deployment.md | 33 ++---------------- .../production-deployment.md | 25 ++----------- .../switch-to-microsoft-defender-migration.md | 8 +++-- .../switch-to-microsoft-defender-onboard.md | 2 +- .../switch-to-microsoft-defender-prepare.md | 2 +- .../switch-to-microsoft-defender-setup.md | 2 +- ...tec-to-microsoft-defender-atp-migration.md | 8 +++-- ...antec-to-microsoft-defender-atp-onboard.md | 2 +- ...antec-to-microsoft-defender-atp-prepare.md | 2 +- ...ymantec-to-microsoft-defender-atp-setup.md | 2 +- 21 files changed, 38 insertions(+), 97 deletions(-) create mode 100644 windows/media/phase-diagrams/deployment-phases.png create mode 100644 windows/media/phase-diagrams/migration-phases.png create mode 100644 windows/media/phase-diagrams/onboard.png create mode 100644 windows/media/phase-diagrams/prepare.png create mode 100644 windows/media/phase-diagrams/setup.png diff --git a/windows/media/phase-diagrams/deployment-phases.png b/windows/media/phase-diagrams/deployment-phases.png new file mode 100644 index 0000000000000000000000000000000000000000..4d2a4fa94646c72b26e978c0c02cad12efb50a7f GIT binary patch literal 5744 zcmb_gXEYo@*A`JDSUu5+7DS2OdssCh(R&TDi!7q|MBhcCTU{h<^cFo>y$8##7Q|w; z=-uc2`JMBf@7Mcd?#wy&oS8fK%slr#PwY#5P4Wkf5Ag8t$bnkwuki5h9o?;MNr>(& z&N$5dZX)&6GK1jZkx~C=+?!koxx&Mv=LD*&y!Ol4frq{`M)~)#MI%M;-LkUua(Qj1 zIp#n3@JaXC1UsYF`Td9%I-ZY?MUV%vueqUL2~RW`OV1rR5M7D<+yyEUi810E^ahUR zJb^vBC01m+30X-hZhcWIu4 zmkMK$T!?=7b`Z81u(I5>N*BZ(1)yeyF7^y_Mgdg2C<);JRgzddT5nYn4lewc zNhHcDymwAcy#JQ-id8I`AiS$f^*aLLXziF39v*HM`l+m}?9TFuN=x(6(9qOg#AlRd za)0*MCi`C@jsMjr8Q{adP)dgsq1Le2P~JmqDCcqfx_0oJ<#V%J`$5=R%>Qy1xs=(V$twhOonSTsI>?aI6V@EUapyPG{oX?I z*2(pacgIADf3S>=ZIUuTlzmC7Co4w0rGPxucuz+g4ZEUY$&-ze7X_T0bhIvz-~$sa ziIBg3AHZ*~l+I7v*G@0XmH0o;kdv9|yC@SK9`Rwuf%@S|x5phJTROwPPGRJOS#8(P z<#!DPwZP#Sx93WU7xWNM-?OrT-?`yl>&D6|?G=H+J?R;d*By*$Syp>u1}={u$PPRP z97gU1rycC*QzRHo-6s*0j`_JXm^spaCJ`5)JfUq~c0MQ%59Zt8;_Vz!q!Be?-?E^D zyEqfZtW$Ux3}vDHbHP3&%7=eo!MFLlyI`|MFr1c_Hp2-SN5>Hi`9)a$OzcN7P|$!W z^om1Zsg{5czD7`o^bd!H-a@&Z;W42yK4#4q6(ZgEonwm4ZiTZ8%B&PhkjAdcxkqjha?V%s?2uULDvH-=jz=}u4GekLeG%12}nzo&)PTx;`0WVdv|w| zjY+!RIKYy6{66%9w_g8Xq!CO_XxOzI6Qf{}rEOfUnwp-@4Cbn34ifgl@N?!e*~sx8 z3!h{;)u2>Y;>>Z?YiyyW*x=yc8rR=n&)Tthp^BS6!-2P*vPypZ)ePiqG-$T=h1cWe zGam+1W1y(uW~CC5$w_+CDS3B1q9$T%E9 zxw+UDSjy6;X+?Ms>>uR!Cq+|3S-`(}tYLNsgsA=j4vx`Kd_xjKzo)pRzglDexw3z0 z{S9620%bBbL|z!+v9>8t*=j%N?&0Cl>iV&mf)MV=a%6K{SaL{n_~-P#BJFpAg?E^S z5rmwaT;{~%o}pFy`$NpZX>E$T{YFZl3KkZYR~8oT>dHuSdwSM`)5#K@7qsm2v(eft z{P(_1*@gQ1`%eb4>s^g~(_uSR4LI*?0S551FOx6QlE@C)&ROmWxeXAo>@lX+vdH=N zCT{;|jD)o|A63mz#x-BQOWv=UscNu_auaPXfe~)L zWdzSSy`DqAeEp>Ixb2Bey*!%r5#geg!l(LxRZohFS_P>r zXMU$gea@52B1}>GN3a(`NnKj&+X-3kzaM==;UJ$ z;vCG4cN|t~AG*t)h5mld;^-{6K|T%9TbE6Ter24izBs*qT?7O_eJa?0u2A0#Maw>D zxt@6GWgV;z`{X)5v_}kCL%8@PyvP-?ytkNI z**fd~BC5OJb2AB1xF%RT`@-4*gk^$qYDY+9Hb8u` zVZ3DwmZ>{Kh#6bDC4Rqxsjn+E!lUDA6>Dwz_HP=Q$%35|us5H`mj-FpPvBS3M}X$I z-QAI*K_vTjFUv7I%+*oq3V6-4ixE{Tsigpjsb}JlcEX!z!b|Gv`946^ne8gP97hw8 zsLWqKBXMRZ;GBh>g~4iwkgg%F-r|!!>u}@Fy5||f^TsO%6iJQWzHtjgXME`+ixE5M zdF&Sh+BPWV{7d_m_j{V1+yeV&uk_2&#v7A{4zFJ%QvxR+}Tr(kFx&AJOYwq!4 zQpDrECCJA*WNZ&KFQly77C%kG*Q0k?jLWjqK3Yt+EBQ;rTX;F#xaEHd^V1w3UhV{tdd zChEk0?p3f|p%>lJtCTx_({87OAIt>v6#d*{A1Xi^H&d4--ap}S|0iZhHb^}9 znPut|X#13GkhbFY!8eqBq66aJRLj zz&0J;H|ud!b)eHPL+hxqfdU&Csf7{Z->-Fyvtu zX>!Hc?rp}k7LDsFYg76_|7@E$OEA43#mhOoCWhVbV?~=Q9^2jLO%!j@RfQZq-w+#z z#Rn}%%x#UiPeeHyE3-k*6)@=25K-qe?@l~!>msNV^-fFfz;c=8=bgD3ksM(jG%#8L z$3WyPJ1w&2-{4}QW^?3mRol@-EX;nD^Jl2bGOxpVATSRtkL4+;UMQF(DfrLt?XD83aN4!cATOMqp^!=z)fA26uX?yjk0wRL+yuU{|VZ?k_h^&Ckm@_1em zxnXbUHG}PBM7bh=_3CThvNA&UMw18k-s_;i(0<~Ox^~kWLF9KyZl3k3;qzn?)}`yu z79~e%5ntMbGq9`+Xs!LQd?hLFBKvpDp!gd852FZ? zsCRQ2@5fe7Ry!z&PFqU6^P%e&WOd8jc+Hte@9V(=RyYK5>$cd{ev4shQ zOoKkYG6Uiglk)Ms`d+<3zGr;xJP&&Id#wwHgMixiLi3UA0nvvn)I;-=c9H_nZ5?vjO1!_N{Nm9rSxp0*UI`bUei=Wtn zGRsg8cFwj^dGCl(h#E*eg04wfSy`>0qEILuv&TgNqyt3!>yJX{j3Gi{ym;2(VlJco zo4-r{RqZGR(cDw^e98p zkBrD?!faL~P4?4=X)4S%(26zz1pPPbLnL8Yj*1`pQX-q%+{0u4%S(?fa&Wn6H13l) z&bLDeMB(!v!igvb6{x9mAOJSHQ%9mQ_c{l2)gnSEe6W){WqI)5D2>m8OV)9BN>GEY(AYQt4zWiyv+<|0~=0(|nn_ z{AE68_|dU6RApZ(_~(>-9t3<8l!;6zrbPdm>&pR96HU^4m!_5%Zf<}5ddaCjWDvy!frM6mhdr1bcNy;$?Vu!ku!`n#_m4 z*BNvxQ0Or3tTv5;0F30tkyUE@99vE4=IDSWbzNini`CDy?^<{p4})p$^Z*|J@KQ>$ zQhjnZt6-A^te&faDUiWuvzlc~_#z*;j#fS+my++uOCq!zk%9i4oF=)lg zd)|Qe+ui0*HvTm>V4jHRFC0h{ky+bQ?WNd%j9g&dKG+&<5|RZ^)XX$B#5q z!n+cYzzp~OD0RA)rw{F0orcoRd~e66n=<07hlPO_r~6-|CLnh62+>7#)4m)ni*b%D z-%w9puu=L-&?Tek&?p$(u*{QfPB&)TSSn}sFS7md)$^3Sy1eFh=+U9|MXqP=9kvKx z&y^n1F{#?O6P&dG)%VfQHu%?LKC1lmk%X}eIXecqd7fmUEml#s%?mY!`y)zS$txsY z_arVVJ5K(5xqrumz%wxUgBYwpB%y&oZqj_jQ!pKgEE?HyU|%^0(KI_a-?yvoejh!4 zyTLSFQ_m5kCS^2E>QxZ>)~&JkPxaV&mTH%gfdY5Bu#Nsjm2m5RgxTtqV^p<*#FFQz z$q7ziZJ zRW!0x5`L|hq+6%l0rN#jFEOiM=NA z&N+_ts!l3`=zB!~w$*pmf$Ihg{V5+0)zZuB#z}#A^IrTLcH}7>zg1oqu@Hxgp4kK+ zzcJssS5#mBhT^V(XhNBRo4>}t9Lz(;GQ;zm8>V|O6WlXadiD!bcs-WH39n8NHhd%H z{H46i_;*;>6c&~x5qP;;ANXS=9tJdhM9ZL?m6bIN`B`77MleMPll18T2c}rrf-nnX zukIQ9>0pshO*)Yji+*RmG`x{Lm5|&}vlAK<5HNbGg6uM;S%6%H^h z$fr>y86aDBZoF?<#JM)8_sj3$U4e-zzW;w}n4S63)FeDSJdU=u7a45}fw5g2d~L^@^YkQ!>}k{0QXVTP0* zP>>E^{_DH_F5mTDoLJ{voU_h8>v{J6ebUiVqo#O3K|nx2t)c!*mw(5H^jH6|mj3&lonn)&e_3w@MTiq3WH!DAWrB{^Rd$ z_NL6JjBSRK|G#G7>gpo>uOQxVARXIXOED=($%|^pwLh~J-tU_La5MEXAv zhHeOmc-@}OL#8u!2NWK6PbpOn#G|7{6D&}SKn+xm+?d*o-sm}O4ks=AR4x&12^GtT z6IO=u`&(>9?;g5BxDT~X-<(gUmq|!^m^@PukFB|?e^-;Y!8fm?uSy#U{CBm&e3%?{`CJvH{{ACiY69)wgnqXg&m`2P+->aj-R)5ETsJZq`jVmVW z!ksWT+=Fta#}DR6`x(N{vj6e_!zJFpKAfu+PSga54sMeG9%<85QzO?I0Ow}cyPNGj ztXF4l9p!WLLh$aJp0IVM$n)&$!8liO@?x^e40-$xi;YVJ!}{(|u;>MyXVoPbuG@xh z7@CxS3gwp}wroG`7L#blR<~P31pq=x$;D5NWNMqFgJSa7bM3!b&|$; zey$CQXTja=wL|5=@u_{h{kvC>2PZ4;651{N`*fiAt+w{{Ta>ZDWRd3MK@(pr<2abv z6o`=+f1bf}h+Zk?s69mTKiuNs&k-4+47v&gi%IV4U0t2=Zf`XWQBe|h$a_vdtL7*6 zmpc}c$g%FBpQXx@|4o~}Z8qe>Gf)jjKhTn@@4vEO3&}*LB*=K8XSgbO| zX2=G#wt;g{s1f0_xc$W@&qep3sW-solzs%WsJ|WwI-&T|DH@CGdw|)QK^VL&r05hw z?&lBK8yH(3GM;15<%_kKpu@%3P14mEd2F>6LZA|h#cEAb46stj4#;kG?5G@tY7Zlp zXwG!3>AWWA=Imz3@3NY!l1HZY_mZW^TnGmSFUA+c7K||%Okq(`Ut~yB9gnd5`auLG z^XG?3jny>CvU)^1CEYhQH8to{rHr%eSE&m75r2z_I108)LPEfPuQ|6K!V4d_wR|h2 z_iA<28+qc2+w(Jx>zGr8)ePC({qJ2mI6ibxnWh_jr&c)JndmlDe7Lh;tI{=S*uCIG zTiTl@94xG^HmPo7(w9u_T{v;_WBBkIJX%yy<&At{rUB=CIt7|i5^)bY`;#T5{W~zv zGKY~sLys)J{YJY7c{+M2r2k-V&U-&9w)Sdm-#R1!S>96sV?+<^sZ;O{t zvmiX(kocx?$;SfS(ofF>x&fx$o;$odJOeQV9J- zFC@fkCW{&;ge#1anfbv%ozk6`$3X%UzLb9SH^R4<1;26T!i^(kYR)dA6N_{8Ybe20 znrP`Tz0#`Y9K{y_SuriXl>&*Dq}q9{t7$23F4NA0yEE?IETLZ_((h2p_S{R4Chba# z+V8k7k|FQXDB|lSo%Fczb&O%F^Jeh5%+Fm#S>|l!@qM8QfvLBaOI38{tHxfR^!ICV zoX(z@Q~-NAledzKtA?t-tL%a|K-h2Yeg{79Uo3$XT7jOI+_6Du#WNq=w_nBn+g~ca z*W-VxU0D2!B=237!EuM?+dC~R1#>RJN-&=Ri1-!0r_E6bEkl+p{xNk(SLu&IU9hVe ztFvsSrfIL=m=Uv%_xEO>{^k7y204*f=FYwumW*bJglYPBHeP?l$=cqCpIo2nXql1= z|2~PCUK3>Zy?z~=^l$5fwRxDR@oMbB5RFf!ZDpjr3VapKHmyq8Xb7l(pNgtr?Eek= zj(}F|TW?14^6U_f^`0<2W2}^qNb3%BG%$85mld8%jp9}K7}875a$szd4Rj*WEvZ9w z#u|!G%J;*9lB6DL9lglUk4MQJpoxl-J4?ETdvDeW{G+1`n>`{m{98k$xwRKV5p#Vv z19}CEM0mbQ38!Kf8$OXO2(xNSC68xzWm|1enj~OjkHs18Qk6|cLQw@5j;+gOw`z4{B#Rks0oLJSSOW*#0Pi=YlO+x`? zNwl*F)X&+sg+fYLs3q^Ce1F~C%!!{78h^RmT4ITWUpn-$m{9}>aF((;8f;QWM@{rW z%vYJje!IjY9?~0*RP{YMxx8wx8yH?XSyS0}I=EudT5*ZvQdDGgFm( z;hxhH2xjPH{bVg>>FEBZ;eGhpSX zNt-ICMPYZF$Q@|^@h(o<8HG?+2F8yxgGbUR!m@~`L{NlI)z>*)QIwO5 zTUEF`<50@5gOQHTr0Ic>=MQ@26-l_Zfbs@)4_J#k-2`j4bykkKZw5xX+m>l{^qZnw z`BtMOtCZ5PjCb~)8u~0}U$SD0Fc7KA3c&;wv%%IbD>6R&@(nev@T;vru%T4NfV{YWo^W&$JCnt=cWQDqt!%my* z5fQyv)c2?rWuja&`N-J?2Y!^ozp`1i74Ob4NTO%1hzb3Uw4;Ok%^#U6UWn(%%H9zZ z5wabaIl!*B3o&YbtyamsdQd%2>9d$K2Wqf~^Dk;%s zC%)n|GZMq{R+_1;QUvGFRAz*HdDp;O@ta6ewioqRAA?hMk27gbWhSX$MUyG@o6s^Q z%8dzFv2D-&-L@R_sfjYAz8zP7diFTsdxrRflAk3!f_8uu$L8WLeIV8QZW8TllKgXMM8geBEiy;SmswU%(#=#hxBs|NjA(H$N7}d;|BL4y z@D-&+f7rV$Eh??V)m6(9QK1}1NSAQdD!GfLPA2t7eb#TePkezzlE9X&3ufE z`J&z_)4yrA#wu?^IMZy#c>_>@^Ollr>-;}S+`&^IJ(Sptt``Uq021+x%WY{E*nn1Mn_LYkGw{+ARg;KXq&w3 z4^6hOYP_~}-*v#+7#K;xk;%+ZA0x`CU+g>!q{8WSng9^Y9?u$A@y}i1_i4nkLLZ5B ztZkOR>dC=U_R*y!x*1MRqv|oYqyvy$XdNfJ+aSHT2Rve<`8-2}4Ia5O0A^!j+qmQ4 z=vatO%Fm=tpw=4_zY;9pFecC@XeHv;&Pt-^*ZP5PSYj_}rH;tSH5c6P3@?4{Vyj=ZfGn9_J-K51kHTqdTqm$)6Ct;K%L zHSr`RF`-*!mr@38ZQZq@`So1=p1p&EM-QuUtKT>v$kkO$`RPC~M_lX8@lB?U-kq z>R*dIfAJz3U0*MYImHE5Zh8+74_|d~hFc@cDFbQ*p5InSKssTsCi>M?tnZSy&v)d_ z)NAeZB}{`W808~ui6p1QDxh+Puji_*g4)94GH+Aq9+lD)x5&ESq2R1bY2sf1P*ZrA zR;2b69e;S-BMA#=f9BdfFq>6oey}nBGib*jP1oa?UBxf&=G_s(vkoG3^x0g9+q!@ASz37+& zRiz5ZbNeBnjkF-rSuT-9;!$f3wE%TEd?wE8dyGp%NuWhTHodYsDjl8EoiOA70~80; ziIisw{3uaZ1o{?mSJ>u?y>6$2PT!cEu>Ym4<*@4)$KIOnysvVVREV~B-C5zw|Jk~H zHYB@=oxg|1j@*{RQ(2uM4V}|cVa%xM3zou)&9H7f+0jBM?bbE->6JPZc2D%zM@jUs zE~kz3qNb9TmS1j`PL`Dl;b82_3FCiH_z%~*uXS~$pBm1-)#%O}pHDUQ|HU|Z8et*m zDWk^=3RgD>TSZ^9D7Sdb3UJr&yJJ_rAikBor?F^2L`OKX&%h+y*irCal=Gjt{`5t4 z!ACaW+yBMd&L`5bbtI51;=a)hZTjX3IJapY7J@JS(Uois~9I8#kEZ;0+h!6}U~y`Yh*pvToPsYiFYVs;l%o=%RJtz=`+AJsIDF**IN&JAkjna#i4 zshC=MxNyAP6y)gvQ*W7m-d4k`sezLa#t}Jn{bhS3J)J1$I?D+%`88aB*fW_)EA?Y< z@5qq9L4IpPd4^-rOOr;oTn0u)6;Wn>k*$1XQx_7whG~kE!T+53$JuS3xItmC>cb#M zVm6r?PH76?bE9$zXvBNRhpV7wc~-z>WU28!AC`|}`&sP**O_Wzf5+7zX7`2t4F80$ zGre>#QyLo=y}_q84`&&@m>fmWM6;#Hh2PYXmsvkG`TNnOD2F~F92Z)ReL!9rG%(9R zn+3bDZ@LxK1w`;l1oO~?&0_8-e93F-)1c#Fas_V~X5U8x5aj(Xw7PFvmt!~Kpg4z~ zj(IuHNcY{t{tH#i^j?><5z#hv-0!@uhys%Fd& zM$E-We$>iwEYbsIe%XeL_VD%AD8NmJlR`{do`7Bz?|vfXldbpKpenvLPB0(}k6Z2p z#N3MU#QeNHlj2Yo1Y@u0`p(3j3xluscvkat$Rd;*aF z&!tZwYFyJB%YVT0v=5%6DtDL2>UYP*P8oXYsp_o+?#umqsisLY+N~_e&~`*Z%pDIkt1dwmU5@6>nlwrhbO7=-g1SSi@3YQw{Q92XzCvJ zUv2M?7k|8271#>rAtYV!nchZ(glFG63J;^RSOb0_ksrBKwTzv8x+icrPGq8mHJSAJ zXEWB*Z^t6r>ZW;l*>`OsO*11$ij2FbBUd^08Cc9g;*@Ad;D~Yk>L_6v^rzQ7kQOj7 z_sNbBdUNyDwjc8N1VqHHX}@nS{eC!)%c|{`J<5VKl!jTM?iEPlqGgP;!>wrry$9J0 zXGm$}=S^ys=9inc8J3oo_U&1XMr@5&HL7RevMd&c$5rrSYG%}GUql@SnrljaxPB9g zUSE3opAUF?9;LBuT}>=zog3}oH6a0@0rsu>q|e-HU(T90yJ-|(o(51U6}I{wfz^aI zgS)N5))EN8^5qu~Zz)qx?@Wc!`EyHv$;N9MXJR#1Mi$B9&O(=##TMPhrF@cGZDP2Z z(0$h)ho{0LEJNaNh(Vy z;1frr(}7*)`+zbu8;6IbC0eMoMJzxs_dg(+PWOG-g}kv(#z=!PmR2hJOA2dFS^#=e{JR}V7j)5Lm=^-q^z*c|NL92q zYEO|P6+{>ASB5aJG*|pM(-9V)nRz@R^HmG})EFysds2NPm;LQv(rt)4x>fpQUsYP6 zy$p;HL~!r&h?Yp?b3puW$+=o~xG^+5+|@?t7$27|2Y@W~{u|NNRaMIR`V-4nE@jv# z&h zfsrNb6*c+d_0Q>1R8z@sz@VY;3~HdM^4WOFv(UW*3gRz*Vi9k`hde3gqQHH5quqPr zUW2Bd$L4$}TIL!gsB!i&$$jeWc-7a6eo=GhwcPrjw$fWE{XU(4T$ruPZy}E7TkZHE0bOM13mltP$_NaN%2Ov*a`;S zo0NUHy_@E88W+b9tz|F>Ii4S5a0F_^T_Il4_Ek2+)us^kMi)1{$K_63-V1qdeH2V4hv8S2&w6{LpbYL(0ZjE zgj3^p=vP)_akfZ>288~Juyb(ej@7$+j8Q#2LXKV8L_>C?`K6)8eKOhw%KkwVW))CC zX%am0IbajTLUZyF25|c6#wY5;hU+*J^d9o&pI~K}t&% z^5i5^nXocG@B4~7DI%a((jBpo#gfhk!k~8b4~UTWX%yAEqi1fdnHPO+(1pQm4Qt+h zj4f8)>kkjlhDuGh--uug{$?rI7o(3Gkg%9$_SdfgPR^Fi>>bOiKE+w%`1ssp=kdn9i#5c*XH_7%7b$q&@2t@PB(v^$K z^G}Z(EashMshn7=C6B&rX*tiS2Y`DeB_*h53$nm7&BZ2z+5pG~&)e>kYHDiPhmqwd zZ|BoKcijJUMN(=he-V_GoP&Z!8opP;UY>wt%=p&;V`k6q@_GL0YAvjc!HAno47!CJ zk`D9_XLEmQbAF=&of6d-T{P&Eg5jd@#EgOL;Gkj81M!_N1GnC+fEwv3LrV+?cY+*T zR`$i--c8o7xw$#+xKK2*^W%L8TC=8~Oc&x5;+68ux4ZCI7*z{CgkinX-}L|E7ck58X!e2RyJr@gg3 z=Ihth5#@FxG3L{o>xS;D*7byYJmB#Duk{%}w{1UBb^MpoeRnRi?|y`sg3mm_%D_>Q zbE~3;v}&Fh@~&=UL7PtpX-^4T!%)yOD2iu@5(yOcn@iI%l@~Z9y>V>cmY0VVdU?oq z-A2~)i5z2^fPKmfOhBI3@EIw9l6!Ye-#5$=rt{9$IX;h64}VS0=qU0(j(|7^HJ+*P zLhI=;MCy_jk4L+Ih@^EQ)_=}4w50Nh%z$6JaY^1SvLS6otxFjesD0^PRr+Xb5)IPR z(K?4xyxB@ XSz?>75Vz#;3%y)s#@0B%&^_iqEKr?r literal 0 HcmV?d00001 diff --git a/windows/media/phase-diagrams/prepare.png b/windows/media/phase-diagrams/prepare.png new file mode 100644 index 0000000000000000000000000000000000000000..1001e41e0dbf403ec43cf619766ba4096db69553 GIT binary patch literal 1713 zcmV;i22S~jP)h2TO9oLUKx;8<`K z!7YUz0-TC_K+sEoQ$bvkD-{w5sZu~u0p-xDR6x{^3rI$4AQzCyhf|dT<|{E!LiL|8 zmYu}*u0Pi6xAT)$-jA8_c>aDfZ}-h?ireizB?Vi~DQS751ZIvBm^n&d<|u)gqXcG- z5|}wkVCE=+nWF?|PFk#gUT$tKrKhJ`ycY3kUXn>I;A?G)&8)fNnEh*Ii@eh9+Knk-;sQsA_{a149mTGXO|xD zz0m!ww|?KG-kE=tUIwCD;IHoP(e6>?vwZq~-JrR(19SX(3!qEj+bf6k=ac_}UbkhW zQg7`gI{mIRWH~JpPpsbVhM`N~@#WxSZrSAwa&=uH$EP`A%fXl&&WbB4Dkvo-#kVyz zH5uJDEYK`4#@+zllC(1tdNK<)}%i%r4#>PfEJw2t>)m2(tT%@+PHZJXM7@7tC zYa_V0z_oo$Ba0r*^>(_wn$s2*7E*0(EzQi#XwIW}Ny46F!Qvw&CnraA*+oS~zOK8w zyW7{D*VWb0_V%{0dK|;@kw;#W3=9nT@}MlF2PhLm1kxg3u=10E#0mUdyTEApiHQkn zZEX!Wx3I84VVw08%;bD!k>&G>T z92P>ApA2ZW;14oWWBPLnvd@Q2Bb_X4{r&v`*QB@r76mb6T5Pb^U?499 z^38+}fzMINyRj45UYZ%RvZMnBiw8qPL%w}F>j~)060yNjVZAah_N7%vQofnd)kRlC5i1BI{oGcg~O}bV04rQjNMEr%#pV(B`&_Hwx zT>4%r-MN|>k;o8tr15=owE%M>4)`M`eB<6h$j6rw%c%6g`><_G(GA>eDS{jw*Wr*;hB08cKIHpgsFh1wz zUNH5V9%wNJ{=9LXjr<1Cyt7&Iv$9FC(D@&X&C@4s1 z-GZT3Ht4`^w+Dy|aO`k6OkVTIv6R5;>+9kZR@>9l<2ye!HI=|x#TOO=&&|yROz#P{ zNno+Py}i`Y(cwF%Cx0?w>7^^2ohwPg;=%Evxw$#OVS;tf&(Di}*)7A-^8bWqJvurn z_Cw`QMp$^!5TT}~M(oed&iaG{=!*OL`ouosxbeszPfT?mY<3{ln}7v##Zm%GOSBSd zeK2#_TQD9)`j4sMC@U*VR8`{wdx7B*oAoiI5wH~)D=q9}4{7PCSA;Dmzswiwr@-{| zG`ZdGkohsy2V1hkR$#0{hPZUL*bT>%*Yd?N9!-XtMG4y5+gS+A*2#he`{Q}8f5AEj z*b40UEH~iTUTV#Wer&sF%-o#4ULfXaR~No5Hp%etaH6Yc7_7Z$OdIn5v?6Q;c0Tn| z^^l8pyeDE-C#LJl`PhSlgY@9RgOK?f8XBm+zTTkP#t+tB^v>BDWPINIZPO<(#0}>~ zS5{UUQqOp!9#t}juLaj$qPewaJ}dV3s*8(@!{*P+%ZqFMjDoGecxvVRx`*1Z4*RIKXs5z|WKOmkZ81AIGS16DOt( z*x;tXhUeO0x~cWOaJfmG8C}*!c`RVRLqo!M(36T^^NBM^$t+voD|qdsj-3r2c(Yr{ zMaLhCaG83=w%Qoj{$sBXGu3g5DZ+_m^GAw{a9$EgGzxw8hg=tII6d_lP zl`k6_e;jD)AQqG+*{3F(ZF$Tn27wc#boR+obN(8jGksyTEEY2?EDXK9*_aw&;>2dN zkrohzZwpBFoW=^QXbhf9VIb$*D-FKfC!Jf%To|TY)T1Q}t|o5kAxX)g++ATOQ8YYq zxovQ|lw)CVm%nj1D+c4fMCZhVcV3dBazQ$c3wCqktFX#$g)hakP71u=glyx8D9%*` z{W7J=#X`UW?^5jUhJX*g+Kt*SO#b>I3+6D-XetlEh&PILH0SiGL{ghSSkZ&}Ol=QI&=2t6wNm6txGnFfx^ey4bI4#uHYT!kRj8 ziHWf4>gqv(K&Ny#R7F*_*!4uln$l8aLkrM3bM@;JXIurI&Cl z34^`37fVs(!Pt{MgNiz!a^3EBkBRsiuXX+Ui&jq=+eUmuSQs6JLdhVh+?0 zS>S+ym6QcO2cOiE(lhw<9C3Slx^@D9wnESX?GS};%BD}H>wC_-Nx5_mbbJPZS@bn@ z$y{BC7RKkep&J1LUmo`HHpVKZNQL)6sub<~m9eBoTplj1wDU~@&uc@O$$;MC98{0m z?Py@e;+kmYoCuY!F6~RoD;XvR+vFv)DrI5at!uA;w@I7Y8WdkRS~o*0Wl(loA6Jcb zE=w!EC1@eoBcJ=G)-Pn)@Adj;HM>D#z#EG+_V-LpBLv*GI~))-u+Pfc8smF7g&rF) zGe+VaD871>Q{>ER?tNR3^3l_bcA^%Y!-Z;Lf@b;%BSBB%N^_Gn4mfXQ$`NIV>Fw?9 z^w`z7RHTphub=W6SAMb#4(m~(^aV@GHJq^v9XwtCL&733zQ2vW=u;So3u{U zL^T@a9X=xvL5-))Od_-blaFW@8sOWO9v%WO7d28quCR)wu!Ww_JxPxE=~STNLQ9mT)pN7a-6|a z)DQ6+zbBoU+>gg};7a-{;>E0~{MJi9(6I*{6>iJ)Sb?Gj`}~4Ae9ByNbv0y4`n0q) zH8!XcEuW@9_Vc3(K7ERaB$3J4drun?*{lZjo+Lnb5Gy4-KEJvBb+o3F!oRux8~CwQ zaq;sN#MA457Wtg)><2<&>~LgSLJJm)eH%?8HPdJEqjqe)PH?G7 zs;a7wxJye*<#v|-P=9k9ISIApA_xS6smsgB$*G52nl3V})i-055uVX91;EIW(C~0; zH+zUFNh(cotZ!(tC{~Qtf_7}7!|xxeah=`7!NLDcFfNOlMz%pqNW2#{r{B>a-)mPN p(;?_)x+BX^btC^j`7G@bA|PrE{aouA4YU{A04F3GQDcWo{sV3X&OiVF literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 298867cbc0..20309cfdd3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -29,11 +29,13 @@ ms.topic: article There are three phases in deploying Defender for Endpoint: +![deployment phases - prepare, setup, onboard](/windows/media/phase-diagrams/deployment-phases.png) + |Phase | Description | |:-------|:-----| -| ![Phase 1: Prepare](images/prepare.png)
[Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint:

- Stakeholders and sign-off
- Environment considerations
- Access
- Adoption order -| ![Phase 2: Setup](images/setup.png)
[Phase 2: Setup](production-deployment.md)| Take the initial steps to access Microsoft Defender Security Center. You'll be guided on:

- Validating the licensing
- Completing the setup wizard within the portal
- Network configuration| -| ![Phase 3: Onboard](images/onboard.png)
[Phase 3: Onboard](onboarding.md) | Onboard devices to the service so the Microsoft Defender ATP service can get sensor data from them. +| [Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint:

- Stakeholders and sign-off
- Environment considerations
- Access
- Adoption order +| [Phase 2: Setup](production-deployment.md)| Take the initial steps to access Microsoft Defender Security Center. You'll be guided on:

- Validating the licensing
- Completing the setup wizard within the portal
- Network configuration| +| [Phase 3: Onboard](onboarding.md) | Onboard devices to the service so the Microsoft Defender ATP service can get sensor data from them. diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index e9fa0412b0..8bfa46379d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,11 +35,13 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: +![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) + |Phase |Description | |--|--| -|[![Phase 1: Prepare](images/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Prepare for your migration](mcafee-to-microsoft-defender-prepare.md) |During [the **Prepare** phase](mcafee-to-microsoft-defender-prepare.md), you update your organization's devices, get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | -|[![Phase 2: Set up](images/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Set up Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-setup.md) |During [the **Setup** phase](mcafee-to-microsoft-defender-setup.md), you enable Microsoft Defender Antivirus and make sure it's in passive mode, and you configure settings & exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and McAfee. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| -|[![Phase 3: Onboard](images/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Onboard to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-onboard.md) |During [the **Onboard** phase](mcafee-to-microsoft-defender-onboard.md), you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall McAfee and make sure that protection through Microsoft Defender Antivirus & Microsoft Defender for Endpoint is in active mode. | +|[Prepare for your migration](mcafee-to-microsoft-defender-prepare.md) |During [the **Prepare** phase](mcafee-to-microsoft-defender-prepare.md), you update your organization's devices, get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | +|[Set up Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-setup.md) |During [the **Setup** phase](mcafee-to-microsoft-defender-setup.md), you enable Microsoft Defender Antivirus and make sure it's in passive mode, and you configure settings & exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and McAfee. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| +|[Onboard to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-onboard.md) |During [the **Onboard** phase](mcafee-to-microsoft-defender-onboard.md), you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall McAfee and make sure that protection through Microsoft Defender Antivirus & Microsoft Defender for Endpoint is in active mode. | ## What's included in Microsoft Defender for Endpoint? diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md index d38a5977e8..703d353b4c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md @@ -28,12 +28,10 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] - -|[![Phase 1: Prepare](images/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | - **Welcome to Phase 3 of [migrating from McAfee Endpoint Security (McAfee) to Microsoft Defender Advanced Threat Protection (Microsoft Defender for Endpoint)](mcafee-to-microsoft-defender-migration.md#the-migration-process)**. This migration phase includes the following steps: 1. [Onboard devices to Microsoft Defender for Endpoint](#onboard-devices-to-microsoft-defender-for-endpoint). diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md index fe973d1a59..8adafc0254 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md @@ -29,7 +29,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md index 8813e53523..ae66d91bd0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md @@ -29,7 +29,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](images/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md index f26781b856..98a43bce92 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md @@ -29,28 +29,9 @@ ms.topic: article Deploying Microsoft Defender ATP is a three-phase process: -
- - - - - - - - -
- - Prepare to deploy Microsoft Defender ATP -
Phase 1: Prepare

-
- - Setup the Microsoft Defender ATP service -
Phase 2: Set up

-
- - Onboard diagram -
Phase 3: Onboard

-
+| [![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | [![deployment phase - setup](/windows/media/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | ![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +| ----- | ----- | ----- | +| | |*You are here!*| You are currently in the onboarding phase. diff --git a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md index fe2d128e37..d645d5a8db 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md @@ -33,37 +33,10 @@ ms.topic: article Deploying Microsoft Defender ATP is a three-phase process: -
- - - - - - - - - - - -
- - Plan to deploy Microsoft Defender ATP -
Phase 1: Prepare

-
- - Onboard to the Microsoft Defender ATP service -
Phase 2: Set up

-
- - Configure capabilities -
Phase 3: Onboard

-
- - - - +| ![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare | [![deployment phase - setup](/windows/media/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | [![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | +| ----- | ----- | ----- | +|*You are here!* | || -
You are currently in the preparation phase. diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index a1c3772e14..a002f9c23b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -31,28 +31,9 @@ ms.topic: article Deploying Microsoft Defender ATP is a three-phase process: -
- - - - - - - - -
- - Prepare to deploy Microsoft Defender ATP -
Phase 1: Prepare

-
- - Onboard to the Microsoft Defender ATP service -
Phase 2: Set up

-
- - Onboard image -
Phase 3: Onboard

-
+| [![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | ![deployment phase - setup](/windows/media/phase-diagrams/setup.png)
Phase 2: Setup | [![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | +| ----- | ----- | ----- | +| | *You are here!*|| You are currently in the set-up phase. diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md index c9b60c2b17..1a9ceac19e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md @@ -35,11 +35,13 @@ If you are planning to switch from a non-Microsoft endpoint protection solution When you switch to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: +![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) + |Phase |Description | |--|--| -|[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Prepare for your migration](switch-to-microsoft-defender-prepare.md) |During [the **Prepare** phase](switch-to-microsoft-defender-prepare.md), you update your organization's devices, get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | -|[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Set up Microsoft Defender for Endpoint](switch-to-microsoft-defender-setup.md) |During [the **Setup** phase](switch-to-microsoft-defender-setup.md), you enable Microsoft Defender Antivirus and make sure it's in passive mode, and you configure settings & exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and your existing endpoint protection solution. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| -|[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Onboard to Microsoft Defender for Endpoint](switch-to-microsoft-defender-onboard.md) |During [the **Onboard** phase](switch-to-microsoft-defender-onboard.md), you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall your existing endpoint protection solution and make sure that protection through Microsoft Defender Antivirus & Microsoft Defender for Endpoint is in active mode. | +|[Prepare for your migration](switch-to-microsoft-defender-prepare.md) |During [the **Prepare** phase](switch-to-microsoft-defender-prepare.md), you update your organization's devices, get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | +|[Set up Microsoft Defender for Endpoint](switch-to-microsoft-defender-setup.md) |During [the **Setup** phase](switch-to-microsoft-defender-setup.md), you enable Microsoft Defender Antivirus and make sure it's in passive mode, and you configure settings & exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and your existing endpoint protection solution. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| +|[Onboard to Microsoft Defender for Endpoint](switch-to-microsoft-defender-onboard.md) |During [the **Onboard** phase](switch-to-microsoft-defender-onboard.md), you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall your existing endpoint protection solution and make sure that protection through Microsoft Defender Antivirus & Microsoft Defender for Endpoint is in active mode. | ## What's included in Microsoft Defender for Endpoint? diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index 4852139083..40074d3a9c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 3: Onboard -|[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index 5896bc9f4e..beb6a69b45 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 1: Prepare -|![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index b8c66898af..65b638af0e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 2: Setup -|[![Phase 1: Prepare](images/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md index 371f380e63..cd4d8387d3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md @@ -35,11 +35,13 @@ If you are planning to switch from Symantec Endpoint Protection (Symantec) to [M When you switch from Symantec to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: +![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) + |Phase |Description | |--|--| -|[![Phase 1: Prepare](images/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Prepare for your migration](symantec-to-microsoft-defender-atp-prepare.md) |During the **Prepare** phase, you get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | -|[![Phase 2: Set up](images/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Set up Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-setup.md) |During the **Setup** phase, you configure settings and exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and Symantec Endpoint Protection. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| -|[![Phase 3: Onboard](images/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Onboard to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-onboard.md) |During the **Onboard** phase, you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall Symantec and make sure protection through Microsoft Defender for Endpoint is in active mode. | +|[Prepare for your migration](symantec-to-microsoft-defender-atp-prepare.md) |During the **Prepare** phase, you get Microsoft Defender for Endpoint, plan your roles and permissions, and grant access to the Microsoft Defender Security Center. You also configure your device proxy and internet settings to enable communication between your organization's devices and Microsoft Defender for Endpoint. | +|[Set up Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-setup.md) |During the **Setup** phase, you configure settings and exclusions for Microsoft Defender Antivirus, Microsoft Defender for Endpoint, and Symantec Endpoint Protection. You also create device groups, collections, and organizational units. Finally, you configure your antimalware policies and real-time protection settings.| +|[Onboard to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-onboard.md) |During the **Onboard** phase, you onboard your devices to Microsoft Defender for Endpoint and verify that those devices are communicating with Microsoft Defender for Endpoint. Last, you uninstall Symantec and make sure protection through Microsoft Defender for Endpoint is in active mode. | ## What's included in Microsoft Defender for Endpoint? diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index 38143cfd5f..d2eac41797 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](images/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](images/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](images/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md index cc678c90eb..1e14e2a392 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|![Phase 1: Prepare](images/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](images/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | +|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index f36e72d95c..9945105685 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](images/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](images/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | +|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| ||*You are here!* | | From 026b8130c8ba91cfefa92978510df7f5668fae6e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 12 Nov 2020 08:45:46 -0800 Subject: [PATCH 02/49] Update mcafee-to-microsoft-defender-migration.md --- .../mcafee-to-microsoft-defender-migration.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index 8bfa46379d..16cc4033c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,7 +35,8 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare, setup, onboard](../../../media/phase-diagrams/migration-phases.png) + |Phase |Description | |--|--| From ba7ff8684cd6993e70a70502e21ed98f036f61d9 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 12 Nov 2020 08:51:38 -0800 Subject: [PATCH 03/49] Update mcafee-to-microsoft-defender-migration.md --- .../mcafee-to-microsoft-defender-migration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index 16cc4033c6..d4673240b7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](../../../media/phase-diagrams/migration-phases.png) +![Migration phases - prepare, setup, onboard](/../../../media/phase-diagrams/migration-phases.png) |Phase |Description | From 4eef25e115f8cb1792b93c01f5fd06a143c9a29a Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 12 Nov 2020 08:52:48 -0800 Subject: [PATCH 04/49] Update mcafee-to-microsoft-defender-migration.md --- .../mcafee-to-microsoft-defender-migration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index d4673240b7..277a421663 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](/../../../media/phase-diagrams/migration-phases.png) +:::image type="content" source="../../../media/phase-diagrams/migration-phases.png" alt-text="Migration phases - prepare setup onboard"::: |Phase |Description | From c023c7d42a21d09c588689b5f91f0f1d7df1c57e Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Tue, 17 Nov 2020 10:22:56 +0530 Subject: [PATCH 05/49] Create firewall-settings-lost-on-upgrade.md --- .../firewall-settings-lost-on-upgrade.md | 44 +++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md new file mode 100644 index 0000000000..77e0fa9ee4 --- /dev/null +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -0,0 +1,44 @@ +--- +title: Firewall Settings Lost on Upgrade +description: Firewall Settings Lost on Upgrade + +ms.reviewer: +ms.author: Benny-54 +ms.prod: w10 +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +author: Benny-54 +manager: dansimp +ms.collection: +- m365-security-compliance +- m365-initiative-windows-security +ms.topic: troubleshooting +--- + +# Firewall Settings Lost on Upgrade + +This article describes a scenario whereby previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. + +## Rule Groups + +Individual built-in firewall rules are categorized within a group. For example, the following individual rules form part of the ‘Remote Desktop’ group. + +- Remote Desktop – Shadow (TCP-In) + +- Remote Desktop – User Mode (TCP-In) + +- Remote Desktop – User-Mode (UDP-In) + +Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Administrators can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘Inbound’ or ‘Outbound Rules’ and selecting ‘Filter by Group’; or via PowerShell using the Get-NetFirewallRule cmdlet with the -Group switch. + +```Powershell +Get-NetFirewallRule -Group +``` + +> [!NOTE] +> It is recommended to enable an entire group instead of individual rules if the expectation is the ruleset is going to be migrated at some point. + +It is recommended to enable/disable all rules within a group, as opposed to enabling/disabling just one or two of the individual rules to help avoid unexpected behaviors. For example, while rule groups can be used to organize rules by influence and allows batch rule modifications, they are also used as a way to maintain rule state across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the process determines what should be enabled/disabled when the upgrade is complete. + +Take the Remote Desktop group example mentioned above. It consists of three rules. To ensure that the ruleset is properly maintained once the upgrade is complete, all three rules should be enabled. If only one rule is enabled, the upgrade process will see that two of three rules is disabled and subsequently disable the entire group to maintain an as pristine out-of-the-box configuration as possible. Obviously, in this scenario, this brings the unintended consequence of being unable to establish RDP connection to the host. From a9cff113deab0cbfbf190f95468cdf762b2ac3cb Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Tue, 17 Nov 2020 10:34:57 +0530 Subject: [PATCH 06/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 77e0fa9ee4..f1cf50da2e 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -30,7 +30,7 @@ Individual built-in firewall rules are categorized within a group. For example, - Remote Desktop – User-Mode (UDP-In) -Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Administrators can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘Inbound’ or ‘Outbound Rules’ and selecting ‘Filter by Group’; or via PowerShell using the Get-NetFirewallRule cmdlet with the -Group switch. +Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Admins can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘Inbound’ or ‘Outbound Rules’ and selecting ‘Filter by Group’; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group From 30bc25b178bb4a052c5cf31bc4e6923457d3ab71 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Tue, 17 Nov 2020 10:37:28 +0530 Subject: [PATCH 07/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index f1cf50da2e..5455669ae8 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -3,7 +3,7 @@ title: Firewall Settings Lost on Upgrade description: Firewall Settings Lost on Upgrade ms.reviewer: -ms.author: Benny-54 +ms.author: v-bshilpa ms.prod: w10 ms.sitesec: library ms.pagetype: security From 3c0d7031ed623dd7a035e58e66f038779e95d424 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Tue, 17 Nov 2020 10:39:56 +0530 Subject: [PATCH 08/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 5455669ae8..0492170b3a 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -8,7 +8,7 @@ ms.prod: w10 ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: Benny-54 +author: v-bshilpa manager: dansimp ms.collection: - m365-security-compliance From a9a76448a996bb5241765be32a44ade8f3ca0792 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Tue, 17 Nov 2020 14:19:00 +0530 Subject: [PATCH 09/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 0492170b3a..45fc0886f1 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -1,14 +1,13 @@ --- title: Firewall Settings Lost on Upgrade description: Firewall Settings Lost on Upgrade - ms.reviewer: ms.author: v-bshilpa ms.prod: w10 ms.sitesec: library ms.pagetype: security ms.localizationpriority: medium -author: v-bshilpa +author: Benny-54 manager: dansimp ms.collection: - m365-security-compliance From 70f5d6d5fb1313c59503220e98c293905c0af086 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Tue, 17 Nov 2020 14:20:36 +0530 Subject: [PATCH 10/49] Update TOC.md --- windows/security/threat-protection/windows-firewall/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/windows-firewall/TOC.md b/windows/security/threat-protection/windows-firewall/TOC.md index 34b7c1beb1..0720ca4cc1 100644 --- a/windows/security/threat-protection/windows-firewall/TOC.md +++ b/windows/security/threat-protection/windows-firewall/TOC.md @@ -165,6 +165,7 @@ ## [Troubleshooting]() ### [Troubleshooting UWP app connectivity issues in Windows Firewall](troubleshooting-uwp-firewall.md) +### [Firewall Settings Lost on Upgrade](firewall-settings-lost-on-upgrade.md) From 0e669df0f18f4ab646c2b08ba5f72b0df4c31e0d Mon Sep 17 00:00:00 2001 From: Asha Iyengar Date: Wed, 18 Nov 2020 17:58:54 +0530 Subject: [PATCH 11/49] Minor changes --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 45fc0886f1..92a3e08580 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -17,7 +17,7 @@ ms.topic: troubleshooting # Firewall Settings Lost on Upgrade -This article describes a scenario whereby previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. +This article describes a scenario where previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. ## Rule Groups @@ -29,15 +29,15 @@ Individual built-in firewall rules are categorized within a group. For example, - Remote Desktop – User-Mode (UDP-In) -Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Admins can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘Inbound’ or ‘Outbound Rules’ and selecting ‘Filter by Group’; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Admins can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘**Inbound**’ or ‘**Outbound Rules**’ and selecting ‘**Filter by Group**’; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group ``` > [!NOTE] -> It is recommended to enable an entire group instead of individual rules if the expectation is the ruleset is going to be migrated at some point. +> It is recommended to enable an entire group instead of individual rules if the expectation is that the ruleset is going to be migrated at some point. It is recommended to enable/disable all rules within a group, as opposed to enabling/disabling just one or two of the individual rules to help avoid unexpected behaviors. For example, while rule groups can be used to organize rules by influence and allows batch rule modifications, they are also used as a way to maintain rule state across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the process determines what should be enabled/disabled when the upgrade is complete. -Take the Remote Desktop group example mentioned above. It consists of three rules. To ensure that the ruleset is properly maintained once the upgrade is complete, all three rules should be enabled. If only one rule is enabled, the upgrade process will see that two of three rules is disabled and subsequently disable the entire group to maintain an as pristine out-of-the-box configuration as possible. Obviously, in this scenario, this brings the unintended consequence of being unable to establish RDP connection to the host. +Take the Remote Desktop group example mentioned earlier. It consists of three rules. To ensure that the ruleset is properly maintained once the upgrade is complete, all three rules must be enabled. If only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group to maintain an as pristine out-of-the-box configuration as possible. Obviously, in this scenario, this brings the unintended consequence of being unable to establish RDP (Remote Desktop Protocol) connection to the host. From 0c929a927671fe7d865feb1071f3a0e7ea106879 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Fri, 20 Nov 2020 09:01:06 -0700 Subject: [PATCH 12/49] safety commit --- windows/client-management/quick-assist.md | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 windows/client-management/quick-assist.md diff --git a/windows/client-management/quick-assist.md b/windows/client-management/quick-assist.md new file mode 100644 index 0000000000..a40a1bbf2f --- /dev/null +++ b/windows/client-management/quick-assist.md @@ -0,0 +1,14 @@ +--- +title: Use Quick Assist +description: How IT Pros can use Quick Assist to help users +ms.prod: w10 +ms.sitesec: library +ms.topic: article +author: jaimeo +ms.localizationpriority: medium +ms.author: jaimeo +manager: laurawi +--- + +# Use Quick Assist + From 7033ac7932f5c85d6002061c1f5b00aadeb47277 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Thu, 3 Dec 2020 12:05:46 +0530 Subject: [PATCH 13/49] Update firewall-settings-lost-on-upgrade.md --- .../firewall-settings-lost-on-upgrade.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 92a3e08580..8948b3b3fe 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -1,6 +1,6 @@ --- -title: Firewall Settings Lost on Upgrade -description: Firewall Settings Lost on Upgrade +title: Firewall settings lost on upgrade +description: Firewall settings lost on upgrade ms.reviewer: ms.author: v-bshilpa ms.prod: w10 @@ -15,13 +15,13 @@ ms.collection: ms.topic: troubleshooting --- -# Firewall Settings Lost on Upgrade +# Firewall settings lost on upgrade -This article describes a scenario where previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. +This article describes a scenario where previously enabled Firewall rules revert to a disabled state after performing a Windows upgrade. -## Rule Groups +## Rule groups -Individual built-in firewall rules are categorized within a group. For example, the following individual rules form part of the ‘Remote Desktop’ group. +Individual built-in Firewall rules are categorized within a group. For example, the following individual rules form part of the Remote Desktop group. - Remote Desktop – Shadow (TCP-In) @@ -29,7 +29,7 @@ Individual built-in firewall rules are categorized within a group. For example, - Remote Desktop – User-Mode (UDP-In) -Other examples include the Core Networking, File and Print Sharing, and Network Discovery groups. Admins can filter on individual categories in the firewall interface (wf.msc) by selecting and right-clicking on ‘**Inbound**’ or ‘**Outbound Rules**’ and selecting ‘**Filter by Group**’; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other examples include the core networking, file and print sharing, and network discovery groups. Admins can filter on individual categories in the Firewall interface (wf.msc) by selecting and right-clicking on **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group From d8a85dd2b752ddf3e0dbffb84600c6af6b7a13c9 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Thu, 3 Dec 2020 12:08:13 +0530 Subject: [PATCH 14/49] Update TOC.md --- windows/security/threat-protection/windows-firewall/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-firewall/TOC.md b/windows/security/threat-protection/windows-firewall/TOC.md index 0720ca4cc1..6d788f1ee0 100644 --- a/windows/security/threat-protection/windows-firewall/TOC.md +++ b/windows/security/threat-protection/windows-firewall/TOC.md @@ -165,7 +165,7 @@ ## [Troubleshooting]() ### [Troubleshooting UWP app connectivity issues in Windows Firewall](troubleshooting-uwp-firewall.md) -### [Firewall Settings Lost on Upgrade](firewall-settings-lost-on-upgrade.md) +### [Firewall settings lost on upgrade](firewall-settings-lost-on-upgrade.md) From b67aca1f618e292254193280fa1802c953477255 Mon Sep 17 00:00:00 2001 From: Brian Caton Date: Mon, 7 Dec 2020 13:35:35 -0800 Subject: [PATCH 15/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 8948b3b3fe..8a7721f432 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -21,7 +21,7 @@ This article describes a scenario where previously enabled Firewall rules revert ## Rule groups -Individual built-in Firewall rules are categorized within a group. For example, the following individual rules form part of the Remote Desktop group. +For organizational purposes, individual built-in Firewall rules are categorized within a group. For example, the following rules form part of the Remote Desktop group. - Remote Desktop – Shadow (TCP-In) @@ -29,7 +29,7 @@ Individual built-in Firewall rules are categorized within a group. For example, - Remote Desktop – User-Mode (UDP-In) -Other examples include the core networking, file and print sharing, and network discovery groups. Admins can filter on individual categories in the Firewall interface (wf.msc) by selecting and right-clicking on **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other group examples include the core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the Firewall interface (wf.msc). This is acheived by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group @@ -38,6 +38,6 @@ Get-NetFirewallRule -Group > [!NOTE] > It is recommended to enable an entire group instead of individual rules if the expectation is that the ruleset is going to be migrated at some point. -It is recommended to enable/disable all rules within a group, as opposed to enabling/disabling just one or two of the individual rules to help avoid unexpected behaviors. For example, while rule groups can be used to organize rules by influence and allows batch rule modifications, they are also used as a way to maintain rule state across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the process determines what should be enabled/disabled when the upgrade is complete. +To avoid unexpected behaviors it is recommended to enable/disable all of the rules within a group, as opposed to just one or two of the individual rules. This is because while rule groups are used to organize rules and allow batch rule modification by type, they also represents the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. -Take the Remote Desktop group example mentioned earlier. It consists of three rules. To ensure that the ruleset is properly maintained once the upgrade is complete, all three rules must be enabled. If only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group to maintain an as pristine out-of-the-box configuration as possible. Obviously, in this scenario, this brings the unintended consequence of being unable to establish RDP (Remote Desktop Protocol) connection to the host. +Take the Remote Desktop group example shown above. It consists of three rules. To ensure that the ruleset is properly migrated during an upgrade, all three rules must be enabled. If for example only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain what it sees as the most pristine out-of-the-box configuration possible. Obviously, this scenario brings with it the unintended consequence of breaking RDP (Remote Desktop Protocol) connectivity to the host. From 5ca4a3adb87afcc87c1aa3941aefd2b6382ead21 Mon Sep 17 00:00:00 2001 From: Brian Caton Date: Mon, 7 Dec 2020 14:34:19 -0800 Subject: [PATCH 16/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 8a7721f432..4d978ad0fe 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -29,7 +29,7 @@ For organizational purposes, individual built-in Firewall rules are categorized - Remote Desktop – User-Mode (UDP-In) -Other group examples include the core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the Firewall interface (wf.msc). This is acheived by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other group examples include core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the Firewall interface (wf.msc). This is acheived by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group @@ -38,6 +38,6 @@ Get-NetFirewallRule -Group > [!NOTE] > It is recommended to enable an entire group instead of individual rules if the expectation is that the ruleset is going to be migrated at some point. -To avoid unexpected behaviors it is recommended to enable/disable all of the rules within a group, as opposed to just one or two of the individual rules. This is because while rule groups are used to organize rules and allow batch rule modification by type, they also represents the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. +To avoid unexpected behaviors it is recommended to enable/disable all of the rules within a group as opposed to just one or two of the individual rules. This is because while groups are used to organize rules and allow batch rule modification by type, they also represents the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. Take the Remote Desktop group example shown above. It consists of three rules. To ensure that the ruleset is properly migrated during an upgrade, all three rules must be enabled. If for example only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain what it sees as the most pristine out-of-the-box configuration possible. Obviously, this scenario brings with it the unintended consequence of breaking RDP (Remote Desktop Protocol) connectivity to the host. From c141e22df8e2a08ff44272429585002e1d512549 Mon Sep 17 00:00:00 2001 From: Asha Iyengar Date: Wed, 16 Dec 2020 21:34:10 +0530 Subject: [PATCH 17/49] Minor changes --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 4d978ad0fe..232e9788e4 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -17,11 +17,11 @@ ms.topic: troubleshooting # Firewall settings lost on upgrade -This article describes a scenario where previously enabled Firewall rules revert to a disabled state after performing a Windows upgrade. +This article describes a scenario where previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. ## Rule groups -For organizational purposes, individual built-in Firewall rules are categorized within a group. For example, the following rules form part of the Remote Desktop group. +For organizational purposes, individual built-in firewall rules are categorized within a group. For example, the following rules form part of the Remote Desktop group. - Remote Desktop – Shadow (TCP-In) @@ -29,7 +29,7 @@ For organizational purposes, individual built-in Firewall rules are categorized - Remote Desktop – User-Mode (UDP-In) -Other group examples include core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the Firewall interface (wf.msc). This is acheived by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other group examples include core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the firewall interface (wf.msc). This is acheived by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group @@ -40,4 +40,4 @@ Get-NetFirewallRule -Group To avoid unexpected behaviors it is recommended to enable/disable all of the rules within a group as opposed to just one or two of the individual rules. This is because while groups are used to organize rules and allow batch rule modification by type, they also represents the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. -Take the Remote Desktop group example shown above. It consists of three rules. To ensure that the ruleset is properly migrated during an upgrade, all three rules must be enabled. If for example only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain what it sees as the most pristine out-of-the-box configuration possible. Obviously, this scenario brings with it the unintended consequence of breaking RDP (Remote Desktop Protocol) connectivity to the host. +Take the Remote Desktop group example shown above. It consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If for example only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain what it sees as the most pristine out-of-the-box configuration possible. Obviously, this scenario brings with it the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host. From 1d6498affc9bbcdc4bcc5a345883c280e4b272bd Mon Sep 17 00:00:00 2001 From: jaimeo Date: Wed, 16 Dec 2020 10:32:54 -0700 Subject: [PATCH 18/49] safety commit; I think about all complete but for updated image --- windows/client-management/media/image1.png | Bin 0 -> 63557 bytes ...-assist-for-it-pros-draft - Pauls Edits.md | 103 ++++++++++++++++ windows/client-management/quick-assist.md | 111 +++++++++++++++++- 3 files changed, 212 insertions(+), 2 deletions(-) create mode 100644 windows/client-management/media/image1.png create mode 100644 windows/client-management/quick-assist-for-it-pros-draft - Pauls Edits.md diff --git a/windows/client-management/media/image1.png b/windows/client-management/media/image1.png new file mode 100644 index 0000000000000000000000000000000000000000..1f6394616a568cffc40a1922625ed723f4ddd3d6 GIT binary patch literal 63557 zcmcG$byQVt_cppW-6^HOraPsj6(ywvq(Lbu>5>K!kVYB=1d;A;5CI7#C8T51-OYDz zeBU#^zs?!woZq*`@Y!pR@$9wMJ?|OUyso(jRaKV7#k!9Lfk1HOJ=*Zj%hEa;{<`=bs+vhyY2E!A&}F* z@-osI?uJ`4s9y1KGW0#ZvGBhkL)ncvjf^$~tjJFZw=SkQT?6UpXppejGU;e$W@ZG) zt9NE^c6YbD7ar~ev|pUUog}xqcA5)My?=ZBcA^e84J07EJJkHOeq3dQ{5!CCm>~Z> zh5ny91@}JZB_vcU2~$x>X!|KsKgrB&A&buXVpL5sGF&mXY=YtX%$#kJM*XilF0+@E zjEqcNHxCqidi1s{IyjCWRT6!&cT!Q|WNYZj=wJ&qA&glUeGHGtfv$)PMdf-DCW|&z zjP5xK+R@U{(e;WZL1^f*#LNcHwJk*#;$*t#rbk{h7VK2GYG^ueEYc7QqV^@Va;Kb5 zizQvp@%)wDh;!im&rc_i{r=e_kH8oeLP!W_ts#N1Ou=Tp#d!=IV}~fj;lD&xaJNxU zA%U2QQNpWBa&qbv#~c?uxqkH4MYLb=vLg)2!fk>CE_85j3Z+dPH>@vhA->T2i@}9I*J{!i-=Lgda&`57Ev7wK{H}P=e-(BxdjQdK5L5X5zAH6D8r(p`o)@v5 zs0oFi0^J)#d-vPiDFipuoRjQzpZ#j4F)G51wG%?=o9aXQdV0^uQsgF1Z0}M;1eR{> z!-TkPd&j@q_H@B(4PFhOT)ued=3Do^lWE14UwAt|s=RzM&o1ehs061A&mt(8l` zR6o{3afL=_ZyvS^cgDCx0%4=p{{8O$av8;#y+{4NR;%DD5sWu00(V#NM_i$|k|;Ko zk&a8=V&9g#X7g-6DU1;F;jQs|*E1t$;m46EKYGGHzgnTMKpSxTDXAGCc$HDHsQ*JcAe$IooCAI6 zsgiUiYnZ&vy`U@e;ARG6X&oNi*w>d`tROF?k%g1tqI|2u$ zR?6NsbS}>Yvu$=~l;Fk5>peMMs&a22iqoJ=)NmX@tTT{vVa$CmOL2zg8 z>QuvHA(^>f?;zLv@_AP*H~?uFbQG)VJGH3Zm7_1GZJQ?K$KR@^Dy%su)>4q_A4=;kX8LdE6G#=(^2T__9>6^e%igR2?2jAv~SHnaqtdE3ujEH8=Y7FSa_X7j0>A z(QzDokxw_epZ7H?P~gjY8}0lSxs(8|7E6Z8>O7l-&u6Lh&?Bx4aGc&h! z-R3vF@s#&IMaKrbS=(moqn7tDg3YC<$KREK@w*#)Xt4^(S{e>L=f(}soZ9Fz`XOyP z>~|odYqh(wOjA3~?s~q&M52G}{Y8Wp;h8>dcU!Eesqm=pqT749g^981o}}o)dB*yD zjwm9c3E?kokU;A5_-ISq=6RnqQKW-?z1y<=?-lk!XvNu^ulg8@Ja)|C~ zn+>X%rLAtM!=tBsMG9e+m^6rMnEkV@V>71TbQj{5gm5x_B*cRwHWlM;Q&GoqLS!gJ zR-2|pM^p@rwz%cZe@!jY$Gm&MrE=x1_Wkv*ZB&Gj{#D|o^`!(w48B_#iHgNNe&tgR zEf=p2o_^Ksd2)RkR-{k{B5$zRImrno!HB_98~lN{{%*0qo+u9q3Cj-jNh1;N=wxER zR(9SlXz2T^rWvv79F3V8VAelJcFc>{HPU#$)c>}Uj+d1&6p|D6sQ1H=gnDjxnBf3- z!+#wubZe?s<-VZJ8$)_Taty3!$N;6b*gfQPDi82Qq~E4U zgm)p1tjB(ep!l+=OnPuV<9g4WGX9oY<&!uIE ziZ{KbPMBcZ)E4d>MveBax`A(u|I_CE-}fq?L$5|jIYYu0u|zsH^1G~}@3L83s}Rqo zd8A%x{@i0dCvkbY-f5+o^|gtK*=&=?aIv0{_q1*83=@dQgdaa-4hiXGqp0K6vY)Lx z@!L$OO59#KVPazP?l$W>I#y6hcxl6SmzL;%r3ieoYrWQb{N%~;O)&L4xdbkQ0>t(a zlH9xV-V)tL*WziP%k76IT{!29Vce!W)AbKce-dEg@4V@2$7TLJ--}g^}-dPW#Qb=c!-c9dA^49Gb7sHaA}Fcf*EDjU>HsC?7e?^(Jt# zgS3|*;e8Pj7#QeNQdn3x3nM0`XMb4|*W!J-;i9OmorHFqcP~lA>04c0-P(5E!-)o$ zLg%$XX*SIQhTZ1V^l(ZM_1#8lj0>3O7O#lQMjVH3m0a5A&%ZnmxV$7))m}~3+GS{| zAxc#H_kY#z<2_co$jHbGNn`UCuo=2Hc7=w`@9tk^$H6ME^N7jQeZD_>;7>f|jg@EfU<5Z%qN*0@Hvr&#-9GGn!Vq0^qMorDl z0tB__@Y}(xr`Xq$^zIT;F4FHLF4pMtb*l@`E-n-X(#7GS%<0jJiCpX6c@pjy>$w8S zWp2BM+X8#PMR(r}LyeGQA=`heM=o1#F08L95#jYO$H5!sd~Xe?J(dYSbJ`7N`kx@# zJ30}&l^l5;@(G_7Q*`(YrjNtfK?#{mh)9U+ADRru1* z&Q*eRGC_VWuvm!uZrQKT{)hcTKD#Q1N*G}H(aOKx=by=ij z;ZEzV&$eWl&-J@vRjD9EdIy;2uClOp1mll)`P8+Qz3TWeH)qthUv3MVznHRXj0XWn|vBkX@;O1QJJfS5WG)pq1Mf-u-9vWnG3B zs*SF;+XYd!8@e?%`A|uK)$Hbc>i6ezGkgk8aqsiXi5@OF@vut*FE4y_jXbt?d(g*y zQU69Tq}v2nGUeixsB{xq;n5sv0a{TDRPLGa=3{>JAEZJ4{{An$apib2%V}r3!?;`C z%qk!rp^-ASoFEqLQlfFIZ&6>V>X!fy#oiJ~l8D_{QL;za8+0G%`@b0DZ4v6{o&>nt`?bJ7MNOTB9gD^8&k_ff)Bgshe zb+&BO#%colOXazNPLNP`KS!}4ZQb*mfkqqWX_sfsroVLA{;NsMLAv$U*qakPmWKVE zWi)>NgDJxHh@_4<)M)P#`~SyNxco#8spsbI-)cqIooUw9fsFC%<4WZ8aj@g3mv`M& z-akl)-hK;G6yxVdF0mm0$j!BQA3GkcsT~puk;P&gG&skgVw2t>TS5}Cf0%)ooScQb zX)j>fWA(G+)tQ5c_eE7WOwv#xk;_(MapmCXC@#^+M<+$d?(Hn_0U3?Ge-KewNhv%5 zUi)@NS4>Ro$Dco%k6gD{%zEQ^VYEc|?lCy6{*IUb#MJYVgq?wlOW98LxUE35&=fdj zh3%AJ@*|gmv-9)yC7uyG>;1*f3X1`12YY)0GBPp;CnvsL!g}ZRSdh+TzbPftJrJ~s zK09+iq>g!!tK1V#!FSXGTs8@Tp$Xx(|5g#0e6#VVun+i0p4oZ+_=*WDBo_G-v&vXh zhQ|tp$I+0i0A_Sj5{u;3ULX!Y*4!AQ_*9P=ByX=O!>L5Ih*1bAC|H5lkIFojlMB(J zq!e+K*%h^)_p7oVSBBkgmbPv<(NjRc<9|BYp6VOUQ55L0Kb>*w8#nUxKKHn5WZ3TV z;DCdh+jv{ESzp4zd?3CRPm3d50e5HNlZr%)RB!<>+Ox+&DEibi0f9; zEPftc+cw510J#M{e#e{RiW(Ymvy#3yUiljNu@X_7C1x)vtl#*!XybdE;(3_|c{$_Xw1L5)*zbyvRi~SpFYip-nr)>X{ z6YxBM5fXmkI|9YHMk!VBxy9{3nn?EPlhd7<9O*zb^{;Y-4$jVTdUnm47H4WLQI0+g zIFFpyXr6|V3P{pF1+|L_i`so2%BoeA#D%|ia1cwxs1Q;tZzvo-Gbt2WhqG`hmJBchWh+!W30HaHn6g?5^Xo(k;}%K zlko~QXoOd1&5GZa~W8ec@cp_GYT4*kgbs>9`wJ5syPoIMcDM zyIVGqIn&K=dozp3?+(57ZvMNb1xSCo0Z{@sZ>mnm^z1C9ZYE5k)~{8>_TRhCcdPq> zyt`>KNJhiYud%D5n5+DmK}<}4)^k^!LeOSHpz_x5GsMsXPLeF_kR^EfB&RJ?I`HUr zu`|s247?cXZ-RP04>@0;^g&>-tZQ|aC(ItJNMlO8C?6Hg)IFACLjJ_;Uoq})J}(UNMvaR{)0 z!mV|`4HUVf^Py#YdGsTg6cJ<~g2I>op4W1WtTQ@&D-`0~Mk zNUPM)){qzhF#w<&YS9EfhB^Dj((UO7iC)t;G}Kut=Q1Y-DwY|vFK=eJW15Zw(M0U|!=*uE+>kPH>07_BXv&C(55 zKU4E4XwLO=Nv&0?>(isWdki+7fB)-yws_~*R#+a#?kN|0yn^t$tt`@_>Hd&h^VTC6 zyYf@=Yw)ln40jJo@)&G`B09_sGfY0VoE`b={y1~a4jJ>;fjGW*mN(n-tf%d22)4jR zgxJ=H6f6vG@$ZM~ijmJ0I!aZ3rYa(v&UI=ZjAJ4RrRe@-GaKT&Q1Y698%;FmzL!+yRLoRG-K-y=PKd|&nt z_A*u(#RPkr7){O`6R5-Dm~ZM?Fy%c~t)C3S?%!t{$yG`8+^LtLJ)7J zcckGOT4z^R??Okg*>s)5aEXDaR~z5-3bj3j|0%RFHbG|tNE`KL?P-0rH($4%itjlL4)SsxtBBXs})}W5f0XKGpx*{ z0?}}n;fY3LrcxRjztMkVoT;F7_O&aP6OqTWFo#F2!a{gSyaEU|P#XU{ zbU`U`*%*xhMoT?4|NWmByRLgq;%2Efq$ydWaq65fv@MpCq)5oQo6*9j(K2_BBR7DU zp+|VeM6b0VC(W$&^9SGY?Dy7$ll#stfScrKq1``N-=Oin8Lc_*{5e+1d*SfJ?&YLd zm#kR$X@ZWty!`#?-HGxiH)l)u=b)rBaBy&R9NaKHPx%Ro(hneBGzEdcy(PK|BeiWJ2nm^Zq`*suMUvW$YX*W*1lNDygB^9!}7{*&JPN1|>!(=Ns97KniV zDRD=#_r7{Vc|e0Zbr zMZ<}tX!B%qc++@cxX;ztFhu7azq+Kdq6@c0vRGz7ov2a1V@O!o$iWQ&nTTHL*n}>t z>K?1QOoPiN6Q6m1^Z~ptwU%h;*cizV>%Gh7*t!j&MQBJ~raizL04Vl0pU$#JNnGTO z7VC}I{gEcxPOG5`_lq$!hD2A|{3A8zh8MHP5kZLmejDQ;-*5x_C>$b4uEbOF*VDHS<-zVuFQL1qr{eX+ z@$n|RW`V|sX8e#48-phIp{tOP5;As3o|JZzd->7&NOx1hux;a;p)5elXKe*8)5k^& zVM({9rluxbo2Yme1(t&5mwEuwev+B&<2b17C%I5^Fq|71?0T~+*z>aH((G29g+pj> z-#NiQ;$vUf=cXTjdZd-nx)n<^yj%*~MuAKe<8k^jHtYAx6>6SC--Bg&oqER{r3?v! zL`bIO_Xxb_s^V%*?hc3d3E^(}QI&7fKQeuhalTFhjzH^zWV|=uegJyJs%W`F z%Yq=S09-qEQ@O1*`1XfSr4q_o-2Nt3*}Q){>hnNf4NZviOXWc`Q$|cg%g~Crh>2;T z`oYZS*$ZA*R&9Hh$C5Si$p#SD-Pz*HtJ}i?$%&?UV96mx<$@u#}T)q-DK0i?fVt|;wqnIJ zu1@%o+-ZtVX^Yk0s{E#_gTBAxsPRz1=d>Vb69h9N3$o5o1aK`-KGEY?Upzxld6GA0 z*$6Bjc(a=Bsm%7WBrPZNwgjyc$P>MrIWA^ywm*V%&yC2qXHvLxsRR?55HZV?vb%Zm zuJfp7GiVq60=a3w>p{iqPOKR$`>l!cVZdbU@9puxo`O6&9(GqrZ2SbS4Gj(NA7yK} zT%K$<=wnh{525Tnv#8d4>F`O-R$)EI&H&%`2Rf*J2+n!k#!K13$uaswf)#!uk&_1J zJ@lSYU+*d;ER)H49E5f7*SfUlZ?(1Ac!|Nm$&}q@2}b8fGtPD?(0*zECw0^A$xdG2 zOI~GeP9$>becRNueQ;qWgfb_GM8h+Hc`C^D#rmr9K}zFTfu`cD$12rx6b_>neRkwB z13EV%1V|vi!#6@0zg7_W!pLhsh*H>IYP?L(^E8{@TltAV8y}UJ+4UQkM}B4EQQkW3 zc45QZkz(S;Q+VoBli9F1+^K32Qba|pN@2e-%K98FoLXFWV>I7HA^>c$`VtpJgT|f= zLf6ZAb92-1*`VGLULi1{(u~~}T$>R8vN2&SiZ5&Gz-(l4miKf1d$&Z?pQ3%pM@#)% zNcP!0U*(mQ;;t`G6|1Gcq9A3av*E9m_&{JWw_!9eNbY zaN2r$uWOu z;{CrZJH}_6kBPY}Mt9}8(k(c-_GAA;i7wkZuW~`TS~3Q3v4A^$4OD#u!F$&&{Qo}9 z@?w$T)yZ1?RN)mWFP9KrbEfi;+IZKA&oi`}7&x?A`a-k~k0euXEh)Dlhxf%1Z)qr^ ze+4wD5D0Fy8#2;VhR@9D2{WrE$M4{=%IaV0J^`di=pgU7rk=(GeOAlLI5($hXy@xS zi<(@=C?m$Y}5Yw|74LAL3I$QBZ{dq>AF&ycrxAc+BJ@4vik8X6Jt=QcEi#VyB$ zL&AM;9)7te84Jzd7giPuxXTLqL?k3RX6b;hjt50e4sfe9yu7?C&B??B1T>)6kNx_U z;gIwa5AYBI)?;x12d37V{{AZeX&GRXgpd%7!-OJ46cp>#DyXVPdtd{3;621=sVkxa zK&ZmV8NdT2@>%>&8dpyfc6c0>kpRR-of?}-fhhW3j=KkSY@coR%mF;i!Nq22-_A^< zfUwU&4|5JEm5w{pB8O@em*=Y)@O00eA=Ah2c>J1Xb?BR-5)I$U&(X)?2q6vp$yI^r z)Y*UW2=jK&xV=8j_#FVSIzPtQ%VJ$dkih>eEsz;`eW|<>#s}5sI>odE5CI5QArdB8 z(%rSc)ZKS+ya}(J^C6a$lsr_EN&cs7;5{jma9ozN9LI$&!&PemZQW3P2B^>V@ykiT#KN7P0M=K_kI;bopOGd2b>z~u z+Q;1*r=Ft_3P^hdXaU871Hr8n>DQ~Hd-+k^1aEKwepJCF)oJOZ|ji3dV2 z?V69Z>aS0xs^ds90x7(3Og&F`IBREIQ+IO?j5gyAP?i(5!YGQo)tgp@{5h^v5^)$!oPr-^nR{z}$ z2utuQ(p+G&#ib>aSx3|aRO3vy{l%xvJ^(&!quFA^Gsbj%;>PIRyXFa@!eg7+4UqO* zz+3RkbuZZ>*nKp7>LMu6J^uXCEB#QNmnvj8=GO$6>qis%Enf8=rE7wkc@pHjuiyXP z$c}=Ve=QSq0V=`4Px`1e>n52i}`CM4tDIM#zdFO4h@kmOO~suu;)eJ(6n zUwjMKqDE9(U2iEFjc9iO)$W98ofkDWI;?70?>!<|4)1!(-dEalhJbMXe6CXLzQ1_C zKR75Txz?2WBnN9uMohT?*8~Rri-HywQ>`P-0=YN^#Fp9MOj&SMf~LxK#Y$S z=a}}ys<(J~!1K}Ib;5} z)7rqNnGrx$iw)>EZx)gID6B^FzJx*nJ+2WwKM}QLs%wwK0nkQWLqkffeqUeTW(pfp zR{uYA68zVa@ot^P#^=ntSN32AM;g-`L;*$!m|c>zXJSKb&u0eNe( zQWlVQnYbm0U*~dap|@#T*v2B##>SZ~ zb{r&UE2(x>mLwNAnG2d$+8chhWjupVx!;4Oad!xmfqRk=eUrtKTd?64HW+N3KI7fpt_)*fK-W%qsq=l^a z(B5mQK#m?r1xjG|?zCQ?=$&s>4wwRWTq%CpQG!xC?HKm9v-gQ5XhvQWJ?Q}4b;tzp(6aAY0=%L7vo#m6x6+2L)S3eJq~T+ zsHwpTe0b(sT~yl?HGjh6(A(7v-x5*u`2cm#ekL7N13xM1Unga*lE)B&)kFZCpCDwX z!-RX}URn7t^X-_tw#)V%$l7pJ0TKg$854;fdDd%)y#MK}r-~=eX#R_CuLSnJbMDrw z3LpGv4Cz*AlaN>oXq_KAttef$Xg5+30J28T>f6iaFoD~o{aW-M|Dy}&d_5ua*Y3YM zU8GE;$)=o$RR!+JhEqH!?BJV^A`av)Wap>xtOd;Sp>D59w1Ix5`7f7ZOa!(IqDcSp zB)AupIDv`oed<7=ICwVS4Impz8IR>IvNWh8t_bv(uKdhBCzx9;N4{O?gWNU3c}tK< z@7Lvxk;2ROUIr>brijNg71;*+l`~&lJ3IW$TX=5bI}soMNyldH2lD`yKeY)2G-XB= zrlGEtUG+fAbl-hrA5x4{s9E^!8kwi;sS8rgWyhtTip06h^z^iIs+3J=HE90%OB z>S;i5n`O4DPK=B*^MUO#*H1F#!gp@2< z)Gl+7$@340<{7ieVM4Ikpk?oSscrszG|$tHH7iwzl!+SydDW~doWeEnhA!EU&42Vy zho$s)Xb-aIfM&irBL%2q5+4pEPk=v`bq(ugCu>SbNUWFeA@DzNzTg7GsTRZhFTvP5 zD(q+IMeDLzG{x|iJnEk|d-!X-#@uJ!MUpj6W_w2VJdgVW2dgllUb?F3fq28~sAp?b zZ4asLuG572ywUc7hXrcQho^pX`7f9c6Sn*(eW$3QaksqC=x*buXf>xDi~<^{N1Nj+ z;Bm7zFA*~VxJTO}4vRkotPzYAf-p8df#F^bZ*F8zXjA(&Uq1l())xARiMag5bKNOo z^_w3kQq=x|&=eW(j>7>`bL#C30EOz+R+`>8HJgfdwLI8N_sTVe(}{cDhZ{RS z;0^}8`%ptzT97%AsNyI&0|lGhrDF@;0j8|S@w>1~uq z>7v}+TpX%L{4-2CLP)DpTT$KsZh7t+23F-Gp?Bdw%BlLkzXNy_2&Nslr!LZ&X=4(DH9W}2(@q1) z;|F*Qh2>kgm0H30u(951FtxI_E9ELpH2-XTorusN3iLEdu$=G(!o8_LC#2sl*5f75 zPbVVZBgH0bGx;sEF5+$mu)U@{9P$(6^gP*$c@m75^B_$1<~zbkw`RRhXL5C^dHCX1L7@rnin$^qO~T?D&^Y-u9t*V(tfC0c0nM;^Z_UpgM-Ha^*! zY|!_Y2fTwV21avJQxztWdA-B*!SS)cZu3LA?+Nn4K9gv}?Uc_DRr`ZPWtB2JfXw`+3`imvtdalOzZ135=r2*IG4nSKi*fti{bM za{Cm;D42w0iT6zGDkJ4sykp#dw-$8{#_+ai_oZ&%z}^*kh{W~L2x9yu->9|43p8x+ zW~=6{D_XkU@oQF}UE$4p>lp=WuA4uYU)mqLe3J1Q6u0#Q(Xj2qCGjbV)?=?a)0dh^ zgd|>hNKzKQ;S0dT`AZ&p!iMw<5lbV>J)g{gI{K0-%;r^?lt$MAWisgzy%ghPU3=>G z;dz+vmDs`wF^s^m$ZM`79!-KdHTrT4D+?6=NQ=rF-)O zwcC{6v6Hvud8*(ecSY;~b)2oT!#>X1=`49P%2G~@*SrsA%S~iC={xH?-hF;)Sh6iKCdbx9@0Qac3mXw=x zZ)_13uWpkGjtrA>ER&Q~5Za~L%6&s5Nwp0E7=%#NTG z@oab@)#>=iZ@g{*t91N`Q0?tRg;`km10m&E_a$6hYTiEEcqKY=qcUTECXSf?A3H3< zC$DOW+Z?vQgv5xs0>+~loVLUHec`Uxg0Q|X=KV=uqGabI9OY4xFoX$F=*zrMCM}M& zF97Vb&Wvg!EZqnGVHI!+q=b?2?s-f;A>s5zr(vtXk5l{ZC=1$+q2E-rb&VOhRQ-ci z+yC}2bw^o0gzWhc(3q@4W<^^_!;b6yDCot|?+?<&gs-TR&o5jCLCBF+nr^^YVJ0R? zKLMwHohmHKiD0aA$r{;<`uCGF>R)LhFDzOKms<~ii|QWxnezE?xf^;7?A4#W+Y>pv zzegP-)^^$Ef!BTt+$3wj7CWa7+Wc~Up16`!qIY*}df>;M@<5}}U#XgwGQbGVOvaEx zAvmfd_w_UTNdl9qj0rr&eVbTpt2igC;tdZU1O38v@dqZZJE7O>4^$Bm92i8r9T6sU zNQMkLyzb@O4gvGH(xOO8{Y2T*M4?FiRwg=7b7!?-e7OcX9+}Lj123DH_c|^p>0>tb zR>D4XnEuAZe_qIG8-GBLNE}wkr2EK)TYXzwB!1J^MB6{hK}|>hgPIp0 zrH*RE9ZLw(Sh>#t;2E;{_T4FGB?I0xSzLKVQi*;e!Iu;K`auST2;KdA?6LH?K zR9Vz6)Vy=gyUj(646X9aW2u@`PG;USv=p^8suWuixo~I>v^dqP0br2Euy)?_y%QJP zBUN#~4BS}0vvZm?*=k4uY|k@@0gZ@8PHg@(GK8g8e?VKZSpkVn8`0D7Kosn>sC_eQ z_=r!8c>>swaEvR76~cJtnE*qMu|^=575AW>GC&yHygP={eI?m~%ZPx$#Jd*NpC$n0 zD^Y!p8pVpiC{%gq6a@)N%A042V_NcZ8?P;qkW4qljce{p3kNKW?zwAV(5!!qJe5=M z0z*&t_w@XEkyQGRvQwaZn@JS1uaO5r*|<>(<@D!Wwu)uDN!3}Fs(MfMeRZvO9e%ev zqQ*6W-srOXR6t;gNgbnXU%YdbPPqGYN;lyZwmjCfowt#_G$doJWkgE=$$U=ji+`*p z$GDUw+pJ^?qwYW;3iP*HO{H$#+sn$XQ#^xeH5WfD5e7qmTTNy?QGJ-sB>tWtm(6=c z$ej1L;!SQ01P`%ENZj$JWKasm_grXr{W4;Xo9c{7sdkyg-J{NYOzI!7 zaS;5Vw+uA(I~L0mYrECfN+iX3T|N!%iT+dg(t3FMuWlb{%bYu|hQ0Qls2`SaVG6Rf zWAXU2T`GojVL7I(R9sC3VHm&lm{OGZdi)tZb=gJRSJY5l%G%)qwk{9UZb_xHS3*#Z z;_nWr2Y~84An$)T@mmb4KtBY3#EH?SR`N!)&>tBIjcM&7RJmsoT4`JdT6B^;G%2YN z2sxtrH#oILeT(szz&)4CXn=zs-a&&IfyBERmV8}1`%ba%d$AP@N=_YBsXvi@zq-i@ zCH!P8#TTcJXDa;mg&t5OeelrS-=LTo4Dz+dwpp7N9kOn}R=EY$_( zsJ?LwTls3)zJCd{^P$7nx@G#9iiyJkKZMw_%eFADZPmM3<8JT#(>|y=iN*JaG1~L@ zJePsrw8$afK5W4n1Wn8_t+mU$?jft;1jGop%?}%%=ZcftXH^aB3MCWT&w`Y3`>RB?FfXZQE z?H>1&;K_R=^$;mgs?bRS$qi*g7-o$7=>FuF?~p*jvg=0#ZLfnNVz30PdGRG*avozp zF8U{`VH7SnXZBp*BQf2@n}nu%gQ|X$jSZl;^VLK>mI^<_X6sgcXH@TK=DmC7VVsZD z!tCzDzxw3qQ!C+BnzgP|N_hvAoe2rDRaq}vP;tl2FwSlkH@`bA2(p*Iy7YXF9Z!$3 z!)qOt%o(;l9t7p~*~!yxJ0-oPk9nT~H6#`%iymyRe^45Mh3V;y6B6>4iPEH;pS9TR zh2Iapg7(3_u9LLDL)3R)uYk<4eu7o@u2Hpp!T5@UR#IbZox!F^9R6<^_i_8{8JWO~I*B+T+zFi6*>RZtAd7=qiJk#M_SXu+{dZ zJ%M@OCJU5{F%N8Mp>&ue@@Dzi=EC*7M{)O}#HMw-NpS|VL`_ilg6GHXh3l_A)F4pm z?InM!xl?a$$_}H$rfy2Ki%M~g0#OJ2Tkzy`wRcfVBUZazrgk~!n->C3Lo=vaRBCo3 zLMrgYH3o@01E};=U7oP2(grQ_L`qt=^HO)4YV0naeUM>~oDpWuLG4yl;{PVmt#;D| zc;o;{tvE?K7W96JS2ak1(W86XIP+!reC7hf0o9ShnYzekdS`#yaL`k%7tXiZ!^aRk zE%MhY^OufDclxvpDlsu+y!W_G+GU){sMAh)Z#IuXl6%k|tU9VwMd$(ZK zByVn50Vls@PCyW*pBI|7*C06-*%3xr5Ye-^OM3Ed!=d%!RcKLAXTSHmXq2{;KS#af zYDA&ml=GC^h){PtfglPb(QDP>)Y+2-A*_K6H6`hDFcXFvQtc{GS%$`Pd|%PCY_!ew zv&p;Y_w&+pPFKiC@Vy~xQ3J$)-V8=~=Lt+Kmb3DEoSX3n>c%go%ttCZtv<~j5m-n} z5Ule4^m`9KF=Y0KMn=XgF{|{wmv8+!K6m|feBTKJ8=I`viEMbQ8Ytp2ap_;bnquN$ zC7|ANCb~&pC}z}evVg|7$O)<< z_msOvJm{%C~bC~Yp zoPvKYH~Lu-Z_UWSukn$Lo#_;xB2V*!QN*p9>&~p(uPtADxjae{*Y8cw&PlrFfHIo^ z*b{4-DDrvGhkgPbg6b#8n`Lp(rZ}4*Z><~y?d#3bZf`t$A9z9IND$>_;y#I}^{YO6 zHsK@)i_~6llmSxoenibI6iT2T5fr5ZjRYa18r*ER zL$mDWT86>+E+^IN^;;6&^74btEsuk#-9v_HVQD?KmjyJnr`wDVgzOTZcQJBWT>rMt zfhh0z_Ful7y*#rPkGV`2@BYLOM19&-x0?Vi*6HfgHaOe!@Q#h~Li*aOH(7mn~eg3*Unt0#tYoh6c>QTS*n}`>zo%Gaw}I)UdCpIXBhTo|$O*W?# z2Lh~;0voZCK;Cx$C$cUlvnj{5!jDK}pl&DenVAGSl|D`l#AxD;Zo}PA^!1z4L_C$5 zl#^*qB(Js12R?I4x6`KCvqaaYjDZFATk|k!P%;L4;zF_OGd2oWGn|oujtf ztMNc}MGkl1GNZPF*SmUwKJc6RgzRa|?K>dAk^r zW0H~>)P{zL5<{1fz}q-@&*r0jA_(AmU^pNFa7_a{;rtI}ZIf$@Ws z+U3Y;B?zUckGi1Ul$l|r-CAbj@?s7|r^V_s7>NnosozeqeZYKm6lOEiBKj-iMWJ3w zPqW);VuhJP>OUj;@!cjAi!M)uR(W#O*Vp&@iC$Wg(2Q;8<~%Q4Q7?QZ0D?5`C_7PA zw-1fy?bcX*^YmnEZ5&ICr{4FwnJ2J_w$2|veuB4f;b6=hK?@_s%t!OomJV#Z!C;V5 z3cvg()DxQM6200T@J^cpMooDYWC}9tHs`HgpuyVAEd)15nn%>|+3Vnb>v6ViIBQ0P z_Y+VZ*eh4BIOXLnZ+pCN{{%1Y_#FEbF{_;S${KkkuJlYc>g#wctatyL<2Qc&+5{dL z)jH&TJEGpG<>Im3nQJuo7T`9xzj4y8JWdq0IzOzE0%|+?cwlsmYn!*ORBw?!gsu%}pbq(ct;H z>9Oe4?ldYWxAm;T!Wwwg5>|$dq%Cg8n}5b`-F9XZ-|l53D3Gv|GaJDUbw9qQrdDr# z+dHtm$mn~1l^W`J^PRC-8ALoPGScB8*@#4IcCyhSQ^e7d_qx)vujuknv8dt-Gev7| zXxmtz9MSurpiLLLyOfUt{^CMaxMZ<_-UK@Tu|EuIohoQsf_1}LhnO}=!C~2|*_p_R za2O6iO6?`-Q+)h7>+G|lsAmQ>8JWfUZ1oa6gRtdx`)^gWMVA;I)l~J^6xTWW&zDQg zJ@toVfCU8#t=&E*W`i>iE9XQXO7b{m>5;9Dm(});cNdTqarpjtSo(_=H|fH z<R{>i|UKF{s2QuOUIxz z(j_1%sYs*JAgMG+=KxAbHzFM>UD9m~-AGDzcgNg4zxRFa{TF%UIWy;+z4uz5wZ6zC z&g2wcDQ^Q-|LaQE-G6hl-`&ijNOmJXd)X<=p@YDc%o%feP+zrc1 zOMO20SiX_~;~Ql#OBMR9we+Kw{#$c6E<_85UE74+FEpBA@ZkExbtSKK;|1&NLLkZD z$39<@C*|QgNG76t$!GQkTW)q@^`28Uw;-Y(c9d1^zuq4+vSty9pPrG<{O|~2y;5mM zvV6~n=}X#Qzm?(8kS$LPwe+K;Q`)+%PS-!c9AzVtJc&iQr~>Xgy42v5FEYrZ{0xpF zv4OwH3{=%jSekIyDQJuNo_K~d5&SLI-gc2|D|tEzrw>IB4$61_btU$SU)*s{0xVWO zeYOt)HdOH2r;RBz-qDZ@oAvE{fWHX-2ZA0 zI(5El$fEYkZFg72o}Qjv<}s42sDydvn-&InLq^i#bDj)zsqMx)5SQAV_P0B?cjSuV z3Im2=;lW|LO? z9Ji|1s@Y$u`fUjPaS(I0?9}xkJ*+{%LsWZzJ4iAq5-eebGhAgz7pkx@rW++B7f?!#z2 z03I3~S=O{SvI+&9=R`idMg;Z}GcGRf2ox0bf|3!-$%;2eAn2yz>U#1riBAg_Pf`GD8s zset#%+gWmm?FIL%1;BS-Kj^uBhGB-68Ato+O9jRqnr%Pt?G zMHm{?Z~?z&kz@kK19d+COjM%*grRORC=(6b=_$Di+K436YbmX3aAm>|0_QMNZ$U;M z$lQg4f^U98RXH{00IID?LC$OZ;>&(M8xN0hZX_c;_ABfspT|l#msbmsp_XRl$Z6qX zS~k+VLZD}@vPIEa{i z(s-uPB8~tQ6=-xRm8syFMDSLt<{23px*p*YU>q6(PI+ts2H+UjH z*Za`oQGBVxUp^JO*Mc(=;pIt%-TyO4WonQ80js{ zTkHzD9H3ZuODB_S%mKZX5F`du%jP>Ur$p^AwT2etKa{FfJbnwJoj=}nZ;pQJ_ra&I zP_ccb9zZRlrIibXVuf25lBV(1Qxo@I>lEg1m)zWrszd5&*n-zoX;JyGF!na~-Ivd4 zcM90VSzkSTnCIZ>(>7M5Q^sz6Gw@7HTyR3;>kqaRnrWF}X`$b8?CZsn^?mEDU3tiAB}T3`xPp_j}nRbd-Ir4HILuBf1=@R@n0aVxi?tue1>D4|j_8BRBxori`u~JFZQDO!^9Tb8|d+RWl3n zFpXSjxY#>5aDQlGoiinzZmiMGmV3PeMm2u2KtzK50o4X%ZG(^Q%KJwud-4?&`?19X zO_!5FX=G|l7ehlOJ|zA0NjbgCsEv0}mTkF1hD8@R?3EHpfsDoA=kv)F5OAw->$`Sr z%~!#fy0SBD^npIM9nr|7J`VdYZGM#SQRP(+?EU(eiL#HTyB#?g1@Aj+k8X-l=ueo} zV2wZ%K0H)O^YUo9ZngL@VP$C1e64ii=aAb*5rwE&ue678QNo} z;b0qd5TROHd1pVAK%v9FAdl*7xzuhN=l(s*y-SEp)e!eR`QUHZw3alrM5|fpD+cny z&mVt=@bHvr%~Q<~Yoa(To{k-9fzOizOd=w$9G|#u#B%9Y$RuEZlwgwmOzq~b6X4sp zYdZ946S4J-WHt4L08QT8uTXJ@y((Fo72zj-=;e9Osz~$eF-Z2k6Zz|H-@g73-Z{=v zPh=@eAq12XpITO4zF#p_%sw=a9ZISXH8nM-`=I+%oZOt>#edjZ`deg`i*1_}Te;mL z6_YsiMyT%9_f(R7<3Tb^YFEiS&%*xO{jv$sI_S1Vd-b;h*JT2T!!XE2=Kw>LNWY8m2bj4~L6C8r%%*Qj2fW0J&>H{2xStLB$z zoP9sq*yM{=q4w}1NR5al99uXqOETb%JqbsO&kQP){jHMJ)d zorCvh%_{eKz3=5?{>3VsNCgKa&AT9e#m4Jm+I63ko9?#~L8psUN?#L^-z0B3&H2W= z-u9VADY>AhppM}skghkn_%RD7pw}YlKOnx(JWCzlYPRzA2G~NZ{Gl`%gI}Fam`qsF zgTj+hINdW0+hiD;FHl(AOw?pzWA^guiK?$fNfxrbX6)-W18K;ya8}}=?X4Ma@1xh# zhvPJ3k={o&zyRTUds|=ZA+$ntVM%gw&)TLV96KB*{oWAc3Ti{ffQ@6L>5QT`(_*-E zopOJR_;ftTd1nm7#*=Fp1IfE{|LvfCH(k&A+3ON~wFR6zjNqW1xfm4-9id=Qx|WL$ zS-%CwN7K4b3pDg?w-kbj%5l;!(z((b>*I&%w)w_|Q{cGl&RH8B7>beKkPY|$!GqI% zz=QOSn}4OBcZV+E)PoomFOa8)KKm!$IZprBbU8Q!tuC8f;^;no%@{%6uE+9b5CUlB zAe+?=$?s+J9eQ!=0XjVpdBHjavi%6W4XpcD(na?wl5jF94Z=*ndM>mFR=r~(o&@*Pma_62Ol*k`?&OWR3R@GI6}MhcZXkn&)8Ok;awC{Sp9*V7BbPi^#;lD=PSm z1R!sphOI(29>WXJbxGl${Uopg^Io2P#3%fr+vdmuJqYlw?m^Y_I4A_kqZLseNTWN` z{Q&Hbq!Xo(<#V5RZ2v%g%I7-6-HUMTMyocH{XMPe-rnZZD^uDIN~AnSd)VJE?AOAspgsj+uR)?;%gfaLv7 z3JoIrd~Q}+3EWkU4S?6N1SjEfx9fMZK@g*pVc)?ZH{{#CIyb`D9Lm0Y%xES>EpZ%&N4H`4Emb(21Dhua9DX({OkCSo+ubK7O*V z>RDx~9rhURFPcGgL?ugF_{C8U-sH@T0qljh!xPha~(gDE7e zLGKhR_Q55{)BRn8vv(^MN@q_o#-lklABIRV1e|P$!Dm3@VwvR?in;F0R!2oUc>^3! zNqWNumn&!e1BT(p5NwtcQW+wM4up{!jtHDQA~sQxoha+)KDuB!r=71ZPQj2@Q0Q%o zNPfN?a+>efYvm&OZE)$&r|#Wb@9vymN~>MN%daz150A@C>XIdpW9C{7X5&SuLLBz} zN5*|}omBSvB5kb1O7B~fY()n6WuN50XM-On^~yL0^?RZU+gHKav zq3q6O9zIipmt7%)g&xqeG=1NV=@^o4l4I~Nt6%cgYaMO*2~GXP`8V#Gu^8_=ew#mORz9n-a65Zt)j0A zu^s>ZHR_Y*mGm%G-G`4#8@tN9^^FaiM~W{DSHAvxiyp>Ety;(55kmc5r`F7jhY4K6 z7%rcVw#C}v1is)-YE7qnE~qHt!9;Ao3F39r!r5;ETdL{EndvBe*(>057d#2c(G%r# z8;)%T@};*lxi4t&@Wp80+)0FEeJbSLFfzqgA=;57Od=4CU5C2f1so??=le_$>WgFZ z^H&~S{|h*Q-0mbW6?{-750%^~aPpZq9?7v+xm=%TX`F!-+fAHu1Zy9|G ztv>pNJWYD2K2;7}6cXcTf ztZA0TShj#q6$Uc7jJ>Hg+5#f#ieGQgKemBrd=haL8{hs2(_A@DF zs!Y(7bxURPxRy^TMxgm|GpjoXt)%x4DK_^z@6*4pPb)WGhjivFdV(f9*AYBqUe(W_ z9#dwb)Dw-V-+RbDpi%dFFMJ^I+uL>(@r-ZDyz5 zl41{=q&G5WRx&0`Vh8AFtghgwtvV+50CIPxcI>dd#bcfaPz&RXcFW1T`t(CXR3@fg zrVUk=eS`Jr%aJxxFIO;^@9Hl^FW0WKesGd>Slo)&to)_SO6*j;H?i_mt;3e`(W}0_ zi+&LZR$|SJ4_(i6DPrO=dP^hmPVV}v&S-kx{U4Scx~@Pq04mK-G^9B-H~J!P>%~)8 zFnwL@_x4G0a@u5&va{*F17g^TIE|%xx~Qfj_Q}c5^~F=QbkQ8uADTZMORtq+g(z7Q zcx!C)e&-o`tZQp)U(YR9fWCBPtT_c|`BV6S;|(`=h3QTt{(@hQ5>>Jg3^a4p-R~r| zwiAq=SK4-luXnhZH@5+T+xScBvi~F5pmOXdA;3_0mW5A__sS8y#~Af>1jVxmN%rBT z@02j$is6>O&S|cbuuivdj#o^`sHkxIENU5YUrNxi15PkAC{-JJOvTEC7kL#oDq^S^t8h_2%08`MSj3k z77uhSOX}{!mR}lbwPk@KR$Dhn&mLNM@X(M(sgMjL+6GN%0Ac&URLR_tS;8*ZJn=3M z4_Y32_lCM-IzZ=sc7tdUbwxUwWP2H<)hYjR41TKv6bTAA^eb(MTK%CH7t^t>?OM< zYg;9SIRcMv8*6NBlIQwGHKYzFsb%K%>3a|BQOTVxZoPy=qiSKMhd^TB3fnZH5P zNN#hfEQX|8&V9n>;DnIQ3}`dv%8GS=oz_^0@yBnC)a9k$^-flM3YShwK0 z{`h5o>bUC7C?PP!sCcvU0suuNK=;HmD2dmX>|NHCwt*o$`j1ia>~z z#?(BSjtDd?+H3So9Pk$5`|%n_+kqjqMkZ3|G1ATWhETdj7`_87ll<;x39!p zb`o39{;0e@^98}a+-CgsLj}a8-_nYncWd40)P!`mG=B1z2`xJ5#Yb7bmw9Kn&jT?|1u6jxwNKocJK(C%H~T{Kk_ksrPE?VHfi*hh}hjdBtb_ zTc77&KW3U#sq>#rb6Hs64_AMA1s5fZATZ$nicvtTok84L)m z*!0PUYxr2%OV#Je?5x39Ckc0T?)>}xepJdz=zRD_ywslLuqpMG8S`nMWIU;|X?9y6AO%|~ zx!l^fA)J)p2)&Q?jHvHl-Vypl$C;a!bRGAkbA?kB(Z%m@xN?{m8W_;L~$%6 zUOtQ5ysR;?MB@1Tvi-GYN(V z69t*Jqfuf@(Ahbe{)9awMAwZ-oZ8EMCrgTE5RrX?qpIvMma7mUWRN2WqL0}^@@zlzHou?;qDnNxK^dX=lY~RfaSaMIbAxlBu%k4_I=C4!nvwu<1 zpW=S!%kSraHyrVT9_t?kV}t$3^rT6h7JA0dNYzP=cDWPIQihv@z} zdolH33cjwu68xn&;?94;hmxE=54r5Ed7hZX&k))X9(wpBd_rL#ol6h(;_mz9b(K)= zpZMhZJQhK)y=8Aux1aQPTZDEwl-cXzE->w1rNcBfXUCY<@M&bx&yyo}O_T*S<<1h>`HzU*!%D4ti=aGT7ED z=`mMi9>Z>K2Zs#)rGh~an8U-B2qc0EQBOY@_23@s(|=KiaADA2hs$6a709O@l^-I! z*3s$gjG!95FtjZ}A4W`KsOv&w!Xpw$|CDpjbQ+)Q8e~p6Gawq-L)+pGMH#yg7nEqt znft_9G2NnEkK3u}tM_!>;S<$<45C1C_b)Hm!oc@u^&C{zntXJtjC|x|`chdIhfM%&Ve8l9&u&`y%ebv|nFO=s!&nqMfj>2CN zVsLu0*nbtRZD9(;#S0AweqAr*7mkRYIe$>;`B3I z1xcFn!O^sViahLSPsNCP-a=SZCVQZ(DuuzGw*3TWXY!`e!F{0QrUaYM;<`c-`%F-Q ziFDgE>*YnT(lg4tg}C8nP2J^F(4Vl4CLjp7@*3@5-S3bc<|A9lh$Y?pFn_vt=?h>m z!1w~4!O0^0Q`KFXaMANp8Y%srI@dqmpWB=o?B;7sL>y=Bp}l*+`0WV{__L+Dw5q4I zcH1H^;yBMl`*?pW*f8n&YPq;>aD;P}r0dED*82zl;ADsKtJ?*Z#|W*di*$TS-tHJ} zYn5+j9R0qr`4?_y(v4We<-0y->0{-uwQF}Lzp?o4&U_UTm+-iYCuDE#O%_q(Dge;# z3s&ku?QYKjGX@3AyIk_Bw}&*#wv*p5Nc+SSId%)#Jh{Z$eeQN+F2!-a8#Faau>tMW zGCI$kM9g{QHO8E`o9&kUqj9?to2LOtMvi?W#fgPHQs>!_U4X!;rR@+A#U#$J^9V6C z=?xCDPn2sF24VGlXB2&Z7W9F3xky1}qKnm>uEMsCM1JXxbOLJxfG<^k>r(G@+mi1K zH?_hfe4naaXD01s%-ArQaiQVh;!Zddmgu&C#I46?J7Fou2>$2}D+m?kE#KwiXCikm zOAR$)=QA*Tp$Egw?=a{E?dBUyz&3+jm3D%x?U>SXZRfJexmV4+q)J8Y@@jJ;iuo7p zJ!N;GTxaC^9Ct)=N!$RvzKNi0uydw8wXZi{?NhyG;ja;s$K_@bw;%d&{%icz=s=p4*!HJ^gupNi|A52yh;yPkOUo&2%l?|S*+h=F-hn{II|8Jh`CM8hC>VGb(noQ2m<~(=FYaxP zr@`^`(55cDJQcP^KQrm!lkq+xFqHsk>^YWF=7`8)Nrhp%6|1LK#MBBUzuKssWEz02 z*k`->E0EM6Vp2QLn>;)sCgoVM;@&k8!{7LN8bv;T1d(l8ys#4?QB17<+P&LMztEMg z%7mkft_MeL)=JN_j591ZdrnDdye)UhpI;&*M0AY3*GM+!>xwg9$UQB)&3s5}Qs+)E z)v}&#rN4Ni5D+fn?;k~DobdxC4mDg7(2AhPG9mY7-e<31 zQa5x2W7}#+pxT{4YwK4_VRqP0QuIC^^V?p)Jd|Zc2>3w{Y6nC86f~!yx=J4$z5ow- zsESU4ttS#veS*q`@?f+h+4tT~lx2u;c5{`yetHD4d{X#^HXaEEBCH8B$=t&k(qdw! zh7_oNXZ&u|RLejWJNz4s&e9N$aRQ9$6Y~=CpOF$p4>auIolCZrq(tm`KjYEp3=jP1 zp17B^^5UaUfiPm)#7OA5J#Q0U*Vnvsg6doL;!b@eE5Y`2zvbVlrs?eiRBSfIN^p;< z#F0Y#CucUSH$jJ!fM2r_p$!z2njb0ErtNom_+ecoVI{`3UQ^>`tLzG;r|Y61!pL6>u@l;=i0e{zvSdfVWJUqR%1q4*>AZfq{? zo%y;i(fqOO?eg-vy7kd2TED0;1&>mj+jW`v_~bFp39V|fxg*is_a)h17V8Kgq~3@R z$b>&mhR_Kk@cPrn9wYo^#d89|@+Od}Rb+vCNQ5)qX;i^pA%L#O3MwrBo3=p|E~(*b=&OnjaGY2&XLMJrHc>@;u?LOHK;URLDpp0Bo!5!sOmzc*eF+H)?C zVE1|^ofn`M!y1~VZb$Mmk@;v+M6zO58*yF+V5)}5d^?Ph#!44kr=-_wuVLMF92TWe zQTNq;Q`Ngd3U~FDGLNafwvA_&F0ExpIQsr*BY|x>n1REIPr)?=;?GZLa&@csb>%Ed zSARCLl{|YIk8a>^N;HNlV!Gyl(3CJ92A&6(lVycMgSmAiOe2y{vOnP2c8x6U?S1|H z-lEyhZ;+bJ#KYO`{csga`j25*kNLnnt;(ljOdD!q4W_daYMH4DotUf600uXDDfQ9M z)&9+{L3;mABX{Eb%Tj$!^`nlC9R0?C2om2JGRJ%O`E+H@=Dcqs?gFp8bqzv~8b=Wm z&fU^o7nv+7q3+zE5%c-PX3kBS!YJ021p9Vp_sp5C%%%xR=c7>QJycC1`!=6{J7^Jn z3vEw&@MgPt*pk324VT6?mQ=A^>lE> z~x1S-Zuz=1X+}*Dm~V4z5DH_8xT_? zfK%k0{nROZ%Bf`e89|4@*^PV>#1uhSy}3~l4xy2RRt$9OzyEN0UEhya;>`Ew>_IAb zr|qQeMI247s_e3~jv!+WD9QP(N;5ePn8&hXrI(PPfDiTuE@%M>jcL$3zC-ef>HIdw|6n@6t4uF|bX3TJ3#T5$)!q z%dp_H)|{EDd1mD-jP92>Aj!8OY;&-b=#jR^B+@8DA_q zKK8@7GU7>6BArjW2&_0z&S3sYD($1;4Cn7TB>QH$o*At5?UgV+c78|?dZhE#SegG{ z+hwgms`G4V*-ID8mEVQcE;se%LXP?-Albu0$phUuQsA;}_mR(fATe=py;r{_=CD25 z@5{1_mij{uS`PM`9GkbhG{8D8Mc%RFYRSHyT0_cncbSP8T9R+b6DA z-%tIDiHpHZt|1bWJ!eA|_8ZNZb}#@)neSer@!-tGS=OjQac<`Quk8tnh9yzh$k@#2 zXsx}0Dou7X%u(#UeV zA96Bi$t~E~H^fuus4))5W^VoEjL38T`STeG%z%0m0Oht;Qk();M^^!F|5ZfqOnK~5=j)mxh&@k$UgNONHqZs(j zauqzer@so^OA`;F=uTOnx<7<|^D$mlP|c z3?qoi^-pJO*2W!}e3AIg+=^z~v?2;qpheU)Ctd2%L4)oqfLc`_>N>znFAti>ufDRV zB)`QDFg&1w-d;$^w8t>sg~I%YxWzTN;h%y|O!d&th!xa>B5UV?R3Nf#hkyO`p{~*? zy49U#YXGXT{@fUrIBHIfS!*U653#)Y&ZkVU`sO=v1$F^w>$QNEfBcN3V!}a`)MEyU z_H4!G)YXm$8$^<^2`rF(>x&<3`^>e>`eGs>4+IS)R=4-Rb$>HKG8@$H#x*(aTRxs~ z=qQmA*h34HO=-HA3FgL+lU2%vl;2*~CDd@3rZ=!K>XaKRJY>rI)B8`QUhAU^P~LJ) zVqSjzo3qQkw72!O3A*5gK#IzxJVBLT_rGlX@huvScq8v*b|hcZX!a7D+$VJm0v-Ck zg-=M3px&C6zrK<6^)@HUhnq!(Vq!JO#P^9pD-E)m=eQ})p4E~=XWgJ%-H$I6`IJ82 zr=v^%2SydF0Nddws4vyh(sBXVZi0#D;>VS)uC5h_*+v#12J?yu2?>b-h{kImU920` zQP$}X9Gq?t=}`xR&&Kgjc4r=67Ni)D#B|_fCPZb6Tn;P2R2}A;8>FzIn3ycr7Z)4v z7la>(h=^Q*C;zH4E6cDzt=CsT*(~Vr z+yx})#dgDuR2Jx!Tmdr!HqOyZ)`5GKXa^naCS!dubZt9cQdnLCCNr!6_Lvza>clAa z@Zr;a3<-BoT6V>MS8mu)B^C1r=OQ5rZrt{@+Io-`8w%anMP)trJ5lc zUzni(fF|O6`f5u5pjr?MXRRi2zK&{H%$b(QbHDaL!qa}+>p*%gbl2y@#Rc>>t=yM@ zqm5~N8T2-9AQqcH9ougmewcGecU)f5LU`3W(eC}aq{>Qpn>otQ`eR^fTok}Ikqb2k zUWJ|a;OljML{uKS=2SN@M?wFJR*IR4-|I`xg^M)@bmO|1S@=}HCVgPazJ@lkZ(YhyNxHM> zqn^zF6Uy@pdP4;BHcjs0qt7dHzDr217D2$H2fjyAx8&nJ(qmXa}0E z9IGvp8o#le-hRJd?|GQ(ue$LJzV=}fYuKBvl|hHm6c^$yP`_Q)bP{BQ+kSQ_;BBu% zW~%oS6$2KlAml3DHQj4IR%?>PuMiHep?s$p`?=ErQkauYNbjosYY=+==8NQw<836Q zF6U&falTf})O+X;EW=$p!13TZ5DyK1uaiddUx><954r@A@r*aaP0ab5YX;eCT*Fi0 z{2K=S7%&zrmp1g6bD*xUlgzuxx%E#Pa_s+qr`E!^a(}+L4b&pgME9-1YizLkbyV2@ zeWfvT@)X;)m42$eJPau`#`uG8qFw?OoIkSVJdVOOQ(ZCy?Ih!;ixwx{Qk0XU_1oN& zSt<_t35BkW+2N`Stsp}ovkoUF3V9X?&xPo3&jT$a)azY9){}lyp?KiJklyo#h;x zh+zyaSaZBSXuB!dc#(HPXL+!360?`8YaSEg3y08mh(2E#{sEQU1)VG>kn!9ce>;3%0Vzf)q1(ES(IcU&(yul^1?8_6^YOwTfSH&$3G!s78?kvC)`~OP0P&;d@>FY9pV`L*;uFa# z@1#9mudIE_1W-)r^D2yl$bE6POr8)kjSl?Y?$iSll`WiDtS^fyn>@v>O`20-D-BSY zM3M`pjeu*7lCs5m28L)tm#o8Jzv8mui~Ie@e+V#pK=HQlBod%VJdW3)E0DD6Y|V%0 z7dt0ltfr0S2h6DZaS&5;s{aV|T`+!eXt#!YGMcs}hi_OBb0#i~nYvO?Uj%Bj>EXs? zL;2`owLV1>1xtA;CkNNji^NDSsDHbkh+8g^U#w4*Lf0n7$s&H1yi&U#{ zaUiG3)7XtBl>Yr#fJM_BTCLZ_Rjp_}&50sEmdBKdKP04}mj2Kg*^V^q>z@kg>y}*^ zw&6L_!+3nyPTu1_S%%e%SK$iTZmuXnQz6qj7wsbSROR|6!-8&1TaDbPM)f4fU(&ks zwL=rKva+HdRld0Y5~AaDNzMOe!Y$5)OTef0JJ0SCqpdha0@fdVlfRys7oSot*t%|K z@*MOJh;$hQ4lU9pD%ljTaW&3_Ht56gj)Z43~Lh* z96)rZbS`T-WTWqb=+&4@#f(E!zeAla__hG>#W(P)OkJ1IbeCNQbM&P8P(L?owie3P zbCK|oSFP_aRHlR^N4oLR^SYy6p41!UhH^>C!Qh?A!yY3r({&`0j}(IX6m*=x&cXd5s6=e_Jk6%aUL1BWx*H86m zYlh$aclZvB9&jD9bAhoqD={sLN9H<|Ue20us3LjUi~r`<$&xdCVHWiG*qxuccQhR@ zgB!gjTF&^??IPcBvU?YMS(piLSl+pe1rj@Z*#GlYz~iNI{KILwSiIzyY`OUpD}n-c z<6_S5os-MQF`qTzep@Za011C^tA(*k>$`JldEcx&V!D&yRWQm}P52u)GDo$}El&4F zDhTgWLR|O~Wx{bsT7X?u2`-n!vjW3sknBgu6G1U)+BRWP&1iW(b6sN7;~x5Tvy~j_ zf!fv^CJAm8^sVp9@d)3|6f_0pr}cbdLkKbtSKwwNtsKd%1oPnZAFTI9CQwcIFq zKeE4G?ZP@nw=Suvde_(%KNmBzpXvWfoij4- zA%9O=d>-(Fzm~R1K&Dj>R$|^7SNgo?k&#M-I!E;JQ8f`^XU~^Vvp!ofTT=z=&$CtE z?{h$DU#vVwH#IU1ay6#>yuAHnVcbQnD!VjP)a5+ZmyJysBaE!+sqdPo^HQm!QTX$Bb2`x2EWT^FU6k4~@_0Nenv~bv?%e8J;7BGSUTefk zE9@wy(?bdD78*vYOMQSPKho;-JFFodlDb99Mzr6T;gUhYLT{go6`;Aa*j2fnZ#N(T)myM%r}`eTlzVV zf%;Gl$;h*q6Y4^G>Z3Yb{^4x!2aZ;zHT6;HX!=SBW)3S=EfgrESS+m(XAs-ycc@D7 zA-q~_yf#wfj$*KDmAX%=8%E>Wf>ZKJ_H;`$m?17Kl54a{)%{4jH%7PuA&Jsl(hM9P zcP_6GH-55&#-9>w5aEmi7t~TB=RpiR>X_dGVr8hO1d%jsAGtfcwNNw6uXzwQ0dSwM zSxI0#NWT(lV5X*;zKf8S!}Vo}#Pz;{7zHs~jY`wTF0GnUZyrLIH%~DDo99oDHqtQh z-He>D(=X=1f%p6)^PU5!8QX3AYk4=n#3;A-ckh3`ult`J^}bI43Dx_el0l);B-*76 zqjWY`I#15p6bWw) ztSe3g2+sGF57jxiM^~f)Mr#eTyo&ldt_h9~=gGX+DG7>*)cqfa>5rlYvuq-d<>~U> zsVO=3dYp}o>$sWuCmIhQ^DMHQ!-yo!e|&>$k7acSe2vA&taT8 zB5{d>e(Vv|eoMquue9mEnHw$ewe*|B%&_*vu7PyThkT2SmH_WNg(+_l#q>yXaWyJ1 z*(=dfDbF<`bs<&0aB=ftxd$)zIrVwN)J>nJ!om8Slh=%ADVePE^oxUEbC#B#$D~V^ z&0xA3C=oJD9rNnN`B(Y!y^e2H;-OQb^|ViS!mgy-Y^$(V#AAdP)x0EfpM~Inf52xW zIbNVhl|#>oU8~iQmN};~T&ojjXMW3AanDBgrpVdY?rGIc?UNUCCM4PBy=FWLD+#Tu zk%y+vXMsJxDqh^gWehiruP)XZ%u5hsHf0h`YLD@D0<*=b! za5i{0@$kqhMnK@lJKRIXiAfFVWB}I!)sHIA;$}mFuEC!^fzhl&-L4RaEsQTA0IeiZq?wXk0=01tISQ z!tv*c!Ka>zo{#2~;f94D3wK`0r@!BHEc54AN=B|f*y!XlxBl*WIsAIgkcKfD;g}zh z5Nxdf+Icj-^u*s#AtOSW$?^5F%wCzSl-hmK;cS;|Fzk-QL}GUVCK1)?R`N>cOP^`+ z=N3w{f^)EpnSRYmC+yB(Wk#*Bn6g3q17DiC<;7JcxXoWi&zA$&TV5_{FU5 z?JSxmX-;h&@!UZ?GlH+v3+D=4Yl_+d(Ij>Ddjg_DosmtK)3@i(S_Le|#f*5Kd#SW6 zDY&qx{rc@xC-Cu`0P|~ah$u}!NA=ATi_nA42%?qGX*?s%%qjs#L8ssHEGKu~PoI(( z=*QF@CYoTs9uv4R4?H{q=>6rn#s?kFMdq4FGWji;xj|7U^Q_71sP##6=-z2>W7p)I zCFV1^lIyHW!52g)Z*hWK%(Z9Sq!f+yR(N@Nn)4^-H;na*d>Y=8F0>bjqDBOz;0cv) zxWCk+M%~*5j;G!1)Z)GB{*$D+veyZ_5|#)*@|t_F<&yFV%-)~BNW^i24_|LNGq9Q+ zq+%mQzxCgMmqrp%B=Gzr4F(Whyiep#z4%Bz6hI5#Y(fy8U|QmYQP$j+rXpvG>qzAT zgtvC>$1wiBQRmDSdn}Ii1`6lc*b56iSYovwWUpj_E9N3!D4XjZc-A3zlY5hN9QeFz zc59{i)xmUonug6rmr9uie9JNI*Db4P2w7>Z3D;T8w$#X$nv$^}Vi)Ej{+pHT)W;K; zhr()*78{?gVj~rm^(_S!K2A;lS#s8_GTgDM0E?K)vjB@;ttE$>$SC!snr|Ql&T==c zP#bob&t#C4NZBtSXvZ(uElTZI$008<8_{*J#=-Jdmn=j&gmL+D-f)Ze{aJ|ZCRIH4 zTh8~^!F~2mP|K$d)th9$FC^)0K%oPZC&$`-Wb&4d{L8CoHVl}YBpd?y34PbHB3wj- zjISmhv6fRUH@m-_b@O5kx*nW>ZdPgN1m}_nc|#aAl;|q2kvF!<#!&>?!<{7bPR{1MpOCv zG}So}ML9FCmIW_98}YaQz>4mIUK?UEJtsHqMV^Vf1om9*h-~@IW}c@mRX7WocmqdD z#krfwG@55(=FshZ-t&|xpPw}!@K+6&_YcMgO5c^%5%ClD@gmoG1ta0GwxSEV`2|nz znIjRx$zN$neCXFB`sm5}Kb#jXu4U?d>p3+9TM8mEq&cMO4@ZBVBSyWc# zOCeSl@r!!fj~ocMb0Mxwfo(^LLE&Wy^X$-8D69l$$SSa7_}P`zF!rZgG#5(NBV#FI zrYu$a(uA7#UX%FTyO0=DY)B3E)#ls`&VSV#AZzt5ToiYw-sEo7{s9nFTA z66~ndQ^YAS6)Ary+WUNE-pNocXPq$`&woNkHCbQ(qPa;T1rt^E_BmuwiVf`4Hz&6m z)QpdEon@KUB261uYAyYbvLeLSFrY`$^9GAWTSGrgpS;z$50Bf_$+5X@cCHv;L-7{yW^uJ2gkOvz3R)NsG zv5<>}6mHS7+V-ICxY&-k6|@^e%}g^X#gEUb`?&QCvfcSJYK8&19n?1iE2CaGF>RvZ zVwnu!SL>ZLq*D;NR5VeOM_q56a-?2W6cxkjb7bSXz+aqadL~rp_+k+!1N=3jhiv3~+;h>cli;0YVqzd6qnvGCSCn2-)$P3j+ z5K$D+PhG0WQ-1+N>;^(ux-tkpMVP#8-VqGidiUgM4KpkWqMPL?8yh`~HWU@mJ*-@4 zfOt8#t*7WurvaAWM}{)X>I2);p>orIA83IBwIhB zoAsO)yLL+iC;PM*53|7gb3?7DyGQMhs3Dxj}Mo1AK7n+XA2u-IeU{_#uR%!!S*?M zO0k(yES{#e5VZExhF&g}pZZd8-g&Qap!*A3898H+o#jiP7cwvi7U40^jFd)6`9mR9 zjHp!&t%$tO+c4cG=~Jy*ToG3jRbgnV2!jq}{e8l?oxCR7wkP6jN%e^@%%WDtxy^EK zS1fx6dg@q^Q~I)u_IGb_jQ8hoi?ruI4xLp}3^$&*xLyi+Yx}Fz##K9Ax7XVSm%uu) zEjrmZNuxeDoG5p^9aYSDrFq zg@y#=tTus}7MG#XpL)5OKD<}&EkhZnfGJE7M;kx&-dIG&B#5V8GJpHm zhv*Z+#LbKShCx@Yg@@lcR6#PfXEC;{}&hP$*!PXv< zhFEZd6yTtT8!i8ViRmoylWC5lr=ZE-@YH-^9vs(pXZ2l`+?_A$rGH4nPYHUBBj2s_ zDgOYqxgJQbHy~K&V(}#{$(yG|&h!MJV!p&}Us9U*q=Gl5nx9u4aei|5dsv9rPz1Ow z6ZHh%cVilFl$p&D#UyPaoFQFlCfLO>;WtWY$`^?6oLdiIwa;yWx86$=t+Bal1o;mg zZYSP{C$^ihW`)7O^GFTP_=+E&JS(bfnVlx#9F^>=$0c{4AqT(*s<`613_jTdsd&i-scZl{>4A%e< zEo+76E&a5JUzTj(9)(TR&Z3s$VXs8|Bcd`EQ6*|&A19XW{b^HK$z#Chv-=F@bGEX# z#vV^`mf4eA&7aQ(y%Y03QmF14rA0-(cVLr4g|5|$PQW0bTk(EwCE#;m?(^qipV`-5 z5G{7+*`FTr+)LGftl+Ri3wtN4;s!QW}V)f)@ z-xTYN3#xk*^Np=cPz`~%(z5zn63Y_3u72EYJW;-dO;{cpFlIkprcGzo=>&{Q&Zk?f z?=E&(E$7*J9QWc}Wk%`rABKrawn(YmuoG!UmW+iynx>z8lKD!Oaj<_#p2=kw3%3-y zpW;o9MvX=Rfy^Zpd}|mKSpRWR7#aG9I_0)rb@(Q~p}M8|VQF5}WLZhMShsK6MBKyHN1IU%XDuTztOgVOXfrW0=!L>B{+YdAfhJevGbY4iQeI{h^%9UtZEM2B5ra5xthp1`Xi=~g99Pa0;(LO z(8e?^5|}f35BOSnQ0B)6=OcRHLh#oJLRo94L~~7gb{`dTw!a!OZ($AK?XE7Pu7~$V z!7RP5NwZ&hp5j_6PGaKN1x&lNH;t!~zMa_&DOIg@#<39lxgN0El%En@w)15hHs9nK z5mM!l*7T9<;yup1_yn)#{Y(+5{1;wK4*B)#c+k=7rz>wE1@@i^pdUE^>^{=UDKVgP z7=YB#@bDCkA_PlT;O!0hv_xFIN7`ObPg~%QlgQRc*-b{38t^se7V* zj62Uyug86U&!qXo0mV-h+#gaEpYy(1<#zlMEpV4bDe{T0U5u0!+Q* zZO5gMP~_q5yr;KD+X60qu+$de*YRK1VM5-y7*U3yIBDErH@Z4nE>dl3_<2-u7kZDl zL_a*uen}XV&wVE=?w>m3XR~M|pNByG%D@n3g`U>m6Iy>x;zzo0x4Z&CZ!S*HS z^(+i*CBog--*0!qk^{ASQ3pRN{v9|+)$V^yAKCBVNp27ih)z;4{ushi@(Y89d$(BV z_OHt)9dIpFZ|)vZ`==&ENv=a8Td$6jT~+E$ z2au|2;6MRLl+5K=vAQq~O+F3;#gd`6RJ9@`moE`!6a}WgJ<#0tbF=6@;t1gIBG>%U zhFctwn8!&?Djk7qesIw!L7X>8Pqwui+&PD)*=KBF+grew12ksaM>n7jL1$pcHT!KQ zUNQERMM*(Ei!@yM@*JaqiG{>dcJPuxJhOhN}Wp~gdY0B<`qR9H<*!l*utNYS6U{m*zY znA`PID2%U-S0m6OG^Ud?vCrw_&`_^uCQ*2Nvgx|9qn;l@uw;yKyZCpNHZ@ouLAwjM zAa<{B(*aDZI6Jf&!-@`gLM9|w&S1O|$~=Am;)E*0KGar*k`-8jH&7Po>D3jd^+4vy zk2_%7HUu1G0AZMTIt*->(tu1`K!sBJvg`VV`7pg2Y{i*a9Fd+a8|*pA41Z5FoOw_& z0W!fsf6qK4Oa+I%X_Aw@_L(F$!-|L@Zt0;!ywLId$IV=U%{+Y`)l=lqMAfJB8ELpQ z=8D7N&xib*$*37_QG)m>B%hCe=?U!rt$^2?K4M<_{8k3Bg7Cc?JbTGbic&c9ZXs|r z)a<=vh%T>-pwVq>F)^~v`vC{iXk)=)qWinMlo_jtM*Ho(VFwj;^EUU(z5F3z&3da} z=53bxFFRD)aTzitzHg}+4s&>#7DmkI?j2CrUw@R0A=j;i?|7S_ZlLOOi>8v0-$%Nc z|NY5sRjKsKOk|~i_?Xcee&@)Jl6|@1IEIl+5;R%jr9TX?9ky-+J7qMzfegKBYwdoT zC6IxPOTNQWl2od>woPQZON{MZF4LfycR#~hdi&uL6H>a{*R$5*dcFZ3!I@-B<$e?F zgc&aYo0_c97d=mCdEL%?LpVtL@T4at1>9lT<%A~lfO+7Zr{vfRGDdDQ_#^Mk$i&ye z!FD8kQvbplUi*6N4Yb#+a=lJoB*gARs1{mU%R4IK#qJ->C)XI(du%9yFJgX>SfgpL`rHmagCpqHNq7!Qk7*F8 zzPKB)c2{$H!I?)0pvoA z0{!dX?@ol7CXw^3jPlKf1gqqp6cIs$U>b%9pWrywN6kvUD&uoi}N`UOaRQ z;nxA1S;X(wTgv{1>Y!d!dUS$RkwE*)zuYc%s~fNp)G*=Fl33v1Do*R!RRBB9d3yr@ zR%z0Lg!gJMEt0doSASTKF?Ke~8RqbNGJblAX{Hr9q&Hxr636zhPbEKXBfEHXvUf_c z9#71>v5Q0%3*w>=e{myBHmkdrNexoPO&6mWN|>s%-Y5kz&H{}I(#a0*%mcjZrh}DM z89!LK5eWr3I|qk9#;{OGc$(!^Ug@>y78eDKUZ=0yND;N`&Di-r{Fo>uf$4?-gjJ+} z3`JOwgmq!tv#UvnC3Dbrmp1ivUuQep)n&bF1qd68;VYJg5$WJ+%u5rSb4yuta(zz; ziW(cR<8Nlo0K#&z)!o^WTNFfUu2_SI6Jm_*9o$flUskhm5+3Dkmbu+b4<7L8+{kQq zkt2;+zRk`o5_rokc`Xao!(XZopdX(LV|x||dKaKlu z@)xQ7=v92AD&nraD~^4PW3Ff3&zZl~V=Az#25O~?IM<28$sD2pC)tzVIagYW@xW!V zsJs{9s_GPHMgM~=rsj;73Qk#`>_p-rsMv?9q*?OuUxWsWfDo!kCRkV!lM|{-~1yI zicZ}xVUk-FbH#U?3W1fjs+QJad8Pzhk`)JEo*bU)($8}DPiV&yNzYG#)HH1D_Y_jcz@i%3`~NRLN+;x16%mFo?L_dY2r#IDLU zNH^J%xRnQq*e%!{F*ZNm=HJ$EjCQL`Ky4bimR&^Cv<{p-ommi6_`@r;ImlMU$Cn!2 z6fNPG3>In9eFn^EL74<6nLjVb>LrqP*x1U07{{*K;oj;>1_xDc-q;_uvz-=XrTnOgD8TCt? z05_q#Q;_6p5i5ZjOa8Z1^%smuE6V^6Z&tYyv{yLh&kL5ZimTyKmYgL!WG zeo9Jt01?=5`};0_DRbf7=C>+C%QeKw}e;%xw7{3 z2oV*33mJ!PbYiwWFwA{4)xpwsuKhYi2?(!X^*MIh1cABNd5R?P1F30w63>QN04&>K zbM^J3qq4^UkbIV|^BtrZ^Nv=#LGsEVkOfN!SJ+iFmhkD>Vtb;|?^DV2irZP-ZA%_3 z22fUu`hyL5TYCTOVHtJtYyCa4_^dYyEd)s3GvEqQA03^O*lCYx%kkD*n(^PxRGRHs zLKx~~AQtYBtV&$~429a$US9~hoMZvgsqpa-E%}=!hh4kRUUfV$&;zIm<0fSv{tbLk4B%vGcXTUNe56}*&6*;nCR(e zstp&ZAKJZ%2k2Nd1Ey#)Me*&D2S>FrZ(MW?49m)EngJ2F=@RjS)|RQ-RKPD8kcR6o z$MBdv{HT4rG3?dww!jG5H`~!)co_5ZKRR2d`2;B`plz=D1X240v4!Y5(GPM9YyGj* zqkTt(#eUH|0pF2lnH^))LQ)J@fxWtJDJ>=Cybf=&7)j~#l>$G-Yv;&Q)LntnMoJ=BPJO-J#S%E7%q{dmP z0$z-=U(`EeO59T|H=Zai?6PD(d*QfsGQS31oa)<;=cuF}`bQ#tx{h_>)A`HVPhXtX zZ_U0~5_}#+d7AQjgXe~&Hv`<|p?V?OAm-f2-cI0>JiRqHdxR<#1PndZ0ofFftbl8@ z89ll%mIh?jCfuX;9IzL>dpNP-xg`Vkg#6(w203z70q=wQ{Z3}ddGOv)2`dIS5t5`x z3(idJ+nr>-h0g){pV~8r`^JmZ2mP3#sj1Icq_gjAf!E*%yqiCt<+bG^-k1Py)bW)( zDXdQ)EN3f(IV~2+$yT1kmcxo^mf}fGx6(5);cf=w^~{M ze2wp4t4votogOh+`?N!2qw4<;l*f#VG^Z(+I*7Z%Vh4Vdz~*RJ~3S)jpc>7<8 z5vi#vH|8AVHgNzZw1+8TF%w8DKdfT<_QP}Tn(o4}{1BP_=zgAz`1r%^qmJ=rtyTVJ zmUmhW=p@C~1?<=xPZwh;0!&SEM=WQZ z?KwpZ9bTC%7&MN?VX!>G22R{Lbe zABDO$4;Rl%K6M69dWzfLFcHfZ@a?b1VOKtnI2TQ)c_)Cey653Ot;?sAAr>a+kS3fxE zviG;WK{vcsP>>PY|Fp0a4{3fgar89%VQbEtNeU^QR)3%qsP)NB zN7E)4szF6SzX&WsQ}x5HFtcF8*O%IXJf5aWf9@UvJgPp7Bh|1GZO7X<#=XT}%KJt` z1uY3$0_8m1l>bsH*u5!I3Lzb=<2j?C`Ql$sOqfZ|<`gJhKrCktVw(IyaUtEp(yjyV z0=abHZ7C29IKo3AX}}RC0fMy{VnY_BvUZx@P=3h!BgQuAf+7Kmo9S zWGA`0OoA333KK!nPgZKM0RY3t}UGdG^2l?AM&?MsWzfmehwmGB0Yx}l0LsPY&~BKp4^nsbzQx-pJyNE z{L|GlfiLrrf9YIc^gCGc_GG%MsjS`gBiA{`S7dg9`t!&F4qKZZT)`{QL@*~hk6!tq zGO6>KO9t#Zo3%4KQ?FErN6YnJq1K0i0L>72juZdNB&-N3J?3p(yr2pLZOai@n z)$Zy(DV}Xs&Zb%3W%zsX<1-yjilG>ZZ0P+O=w(Yt_*!RpwWjfUE#8g zeIKvQ$Q3V|8wrYubB*=|HP$OSLqE@|LDfrpD3aBieXqYv`p2JU$f{4py;fLD)2yya zX4s?&GxtfZukK?NyCP7mjb?`@bk5oc705y#tU<}wyX#-Nr&Dg5_pZRUM!Z1~)tKU%Q)lh%Do01vnEc4qoO{%zR?9*k)z-dPuYH9z$zbyXa zCu!ExvNNR-w#~e#x8y`ol0pftxwd{HyR+MmLjz5U0<3vogNHi*6Nh^RR9PIDM%tP? z!9QQ=H5%^^TAgJA-P)s&@em;US*tysIJ5p`RyKg7D!?{yVqS@+e{s3&vV(S*4Aj+3_tj3X zm=UBjV(xtvBpp{igD4YvT2Qm1BwpKJE8W~*?oT%eL^L~&VR)7K4v56g&6)xWBK92u zpMhE0IU{JZ#n}=uCUJK$Dmd8dFFi*VuzcAVtGfzMuYO;0WwoHyb!1_-7|O!aYaJgkjo ztVtOlDujwsEy)}Hxy1cp+NWhh_!76Uzmmpb1HA-?+LZis;}L3NhGs#$H%!ppRz|ER zX#XdnG(Wkg!0@KR&BWcjxZv8=}Kg)TVGaZCzF&kbXnWwp@%W*om&(FUb`;Fp+Nw4WA# z>(5-`9Bxl*JQ^AMJ$k~EL5^;P=Pdp680oJu;>yzQFHb}Sc3P{jbMEmWIo?+j8#dp5 zbf3$A@kqdgNRVPW4z+h7#6FujNvit?(nZ@!L5mM-L{Bajktsy;6PM>+n?2o)L1m90 z@ZXlZ51LS12WZ1Zy!buz{RCdy`O2(BsmduXl5c96t~=1nr5PuD<=(z`-&8>h+8a{d z(K`sNOwd&m39POB5jki@xgUm>qp zO;e;h`o&HDG=2ie8#u1sO*8=zsVjF!;;QQE zYPRas5q{7ql5pQiR;mH$*vWwbSFerCjJoxH%B7-kj6 z(fbm1O{Fk!Y8>VhR3b!DjNgyhHy#u{I> zqMWX>(zn;K3(yA+m-;ltBNfvGmKx;Rn(fwmrs3!^7gSYJbWa*o_RHO^C5y@<260N5 zc8!=>XwrDTwbEB-z|(y3r`rcbQT-wk1zt zYE>h%h*15B~2dQ?_j-`?yitZd@8nl1$dDqc$g?7I{-3nwJq)mviXTL0u%M*1o zTJM|U*caq;r?saCN0PEURof-M(OA|^z_Pjw@ScxJ{u=1JoE)C$+{|Q|Zl8|BvYSHL zDB1i(gFSq;W&c7c*^z zTeX66L6{jX$O)II6IGQPIhfXMe9|F2*ptI9?^%spRSr)xxqL7B`$A zQs;ykb;@KEtMxTj(;Qm!i6%SVAet=D5P!M%S!kIyRZc+1NjM~en|{TrwHU_D0o~qI zZj&Z-WtgEorM|jzP08{fi|b**XS|^HN5mLJOO%{JU-QBvA zQVRiBYlPXP5c=`^h@k;`>r{z03q7m#6NVygPD%HD{joW88f&kjNG*5ultfuN^A9&N z<)*AVmk+rzJO4=GveyE20@3r$8}>Tn8SMHa%Qxagl9g;^|5NItjBAOcnu|S_o+ZwW zcB4F)sUET}n65b=*VgCwI}w@e>wXn*F2n;(a1u4x5vS!YZ>ybkP5JLT%)Y1i<^8F~ zlLIMNPxFld8=?*ePRqBeHoFE#k%^50lw=QOuBe2VgHA+^$k6K&cEy&y->&bHt!TX1 z&Q%r3ewL#)Zj{Wq8y>>%)PFHeA0^G1q~L38;RBe~)FC*S`@ zei}r5!cpT#(qZ%D|Av{|9~H+DIVw|Hw|)DC(dvPx)PJ$XvvFB4x%Wux`gw0-9Q*vH zch)@8Y5AWgS6*+P;iT;oUb=#tYJJOOk%8N3=-Mj>E>1f%fYYWP`6}C)v zX1G&<(6L=dEmgwCqC~wgDYr~_7+&cP8`tC{y`So`1pXy(t7ttxonbdpDd!w}{~Kxx z5&YT`JK(cD?4%Rv@gWYYTad-beyLKkGKGJ6Y%l3F+?eFP5}pZ8vrBfrqUaj(I__m^o67;t6d}#HK-~t#L5G z@PpJvOG2YVAq^uO;gkXlsWZU)P)H*6Ae+c$``#X?+7AY<*KbV4<81cSDx}|Xybb>M z-0;>;6;-Q+Ec6PD77Q^-Uz@V_S8=-5%#-{KHiR}fslBq&RmtsNwH8l>soM2diE?e0 z)FwJG77p23Y-_iAs+PZHb{}(W9lmh?%Q{HBb;UE9NzFfC2r|wLMe)U@F zDl#^d@ZMGBk0ofvEIw>G-Dld5&o)3#v@Wx(J5L}$N|=$(k8hv9m5DTEmF$g68w>8o z17@exBno{vw;5Kh`C5#`yR|zl%J+9kI`Z&rKFAFDEpo-<9d7d6y&?{!~;^ zpJ0sSQzePlNeG0lFXmg6=d{aja<@Yk)k`ggk|Wj;10`%nBXFB)Xg)(oZPyE~FA4DT zr2NY9O{exoi(Nn42~g$Wf@)(hYTK;sZsKq2tr$G8h4rr2=l^RUNv_>b5oo)&2ts&T zpVm#t_`%ZJU2AEw?`{ z+kF)9;LI)E$0cFNl*TEcgG0vvOB%FR@%n!?+y-VCbpEN+JhnhA1zUSEh)%@r_pjI87``-YpNj~7K zHK9!i=d51rPN6-x1$Tn)P-gb&Wb_rYcDt9h*UcK@Kss-|(P-M7#+@F(_c=669eSF; z`uwv14jhxfN9R!qN`NHbcLS_u4GI7$jDE|Y(bI%U0{p+BaPY6=S-!R8PpimoKpWbW z3EYnxj`!eAXZrw0I0(4H*7npweFF^w@Fc;#kPZXRt_u*&p$n>7*W z8=yi=4lh}DakQkl&^iiiMQ8wsDXP-2ua_q3_k9>AdtGeQA$Xmxj+W?v01Q)JUfz7S z9cqXUx?3?Lsa%>ePsmc~;0HrM9C7&+NAo$)?Q-v~QC^zJ6&8XgYBUq2nB9X+al`L^ z^=J7B_}s|=DCF<%ZqaHh&w&Zp$i2T?7cwohoJa(aN5d(6`C}3=HrAu;sI72J}`i_jfw|M^o>SR zzAOk(mlLrV1TYe_8U@u^k8_If_E-K2^s$|<`HBHUHSZH)$-!p|P-pX_BD{ORltz@_p4)aR!Ah`7@BfsmxBRNRsN zwaR^80z)v-JQUZF>%UI@oR0B+KNWgb1iXZHa5&p6mR+|AwO0bO?)=dN#>Y_F(oToW zOlMBMYXBqZ-RWPcP{B^hU$Nd%jJnXn_Pf23JL7O&7gHB)^7jhaK7v~1EoUJSukBE_ zDxbT5pv?^W0ELO}Gj2dYfSC!tx9qt8bNln7{54z@IWCV~o)z5w8h13Im;vYrj$*}vgE8eA7Ad?pAAN^ zK#NbE6>!^|u>DRBAp*?J5-1@hah*q!6+%lWaDTw&$!L%SBpcr(rq;TD)M_`GjuG)w z@&z7df$_i2kCBMWh$u4R*mji$zf1F@q1q(7t>Gfe$E++8^RGrbX+5SdMTxQiI%)oA z-!=(Na6LQ(HXmyJ5BdW?H>aV#JfO#?(oRCa<|oB-z9Dy#@h@~{Wo1PJQ$2&v^#Z4N zG|PA0op@;*!vA!CbvPwU;Wnu#7n$K8akKf6XA1cBkUep8cPE08ND@K?w?I}(CqOsl~$%fm=_9HLUeZ|$^xlt81z>Df*pKgUz``usc=?6O}Gl?=WcA^7R16@YVPmnZyFX`m6B z^brQ~s=ZH-r0kf4^@sTx7Y2v4IYK*52c#T3_+zwXUW;R(@~fODCbx=$7y4nSY-xqE zzq8m_ts+GdVdDgZX6fB1_F5#0kRW69*ja2+&I7CuXo|jmp5lJ}r_L~fhR-Z{9T;`~ z_M6|jq)U&}k~*A#CL?bfWz3!<4lmQW1xHeHt;Jv|Dez~H3@n5S2Ih@d@~KQ<77|z7 zT`u|JXpiEgeq^`^`r)fKc5nhQEH5ul$INyo3cwzD+@9@vwy6A+O};P{LI<|V?vE6` zT5yVwIqNbA?bQA7{}TDFms^?`t0sMzjtVlpG-AIbEu!i2wY9Z1tswn7&5vO6d^l_T zfJ!eKgB%M>x*xRS-$1|wPB=vozdD>=Mc%7DUXk%1S1~1fK1n3~;3P|QO3Bg=tiz(T ztX{B3GJ(3d5VBBjM--?3i18q&8P^fxEw@?gddD{(j{vBNGd{%Fuqz(t;ZD+P4dc_@ zYTn8ehPZUFeP9dUvnR+VL+m7>MUE=%@XC{n?s8*471bpCg3B#V&cQqbH~(7~KnA@1 z>`l3?3#Xy5`#kaRcXus77rfgJyrm-E)EH`-$s68Zy*@Wut0koCinegwD=KiHhO5&C zEczuA2PsN?>3bFeyoCrk@LEs+(%y%I9-c~{2qE|#Nzz$ts-2)7f%g@4?{|H1aVkSR z`M9lm$elVOAq0_zz>k51yYFf|c(;MTS1=)0bRuwtU$!aOa-rP+`sMw`jn;6v@4#$y zUe`9^_G=bdhku~EgyoAu4 zKt_4P+8_1a-|@ITD!!WuZm>3ou3X|)5EF7^AcBCu$=5HC(}Ea7C11Agp)mRVR2z!b zB7ggYu3!2lkUHyKHV{&2ux_FBMRpKpx+-Jn-S@*oi(3>XNJkT+!pujn=6ThtjDkN4 zg$WT<`j%9A2|2>R;>9hKO`v0gH_;~h@w*ez2jg-3Fvy#zG$`e_b_(ew1YX=MGsiL{ zyI`kAtQqYTnHD`Q`&XzQG9iBw8jKX&MK7f?x9Zf-Pg5WZuvXhbfgukR%bI%K$>)~I z!b3FrKCsQ8(8>Y*KD&>=auqace&tkbUy0a+>e%8Z+(%p*gitUqzCE<{Fk$BU=zyLpaN2{FLT-1E-gn#K9^Qw6HfzIo&I=N`oZ4P`MT|iiM$+yZkXVVsK)NxJ_OI*k({DY@B1z6lGV;L^oq^)1S z9uxKm?+Ml(L2)7Sl0Oyr#}j0Eq8^^$+JQFA#}n8nDh@!&uh~|s5}HghlylW84SGRH z`r4lAH8C-9_X8&Lu-*{!ijX-&H#1rp{vs}`l3 zPgop4Ls8BXSD061bCrvf0`X??05~JLHc&sQy;K}vLteAl{5jMU9N`*dZYMA0KdLNx!ecf-K%%!S;GEd z;IiEm^R)f+!Qzl*2!3hNbtJVY|9 zEu5N5BoV!&2+&>vIsk=c2*Ue2?)f=0!-YeM(srjq4a>1)-yFqyEA920)Aji>k%i$e zyvHE#5(g@uFwl7v|F+Gb+qQUee$M7}wD|RxE1Cgz4PGjTxd}rf;vruT$;Xg46Ze4D zKBESE_*tUi`1sg543|aZcr2A`jM@KVHwx+H(|Vv&&13TE$w`nyb>d99uI?CI5==WI zo4+SNB4>}d8P!aw`jm!&St{Z7Jc{@)ioglzCX6DR!cH@JzCE0ryYPEmE#ey27Uv&( zi(rI~`ymJa52u5m2DJOou@HL;3_`Y>nOSQPmQTm*=x0_&2EDKhg2QNDJ>P1`G&%XT zf3(y*qhWvx!gG#S*tB`4p=1Qr0Dz^BuMAFpW{-r3YR62wzZ({6GuS8qcKuvMj$X2qDJm?lpH~eFEb_bH!)=vfWrzRG5p%* zijj|j8|zDt#7Z|Sz^dUyiAF(m<#vOEhZh$>vJkLMl8d`!+rS$Zi8y@kL*x)v(8(GW zD)JUJUrq0cRR)R-rRVD%Ff3JeVEbu+`to8imz{WyQTC4?{V%e(koRn18MgqS_ejP2 zV>{ac8Ov++{Od}E{EJs_#%14E*(E^`y1y`+(^FQ6@w^+fIZ5uWi^dagM6LQhs?Zg< z2V*3A+9GX71mRe0-sn zkRz<#^Z0p~w4ys~XW#4AnL>pQFP>$sFAS@mumo7eIxKJAauFcUSGYtNqSew-=S!gY zIJLc2MeIIjaauvit9?UMiCb*WqM!Ttp+Wx!ffC!4vVJoD= z6!AEnaC_}M#0B%v+an^!j|UZ9P_G|}7MCCru`kr6r!1m(6Ham0V2sOWjL@o(x%YIg z8=ZL!Vt^iZvmp8n{TR0Qnzt>GzvV@yltf{KxCg%Z7IGi5{WgcW9|{SpgbBnfsXgs^ zm*(RO2&;I1Aqf_2|3i{*tUiJT1|FA@?l2ZE4crgoop6p7-1XT?!zL8OY;~0cu%HTYbO5mqLY3=62>wEh3QnvMKi`y{8NN2051zaUUJ&P$ zzUd^&LpYS-mGJJK9m*2-Hrhi#BeKwHb^DSDO$hewPaC^Ui55hD;?4;f-JNK4Jgu=9 z@!QIsG)2Ax2v89ACI%?O_|zfK>zWZ~^9R&@pe3b}&nUGdzWBqa)u7k%Nvz8$mbID?R)sT>>=e~5H@Ue2z7Bn%JAiK}~tjyJ^T`Z!Uz8BU0c zS#uM0pJU9d@;GVvue*V%pc?H^r``3ySCE?4!*!d0We1N00y@aJ_-|HaiFJOPwzbyE znebxR4wQ><~Jb1M<&j zkGDB~>)+<8@~>`km2fg&_K@GuXL%m?H^M?PKVR&TnK(M~6@~#lLTXv)7_kA0a>Y8^ zk3BtQs`XPaPKp0J6lZ3p_ZVFV?h8d7z;*Aks+RlW3nX&(s21i`80OCgf#hd3{0ZEO za2y>MVdr<7NI(u2LA{BPh6HcnBxKx;6Y?m|-JR--6$#uP>nt4?oLs-BLxgy~8%hb1 zBy|V(CSnNqxU_kSHuBW@Grg_Ag52agqrTgH%4SE_#l0~O`KpG*Pw-#ii-Peb4GelZ zC}ZIP($ROtGOfnG4~x-9!9crYt0{X#1>-X#(V^MwWa-Jk3)1CTmKQs=QV@^Z&BUfh zzynp6F))34xV_Vm$3kpm{wgt?Llo$=dU~%Xhnw(gxEU_*O>5n${Mq{+cNY(B+ zX#~cYvnmrgA00{IRZl#&Et9B}WO$kRAQX$>GR>EoYRmj5aU_yX{D}yp%@zLnu_o_O zUO+d-oSql?Bh=-6=+e#f8JK8s1#p3SNy6n%9_`Fp_}xZ?`rI!93H5@Iq<1mkR?mIk z;|2}X?wAD*u9DG&`v_|;%94w!{w&#?ziWYmKe7W7JD2(E~{?+r&D(y=!Y&f+p+y&R?e|`;$ z2s<8cBckX#w49MHFcu7mc&XJYvM3pBuvxUShk1xB{}#uO?)tb+F*CtkVU<_AU4Bc) zd3{YR)@s5DW%OJp z{F~AG9ZEN7Qwkhn{pe)xf7<@_4>v}NB4jG~kvY*Bg1P{TrPTjEJb{pHDtNA3r}f(} zS8HvHZr6pKrM{kBkn?%SB1H}m+TwkHZ}9Q#GFswyyBL>w@o#d`g;2I`xzXPA6a4JK zW2mJ?V8m8bRFvA~Vzb`>WTH7jss&@Xc|OqdAY$2N{dKx5kyJR?$ahZl{<+A03x4Gy zvGcd@1JV~RXXWSt!kXJ6XG?wA za^{YU9)ZuLeVRV_#RMiNJ+hBC=%lF=MW3nCZ_)9H;y58yBs;EsQr+~2oWoi{`%I+G zzDgLwi@|7{n%1rP$utCS%6x;2AZ4UJnTmsvc9<=ctW4l8{NWWzfR}geKeUARp8x+#~f{8s;j|%M2ss)GhE~1W5FHx8JCG zi5`5XGt>7R?v333&|O#g8oq0m7^SiIX_Xc$Xapi!&(h2v=$UIr@?loD#=MfKY;ZGa zF^Hij%7ySC^mjgI+^r!s&p*}sS(vfT%GJeH0@9$qs7p}!l%U;2B>x<>BeW|x zn(e8>q}xUhMWoxWH7sIa!WTMpaH6;WUdD|4|Hn)C))J z00kWfJN`JwRgJ8q9yDVLrxP^lDWO|G`>cooROr~eR3c;gvIHs2g6Jv{I(il{qgFNM zCT-y>p)I(mQ(;G#-mHefCz4nWpz|C-U2{bWVm>n7=#Nfutc3GyA<`kf_Y$Od1MN_V ziCvgwP2sYTQDzq0Q5Tm6r`4+U ztEbA*bZ{l$%ix75gt>3w|GN9~Xe$4=-Mu$LnKhW_q{$pI3mH;|uQIcR%8;4Z$W*9A zrl@30NW4H7TY>VpUW5A=_}zZ*4(VnzM^82@i%mH+?W){jk?cwIpE+$w2U?Cyah zALs5-?%US_2<2^nMk3qu8XjTJ*x`?JpVLE@t&JorOUYHE-celDTzM)@xza<;FLbSK zbkf=y%+G0bAVtbReZQN#hje2&VN&4oOHcp@%aZA+A@YaP(yC?hmv8#!Ya{xRsw(VT z=VW%ucdDc$ZATBmQKJOz8yWBAWaHzef!YTT!OEVr9ksFDi?IJGjTs8uNn37vtvDKZ zfkbq?dECi5jYl+{bAU5o3#eq4!whIX-7GoE5RoYlE=d!4rHcCErVuuFdZb$~M`5ia6O9e}|rQ&$h@3bbUmfhYK@e+n=5>$~Tpm z>Mu-p8TfcHyz|bSZwh~5yW-I|bJ->;je(aC0Up1S+)nsuo}$W!SMeCRbIRhQ9&`d0 z@tOV}H&E(k5eo!d94PR}r(xpZ5ruiX72Iyr1kU1tnn(`HZ`WUQq+Ja*ol~PW# z4jZGYMI}P3pXN9gYlp?YmJ`ICn@7DsMJHZtUJP#NKgG| zvTiZSsw?YB20z@lue=y2km8TSYzZcxa~O;`xwx7Ct;cUu2fPib(dM_z7_6%7-ZIP9 z&erl@cN;FO9AJ|Bl;VIzG^@Q`?Gqa{asZdkDSZR`>p@y%WF*Xm*9AB|4ucEgA!nM} zMj!v@<%hngp(>^RGmoe(vs9jxD_O{=+e^MRV|Z;Lmn4jS=~8~;*O9bd)UO3brL@J2 z;Ejd6lS8Y?*D-*EjfSD+5RpTDRJd6tlAE+pj#P=iWJb`96L{2`hRR23WTM zeQQ7c{k11t+4R_@NAC4&&kG9+OYVqx-1wiB|JbO>`n}#>lgw%z+-fs5L0carGeF-p zDz?{|`c+wqR74e6-rG5~MUyWfJX}+9dg55gft;QugOS~iZ7I+81SW|@v+7#Ls zS6>JjTUhE@Bp2Jov?N)GR*a2yQ+HmAk9E4%lU_UIr};50`gY&WjAO!u;XL-w3LCXe z;lebcnNg&Z%QzVHZ4$$ER-nFqO+_s;`}^yEh-+5G_A?V1jSc{&&1bLLQK6VW%R*?0 z7ny*Ce3S=NIP)*oh1Ntf>O zV&%s0{_2w@FH;{~)|yM2P|=&E*s-tkdLraJJqEgp+Iu@7<0Sp&vCo+n)F8me=Z!Td zv;t-7!@w($wf>0`ZtC6hD~K3gyS;cI0i|(I8z{{ZT&_-na8JIORP*E0&p^vK=Nic_ z8909QtjFo^=1VrSEnCh1oDKB;R67k}?J*m)nO9%5=NTc6^V8pd`Ph)YSQnyy@$M(? zjjJWZ>2NN`_zP~4{HS&7bFY`6=7bM~uSo%>GhT;dbBFNU0R zw%QmjmD{Na*TI!lCL9FiGx-5)j5#|g+1aY082Qy&=vxE+h}GRTY%J|go*qp+cdmN= z(cPyzPL~{w6dw-mKl7p^akO}Z*%&34XCYV8=6^bOkXH7^;yPb7SLXZ40*w38pNojK zLl`4`DOF^m<9Py+t8za@6lG%PRzL`Cs=os?nlN7TVtW6=)>qwSTI7 zGL`O@1htxr7)4YIN-wX><%i@GMgQWC>z=iK?5Yq5`{k5G!O|-jhN`{#`95NI_)+2W z=F)9w9wJL`ntgz5RUf^3XmNddHV|xSLyVtS+#c)Pa=WWVle}etn;$YIZ)zG{&~&c# z%&Dy1K%*uyU49hHlhC5cWv;*E{Xq{$qEsIToDv63_E-QV4UykSub@k~$RU@uX(enO z>iHl^t;%Xh|4Qw1Ew|kOnFPGa0S&^#vuJWPeyAaGf5_l%>rJoTs^bnxB{pwc*Qbi9 zL%n3LHq!h6;^WFbY#EiX+-EjN_&OCTd)N3ZrT6o4O`!kA^qWF^Pz)A9-fe;TqGC{8 zGcq;h_;v-$G#~IZPS%yCj+_3?GtIR2^hK3c-pBDjf~4oEn|6v5SQgOeT_~YCo_+oy z>|?OqXd|L(RW0oIlEaYiXh!}$sqWBLx;NK=sMZYPg999d@@KK|bdTz%DaHn#!kLro z7rowCN>&(NSy)?&Pqc3K{z6`_$&q%W+0K>in#P zSTVDS9^c*rqUD1JM4{@q3BC(aXam*fF}={+Kx*@6snd6Ic)XV9@I5^{d|{)q^Ul|| zU6p!agSnF(7zl2^TC+^4A6i)O;eTmw2NUP@8HGT{C%?uT|;$w_E0Q;LI1$-Tq%WrQjWq*MBQh_zRNZT{8;q4kn#o4YO~WVyfP?3^g`7 zT4w_Ia@3?@>{+|XSiz6|lT4Gx>}#?J41Ofi$Q?tC{9{ZT@~^!*`uFC+{ef%-QYipubq^J8<@C0FLtvP* z&bEKK2FFImdEp&@LeBw7uYQEGIrMe%s7g(|x)JUj31HQv$KLG{VXosPT4dhxX}cY` zr2B_|sF_5+%t$LGw9H>c^M`rSJ)yAtA?^7NHLs_QNXBU4{-^Lg3m-fH*SM zK0IvW)R&J;oGjagd_zEp}XySV~?H*6q@2)O`4G_jZlyZgQp;mId zU3NH;K)^b`)gnRjp~nK6_f6O4hCyXpDZ5f&`MSwxb;b-%xCem?pO5r_t1T*RDUx4A zL_6R&Be%T$>3hL)GF7)4BIqCZ4Hw%t3qUkTIB-PN)cG?#%Q=Jt0~8SzwfC@eJ&Uh* ziryUfm;`&h89rrxj(|y_brN8T=J=x*>>=2&@bDD0#+|}LNZ>l_se$yOtKB76!i~`k z|7Q@)Wqe5KH5_e|n=*=|^k8y#V*~to96-!R9%iJ(Z>Z}*Y?G|(Ae&)J@OaB1vua#P zO$YQ99Zj{q`g3K`8?=0}dp9g~A9r-)IF`P(yii6Es^5?(TjEl~;JR z3TsBoKW)_pZg?t*8edXuqojlQr*12A9&Q~=2^beR;P?}7%eY7yuJZpj2~UHWjqOHC z=sQstfb!A-)F(>AhEr(;}hf}#>ZEeq7q!Atn4wO5tIg&KVXLs zG|;)wOJSuMcoc6Wp0?P;a_7}9?(UxLWgO0|CN;6h{r z$B{Gu?wkqE!Z=ws>uivIzCiio@>y82GF8>p4*@nzZGaOrLevJPk-Ab$P?Ok)z8$d% zlo*j>Ie5@M@ubNmn*#%%afl0!hf~=?&Q+0d0M5$Dv?Hl@elSSwA^0w*Iw6eF9zu?k z#K|Avqo|{?gn?&{g2CkNFBLvSkomJ=vz!NGsI&G2G0DO-yGCD9A-ZcOl2lSJ~s9p*tvgw&;P3n6<$@C^3MG`Sa__2HpH zm6?kxA3Y1BeKTW!`*o%%y-^vU4S{wAPDKjt1XZQONZ1iZfr9=ThGebIKJ7v#e)%Z5 za1PXw1x1>6AU9JhMpqd(tm^KQ(>dcK=66@989H?zQ~|rB4OuT z{3OWyxZU~R4Y-C)Z5r3Q2TS^cKu&ZlQCywp!GU?teH$ZtD4gEnQHZ)#XoRfV{V%%7_G&X_JN zEq$}4x>l5zvnuZONAI{<@e9S>?Il27uZbCoyrau&vje$AxrW=B2YI(70#;p4k2V=l zO5Ny<-@t!bAVi$xt^?4X!Ad#8_U>Y0?lbg>?xQ8@RY)*$1S;Z(8NTc9Zwu|05CA5B1RCbUo`zG%UjzG8CHS`gc#?@U+ef#_vrRb@BN(OMlfCB&PU@Ws zm`{8DJMgRQ^hXd_)h5BV$m6I|16}5RS-WJIqk1W5io3(mdl-t zXi#u)^==giU3jcl8rq17r3?F6-dHNbX__Gvt|js2H+#VrGQbUOnSw@ zCUq@(^>%jdk>v7c@;*+9N?#<@R#3PsI7bVme%nQC0*Te)Tv&aW`HlegeAm5`bQzI6 zv?$9FhRgdwVts&Tq?4+fSu(6YwNBIZj>H={ANsg)R5E0;dY_PjFsR?Xlz8C+`;bf& zjr+n97%WSUa2AF-z!x6xcy0mbhmgw7a>5W3YM_@Q#gG@Rh#7)#Y*^Y2O<1e#d1KHH z3nIU?975L;0A36_ZgTjEU`vMS^V+2Iw(h6uaN1QGG?veUGLOy|?C{sPE1yd^qH;DjsRQ2=RRy?~(XR@R7PFO17!k*Im?3 z3+qUo9D+qU9pa8FF0Yr~=sp*&miT@^JXRI*V{fjiYAzU?i!Ktw#{wbf{AkYU6&go0 zlnANg)VYgvo)oi+l$d90btUOn`p$mHLk)bE0V`}lFO8gVDuoNLQZJry`FnOQFP9Cg zIt4=hfM*IuIA5ANt5%FIg-Ghm6sv(|p~Oc*hCW5a2GBg^F1_m&I!$BDN7&|z^5t@} zeIKxG#a&6?M5040#B(4@$x@g-O;~U$HD{O)|_yA!iRn8;pwkR~h%(yHd#~`FT zGku^<5IgM7V`v+4^QtK|i;#91LD4qI@~S6v)MZ{eUiMQTZrGhK4MoI31d8*ZaNpvV zZ@@g!EBlbXBA-4XPu(O`h&pH0LCV;xASZ||GlCP3fTHAakn8wc6skth*|*nf9!pya>CBm8qp3+ zXhvW|e{EA+X(`)KN&I%DkuI z^`6OG{OC3;3S?H&pY~@L;siAFwMP3v{T~Of430ccMn3zpDH58-&Vd;&8rqILm39;W z0Qm^Ags*^SMFLi5x>a{pX9pI+tk?3Uu*OMA-5%)MMaT=B#P9ncup3&oK0+MlU9Qid zao{PN8q1y+I)Z>C5|HYeG>CTPxRpHRA!sv(P!0lf3JRWMQQPwkj1{qd&%tc(%(M;t z1;&tPe|T-GNZ`^5{HXdG*)U5Gv?(zhN(P+ zP-&2Pjw3^%!fPUC-wP<`NQAl>;yM|um=>`WSHQ(``X8+JdCR%ITu+I!!Ep+UX8c3Jt z^1zK^VKk~a91NP%egSo4EH~vm(1sOl5u>Lp%ZkVf{)_hXUuSokYPHYt9S`lVui?j& zpfW@`LX~?W6H?2?PY1*%-x0X5wXooG2SUIhuG#;2d;cpLIp_r>suhMg#GI0w35n>_ zG9(??hR1+YOnHD-7cH`3d)x)(Qc9xm=u5AXyN|+8>T8eO0N{7PcdUd=0&;iz6!h_| zA5j)Sn?=JqH+N=3%&GKZVq&9{-PusmV!H!8mUVD}MQH&u6B8Dyng+zfJq4k~?Vj;h zDx<&27AWD07^I|p&Ng!O*O7p8XlXUhi>oHub=}Tkw0b*Ukw#p zt&k*)e?DUKofg$S${;e_M9xm;R9Y{~yw07x<8^Ah)RuRC8)PP@jX>ZY-)d<{UTYH( ztKBY!Ecbl+7SNx%p%|(ckel{##63|f>v%X1%S{_fWV{*fp0@aS<1R%6HNlB$RT;qZ zrOxotE-K3;lsdHw@Sfj2gO*3KjnGXG_M@+}=|cWYg*4VJ8MBeoFT+s?>wd5afD|$= z;xK&Aatb7oh)N~&1jZ!Kdfg#NLqQ#fkl-VY*Fk#X%+M2d%6q$<-tN0Z907{T&V<}L z6UQCqIKfX7QzVumh8kZM>9zq)O|+?I)E}`Ihj7a#_6XAWp0Px;u4XFo*2@UOe;NE$;hY2Lq1jq#C`MA1B!z&e*jkw`7t+G?Jbu{gH6whfWjP2(E|`(v$F zCNWmm;low;6<~Z#nAil%hJb8Z{QzW^F>Y<{t<*4Lnv|y`K#F+lhdQWUUT=B)fYkR1 z(&LJvjHIt$gxLgH3A?sYs>b(d^TTzRCG1hOjEPHjhl5ioEOSs3RI+;WkwL}%4;VVw zBP97!nvyV1-(T4(v9PnqSXFp;FGbr@BSoO2T30im&S-N}JD$)&fneV6g*NF3gF5D` z*sgMiB0n7f$k%v~e11gnrqx% by using the Remote Desktop Protocol. The traffic is encrypted with TLS 1.2. Older TLS versions are blocked. + +Both parties must be able to reach these endpoints over port 443: + +| Domain/Name | Description | +|-----------------------------------|-------------------------------------------------------| +| \*.support.services.microsoft.com | Primary endpoint used for Quick Assist application | +| \*.resources.lync.com | Required for the skype framework used by Quick Assist | +| \*.infra.lync.com | Required for the skype framework used by Quick Assist | +| \*latest-swx.cdn.skype.com | Required for the skype framework used by Quick Assist | +| \*login.microsoftonline.com | Required for logging in to the application (MSA) | +| \*channelwebsdks.azureedge.net | Utilized for chat services within Quick Assist | +| \*.aria.microsoft.com | Utilized for accessibility features within the app | +| \*api.support.microsoft.com | API access for Quick Assist | +| \*.vortex.data.microsoft.com | Utilized for telemetry | +| \*.channelservices.microsoft.com | Required for chat services within Quick Assist | + +How it works +------------ + +1. Both the Helper and the Sharer start Quick Assist. + +2. The Helper clicks on “Assist another person”. The Quick Assist on the Helper side contacts the Remote Assistance Service to obtain a session code. The Helper then provides the code to the Sharer. + +3. After the Sharer enters the code in their Quick Assist app, Quick Assist uses that code to contact the Remote Assistance Service and join that specific session. + +4. The Helper is then prompted to decide View Only Mode or Full Control. + +5. Then the Sharer is prompted to confirm allowing the Helper to share their desktop with the helper. + +6. Then Both Quick Assist initiates the RDP control and connects to the RDP Relay services. + +7. Then RDP shares the video to the Helper over https (port 443) thru Relay services to the Helpers RDP control. Input is shared from the Helper to the Sharer thru Relay service. + +Diagram Description automatically generated + +### Data and privacy + +Microsoft logs a small amount of session data to monitor the health of the Quick Assist system. This includes the following data: + +- Start and end time of the session + +- Errors arising from Quick Assist itself, such as unexpected disconnections + +- Features utilized within the app such as view only, annotation, and session pause + +No logs are created on either the helper’s or sharer’s device. Microsoft cannot access a session or view any actions or keystrokes that occur in the session. + +The sharer sees only an abbreviated version of the helper’s name (first name, last initial) and no other information about them. Microsoft does not capture or store any personally identifiable information about either the Sharer or the Helper for longer than 3 days. + +In some scenarios the helper does require the Sharer to respond to application permission prompts (User Account Control), but otherwise the Helper has the same permissions as the Sharer on the device. + +Working with Quick Assist +------------------------- + +Either the support staff or a user can start the Quick Assist session. + +### Support staff starts session + +1. Support staff (“helper”) starts Quick Assist in any of a few ways: + + - Type *Quick Assist* in the search box and press ENTER. + + - From the Start menu, select **Windows Accessories**, and then select **Quick Assist** + + - Type CTRL+Windows+Q + +2. In the **Give assistance** section, helper selects **Assist another person**. The helper might be asked to choose their account or sign in. Quick Assist generates a time-limited security code. + +3. Helper shares the security code with the user over the phone or with a messaging system. + +4. Quick Assist opens on the sharer’s device. The user enters the provided code in the **Code from assistant** box, and then selects **Share screen**. + +5. The helper receives a dialog offering the opportunity to take full control of the device or just view its screen. After choosing, the helper selects **Continue**. + +6. The sharer receives a dialog asking for permission to show their screen or allow access. The sharer gives permission by selecting the **Allow** button. + +### User starts session + +(I don’t think we need this since the steps are included above) + +Next steps +---------- + +If you have any problems, questions, or suggestions for Quick Assist, contact us by using \[Feedback Hub\]. diff --git a/windows/client-management/quick-assist.md b/windows/client-management/quick-assist.md index a40a1bbf2f..aa7c26cb84 100644 --- a/windows/client-management/quick-assist.md +++ b/windows/client-management/quick-assist.md @@ -1,5 +1,5 @@ --- -title: Use Quick Assist +title: Use Quick Assist to help users description: How IT Pros can use Quick Assist to help users ms.prod: w10 ms.sitesec: library @@ -10,5 +10,112 @@ ms.author: jaimeo manager: laurawi --- -# Use Quick Assist +# Use Quick Assist to help users +Quick Assist is a Windows 10 application that enables a person to share their device with another person over a remote connection. Your support staff can use it to remotely connect to a user’s device and then view its display, make annotations, or take full control. In this way, they can troubleshoot, diagnose technological issues, and provide instructions to users directly on their devices. + +## Before you begin + +All that's required to use Quick Assist is suitable network and internet connectivity. No particular roles, permissions, or policies are involved. Neither party needs to be in a domain. The helper must have a Microsoft account. The sharer doesn’t have to authenticate. + +### Authentication + +The helper can authenticate when they sign in by using a Microsoft Account (MSA) or Azure Active Directory. Local Active Directory authentication is not supported at this time. + +### Network considerations + +Quick Assist communicates over port 443 (https) and connects to the Remote Assistance Service at `https://remoteassistance.support.services.microsoft.com` by using the Remote Desktop Protocol (RDP). The traffic is encrypted with TLS 1.2. + +Both the helper and sharer must be able to reach these endpoints over port 443: + +| Domain/Name | Description | +|-----------------------------------|-------------------------------------------------------| +| \*.support.services.microsoft.com | Primary endpoint used for Quick Assist application | +| \*.resources.lync.com | Required for the Skype framework used by Quick Assist | +| \*.infra.lync.com | Required for the Skype framework used by Quick Assist | +| \*.latest-swx.cdn.skype.com | Required for the Skype framework used by Quick Assist | +| \*.login.microsoftonline.com | Required for logging in to the application (MSA) | +| \*.channelwebsdks.azureedge.net | Used for chat services within Quick Assist | +| \*.aria.microsoft.com | Used for accessibility features within the app | +| \*.api.support.microsoft.com | API access for Quick Assist | +| \*.vortex.data.microsoft.com | Used for diagnostic data | +| \*.channelservices.microsoft.com | Required for chat services within Quick Assist | + +## How it works + +1. Both the helper and the sharer start Quick Assist. + +2. The helper selects **Assist another person**. Quick Assist on the helper's side contacts the Remote Assistance Service to obtain a session code. The helper then provides the code to the sharer. + +3. After the sharer enters the code in their Quick Assist app, Quick Assist uses that code to contact the Remote Assistance Service and join that specific session. + +4. The helper is prompted to select **View Only** or **Full Control**. + +5. The sharer is prompted to confirm allowing the helper to share their desktop with the helper. + +6. Quick Assist starts RDP control and connects to RDP relay services. + +7. RDP shares the video to the helper over https (port 443) through RDP relay services to the helper's RDP control. Input is shared from the helper to the sharer through the RDP relay service. + +Diagram Description automatically generated + +### Data and privacy + +Microsoft logs a small amount of session data to monitor the health of the Quick Assist system. This data includes the following information: + +- Start and end time of the session + +- Errors arising from Quick Assist itself, such as unexpected disconnections + +- Features used inside the app such as view only, annotation, and session pause + +No logs are created on either the helper’s or sharer’s device. Microsoft cannot access a session or view any actions or keystrokes that occur in the session. + +The sharer sees only an abbreviated version of the helper’s name (first name, last initial) and no other information about them. Microsoft does not store any data about either the sharer or the helper for longer than three days. + +In some scenarios, the helper does require the sharer to respond to application permission prompts (User Account Control), but otherwise the helper has the same permissions as the sharer on the device. + +## Working with Quick Assist + +Either the support staff or a user can start a Quick Assist session. + + +1. Support staff (“helper”) starts Quick Assist in any of a few ways: + + - Type *Quick Assist* in the search box and press ENTER. + - From the Start menu, select **Windows Accessories**, and then select **Quick Assist**. + - Type CTRL+Windows+Q + +2. In the **Give assistance** section, helper selects **Assist another person**. The helper might be asked to choose their account or sign in. Quick Assist generates a time-limited security code. + +3. Helper shares the security code with the user over the phone or with a messaging system. + +4. Quick Assist opens on the sharer’s device. The user enters the provided code in the **Code from assistant** box, and then selects **Share screen**. + +5. The helper receives a dialog offering the opportunity to take full control of the device or just view its screen. After choosing, the helper selects **Continue**. + +6. The sharer receives a dialog asking for permission to show their screen or allow access. The sharer gives permission by selecting the **Allow** button. + +## If Quick Assist is missing + +If for some reason a user doesn't have Quick Assist on their system or it's not working properly, they might need to uninstall and reinstall it. + +### Uninstall Quick Assist + +1. Start the Settings app, and then select **Apps**. +2. Select **Optional features**. +3. In the **Installed features** search bar, type *Quick Assist*. +4. Select **Microsoft Quick Assist**, and then select **Uninstall**. + +### Reinstall Quick Assist + +1. Start the Settings app, and then select **Apps**. +2. Select **Optional features**. +3. Select **Add a feature**. +4. In the new dialog that opens, in the **Add an optional feature** search bar, type *Quick Assist*. +5. Select the check box for **Microsoft Quick Assist**, and then select **Install**. +6. Restart the device. + +## Next steps + +If you have any problems, questions, or suggestions for Quick Assist, contact us by using feedback-hub://?referrer=resolveUpgradeErrorsPage&tabid=2&contextid=81&newFeedback=true&feedbackType=2&topic=submit-errors.md From 05ae433dfc05d6897123a98259b6f241445cc058 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Wed, 16 Dec 2020 10:33:43 -0700 Subject: [PATCH 19/49] deleted unneeded file --- ...-assist-for-it-pros-draft - Pauls Edits.md | 103 ------------------ 1 file changed, 103 deletions(-) delete mode 100644 windows/client-management/quick-assist-for-it-pros-draft - Pauls Edits.md diff --git a/windows/client-management/quick-assist-for-it-pros-draft - Pauls Edits.md b/windows/client-management/quick-assist-for-it-pros-draft - Pauls Edits.md deleted file mode 100644 index bdd037b8a7..0000000000 --- a/windows/client-management/quick-assist-for-it-pros-draft - Pauls Edits.md +++ /dev/null @@ -1,103 +0,0 @@ -Use Quick Assist to support users -================================= - -\[a sub-article under Administrative Tools in the [Client Management](https://docs.microsoft.com/en-us/windows/client-management/) area\] - -Quick Assist is a Windows 10 application that enables a person to share their device with another person over a remote connection. Your support staff can use it to remotely connect to a user’s device and then view its display, make annotations, or take full control. In this way, they can troubleshoot, diagnose technological issues, and provide instructions to users directly on their devices. - -Before you begin ----------------- - -All that is required to use Quick Assist is suitable network & internet connectivity. No particular roles, permissions, or policies are involved. Neither party needs to be in a domain. The helper must have a Microsoft account. <Sharer doesn’t have to authenticate> - -### Authentication - -Supported methods for Helper login authentication are Microsoft Account (MSA), or Microsoft AAD. Local Active Directory is not supported at this time. - -### Network considerations - -Quick Assist communicates over port 443 (https) and connects to the Remote Assistance Service at by using the Remote Desktop Protocol. The traffic is encrypted with TLS 1.2. Older TLS versions are blocked. - -Both parties must be able to reach these endpoints over port 443: - -| Domain/Name | Description | -|-----------------------------------|-------------------------------------------------------| -| \*.support.services.microsoft.com | Primary endpoint used for Quick Assist application | -| \*.resources.lync.com | Required for the skype framework used by Quick Assist | -| \*.infra.lync.com | Required for the skype framework used by Quick Assist | -| \*latest-swx.cdn.skype.com | Required for the skype framework used by Quick Assist | -| \*login.microsoftonline.com | Required for logging in to the application (MSA) | -| \*channelwebsdks.azureedge.net | Utilized for chat services within Quick Assist | -| \*.aria.microsoft.com | Utilized for accessibility features within the app | -| \*api.support.microsoft.com | API access for Quick Assist | -| \*.vortex.data.microsoft.com | Utilized for telemetry | -| \*.channelservices.microsoft.com | Required for chat services within Quick Assist | - -How it works ------------- - -1. Both the Helper and the Sharer start Quick Assist. - -2. The Helper clicks on “Assist another person”. The Quick Assist on the Helper side contacts the Remote Assistance Service to obtain a session code. The Helper then provides the code to the Sharer. - -3. After the Sharer enters the code in their Quick Assist app, Quick Assist uses that code to contact the Remote Assistance Service and join that specific session. - -4. The Helper is then prompted to decide View Only Mode or Full Control. - -5. Then the Sharer is prompted to confirm allowing the Helper to share their desktop with the helper. - -6. Then Both Quick Assist initiates the RDP control and connects to the RDP Relay services. - -7. Then RDP shares the video to the Helper over https (port 443) thru Relay services to the Helpers RDP control. Input is shared from the Helper to the Sharer thru Relay service. - -Diagram Description automatically generated - -### Data and privacy - -Microsoft logs a small amount of session data to monitor the health of the Quick Assist system. This includes the following data: - -- Start and end time of the session - -- Errors arising from Quick Assist itself, such as unexpected disconnections - -- Features utilized within the app such as view only, annotation, and session pause - -No logs are created on either the helper’s or sharer’s device. Microsoft cannot access a session or view any actions or keystrokes that occur in the session. - -The sharer sees only an abbreviated version of the helper’s name (first name, last initial) and no other information about them. Microsoft does not capture or store any personally identifiable information about either the Sharer or the Helper for longer than 3 days. - -In some scenarios the helper does require the Sharer to respond to application permission prompts (User Account Control), but otherwise the Helper has the same permissions as the Sharer on the device. - -Working with Quick Assist -------------------------- - -Either the support staff or a user can start the Quick Assist session. - -### Support staff starts session - -1. Support staff (“helper”) starts Quick Assist in any of a few ways: - - - Type *Quick Assist* in the search box and press ENTER. - - - From the Start menu, select **Windows Accessories**, and then select **Quick Assist** - - - Type CTRL+Windows+Q - -2. In the **Give assistance** section, helper selects **Assist another person**. The helper might be asked to choose their account or sign in. Quick Assist generates a time-limited security code. - -3. Helper shares the security code with the user over the phone or with a messaging system. - -4. Quick Assist opens on the sharer’s device. The user enters the provided code in the **Code from assistant** box, and then selects **Share screen**. - -5. The helper receives a dialog offering the opportunity to take full control of the device or just view its screen. After choosing, the helper selects **Continue**. - -6. The sharer receives a dialog asking for permission to show their screen or allow access. The sharer gives permission by selecting the **Allow** button. - -### User starts session - -(I don’t think we need this since the steps are included above) - -Next steps ----------- - -If you have any problems, questions, or suggestions for Quick Assist, contact us by using \[Feedback Hub\]. From 502d130ba44ff4fa7a87339f3eac1acfc3bc4e44 Mon Sep 17 00:00:00 2001 From: Benny Shilpa Date: Thu, 17 Dec 2020 11:04:09 +0530 Subject: [PATCH 20/49] Update firewall-settings-lost-on-upgrade.md --- .../windows-firewall/firewall-settings-lost-on-upgrade.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 232e9788e4..3bb0a16e42 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -29,7 +29,7 @@ For organizational purposes, individual built-in firewall rules are categorized - Remote Desktop – User-Mode (UDP-In) -Other group examples include core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the firewall interface (wf.msc). This is acheived by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other group examples include core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the firewall interface (wf.msc). This is achieved by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group @@ -38,6 +38,6 @@ Get-NetFirewallRule -Group > [!NOTE] > It is recommended to enable an entire group instead of individual rules if the expectation is that the ruleset is going to be migrated at some point. -To avoid unexpected behaviors it is recommended to enable/disable all of the rules within a group as opposed to just one or two of the individual rules. This is because while groups are used to organize rules and allow batch rule modification by type, they also represents the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. +To avoid unexpected behaviors, it is recommended to enable/disable all of the rules within a group as opposed to just one or two of the individual rules. This is because while groups are used to organize rules and allow batch rule modification by type, they also represent the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. Take the Remote Desktop group example shown above. It consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If for example only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain what it sees as the most pristine out-of-the-box configuration possible. Obviously, this scenario brings with it the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host. From 7aab2d4b96947c5b6b16ade3a216ee10c1c9adc2 Mon Sep 17 00:00:00 2001 From: Samantha Robertson Date: Thu, 17 Dec 2020 09:41:34 -0800 Subject: [PATCH 21/49] Update deployment-phases.md --- .../microsoft-defender-atp/deployment-phases.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 9d2261bd59..103eef241c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -37,9 +37,6 @@ Each section corresponds to a separate article in this solution. ![Image of deployment phases](images/deployment-guide-phases.png) - -![deployment phases - prepare, setup, onboard](/windows/media/phase-diagrams/deployment-phases.png) - |Phase | Description | |:-------|:-----| | [Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities. From ef5895a7ebd147aaf01a0a9f8eca2d65c6e424a2 Mon Sep 17 00:00:00 2001 From: Samantha Robertson Date: Thu, 17 Dec 2020 09:57:46 -0800 Subject: [PATCH 22/49] Update deployment-phases.md --- .../microsoft-defender-atp/deployment-phases.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 103eef241c..6155038acf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -34,9 +34,11 @@ This guide helps you work across stakeholders to prepare your environment and th Each section corresponds to a separate article in this solution. -![Image of deployment phases](images/deployment-guide-phases.png) +![Image of deployment phases with details from table](images/deployment-guide-phases.png) +![Summary of deployment phases: prepare, setup, onboard](/windows/media/phase-diagrams/deployment-phases.png) + |Phase | Description | |:-------|:-----| | [Phase 1: Prepare](prepare-deployment.md)| Learn about what you need to consider when deploying Defender for Endpoint such as stakeholder approvals, environment considerations, access permissions, and adoption order of capabilities. From e68dbc8f3b979714c559bd4cc7855d2fd8ea3da9 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 17 Dec 2020 10:02:35 -0800 Subject: [PATCH 23/49] Update firewall-settings-lost-on-upgrade.md --- .../firewall-settings-lost-on-upgrade.md | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index 3bb0a16e42..c793caf0f3 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -15,29 +15,27 @@ ms.collection: ms.topic: troubleshooting --- -# Firewall settings lost on upgrade +# Troubleshooting Windows Firewall settings that are missing after an upgrade -This article describes a scenario where previously enabled firewall rules revert to a disabled state after performing a Windows upgrade. +This article describes a scenario where previously enabled firewall rules revert to disabled after upgrading to a new version of Windows. ## Rule groups -For organizational purposes, individual built-in firewall rules are categorized within a group. For example, the following rules form part of the Remote Desktop group. +To help you organize your list, individual built-in firewall rules are categorized within a group. For example, the following rules form part of the Remote Desktop group. - Remote Desktop – Shadow (TCP-In) - - Remote Desktop – User Mode (TCP-In) - - Remote Desktop – User-Mode (UDP-In) -Other group examples include core networking, file and print sharing, and network discovery. Grouping allows admins to manage sets of similar rules by filtering on categories in the firewall interface (wf.msc). This is achieved by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**; or via PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. +Other group examples include **core networking**, **file and print sharing**, and **network discovery**. Grouping allows admins to manage sets of similar rules by filtering on categories in the firewall interface (wf.msc). Do this by right-clicking on either **Inbound** or **Outbound Rules** and selecting **Filter by Group**. Optionally, you can use PowerShell using the `Get-NetFirewallRule` cmdlet with the `-Group` switch. ```Powershell Get-NetFirewallRule -Group ``` > [!NOTE] -> It is recommended to enable an entire group instead of individual rules if the expectation is that the ruleset is going to be migrated at some point. +> We recommend to enable or disable an entire group instead of individual rules. -To avoid unexpected behaviors, it is recommended to enable/disable all of the rules within a group as opposed to just one or two of the individual rules. This is because while groups are used to organize rules and allow batch rule modification by type, they also represent the 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. +We recommended that you enable/disable all of the rules within a group instead of one or two individual rules. This is because groups are not only used to organize rules and allow batch rule modification by type, but they also represent a 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. -Take the Remote Desktop group example shown above. It consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If for example only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain what it sees as the most pristine out-of-the-box configuration possible. Obviously, this scenario brings with it the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host. +For example, using the Remote Desktop group consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain a clean out-of-the-box configuration. This scenario brings with it the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host. From 156e31cc363362da8c52914351ef8a1b7f46caae Mon Sep 17 00:00:00 2001 From: Samantha Robertson Date: Thu, 17 Dec 2020 10:28:53 -0800 Subject: [PATCH 24/49] Update mcafee-to-microsoft-defender-migration.md --- .../mcafee-to-microsoft-defender-migration.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index da9f78e5a9..dbb50ab562 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -:::image type="content" source="../../../media/phase-diagrams/migration-phases.png" alt-text="Migration phases - prepare setup onboard"::: +![Migration phases - prepare setup onboard](/windows/media/phase-diagrams/migration-phases.png) |Phase |Description | From 64baf0f2a530948ab835655427c5a7c19d67732e Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 17 Dec 2020 11:54:58 -0700 Subject: [PATCH 25/49] some updates about RCC chat; fresh image --- .../images/quick-assist-flow.png | Bin 0 -> 25812 bytes windows/client-management/quick-assist.md | 8 ++++---- 2 files changed, 4 insertions(+), 4 deletions(-) create mode 100644 windows/client-management/images/quick-assist-flow.png diff --git a/windows/client-management/images/quick-assist-flow.png b/windows/client-management/images/quick-assist-flow.png new file mode 100644 index 0000000000000000000000000000000000000000..5c1d83741f6e97ee1d9833c315f300c43e7b76c6 GIT binary patch literal 25812 zcmZs?2{_bk^gldOR6->wLQg6aNhM3xlqFfGLRn^%Y*{8*#$b##YbXt}%h<9_*1^n} z3aOEOUq=`_!&t|d@qYC@zu*7=zSrAz=`yZ+?&X|wpL0Iv{+w_#6Mg=Jq6a}B5Wm4~ zox30q_aX?y<-30m@E7z&bKnDr%j>TGO;B;msTttIUMFp1Z4js=hHv}PKH&3#XSW}E zfj|OvyFXlw@VqA=&=VH}9qs#m(1l_2yHm8(DI~|5?NfkO((@#gVEd~2+8Y|KdmjF5bTzYk{sQ=~`v!&=boMZfD?>C8L)}`EB?zW365WXKb_*kYr14o% z5fSnkV17NW-9^6XGiRJeyv^z_R*4m=Mp+O`3&9sX3yFk1117Cluth>~Zj-Fzd zwXWXn;)c{(gfXO^B9X|20kr=^EhCeWQPq8B4mwCX;t^W=zRc|~D;padV8SycXkSQ9 zt}lFNNwV66>;6MYEYZJjt^UHkt!`gk3@_ytMqdP&3po1ePmN$)dL-P&+kE&8g`4&d z1FFTh%vVGPjGnrKFv#ZchRas`5D z$9`~z3M_Cgpf^)IQ{7A=Q@!Q}MiK%D`v6IY*+12?)!peZoZ2X$fo@Th)A|4GVGfL2 zuYBy;e}!d@zp45E`TnpjGtsHF&ngvDsUbvr!SFszqo;-~US+>vuY_+o{zK{IhXm;y z0fbyeB+lp5bm(GW)vF^lYBBx5cYw`(@m`O$zHUg)42(e^w7Xal#c1Trb0^qxUKr~j z_x>w~x9P(K1P(?Hdj9-*P|%2Zk)8-7hm6F?5S-%c94AAhj83v)Y;E>?+eg=iH z9I(h*cbM!~C~jcUO*Pm*;(1LA2`haAYS7z5g*hvar6*$~$Qcqx8?-{qb&=_#!}5|l zTOKEaL&m_kPg(Ti0QLF_rd<0Sjgc>oURL(9;>orzzO*zl!|2`RgqMI%t%Bl7^7f zEYg)t7#Z}VK7I`8ZP-Z66ExJu$lqR)fJoeKieZ$o-6xg9n{4l6zZU5pq=x4W8Zor$`Ug;Bi*FE@IMZRa@P z8_gFlUaUf$Kc`I5+WORViHiK414vO9I9oxL#Rz@mVfJatT=1Ab=yI$oc|C{VI<|60 zHAm!u`Ago@Wo2a^J1%h|G;1D|{M1_sNUaB;#(WhD?>Ya@qSMVHI>->H-KzUgl_#|p zrFy!Gt<*FoCL;8Z*m#vS^sv`QO;%P`K|x`#(%rhuF)E-QG|*29zz@E$qNT+N@;TAk zBLLZ`Ml+UK9?SqAX-E)jePKB{2t?`rvrj2Daa1UwD(?Y%$Z!gna-)<}EW(zPx4cA3 z=qtW6_M81wK|`c3BV_wafeU`B{LH^ss)7QRMCWT1cps%rO-|Yf2VZsBu1vjTx_o_8 zXTYK)pm&vBNR$tlf|eQQ(xX0Xl=KQHXh;U=@-wAwm_ll8|Fd&pU8KXtr10})gvu0p zZ#>{7qKRPYFY{}$`#WVg^++@>ZbNt2YKL%7vcNq+fih+UsEhvy4Z;JcOh#Q+5++GC zTVk8Z0B*zkY-V8SfsvIf{&iEZQnfxK4R(m!0C0`T zaVDIR_fMueW!L`RK!Swd0E-KV{j^LT)sV!ofBC^_9RZY$T5U3A*9?^jtJ^co7A#T3 z(LYoDX&5->>S3DxF^I$ot(BD(+p~VH((~S!1i(OH%h?I2$xInGhzr4)L~lvLx}-rst50FY6E1O z5iy|0eDh{s)KAjAe|`F{i{d)_AjIMy3b%Qe5{27#*JIFVv4B!GOuEF5W5tqKFJ&N{4iqTfpYKAD^@WyJ*cK^F+5a`gM|2-2Z_yrJ<{yQ@0 z^5y@P2nfXEsFS&!ZJ2P}KGzht*pzl9>E9CqbLpL>NUHf73Eo&=7@W!n0whyuwbb0e z@&~;^76`4uFChMvk1U0XpPq1ZavDD?dEImDb%CzK5!#^N=AY1onV{*me=HR*0Rj|0 zHAw!o-qmzzuzcrZ!S83!&UjVlOAFM@9Fx1acNsmr_s!*ooiH3HWAI&Do+mTJK4Uw=kECknR7DWu9o zFxpGQGxMli8sMXvZATmqi1{l1$-kqdr6sBVaroZ7ds>l9A&et^gmh;mGBPq$K)m!T zHa?5_^dE}yOtqStT7h(Vvfw(G*Zc!7qN@LDo+zxw`&Y9ikPe;j`K9njQ#q7t*qG%2 z8B>P%V6!>tzvnB#^D-W^syMOp>%4;=edWK%_V1>}ZbZC%y>Kb%nYqJVo#k99%QyGU zloQHF=^yP#fzwpe{~kmpjbfFYUSOvT&|vKGWe&Ag^3mRGN@GpqpIG$xM<{Fa-K3 zutIvWk^bR@eGHg7(MmyhI6D3)ve5<{T-OC9{KOM2TzCsM(A(We=68YSu}c<`kD`*- zMEdFjle>7hCd}Nz)+@gS&6{hV6S$aqP+mdr++kXBjmj0+@IA&&;AGHaRj3>R$0RP* zmM%z9LBu3mbnIm$EA7RGkH>q%gm_cTZpZ3RetOn1pRW7#`B4v z3`S|ZOx;<{eX>B%s=So{5=_NxaJ`qWA2PB7^cgrWeB;-#kGG>D ztO}eUoRm1&E84_pH0(L|9&A=%bL@0_uxpKO$SMwU$r zfA{8YM^A?_jP+wAd`u^JG|22wEt7OjHlVhuef%@FnKuEkt?7JAEE~OX?t)U^mjb|U z1!#$+fQ=v5v){zxU5`9~LVY8xcg+}?AaQn)t{g=D^iWQR`7>NddR6q=GLedh!^W}* z(2x*V;prrI)|h##UjR*JfMBz*A4qnAI~u{SH2?Iwd7Qn{re?3%h`yDA7kQ!~xjuZm zE>w`P?*tHsSe%yF1BoTppL^vz6crU|R#~s782YmTIY3$oI`sB&Fh2n>LE6tqM&ico zgNF}2Bkx_s25xNy(7^aZbvH0EzC}ift)s-4ACnp}opkFrR0TyFAk_r%=$-ufSN_ja zG*MPk0bBM#2r3G(m9`vS;Gko`ey=ZaJ#ceLV`Io`b-KM?_~6WXY?#qOE&uDEoS&rQ zbU%kNsv%HQi{3NuYSTt0beZ0)--2PzTJ23X$_n8B*9x)Oty-GfOLdP%R6NIY#%7Z~ zf4<-lYu^~nyhneUk&;oddQki1`4ygjo_Yc9WFLZbU**|oa6we(5f>mXF{c~m-b?9s zD952kU+~&Q@@Q0d;yiP6bA`7gQL7LQSf@O+qN~ESP4jSNdwEX>pMyp)S1$6e-^3oW zt1CWlW6tbY)_Z>|+~yW~Qf?~FAU;0+>WV)C6U~DzEd`K*vA-2z%C=4_Mtv+Dozzxn z-In1*JpM)`yFb!00GW}CD{#+N@^8+!ZMaD+h=LsyWXzagcx#T1#CV=i{t)h=)IZ~E zy?Enc?ewR$CB(@k>^>eNZqmZ(UCkI$V@msC(A(pN376jd$xZ`7^aoQuI+NtK^NSvP6&&7H z6fk*~jy!FECH__YIcqDch`I(DaQ)!g9*hqpzH;UoWw7&sP;vf~#Duo;>{C>n&`L_IBq%fRo?og_ z==|}b;RP8N?x4T>WYalKiM(2B8=DCM7iP8DRT7P%f+?EBS@ff6b8}2gk&Fpt`3XiJ zm1>%$B)*#1o}3(h?YNTIo94QikJefb(`S2hx*;uyra)Qa@*(w`*-O+arr;%db{;Q)H|uYA+>l)Ohx;w#&l?8ou}6;iSO+&@ zK_6!F+v`pcD2!n;*{$f_AI`iq@|ALJ)JYv8vG3S75i}=tqgAsL$ZqUKY3{whRGi$- z3+PQ%%01)hFFRsT=R7<4(&8kkVXb5`U+&)Hg3!+QdgSmeJFmxl#>Z%Eo?#^`YdrGx z(G3yYdyi_ZdD(ulaiOo5eeiJ6`D<;1UVjA#B;t2g?ksU~0>cdtNcfF%HJs?4%l-a! zgcPu1mGilzD)AKY-ZhX8(g}&|CtG#jTWR}rYbLonEN#_lBAqaBYyMR}DgC45cCwic z^4MwX3BC_bj$LshnSrIs@&dn%ALT?z7-4g+4-X{b1oN>qdRh=4Cy3_85!GUY8V6V7 zF$Dhe#GM(F9|8nxW9Pyc-yt9tD5BJ&mXc*-PF){+dN1c5epDe~eZJj_bNoXRc(cuJ zGU4tg^6m{&l`)m=-I^k$6)yfdQO4>H6LoH{`_}xhPF%{k9Y)X@5wrfG>HL_)&jU#G z=W*ss=g(kKj)2eE;D&`2!ha&b<8>yo(6P|~Mo)yARhq$}TA(#$WHsu4i!9bt@jy;w;CE4;}eMm|>OJH`+v6P?mE|(|x1% z0679OK`BMW^Sk2B>tPICOc(p!J)xO|%ACm<;#rn^_kn0x@#{}o)P zv%Tt_^t8v$o|qVEaeSMPUDF5B^>176^URx^9IYFS-REXFHpVLA%_c@q^q5P_R=PEf zx691SF16n+i_+4+Xw_i3`6kufBk&8M`!$b$z){!l=KQZRZ+qL<&djVLEM)p+j~+`w zUQ~&MJ@bHyOQ?E>MY`X)iGkO_u4DHv=3C7m(-A(#BdO;q(yNXa)h@k}pEiHtdLO6= z9DFAi{NfR!-~j*X-|!L@yQEN>xIW)Mp5*uth!6`5n(l>FAh`YjA{EB_+_J#?v{C?P z_(SH>(k|=cEsay^g!Tminh`VmlLP&JXy|4Rqf#^9;o(q}NV@Z?F ztj9M#|5DW5IZPvzbbUjJ4x(gMrX7M^6L9l$K=J{;Q3>J+*;Pg9zpA)1HVw&IaC#7_ zr3}_#0zijQQdKpb7RQWuT6Du$bu_CYm)n(+fqcoZx@LXJ^+pyhYo@!I0Cg zF;5?Ou1M)g5&pVA?Ad4u-Njm#NAETL!GL>5X-zjUbUkSZ$4QHo=$cAfo#`yLtzC|0 zNGCwqV+lKt$7+&`iH=jGoi*8fLkP8mvwpfrB62zW}^D>aO$7BPz8F>D~TgCLc0M*zV>U*g0lS2Dm|q5lU(vv zQ~|uNf}Q^>#x?*;+msg2LJqfRjRbW|dta<{JW;&uc7?FR5S&lP&jerxW48O3r0>sn3)eaj_{wsW~l7z*3qGspK#|NT# zqUQfKi?g~IA`59`Z0sNMKKrQ)|g3)EAVC3hy=Eyl6i)YhHVb&Yh^fO75HWMY}c zD{V^aaXH$keniW$qqG+$UkE<>@7W<@aPsU{vioM$R*3aAXdYuco!I^KeqfUZVgYTp z%9D*vx}v2cP=JU^DpEhqRd1y196y{70s#lh{yjby8TY;=2+A7 zE!QOoM^+Gp()YePBK|0D#>Wo@=y;InCwrXMnofS!?bF`Q#9Go*supwPgP8KsJ6pnY zdtbFfD#J{LOw^O|;m0!7+YV#~ilnJ*XYm}-@^yZ8eVZ+HXLgzCXZiVY6uh6*>xi%+ z&lLyMu6Cx&KVS#DWZ?foq}Lbf>if^urD+7@9xFomYm-$ zEg|@BuySlEZa2ltORZic;*cy9|Vq_xAua_gWan8u_FhWNqSpgvP>dLh}XHmx8a7 zpw-6%lXM~vUix{V?rY{Yb4A3XcEJP|#(k=FV8MvQ9Tu;T`-r4gD+SY+Pydwg5BeY*ih+Mali z{e$$Et)u|fa*gENxJJ0ogFKo0!~ZYl(R=VM?rW-Rz|Ni3XfRch1jq@k(GP4VeQ_8; zYt)KU37LIRh@I+I9*WJ|fM|Ms78b9^)hteaf~~2Hs75kci96GwmsTX34F5`~l3?xa zV*F<~^ZwIP0*dwtC;gmAiNXh+UxOCQdQ@ysTgA-gueJo#`jMfBs&ca1AHa8$#_qh? ziTHl;vHHONFb1maSL!*nk}sFr3O0CzXq{8T=DT;m6kYpl2}g#D)Q2|cBOybk7mYFE zz4WbZ6ii}CElW`w!^@N7hlqS0$bn88iu>XvH5AfY=0x?cB|S+)SbDln5<3Sk3blWI zqWslU7ITA}^siIPm(QKxm!53W!_Z&7j0q{Ebai3oJWul+rir9!t-lvfHv zZiif)JM~Mt4vgzo5Nv+bt{u3prn|w`K|C*O*lsayE_>xZvMLRD32+!ge9|wjggR_; ziL}*Tpulr1Y7d3lZq87Pjl4fZc|%|2abTp$kI*f^FL?e_L-kLCE_O4%Rt(NInl&4|>+LMjL)!nt zn&8&{wSjP>^*I7RDmBT^u@;YYm`5n{p9)|89uXyqW-FVXpEbYlGM7|IUxoUxn?uRy z`ie_0^pGseU1w?zz(G$L&-KOOg1ijM%dc1^0M*|utGB&qh?V-2Yf4#jq##Dq*Gy%A0(=KZR8%`SXNOYX*d99)h(`b1EZ48|Vl!*X;R1v5Aq;KCM z{0IJnX+pj2Tk{VaCb(JLFw(kT*`O2ruPy8^y9WPfgc@lowCmO}mR1+)S=NZWsLb|Z z1hvTj`8Mb?5yk?K@wfOEzYhJY^9~t?{pv0gli=kfZDE!Vue>y>LTDf%J<;(LP z4bbiGrue2#2O!XP-Qd>G91)rOW=QTVkXT&-y!=9dX}q6H6olu?uFuR*I;uRHmX_wr zcNwT$am^z4{ zHB+~+PLsBT=V0!Ck^OERAWA3-n>T*k?nD@aW(8pT*3}Ru^Lfm%R9SgSdeFie@g75x zu%1KaBuh)GttyAZ-!jgL(;CQ^+pIca>>mx037RXg#fod_x+sE><*iKlpU1y`{X!6K z(o;0%AE|Ojda8NgA8~6|VNrah8=PVy?tbxFhi7e=CAF z3-cKp8#^rO@wX~6#RVLTyDDw+#Y{DjQsHT?=L%u*LT6TI2TQq z`7$eLjh_HG2&-pIV@FKFXI_a8h?@HM*hxd(f2H~rw$uC}QCZ8Z-;-Sogq1q-_9Wuy z+9OX=x&Nwlj4V4;q*3sEGk`UDG6PY-s{`u0iHJDTl)Uc$ZFp=YGcf0JGi>Mc;M$pQ zayMH4XTMcuwF`qpV5b7FT{tzV_|H!G4D^3xPD&)hxBU?m!cAM#$(ApOU>wb28i=>q z%K7X4x24@cXRq_%7!3wk-ah{OHu9+lI=2@BG^d`jLjTse=L)jGIJcr#8PQ)7ckQx! zlH%%nezqu!E=vtpZcQNpw&OZ{)g-ek{^~d31o+T4Z^FjiuDTE^tG8GmbiJI=tiIV_ z-AEqV1$ZZEIP$Wu_=wP}H^ThqR5?4poan!ZpNSEoRZ!KOYv@k*^h6-NAZrZl$it-n zt;x#J3%8eHCeC(-epddidZ$n-CTOz>wXQeCI#*ZGWTENqLgJ z<0mehke`>jE2?;Ot=1dW?O?zS)T4Jx*p>zm4v^=;J|@+oTBoiyVX6K$?zN1zUZJ(x za`z>Ybj&gM&AA_fdqHN%eRVIy7ZjhKokh)j(f)RRv1ZC}sudO{p|5rLf0e}6jY!mW ze-1yT^rtw^v`4uqE4m2Cmr1i*@whoYLlJu39*|z=L^EMUvs=}3!8jKdVEgLkaw8OL z>STO&uE?k!c04)nP*YW-#BPMgJv=KK}DE^+epm`9T&4WIy@|r;&u{u;u=ClUEsgF>Kd$ zq=aO>gnw9|SAY7Z$J7hfRJnq=xS%YiyY+|oF^?~k*tOc=iiFgT{&b}lTfSQx)I<6N zP0)irq9>w6`+&Fn`?lXKbuLhL*xROjdZ&cf%z!slK!~ET^Gz@XLv$-YzZ^xjKkxBl z^fARi%Kp-rc z2;O1uaPUZceDC{>TrC)QlM(|wjM5a9=$`}dhzJdLdW2a*V z5!?rXzJh4)NRk|Zjc!AI(_zoz;L5wde{) z1I3jd!1|YYYFfr*_7&h!=j<$B57*c3ZNW$m}kb-0K zHfZZX=s$DsG6Pd|kG>!%7T0@K-boo#>H zi2r&wt-^f33Zel8t5_Z$zYDE3a*$3^flNntU>BPL97xhUsy9e#O?4Q#!zPkj} zgEU@T|Gu4)tI5u_+LBHuNkibeYgYbsQF!UuqQJE|^e#@agsyznAql%*8Mz9wE7a*V z&xvNrSlXgj0AY-6y!a4#{~E@5nE2<1W`}<_f4}_EV)F8OEv)!@9~hn-p_6zwhu|1rS9{BE^B-NasPg0oy)8-S1U}kGO*cKoG?!raj9d9r zyIzI+0}j(Ft3(Qd%jCLU*Y@I7sL+~4ExQjf?!JEVU*FaX%G?HWHu7vuvJl-WKXCg4 z9!m7Pz*&7dr*AJEQ5;8}OOsEv@n4%QRK8Ua#~E<~fiB<05EXs1;Cav1`0+&Kq}xcY zWyND}#Xv@m(}(q61yyzRnWjcIh?PjPf4|ZI@JtB2bHZS+s=uCJS;1MFjxbhZf}R73 ze7e9E5;CIMp~~)tXVFD}UB zVqFdn%Ef0xb=PJ9(t-|mM93!{_P-#|o0xj{KM&2%u-~nG>;gPmVEAy`#?nU2yfew} zyaGiQx3fCMH=_WaUD;v%D0JTgGUMeHkT6NNv7*(yT@0=;)j{&Biu!lJ;EWPi z_z;UJFEci10lZEBeN=nSfXC@P(~El1eMzsqg*0NE_9$&L%HmDsS&)YNBAN1uF% z==hmgnR+eCgYbu5^U23*@oT$(X!L^?l6tAn=7}#>K#UN5h7l1DtWybUmeyk9_0fS_ z6}>pt{gtqkXhwP!)3ha>{I2Q_l%1zMcN}D%IyL0DNLsa_6 zxc))mibGgph#0?WxbkZp0L|=74y`Fu^bG>eysx}f5Ye9olNBeT%Hcem#mX0)d}B-u z)W~-$aBk_1{Yv#k&dEicK`+s@0{4v(Y_vp>#^O{?Qf`a{bvGFc|lr$@5Pq;Ut*%7f@{K^ZJqQZ(R5GZ$4 zNb=J5`yP_R#z^d<<%gbLFuVkNE>NeWUI*qgbKbrB+`9}Psn~11E?Lnk=qIR$4qoo* zPNG78>b}fmQ1t{N#OUc^9M{hxMV+H_ZJ%p^N0G#a$X<(E;fzW86nfX048EZ&4{x2! zMv5EwEU~A%)lirnpr|miIinFVzbqUDF%fkGo_nYr_`Iao>Kbo_rew1Wd}3i&U6c&N=U@#LLO$zm*FLv4yv754(L2 z8gqdixfm{{e`Q4DBKg}h_d=*~CQ-xKD(&L>{iv?BhPlI7q7Bh+W=4`d0RYRLc30n# zK$cV7BvsvO-Icl-j}q*fT4b*Px60OBrqL9*p8%xK^uMVNI{o1$Q-r)NBGfzVjS4&v z6>@_A3`aKeT9tDcgcP42WhJ0epRB3Jbc}U2Vt#3FyZiq3X%CB?GTyGXX@d_%sk%us zb@GPZVv)Hh-7jZ73e7qPI*ebF9{bE5p^3G|Pb$dxXKqP`2RUp0&C2t3Nq5kWf^*(?Y&auJ#p?EH%K*$i?+?=^T>&t4UHWoadeToFU*ed z1sXX!e|F|S5>?%$nyKpg{-D@NCbnI>Dz9YUM&Hqxe-tQU*3#7n%FQFe)WFhfIijYT zxa`a;<5q-+0nz(JHC#$7%EEelwo7&JC4K{zdkx2a&}#h_3^C}%$Vu87lyLa1|6l6gUI%St58wvN+Yl^>pZ<5#@A6QVbL z`?vG3aYu?vlu+$?FGwFctKGefH4Uk^R6Cnoqqh&D84G#iJA0V6R=;1@Got_lqc2j!IaMUBR%%DzuzvK7reg$QJcu!y(!Zd|F+Uhue=`^1|nOBBypMVs^mmk3$i9F-y^1;{= z?J{e!d*pI+XvfflAr+~b*N1|>f}&P}Z~hxjy2;>l^|zWE#ykIf z+B_B+@ak^k*tE(C+m9!jCr=&5t_MM$4Y|!oYnqRbEW4$eT$^M5bUw_mKy^%8nOdT(PGovp-~d{yjTxNHt~d$F#7AQ?I^ z7y&Sm^(2UCFI) zG-=N+b1jmrsoC0&)wjI|k_rK6OD(Ib? ztvG!IQVWg1mHe3%wZj1HBN>^hA0Y*ZPkD!>(s z{`XhA`n97pyyiCL`)B-cpy2Q?SW!ewcM9&FJN znEY(fHXyDn;E^u6BBFNaq}Gi6L14qX)50;M>~oAq4-r!(00p*6ZvoKb;@M(ADoKwZ zr-qkEUg7g;4|`6jU^i<5J-fJ37a-6BLA~-L6qezP;ydU8asLWr{Qg%7Dml-5_%Ck( zl-*r=C%|p4^ne2F=U=qA^;|39kcgwbeb0QFN99OsBf?snjXGd=>mJP@y&0;{mDsIQ zG~qEkXDM(D_s&wOB~_|T(9q8a&`ieBnn(s^*;+#Vk?e7iHL4O&BjG9o9=>u^Klo{- z6u9!Zahef~OSv;y^Qb>^z3tO8P8jN1B>pHFDechIzJlGEY}h;ybHT=z`~FP?BnV)O zxfhv4kgXj60fxrY4(cnG)UgtwWyDPjVo99+v+g0%MyBq)(x!->Yh(Cy*y|aQQ-`r z1e>CLqx%A7@PtfKT1tvr@(i2x$HrFScH|V*mgR@LK0>J#(O(`4l+4_w5a?YcZB;<9XjzVm%ol$EFQReK&`U{IvfV)ly6inOJL&z+Gwo_h3i z6iHQYXMjWM+FMNf`RdAHJ)~*ez5qP>uaNXkR@4br`#zX7i5ZIfg9>8|rd7Y&)F8-i zS$kzSpYFf%#>@WeX<(P{0g=UH$#7<_4}&DjAC`Qec-N?(G1- zyMF}35KijdAh++Y^}6!Id;9r45YJ6)mDr!MV@_MY!EmQG5fjod?i8++wd685w#$#c z$T%lYk-vCxexRaY^L6&2ixga8VLinChNGk7*hl5l)_9L$^&5+lg0>|_JKeaTIKcdJ z=(!U`ZwJDeX_?y-trkbgP`bljYV`@rT}JZwYELNaVW52${G;kILqkK=$(lcW)9IBb zd!IP^XZsTNk0dZZEJhzpq_VqwmLZxXUD*7&*SX%APpSc{+~5N_XAkcP1uU{*nk!iT zboA%VI@)wXv+3HFK@0KfT}k@9CIv@i1YHlpmb;a`FMU2a}d-8vy?5U58$w zTvev;$F06f_hhxLJ+~YZg8+_$hGJQvjXy3Xcf#Dlr>tpaW+qBZxh9lvH9U>EK8v_q zp3pBQo;tU*N6bf4QPF2&id>0vu|`Z?2?%g+dL@0_gtV}J24gote51z!l@nNuCxCqV}UJO z0do~uwBPNK5SN@kx@`iy^m$NgHRz?ApCV%iGTa6$oA;4kd`wI%;S1oYV+TlCYzrhq zsf&Q-Jv}{owE`|8HIGz$d{QgX0_p$eb&ciFf zUS@jqJ2hq_l-suaBPfjg_^ofXOHmM1*0-RIKb^k+M4dlq0{X2Upx1az{GoTC!71+= z$K1JH&ibV6OK?o=F&!pxFa2SNK;%v0Y{fn4S=L|ntoy)K{Ra_rJFJn`_3ICx4aBDM znTu$Wl->F=YzL1L6H$wWwzuzXzqqzzaeb)}~Q^3wZseTJ6*3|`o{834on(0#7!gm=$nu-Jd{jy}T?2M?Gu$s+uuDd5oO1h}F z4ott$IfvN5S3R1#+5Ki}v>71cFO(I@08!(QX_Py_sV4W|zx|0y-rpNh>E-fsk)|$6 z9Oh$_n=<9+$kyyK2H#W|18ayS2%Pct-VYmN%{d+GS*TOC!2Ri$H2!Yrx_y#eDOnD5 zDWtht9RaEpPXLclabTn@_5QgP0foPe^oVFs@dl5$s$2V0EYS&HG*s#knarCH2ds1< z*!Q`H`o8!R(QL7CQKyAYR~b>X;z4T?c_imUCllO5rC&D2$ObLNcqm9^GzFW_$_3qb zg#Iy^8g6Uey=_Boa_a&4&=eC)mo2_rN-VcMUSX~qLxbu3CdcmW( zvZ;_b5_nBO$r`P49P!0q+k!1;BTKf5Z(nfEyme#Q{aoD&S5NI`HyPd87OhrrXDLn( z(|CKC<@OCltw6{sPdm2-{MvSonq9a8^c?Z0KGHKyS-7(lP94Z?jec`2Clo=xuy`^t zUcT0{qgV2?kz90}Vc{a+{pqQO+mBHf4dI?~eKMP}PV;Yq1~sVZ|9t6K|2Woq_yH3} z-wGYn+@KX%<7>XE)vl`5XmMTMv#nW`k9#%?FuYH5?wk4ELK0JhP>yps9WznfIw20 zX||}fT~uBKQ6!d|OJN;tJ0EP-^eoLk*koSAdJe&Q^Rq=e*^}Q3X4}JKFC|ER=A&h^ zz*>l{yJLts%YM>VJgHKo_KB$^-}d|OXpWwK=&wz_sr%m74&c7F*UYq1H|_6jrI6@0 zk@K(Co0^*36-d@6Z{Xde%^$jBdV}(NCuEYoh>G(UI#$>M9C~X}UKF^u_Jay9y%qEM zMUu;t`wp9FNR`---qz{dsH}X;HvIammbw$Jg&l?quMdk+m!-!u&fPAP)}LER8RjjF z<=l{2fj>8X@cuH!HKB!=X8v93jle;rBNC5~df#U#7p^YwZCUR5as!usaKqx^yO|=c z;Nt$p&!q#~3$3#*-=CJpSVsx$x99{o__M!4=c6{{w*HZChLQ7s1l?{HGhkm(5MD4_ z&q1hUo!{K}#TWAYtdS&rC7ju88r1_dSX{7+Th6YMTKhEGKA}&O6HIevbqvK2WK?f> zk3jV!##&nZ~b=HZXWmoB1Lmr7<)XWB;y_8f8`SZyICPN>&SGHmYkNWv z5q$c6&)Qad2c2UK_j=QU#6Alx$YDhS_qK$%1l-nP3dp4dAQr|+BOjmB`QX)ydPb6$ z0)S`aO?QHPC)zVvo7;X16dP7EpP@L*SykdQ#p0qiSh=DG3NQN$~?;@*Xanp23&83-dRN zX1ISw#Wp`Z>eN%Ox=Lc2mcFSg*U0LYI5_LJyiE|Bsv$;hC2>3HF$)Y?Ui(%moi3dX zTIfE`MkUBsR%;&mp^p>_vgwWx;A$Y?$?JOTzV@>#)8ow6mV%O?S;bppx_f~B1ki$m zg@sxW(Aful;IVF>@*PiRzLw87NYNK`d5!G%m(LwV zkUnfgs|3nE3&&m@3_XHiXR^FjtfSMU8xfa|(3*djIh9*l1B}0sX}<~FR|sU))aK@g z!%zq|HhO;d{BFGWch8RrW9VrQ-K>t-gIKo{d$ zf&?f3S&`3{|8iu}D$9_VT~R#}h_U^s2cTgKyn9>C8Jdn8X2uC4PfcInQ8wgIC zgpywd9Z{xU5f_NS5??z}eNI8Z`1jU|iB5A3=nJV40_Ql>LTQdb1Hr8)gscdty=%-O zann{!oEG=9F5W#7-IxxJp_Hge%}oLQ6a}+Jq4qF82{|I)n~<*GWo!9en%O)uR-QnD zSHuRgru_;vPk~aMrG*8M2~@fd=A;)tE%#xYTF7SWFkb^Aovko|X z`SQu!790uUW2+WWR#knSwKn9(G#0v5!BvTUH^&3Aikw}RBO*x$zNI!aDL@een2wUj;R07icf)29l;YU7_$)3z8l#D3j zd(*v6$jB*;pl<^OZpbB_Z=+SuX5G;bi4l5_@TW8UC28z8xKtgc_sfm^6SSxxkpN3= za;oe704ed^4n+XczBgGK`KSvJ9ZG{d*;~afvf^sj4$b)xN$>F$%N1TpEpHjBdz~SZ zQ7#&5c2jh@MR+pPcv58nOB7@ei~%(*V%^DL&5qiB`(;+`It?gY#jlFJ`Wm*2OSNgQ(S;Pfb?&7X>FCVr9}##Z*2~mSNjJY!xGPJ`porIql*KrE8QUD z5go4(WIavxk&eWXOyc=%q^GdjnPWOgphJK%6E;eBE~tz0-!EGc{t^t&-MhMCHonO4 zE#E4jOO(Kh?h~tdK$ihFgNNJn*JfqvJWub<86&uTx~?x8YQtR|ffIa)!Ka{BH}?@r zUhA1_Id2urqOxxi9al1m?pFd0-bFJ~&-$674{qq6bWh#>;1fF&_tVJ~It0{0REhi! z4|+5_edh#Q>A+QgPa*{FV7IrE>8JeHVo5oW{^zTKo6q&p`UUA$Z=s8?@gI804?_>s zhI}`oV~GZVhesqY5HC|A2Ush6)f~~Ty!(qzq~*81Wi-js`$D=@JZ~=UY(>JL>!v%^ z0fpx}O$s!6+)seaEC~p@FZZqMfjNR$;__6({cAsK20|`Vl9$wzqOu-cN+1HyuoebG zp(FZC^K+Za@hz(n^g;CVM->|e@|PmkIvc6bli45EfPzKDc>Hi&SMRCmX(h~~exNLc zUL_^$Y{=qR(iQ0AmD#y76B83?|Iz-{{*5IHv0mTnC}d=FWv{QE*76USDrL^^k!4rj zW+!tbUJKc!QU9V3$j=8agEESFgrLgsk?nqcbXJMH=Q;{V*wKlske-<0Y`~LD4S!eu zVXR6ictMBNl^3{w0poacmS!cuqMW5$J2N|hZlCJJun5bpYUtVDsh4Wvetrc&r$`H_ zV6&D(UP$=5fNpAavWfqCd#4b~C$>-4L~ z3ZfZJBGe{UP+@Hxe0v>Dbl;+G6L$KPI%DP zRPy_OBwWw;BE+QRL}H1($Q(-re2eqkMEdXIS6lO@L4#C27Yl18t+klCnvX%k5Gd|? z<<7)Sk%TsHSncwlaXK5V%x3L;+&Dk*KyMdOyKG#FX8fQ&(bMN=dslG%D`~UrXnl_J zn0zk~sX=JMcP4^Dw_o|dXMjx|NO%0Wc<6=+6MdeWp=$TH-OBA3b94OZo zy?{!WQZjo_a1(+x5xi}42T1uRzG-y=e=mKe?~_@v_~6xz zkRR+}MW9c+`);K7wGyu>{~7qy0pPAvCoMt`#I3q;FGHa62j<;%=Gvk!{vRod^Pd5r zDce@@}u*NY8??)Yg>@?zK_%oH4x<~w}k??9>+njmv(P=Td+vW(k*6ERh z9Xho=%RW?hy*{;Qwd^#-^*ao1KXo7w)BC!pcs!CMW9FcZ!T*pMNFfb=M5xT|b}WA_ z+r1Jl+b$Q4S*~|_hmpUFpBu!Wl!#U>>r?H=>VcX8rnd>CCOL)6D{-X(uD_H(od)vI z`!0f?Bf&5q;Bt!5f|D*O;4orQXYG0Wb}QjA_Sc%?u~T*MkNJXuZn@h?B1=+8lR}H7?6PGyManjn?1q$m58WCkk%@R*IU#WGa z)z$Y)_}m$(CW{)~8%YHyz%+UD4K00k)E2yAeRE6jx5s{DH;zBxrs+sknw8hl@Wm%i z2D#BFtMNu?xZAofE4QG*UMW~7STfk>g|H@SWv?ZQ1yoR(lq{y6U9<2C>5tpbg%#R3 zy;5R|bhZWub=IY3)7+#$KQTq;bUwQ6=Euk>kb#NBa)cwO$OQb2qkB6ar2(1>?@0m9 z`qo6C5Q&No+}!FH{4E(A6}u#{8&xE0V0x>(s#@iH&$=#J@5Wbmez`SwfTnkB@icav zz0hZK7_oWcmKtB3=LHeKmB>@pr+!yk1M}I)zc@b5qTDonlCxH}(1r~foyU*S4HmT{ z_YjLNx)1%;+mcEsqGTM~xdO5^Q>d4J_K;*dq!HHaHGao98R918N?p~#*Jv`{Ax>82 zTnW%&(X4k)#3xgH~vd=E~xuz^g&?UvXJ}3@wet4zYxP-n$(T6?$*JWb(u`D zKVE)?E?0tyyn@`=(`1#(8(XZ#9GCAAC*f`ZlD+2WZw`~p)lkttzVS>7Zx+Z)|HO}6 z%xyrozmAc^1*DI&KkRcVYZ{v5SHfy;r&>Qc?zOgy(C-1%Ia^EL)i%hq458sfJi4ar znN2-6((l~2QZ-)shFQ%(&254js0HSgx}Fsy;xnE+)1n(!1fQ}G9&-s6d7O7zFA0?K zYf5pYI_NB1JUn~Wl?T;8mE zR~6mA5Z2F!Ia-!DBo6KocC8K2{m4^mD(yN@ zAw90?8=b_{BSZLLO8ler9oWbRUu?7VoL2eH@7-~JF)p@ds-4zvra{?*Q073?&hHzY zu`?A1N6yP{B5GdHd}uiK<0&2FdXlNx0lH~-*s6P37_`dh8$_X8GvqcoPKMA|-WUvB@e4{O)6mG95{-k-O59sF8G|DzZu{cYRvKC;?d*K~Tq+tc`U z;CnG65kAs~n{2AXPn~Uhah-kX^l^g*Tw(61;R)rvs1kUSo);J6n!qR(TP7Rt5^uh9 zLIiR$90?5uFYT0=jYda5k^Q{7R9DjipF^@t#H+8est@m>f7?TEjM!RLvnBDYRu;aR z{6u>ZI?^6zLBr>WEky#9mjic2K*xWaGpjtC(#;5%_@1HMnlC-6>0Vd9Lq*U43Y+K{Wmn}9e6^qf$ZYt!R_rNf3kROo0OXurr*efbs@sve78(f6e)z7q1_xc zk1LY-wn{nKBm@r4MuS#c0$VwmgO39j1Yd5D_!9&UUZypXfmiGSeEMG)58>+ zwH@#ZDH9;@;a1>#cGrTqXXtc2bIHc^r6#!RJ&ldYhz5!*FmnaWg8_0l@QPntH1^1; zY{k5r+3E)+jVcFJ!3Yw|e9q9_zF5O0-A^&6zbZ2R?) zUVrx`;}+#Y%Gub2n0b)lay)d|hQhJgbBp^trd=IFWMwpD#O&Ktu;c;`iB^ldaWhs7 z1S28#BB3u<5XGI#uX&)ZSH3v_MAG7dfb$s9O{j^aEyKq& z=3n}yUs?lkV-Z%T&wpf6pc4;cZnBtl)&+S?&cvQeX#95YbQ>L~4Xj6ERQ}};pJBgU_y6=G<+ck$%==@NOV_4N!Ra@z&@J@b^s^J$ zmr4s?bg3FL=m2p8Q)E8waXoKlFQ7NgSAv_B;ejl+z&l>>Q2pwEyIKEPWXv%LoML0h zwvef-*bOoquyp7pVU0NZ##N^?`J7c;j}F%Qrb=!%vVwfVPad=CBi}p5zGp)W|23*R zBwbm;=opE``7T5IR#(u~b;~GCN_0ZB{f#=Fdsc4=2P$sAso%UdxEm|Ga%n%hcI|Hi zrFrvzm{R(jAiBzJE_AC(j1VWQWV|H7=zHW4ht_4lM}t3+mrICtY!1pw8)31zT4Ve9 zf+tC3>BjDwV+>9?LIb%(s?xAp`kRo%uvuSTX*Xj8T8_UaSv2(mbNBLT@=!&kf&{VP17b7Z-^xu z8DWGsDtc6OEXm8k^#+4&D3#&I7ZzfZR!+Ehkxw6~4NK_PYDddH-wjR%f7(_pjn_+W z?*=;|_;F9l1P84nA5~g}?B4_r4HlFjU@B2idZ{- z60-ENi5ux<9?CK8WdW)~P7j?jeqy(uqjGpca%%Kn#}B6VNk17K_@m}y{^0j573RZN zS4=9%UPsvn#NIN>#e(j~5S}MY_VP{IJ?<|a$C2(VvpKa)a7=7!e9btW>uE}^Myi)y zlonvPhmoG=$-ei@vaKXY5*XqT>E##{1~a!}Ekn9kCW3S=`&^%@iMkcx(wn1!$k*g&@FsLVd8}M@WM9rw|ZmNW5M!e&YN7TlzE|BV|S+*WJWi&b%j7L z7#u%*B;SwC!KGK0QyGUd(4N7msOD zgb2)#$58$;^TUfHdr>#s!zdg4IV``%qbM$%_9Zms?0!2sNlRd7jO3Pz@-~YK_(i9y zb}8%{!&-8iE~wslpJM-59vPCn>K*ctZ`TK158g8OR#08H;MQL0iRironhr41$y<{# zX8YyBeN8mvKa};Znjbz%)!Lp7NMSreE zit_u|D$~y}_k(hqOKq|9l37@TwWUD;-sCMx4!lKl4PVi}_XJ{R;Dhed{T20*bI|6n6`r#sN53BC@>3t3naFz1%;N@7az}ss>W60T}{I#^; za-cAi7ZeA1O!fBf(L&1^pqc%)YmALKuQ}?BeCw%qs4amvp=bGZYvdjfMFqT#Vm03i-K z-M4~-m&~vfg!}4h7$FPriz<+QuwXvrWpRpsg@TC!L^?JVoXtoCd-l{DK(5*bUeMBM zmG8f^RWjiZT9YzO5f+Yp3-%@N?c707TsL&4_#&bUM=c0Mmfn zCDzoq-G7v95}3QNk{?hy3@8moltz%}V4gdy7nViMr?J1(@Xg-=rUUGxiTXOaLafp% z$SuzCY$0 z57hZyZmfIgrm!c7*+ahjiFpgBnuOL$IQCg$ zh#=q%sT2%>$NGuwS2UBRf&jO#s4qx~6Db4Hk0 z_I;JTUzVY}`prnhW9AY293Ckcf{f=Y=lw+cC8Vo=*uJ-+K^iMQ7J@@-kHHk*@mJNv z1$=q~<}L3$SZ~3!__<7wIDF+CoLybgnNc#I1~33WZ=r{Lb%h;NQ8KUmx0V4+#S>U; z`9H?~KWM^(6$~<{MK$Ap;(x-qXPpa}%{9MrqScy;s8@qz(<*J_6G%?oMg4js!_F^N z(N^q#+l7$sFno3x5*Ek4$!4?BMggZ#=T%3Q0JZ%Gzg1={P2aRoB|#^(L46R2FTLZ8 zCtaR(08j-_dw7)KWr0h+2JF%|GvPPC`v2i$CUV@U0BDbE6K{h&QSbhfqR{4Lb3zNk z;?*$Pt%Uzp>dngo?R}QAdiIbeP=-1VR+H(NR3(a7GEakW{v1wm59D(|H2)(?cWTpK zu`){4wXC$ZELZe-4FQZP5Wu*s0#F@!<$rH40Fx0kZeT{?%OG_jAQc=CiTv9O|1Ua@ zfpdgIR>sl2R{5?l6vBGC0MOrno{IhVMuD^$2yTZ=^h-+G(}tJ2r|(FmAp^#6c{2bfiGKs_)xYPf zvH)L=a9T1O2&YF%)dWDxkprm3S`pB$|MmPt+yUTXfFv#R{08Z536_5CWo_D+#)-n; zX1ZV+p5c31*-DmL(Ff_DPs#s2{AtOiIloa1fue)3sW4~%M=zd0+ze$F?G}MU2k)wc z%9+IS%MnkPt5#|?R^sF1e~?g_p8juRq0CTgER05gFchdQiBbAAUkvi>V)<}c_RNv_ z$>OiIIJO==j9F+#a&kY&f2V*vGZ8uGbk`N~LE_LA5|-FCl^e{uR^~ zxFfUEgWm9;NUJFY6yH3h-5HX8M>44Z*(?bpzW||_G&1ZK)DKkp3vEiEY&l2nXFG}a z=dB}>L7K1-f*H>@DVWQz4fO-^^1~|wRzfk zXnd}T`2B$E@iSd>{!^a!J{KIz3KUHRTtQ@-4w+3T+WQhFe<_u<&ZYY!KO?zC%WCV-iF47jf6 zGK-bhKXANUK)|J59o|^AzsAU6SiYgLBiPuzL!)d;uO92n4pbo%` z4GVT$i6&I=k@&r$PxBktMJ`d;IThE%G!0*=GywgDb?gTLC+{B370JETpT^2UU*_!q zf`V|j4r1|an+*_FKJ~RI&4tgc0M;;DNG*_Y)P+EFmFERaXfFUGS4^WX)fymm{nVAT ze2I-Jtgt$8E1CQ|_Lf)NnwkkTs;S+06bE{RSh|~2X~rZF;xmV5yc;|Pia{8BEsOaL zDD&|L_@jw>FCu7e$l0s^fmpsBC>$U#m3F@_1MXmRXZpIC^09i0Xj~=aOgLa7KTVSBNh1rEI*i#pI=BmMtNFpS~%;| zAzSLD%V=hv>)41!qro7;Z1=`gvEW7<%jR*Gx(VRCRlP%9p5GkINb0|Cy&Lov`n% zZ#!Gw8#+f)LJM(Ub%iO`JNdh9#?-XRu(EWwX7SIjgj`H2ltZ-4HlIucbFJaadkUUb znDnx8S8|BuItT88!N5p7j=f8e)RSXzwQI7-=mT&LLgnC(Z4(g=q#8h8XKK zyL=Sq+i9)!U5|4{9jnieF~rh$n%ge$^lFFN6*&wqr~1IzmqslH^5?|HIFlPJ^-#I! zv8q3X5L#}Ug9D<`rXqZK+Fb8xd@%5T1VUU_T%M!Py4r=e{vZ(+>E|_kDlZw#D-y0K z--kN9W8D?c7yC|n+}x=I>+?aR$-%r7g!(X#XlNQ8qo0wp){vPen<8e)&gSm==2Rs| zJkpbEHH1|2AH2Da@0YZ;_ow3Bx1_ zfiA?t0!A$gAD}q-;$8uZMf&Gf=c^r-oddP>NNf&JKQuQ<4C*TFbygwgu*(T~P%>-R z{T@#dd@NcchuGqVw!&0_$%N=XuV#nwo&v3^0@n?DApZ}m`rRDsRHfarCtO>2OL7Yv zXiG)D+708+jLyuyOPZBXZ}6L0ZY6qY;wdjJIAI+idV%c#k*w%6 z<#vdRvV4+OeW@l6eC5U6m_MupQ@;p+dQgD8hwV}o&R=tEopxnxI8QldI*aY+{zU|Pv7BwnL zbUagxr{a5_#)n>FsuOlr!o~s==9E(9q^IR(>6~yGMMeRQ~W_L_PC6HS&&t^;rD?(aup*~VR;dn z7+s%tGyiI0Y}{T{SIrRt4NEJ$jSE$J#yuor%zu|RH#^w4=< zDJ9F9TP86cMAc({XaS^wK)=l!D2p1 VAJ4ZDg +:::image type="content" source="images/quick-assist-flow.png" alt-text="Schematic flow of connections when a Quick Assist session is established"::: ### Data and privacy @@ -118,4 +118,4 @@ If for some reason a user doesn't have Quick Assist on their system or it's not ## Next steps -If you have any problems, questions, or suggestions for Quick Assist, contact us by using feedback-hub://?referrer=resolveUpgradeErrorsPage&tabid=2&contextid=81&newFeedback=true&feedbackType=2&topic=submit-errors.md +If you have any problems, questions, or suggestions for Quick Assist, contact us by using the [Feedback Hub app](https://www.microsoft.com/p/feedback-hub/9nblggh4r32n?SilentAuth=1&wa=wsignin1.0&rtc=1#activetab=pivot:overviewtab). From 474f267b8a7342e5525745125fd67885650ab5ab Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Thu, 17 Dec 2020 11:25:07 -0800 Subject: [PATCH 26/49] acrolinx --- .../firewall-settings-lost-on-upgrade.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md index c793caf0f3..c5ebe7fbf7 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -1,5 +1,5 @@ --- -title: Firewall settings lost on upgrade +title: Troubleshooting Windows Firewall settings after a Windows upgrade description: Firewall settings lost on upgrade ms.reviewer: ms.author: v-bshilpa @@ -15,9 +15,9 @@ ms.collection: ms.topic: troubleshooting --- -# Troubleshooting Windows Firewall settings that are missing after an upgrade +# Troubleshooting Windows Firewall settings after a Windows upgrade -This article describes a scenario where previously enabled firewall rules revert to disabled after upgrading to a new version of Windows. +Use this article to troubleshoot firewall settings that are turned off after upgrading to a new version of Windows. ## Rule groups @@ -34,8 +34,8 @@ Get-NetFirewallRule -Group ``` > [!NOTE] -> We recommend to enable or disable an entire group instead of individual rules. +> Microsoft recommends to enable or disable an entire group instead of individual rules. -We recommended that you enable/disable all of the rules within a group instead of one or two individual rules. This is because groups are not only used to organize rules and allow batch rule modification by type, but they also represent a 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. +Microsoft recommends that you enable/disable all of the rules within a group instead of one or two individual rules. This is because groups are not only used to organize rules and allow batch rule modification by type, but they also represent a 'unit' by which rule state is maintained across a Windows upgrade. Rule groups, as opposed to individual rules, are the unit by which the update process determines what should be enabled/disabled when the upgrade is complete. -For example, using the Remote Desktop group consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group in an effort to maintain a clean out-of-the-box configuration. This scenario brings with it the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host. +For example, the Remote Desktop group consists of three rules. To ensure that the rule set is properly migrated during an upgrade, all three rules must be enabled. If only one rule is enabled, the upgrade process will see that two of three rules are disabled and subsequently disable the entire group to maintain a clean, out-of-the-box configuration. This scenario has the unintended consequence of breaking Remote Desktop Protocol (RDP) connectivity to the host. From fcab9bc1756921ece50214580f9a0aa4dc58788c Mon Sep 17 00:00:00 2001 From: Peter Baumgartner <32550988+pebaum@users.noreply.github.com> Date: Thu, 17 Dec 2020 12:11:20 -0800 Subject: [PATCH 27/49] converting faqs to yml for google pilot --- .../security/information-protection/TOC.md | 4 +- ...ocker-deployment-and-administration-faq.md | 101 ------------------ ...cker-deployment-and-administration-faq.yml | 97 +++++++++++++++++ .../bitlocker-frequently-asked-questions.md | 4 +- ...bitlocker-overview-and-requirements-faq.md | 82 -------------- ...itlocker-overview-and-requirements-faq.yml | 82 ++++++++++++++ 6 files changed, 183 insertions(+), 187 deletions(-) delete mode 100644 windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md create mode 100644 windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.yml delete mode 100644 windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md create mode 100644 windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml diff --git a/windows/security/information-protection/TOC.md b/windows/security/information-protection/TOC.md index 6fe54f4f4d..442b60a184 100644 --- a/windows/security/information-protection/TOC.md +++ b/windows/security/information-protection/TOC.md @@ -3,9 +3,9 @@ ## [BitLocker](bitlocker\bitlocker-overview.md) ### [Overview of BitLocker Device Encryption in Windows 10](bitlocker\bitlocker-device-encryption-overview-windows-10.md) ### [BitLocker frequently asked questions (FAQ)](bitlocker\bitlocker-frequently-asked-questions.md) -#### [Overview and requirements](bitlocker\bitlocker-overview-and-requirements-faq.md) +#### [Overview and requirements](bitlocker\bitlocker-overview-and-requirements-faq.yml) #### [Upgrading](bitlocker\bitlocker-upgrading-faq.md) -#### [Deployment and administration](bitlocker\bitlocker-deployment-and-administration-faq.md) +#### [Deployment and administration](bitlocker\bitlocker-deployment-and-administration-faq.yml) #### [Key management](bitlocker\bitlocker-key-management-faq.md) #### [BitLocker To Go](bitlocker\bitlocker-to-go-faq.md) #### [Active Directory Domain Services](bitlocker\bitlocker-and-adds-faq.md) diff --git a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md deleted file mode 100644 index 064a82cf8e..0000000000 --- a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.md +++ /dev/null @@ -1,101 +0,0 @@ ---- -title: BitLocker deployment and administration FAQ (Windows 10) -description: Browse frequently asked questions about BitLocker deployment and administration, such as, "Can BitLocker deployment be automated in an enterprise environment?" -ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee -ms.reviewer: -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: dansimp -ms.author: dansimp -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/28/2019 -ms.custom: bitlocker ---- - -# BitLocker frequently asked questions (FAQ) - -**Applies to** -- Windows 10 - -## Can BitLocker deployment be automated in an enterprise environment? - -Yes, you can automate the deployment and configuration of BitLocker and the TPM using either WMI or Windows PowerShell scripts. How you choose to implement the scripts depends on your environment. You can also use Manage-bde.exe to locally or remotely configure BitLocker. For more info about writing scripts that use the BitLocker WMI providers, see [BitLocker Drive Encryption Provider](https://go.microsoft.com/fwlink/p/?LinkId=80600). For more info about using Windows PowerShell cmdlets with BitLocker Drive Encryption, see [BitLocker Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/bitlocker/index?view=win10-ps). - -## Can BitLocker encrypt more than just the operating system drive? - -Yes. - -## Is there a noticeable performance impact when BitLocker is enabled on a computer? - -Generally it imposes a single-digit percentage performance overhead. - -## How long will initial encryption take when BitLocker is turned on? - -Although BitLocker encryption occurs in the background while you continue to work, and the system remains usable, encryption times vary depending on the type of drive that is being encrypted, the size of the drive, and the speed of the drive. If you are encrypting large drives, you may want to set encryption to occur during times when you will not be using the drive. - -You can also choose whether or not BitLocker should encrypt the entire drive or just the used space on the drive when you turn on BitLocker. On a new hard drive, encrypting just the used spaced can be considerably faster than encrypting the entire drive. When this encryption option is selected, BitLocker automatically encrypts data as it is saved, ensuring that no data is stored unencrypted. - -## What happens if the computer is turned off during encryption or decryption? - -If the computer is turned off or goes into hibernation, the BitLocker encryption and decryption process will resume where it stopped the next time Windows starts. This is true even if the power is suddenly unavailable. - -## Does BitLocker encrypt and decrypt the entire drive all at once when reading and writing data? - -No, BitLocker does not encrypt and decrypt the entire drive when reading and writing data. The encrypted sectors in the BitLocker-protected drive are decrypted only as they are requested from system read operations. Blocks that are written to the drive are encrypted before the system writes them to the physical disk. No unencrypted data is ever stored on a BitLocker-protected drive. - -## How can I prevent users on a network from storing data on an unencrypted drive? - -You can configure Group Policy settings to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md). -When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. - -## What is Used Disk Space Only encryption? - -BitLocker in Windows 10 lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](bitlocker-device-encryption-overview-windows-10.md#used-disk-space-only-encryption). - -## What system changes would cause the integrity check on my operating system drive to fail? - -The following types of system changes can cause an integrity check failure and prevent the TPM from releasing the BitLocker key to decrypt the protected operating system drive: - -- Moving the BitLocker-protected drive into a new computer. -- Installing a new motherboard with a new TPM. -- Turning off, disabling, or clearing the TPM. -- Changing any boot configuration settings. -- Changing the BIOS, UEFI firmware, master boot record, boot sector, boot manager, option ROM, or other early boot components or boot configuration data. - -## What causes BitLocker to start into recovery mode when attempting to start the operating system drive? - -Because BitLocker is designed to protect your computer from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. -For example: - -- Changing the BIOS boot order to boot another drive in advance of the hard drive. -- Adding or removing hardware, such as inserting a new card in the computer, including some PCMIA wireless cards. -- Removing, inserting, or completely depleting the charge on a smart battery on a portable computer. - -In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password. -The TPM is not involved in any recovery scenarios, so recovery is still possible if the TPM fails boot component validation, malfunctions, or is removed. - -## What can prevent BitLocker from binding to PCR 7? - -BitLocker can be prevented from binding to PCR 7 if a non-Windows OS booted prior to Windows, or if Secure Boot is not available to the device, either because it has been disabled or the hardware does not support it. - -## Can I swap hard disks on the same computer if BitLocker is enabled on the operating system drive? - -Yes, you can swap multiple hard disks on the same computer if BitLocker is enabled, but only if the hard disks were BitLocker-protected on the same computer. The BitLocker keys are unique to the TPM and operating system drive. So if you want to prepare a backup operating system or data drive in case a disk fails, make sure that they were matched with the correct TPM. You can also configure different hard drives for different operating systems and then enable BitLocker on each one with different authentication methods (such as one with TPM-only and one with TPM+PIN) without any conflicts. - -## Can I access my BitLocker-protected drive if I insert the hard disk into a different computer? - -Yes, if the drive is a data drive, you can unlock it from the **BitLocker Drive Encryption** Control Panel item just as you would any other data drive by using a password or smart card. If the data drive was configured for automatic unlock only, you will have to unlock it by using the recovery key. The encrypted hard disk can be unlocked by a data recovery agent (if one was configured) or it can be unlocked by using the recovery key. - -## Why is "Turn BitLocker on" not available when I right-click a drive? -Some drives cannot be encrypted with BitLocker. Reasons a drive cannot be encrypted include insufficient disk size, an incompatible file system, if the drive is a dynamic disk, or a drive is designated as the system partition. By default, the system drive (or system partition) is hidden from display. However, if it is not created as a hidden drive when the operating system was installed due to a custom installation process, that drive might be displayed but cannot be encrypted. - -## What type of disk configurations are supported by BitLocker? -Any number of internal, fixed data drives can be protected with BitLocker. On some versions ATA and SATA-based, direct-attached storage devices are also supported. - - diff --git a/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.yml b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.yml new file mode 100644 index 0000000000..f873294bba --- /dev/null +++ b/windows/security/information-protection/bitlocker/bitlocker-deployment-and-administration-faq.yml @@ -0,0 +1,97 @@ +### YamlMime:FAQ +metadata: + title: BitLocker deployment and administration FAQ (Windows 10) + description: Browse frequently asked questions about BitLocker deployment and administration, such as, "Can BitLocker deployment be automated in an enterprise environment?" + ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee + ms.reviewer: + ms.prod: w10 + ms.mktglfcycl: explore + ms.sitesec: library + ms.pagetype: security + ms.localizationpriority: medium + author: dansimp + ms.author: dansimp + manager: dansimp + audience: ITPro + ms.collection: M365-security-compliance + ms.topic: conceptual + ms.date: 02/28/2019 + ms.custom: bitlocker + +title: BitLocker frequently asked questions (FAQ) +summary: | + **Applies to** + - Windows 10 + + +sections: + - name: Ignored + questions: + - question: Can BitLocker deployment be automated in an enterprise environment? + answer: | + Yes, you can automate the deployment and configuration of BitLocker and the TPM using either WMI or Windows PowerShell scripts. How you choose to implement the scripts depends on your environment. You can also use Manage-bde.exe to locally or remotely configure BitLocker. For more info about writing scripts that use the BitLocker WMI providers, see [BitLocker Drive Encryption Provider](https://go.microsoft.com/fwlink/p/?LinkId=80600). For more info about using Windows PowerShell cmdlets with BitLocker Drive Encryption, see [BitLocker Cmdlets in Windows PowerShell](https://docs.microsoft.com/powershell/module/bitlocker/index?view=win10-ps). + + - question: Can BitLocker encrypt more than just the operating system drive? + answer: Yes. + + - question: Is there a noticeable performance impact when BitLocker is enabled on a computer? + answer: Generally it imposes a single-digit percentage performance overhead. + + - question: How long will initial encryption take when BitLocker is turned on? + answer: | + Although BitLocker encryption occurs in the background while you continue to work, and the system remains usable, encryption times vary depending on the type of drive that is being encrypted, the size of the drive, and the speed of the drive. If you are encrypting large drives, you may want to set encryption to occur during times when you will not be using the drive. + + You can also choose whether or not BitLocker should encrypt the entire drive or just the used space on the drive when you turn on BitLocker. On a new hard drive, encrypting just the used spaced can be considerably faster than encrypting the entire drive. When this encryption option is selected, BitLocker automatically encrypts data as it is saved, ensuring that no data is stored unencrypted. + + - question: What happens if the computer is turned off during encryption or decryption? + answer: If the computer is turned off or goes into hibernation, the BitLocker encryption and decryption process will resume where it stopped the next time Windows starts. This is true even if the power is suddenly unavailable. + + - question: Does BitLocker encrypt and decrypt the entire drive all at once when reading and writing data? + answer: No, BitLocker does not encrypt and decrypt the entire drive when reading and writing data. The encrypted sectors in the BitLocker-protected drive are decrypted only as they are requested from system read operations. Blocks that are written to the drive are encrypted before the system writes them to the physical disk. No unencrypted data is ever stored on a BitLocker-protected drive. + + - question: How can I prevent users on a network from storing data on an unencrypted drive? + answer: | + You can configure Group Policy settings to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md). + When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. + + - question: What is Used Disk Space Only encryption? + answer: | + BitLocker in Windows 10 lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](bitlocker-device-encryption-overview-windows-10.md#used-disk-space-only-encryption). + + - question: What system changes would cause the integrity check on my operating system drive to fail? + answer: | + The following types of system changes can cause an integrity check failure and prevent the TPM from releasing the BitLocker key to decrypt the protected operating system drive: + + - Moving the BitLocker-protected drive into a new computer. + - Installing a new motherboard with a new TPM. + - Turning off, disabling, or clearing the TPM. + - Changing any boot configuration settings. + - Changing the BIOS, UEFI firmware, master boot record, boot sector, boot manager, option ROM, or other early boot components or boot configuration data. + + - question: What causes BitLocker to start into recovery mode when attempting to start the operating system drive? + answer: | + Because BitLocker is designed to protect your computer from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. + For example: + + - Changing the BIOS boot order to boot another drive in advance of the hard drive. + - Adding or removing hardware, such as inserting a new card in the computer, including some PCMIA wireless cards. + - Removing, inserting, or completely depleting the charge on a smart battery on a portable computer. + + In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password. + The TPM is not involved in any recovery scenarios, so recovery is still possible if the TPM fails boot component validation, malfunctions, or is removed. + + - question: What can prevent BitLocker from binding to PCR 7? + answer: BitLocker can be prevented from binding to PCR 7 if a non-Windows OS booted prior to Windows, or if Secure Boot is not available to the device, either because it has been disabled or the hardware does not support it. + + - question: Can I swap hard disks on the same computer if BitLocker is enabled on the operating system drive? + answer: Yes, you can swap multiple hard disks on the same computer if BitLocker is enabled, but only if the hard disks were BitLocker-protected on the same computer. The BitLocker keys are unique to the TPM and operating system drive. So if you want to prepare a backup operating system or data drive in case a disk fails, make sure that they were matched with the correct TPM. You can also configure different hard drives for different operating systems and then enable BitLocker on each one with different authentication methods (such as one with TPM-only and one with TPM+PIN) without any conflicts. + + - question: Can I access my BitLocker-protected drive if I insert the hard disk into a different computer? + answer: Yes, if the drive is a data drive, you can unlock it from the **BitLocker Drive Encryption** Control Panel item just as you would any other data drive by using a password or smart card. If the data drive was configured for automatic unlock only, you will have to unlock it by using the recovery key. The encrypted hard disk can be unlocked by a data recovery agent (if one was configured) or it can be unlocked by using the recovery key. + + - question: Why is "Turn BitLocker on" not available when I right-click a drive? + answer: Some drives cannot be encrypted with BitLocker. Reasons a drive cannot be encrypted include insufficient disk size, an incompatible file system, if the drive is a dynamic disk, or a drive is designated as the system partition. By default, the system drive (or system partition) is hidden from display. However, if it is not created as a hidden drive when the operating system was installed due to a custom installation process, that drive might be displayed but cannot be encrypted. + + - question: What type of disk configurations are supported by BitLocker? + answer: Any number of internal, fixed data drives can be protected with BitLocker. On some versions ATA and SATA-based, direct-attached storage devices are also supported. + diff --git a/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md b/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md index 3679c9fde7..31ee0816da 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md +++ b/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions.md @@ -25,9 +25,9 @@ ms.custom: bitlocker This topic links to frequently asked questions about BitLocker. BitLocker is a data protection feature that encrypts drives on your computer to help prevent data theft or exposure. BitLocker-protected computers can also delete data more securely when they are decommissioned because it is much more difficult to recover deleted data from an encrypted drive than from a non-encrypted drive. -- [Overview and requirements](bitlocker-overview-and-requirements-faq.md) +- [Overview and requirements](bitlocker-overview-and-requirements-faq.yml) - [Upgrading](bitlocker-upgrading-faq.md) -- [Deployment and administration](bitlocker-deployment-and-administration-faq.md) +- [Deployment and administration](bitlocker-deployment-and-administration-faq.yml) - [Key management](bitlocker-key-management-faq.md) - [BitLocker To Go](bitlocker-to-go-faq.md) - [Active Directory Domain Services (AD DS)](bitlocker-and-adds-faq.md) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md deleted file mode 100644 index 7f9715b9c0..0000000000 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.md +++ /dev/null @@ -1,82 +0,0 @@ ---- -title: BitLocker overview and requirements FAQ (Windows 10) -description: This topic for the IT professional answers frequently asked questions concerning the requirements to use BitLocker. -ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee -ms.reviewer: -ms.prod: w10 -ms.mktglfcycl: explore -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: dansimp -ms.author: dansimp -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual -ms.date: 02/28/2019 -ms.custom: bitlocker ---- - -# BitLocker Overview and Requirements FAQ - -**Applies to** -- Windows 10 - -## How does BitLocker work? - -**How BitLocker works with operating system drives** - -You can use BitLocker to mitigate unauthorized data access on lost or stolen computers by encrypting all user files and system files on the operating system drive, including the swap files and hibernation files, and checking the integrity of early boot components and boot configuration data. - -**How BitLocker works with fixed and removable data drives** - -You can use BitLocker to encrypt the entire contents of a data drive. You can use Group Policy to require that BitLocker be enabled on a drive before the computer can write data to the drive. BitLocker can be configured with a variety of unlock methods for data drives, and a data drive supports multiple unlock methods. - -## Does BitLocker support multifactor authentication? - -Yes, BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2 or later, you can use additional forms of authentication with the TPM protection. - -## What are the BitLocker hardware and software requirements? - -For requirements, see [System requirements](bitlocker-overview.md#system-requirements). - -> [!NOTE] -> Dynamic disks are not supported by BitLocker. Dynamic data volumes will not be displayed in the Control Panel. Although the operating system volume will always be displayed in the Control Panel, regardless of whether it is a Dynamic disk, if it is a dynamic disk it cannot be protected by BitLocker. - -## Why are two partitions required? Why does the system drive have to be so large? - -Two partitions are required to run BitLocker because pre-startup authentication and system integrity verification must occur on a separate partition from the encrypted operating system drive. This configuration helps protect the operating system and the information in the encrypted drive. - -## Which Trusted Platform Modules (TPMs) does BitLocker support? - -BitLocker supports TPM version 1.2 or higher. BitLocker support for TPM 2.0 requires Unified Extensible Firmware Interface (UEFI) for the device. - -> [!NOTE] -> TPM 2.0 is not supported in Legacy and CSM Modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as Native UEFI only. The Legacy and Compatibility Support Module (CSM) options must be disabled. For added security Enable the Secure Boot feature. - -> Installed Operating System on hardware in legacy mode will stop the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) before changing the BIOS mode which will prepare the OS and the disk to support UEFI. - -## How can I tell if a TPM is on my computer? - -Beginning with Windows 10, version 1803, you can check TPM status in **Windows Defender Security Center** > **Device Security** > **Security processor details**. In previous versions of Windows, open the TPM MMC console (tpm.msc) and look under the **Status** heading. - -## Can I use BitLocker on an operating system drive without a TPM? - -Yes, you can enable BitLocker on an operating system drive without a TPM version 1.2 or higher, if the BIOS or UEFI firmware has the ability to read from a USB flash drive in the boot environment. This is because BitLocker will not unlock the protected drive until BitLocker's own volume master key is first released by either the computer's TPM or by a USB flash drive containing the BitLocker startup key for that computer. However, computers without TPMs will not be able to use the system integrity verification that BitLocker can also provide. -To help determine whether a computer can read from a USB device during the boot process, use the BitLocker system check as part of the BitLocker setup process. This system check performs tests to confirm that the computer can properly read from the USB devices at the appropriate time and that the computer meets other BitLocker requirements. - -## How do I obtain BIOS support for the TPM on my computer? - -Contact the computer manufacturer to request a Trusted Computing Group (TCG)-compliant BIOS or UEFI boot firmware that meets the following requirements: - -- It is compliant with the TCG standards for a client computer. -- It has a secure update mechanism to help prevent a malicious BIOS or boot firmware from being installed on the computer. - -## What credentials are required to use BitLocker? - -To turn on, turn off, or change configurations of BitLocker on operating system and fixed data drives, membership in the local **Administrators** group is required. Standard users can turn on, turn off, or change configurations of BitLocker on removable data drives. - -## What is the recommended boot order for computers that are going to be BitLocker-protected? - -You should configure the startup options of your computer to have the hard disk drive first in the boot order, before any other drives such as CD/DVD drives or USB drives. If the hard disk is not first and you typically boot from hard disk, then a boot order change may be detected or assumed when removable media is found during boot. The boot order typically affects the system measurement that is verified by BitLocker and a change in boot order will cause you to be prompted for your BitLocker recovery key. For the same reason, if you have a laptop with a docking station, ensure that the hard disk drive is first in the boot order both when docked and undocked.  diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml new file mode 100644 index 0000000000..de4338a325 --- /dev/null +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml @@ -0,0 +1,82 @@ +### YamlMime:FAQ +metadata: + title: BitLocker overview and requirements FAQ (Windows 10) + description: This topic for the IT professional answers frequently asked questions concerning the requirements to use BitLocker. + ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee + ms.reviewer: + ms.prod: w10 + ms.mktglfcycl: explore + ms.sitesec: library + ms.pagetype: security + ms.localizationpriority: medium + author: dansimp + ms.author: dansimp + manager: dansimp + audience: ITPro + ms.collection: M365-security-compliance + ms.topic: conceptual + ms.date: 02/28/2019 + ms.custom: bitlocker + +title: BitLocker Overview and Requirements FAQ +summary: | + **Applies to** + - Windows 10 + + +sections: + - name: Ignored + questions: + - question: How does BitLocker work? + answer: | + **How BitLocker works with operating system drives** + + You can use BitLocker to mitigate unauthorized data access on lost or stolen computers by encrypting all user files and system files on the operating system drive, including the swap files and hibernation files, and checking the integrity of early boot components and boot configuration data. + + **How BitLocker works with fixed and removable data drives** + + You can use BitLocker to encrypt the entire contents of a data drive. You can use Group Policy to require that BitLocker be enabled on a drive before the computer can write data to the drive. BitLocker can be configured with a variety of unlock methods for data drives, and a data drive supports multiple unlock methods. + + - question: Does BitLocker support multifactor authentication? + answer: Yes, BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2 or later, you can use additional forms of authentication with the TPM protection. + + - question: What are the BitLocker hardware and software requirements? + answer: | + For requirements, see [System requirements](bitlocker-overview.md#system-requirements). + + > [!NOTE] + > Dynamic disks are not supported by BitLocker. Dynamic data volumes will not be displayed in the Control Panel. Although the operating system volume will always be displayed in the Control Panel, regardless of whether it is a Dynamic disk, if it is a dynamic disk it cannot be protected by BitLocker. + + - question: Why are two partitions required? Why does the system drive have to be so large? + answer: Two partitions are required to run BitLocker because pre-startup authentication and system integrity verification must occur on a separate partition from the encrypted operating system drive. This configuration helps protect the operating system and the information in the encrypted drive. + + - question: Which Trusted Platform Modules (TPMs) does BitLocker support? + answer: | + BitLocker supports TPM version 1.2 or higher. BitLocker support for TPM 2.0 requires Unified Extensible Firmware Interface (UEFI) for the device. + + > [!NOTE] + > TPM 2.0 is not supported in Legacy and CSM Modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as Native UEFI only. The Legacy and Compatibility Support Module (CSM) options must be disabled. For added security Enable the Secure Boot feature. + + > Installed Operating System on hardware in legacy mode will stop the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) before changing the BIOS mode which will prepare the OS and the disk to support UEFI. + + - question: How can I tell if a TPM is on my computer? + answer: Beginning with Windows 10, version 1803, you can check TPM status in **Windows Defender Security Center** > **Device Security** > **Security processor details**. In previous versions of Windows, open the TPM MMC console (tpm.msc) and look under the **Status** heading. + + - question: Can I use BitLocker on an operating system drive without a TPM? + answer: | + Yes, you can enable BitLocker on an operating system drive without a TPM version 1.2 or higher, if the BIOS or UEFI firmware has the ability to read from a USB flash drive in the boot environment. This is because BitLocker will not unlock the protected drive until BitLocker's own volume master key is first released by either the computer's TPM or by a USB flash drive containing the BitLocker startup key for that computer. However, computers without TPMs will not be able to use the system integrity verification that BitLocker can also provide. + To help determine whether a computer can read from a USB device during the boot process, use the BitLocker system check as part of the BitLocker setup process. This system check performs tests to confirm that the computer can properly read from the USB devices at the appropriate time and that the computer meets other BitLocker requirements. + + - question: How do I obtain BIOS support for the TPM on my computer? + answer: | + Contact the computer manufacturer to request a Trusted Computing Group (TCG)-compliant BIOS or UEFI boot firmware that meets the following requirements: + + - It is compliant with the TCG standards for a client computer. + - It has a secure update mechanism to help prevent a malicious BIOS or boot firmware from being installed on the computer. + + - question: What credentials are required to use BitLocker? + answer: To turn on, turn off, or change configurations of BitLocker on operating system and fixed data drives, membership in the local **Administrators** group is required. Standard users can turn on, turn off, or change configurations of BitLocker on removable data drives. + + - question: What is the recommended boot order for computers that are going to be BitLocker-protected? + answer: You should configure the startup options of your computer to have the hard disk drive first in the boot order, before any other drives such as CD/DVD drives or USB drives. If the hard disk is not first and you typically boot from hard disk, then a boot order change may be detected or assumed when removable media is found during boot. The boot order typically affects the system measurement that is verified by BitLocker and a change in boot order will cause you to be prompted for your BitLocker recovery key. For the same reason, if you have a laptop with a docking station, ensure that the hard disk drive is first in the boot order both when docked and undocked.  + From cd5dfac88c943e988941c8490b3751d81cce85dc Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 17 Dec 2020 13:49:06 -0700 Subject: [PATCH 28/49] connecting to TOC --- windows/client-management/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/client-management/TOC.md b/windows/client-management/TOC.md index b99a2d3ee4..26cb9368b0 100644 --- a/windows/client-management/TOC.md +++ b/windows/client-management/TOC.md @@ -1,5 +1,6 @@ # [Manage clients in Windows 10](index.md) ## [Administrative Tools in Windows 10](administrative-tools-in-windows-10.md) +### [Use Quick Assist to help users] ## [Create mandatory user profiles](mandatory-user-profile.md) ## [Connect to remote Azure Active Directory-joined PC](connect-to-remote-aadj-pc.md) ## [Join Windows 10 Mobile to Azure Active Directory](join-windows-10-mobile-to-azure-active-directory.md) From 7da0e93576373c790946af9c819bc4a8c8d5aca1 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 17 Dec 2020 13:54:24 -0700 Subject: [PATCH 29/49] trying to get the link right this time --- windows/client-management/TOC.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/TOC.md b/windows/client-management/TOC.md index 26cb9368b0..aac950751a 100644 --- a/windows/client-management/TOC.md +++ b/windows/client-management/TOC.md @@ -1,6 +1,6 @@ # [Manage clients in Windows 10](index.md) ## [Administrative Tools in Windows 10](administrative-tools-in-windows-10.md) -### [Use Quick Assist to help users] +### [Use Quick Assist to help users](quick-assist.md) ## [Create mandatory user profiles](mandatory-user-profile.md) ## [Connect to remote Azure Active Directory-joined PC](connect-to-remote-aadj-pc.md) ## [Join Windows 10 Mobile to Azure Active Directory](join-windows-10-mobile-to-azure-active-directory.md) From ae609d2083a703d1188cb21ea3c5c8d7c9adc80a Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 17 Dec 2020 13:24:14 -0800 Subject: [PATCH 30/49] antivirus fixes --- ...rosoft-defender-antivirus-compatibility.md | 4 ++-- ...fender-antivirus-on-windows-server-2016.md | 22 +++++++++---------- 2 files changed, 13 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index a51058e86c..e6d8bfd533 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -47,9 +47,9 @@ The following table summarizes what happens with Microsoft Defender Antivirus wh | Windows Server 2016 or 2019 | Microsoft Defender Antivirus | Yes | Active mode | | Windows Server 2016 or 2019 | Microsoft Defender Antivirus | No | Active mode | -(1) On Windows Server 2016 or 2019, Microsoft Defender Antivirus will not enter passive or disabled mode if you have also installed a third-party antivirus product. If you install a third-party antivirus product, you should [consider uninstalling Microsoft Defender Antivirus on Windows Server 2016 or 2019](microsoft-defender-antivirus-on-windows-server-2016.md#need-to-uninstall-microsoft-defender-antivirus) to prevent problems caused by having multiple antivirus products installed on a machine. +(1) On Windows Server 2019 or 2016, Microsoft Defender Antivirus does not enter passive or disabled mode automatically when you install non-Microsoft antivirus product. In those cases, [disable Microsoft Defender Antivirus, or set it to passive mode](microsoft-defender-antivirus-on-windows-server-2016.md#need-to-uninstall-microsoft-defender-antivirus) to prevent problems caused by having multiple antivirus products installed on a server. -If you are using Windows Server, version 1803 or Windows Server 2019, you can enable passive mode by setting this registry key: +If you are using Windows Server, version 1803 or Windows Server 2019, you set Microsoft Defender Antivirus to passive mode by setting this registry key: - Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` - Name: ForceDefenderPassiveMode - Type: REG_DWORD diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index 2dd55a5ef2..b29fd1b0e3 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -1,5 +1,5 @@ --- -title: Microsoft Defender Antivirus on Windows Server 2016 and 2019 +title: Microsoft Defender Antivirus on Windows Server 2019 and 2016 description: Learn how to enable and configure Microsoft Defender Antivirus on Windows Server 2016 and Windows Server 2019. keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012 search.product: eADQiWindows 10XVcnh @@ -173,17 +173,17 @@ See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](con ## Need to uninstall Microsoft Defender Antivirus? -If you are using a third-party antivirus solution and you're running into issues with that solution and Microsoft Defender Antivirus, you can consider uninstalling Microsoft Defender Antivirus. Before you do that, review the following resources: +If you are using a non-Microsoft antivirus product as your primary antivirus solution, you can either disable Microsoft Defender Antivirus, or set it to passive mode. -- See the question *Should I run Microsoft security software at the same time as other security products?* in the [Windows Defender Security Intelligence Antivirus and antimalware software FAQ](https://www.microsoft.com/wdsi/help/antimalware-faq#multiple-products). +### Set Microsoft Defender Antivirus to passive mode -- See [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md). +If you are using Windows Server, version 1803 or Windows Server 2019, you can enable passive mode by setting this registry key: +- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` +- Name: `ForceDefenderPassiveMode` +- Type: `REG_DWORD` +- Value: `1` -- See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/why-use-microsoft-antivirus). This article describes 10 advantages to using Microsoft Defender Antivirus together with Defender for Endpoint. - -If you determine you do want to uninstall Microsoft Defender Antivirus, follow the steps in the following sections. - -### Uninstall Microsoft Defender Antivirus using the Remove Roles and Features wizard +### Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard 1. See [Install or Uninstall Roles, Role Services, or Features](https://docs.microsoft.com/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**. @@ -193,7 +193,7 @@ If you determine you do want to uninstall Microsoft Defender Antivirus, follow t Microsoft Defender Antivirus will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature. -### Uninstall Microsoft Defender Antivirus using PowerShell +### Disable Microsoft Defender Antivirus using PowerShell >[!NOTE] >You can't uninstall the Windows Security app, but you can disable the interface with these instructions. @@ -204,7 +204,7 @@ The following PowerShell cmdlet uninstalls Microsoft Defender Antivirus on Windo Uninstall-WindowsFeature -Name Windows-Defender ``` -### Turn off the GUI using PowerShell +### Turn off the Microsoft Defender Antivirus user interface using PowerShell To turn off the Microsoft Defender Antivirus GUI, use the following PowerShell cmdlet: From 21f2d36419f0407c85390326c27a541c140a8a93 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 17 Dec 2020 13:26:47 -0800 Subject: [PATCH 31/49] fixes --- .../microsoft-defender-antivirus-compatibility.md | 12 ++++++------ ...soft-defender-antivirus-on-windows-server-2016.md | 8 ++++---- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index e6d8bfd533..0bb74a713b 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -11,9 +11,9 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.reviewer: +ms.reviewer: pahuijbr manager: dansimp -ms.date: 12/11/2020 +ms.date: 12/17/2020 --- # Microsoft Defender Antivirus compatibility @@ -51,11 +51,11 @@ The following table summarizes what happens with Microsoft Defender Antivirus wh If you are using Windows Server, version 1803 or Windows Server 2019, you set Microsoft Defender Antivirus to passive mode by setting this registry key: - Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` -- Name: ForceDefenderPassiveMode -- Type: REG_DWORD -- Value: 1 +- Name: `ForceDefenderPassiveMode` +- Type: `REG_DWORD` +- Value: `1` -See [Microsoft Defender Antivirus on Windows Server 2016 and 2019](microsoft-defender-antivirus-on-windows-server-2016.md) for key differences and management options for Windows Server installations. +See [Microsoft Defender Antivirus on Windows Server 2019 and Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md) for key differences and management options for Windows Server installations. > [!IMPORTANT] > Microsoft Defender Antivirus is only available on endpoints running Windows 10, Windows Server 2016, and Windows Server 2019. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index b29fd1b0e3..569e75a850 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -10,8 +10,8 @@ ms.sitesec: library ms.localizationpriority: medium author: denisebmsft ms.author: deniseb -ms.date: 12/16/2020 -ms.reviewer: +ms.date: 12/17/2020 +ms.reviewer: pahuijbr manager: dansimp --- @@ -173,11 +173,11 @@ See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](con ## Need to uninstall Microsoft Defender Antivirus? -If you are using a non-Microsoft antivirus product as your primary antivirus solution, you can either disable Microsoft Defender Antivirus, or set it to passive mode. +If you are using a non-Microsoft antivirus product as your primary antivirus solution, you can either disable Microsoft Defender Antivirus, or set it to passive mode, as described in the following procedures. ### Set Microsoft Defender Antivirus to passive mode -If you are using Windows Server, version 1803 or Windows Server 2019, you can enable passive mode by setting this registry key: +If you are using Windows Server, version 1803 or Windows Server 2019, you can set Microsoft Defender Antivirus to passive mode by setting the following registry key: - Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` - Name: `ForceDefenderPassiveMode` - Type: `REG_DWORD` From 5785056149205c818309f6991c57d44ca96c9d14 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 17 Dec 2020 13:29:18 -0800 Subject: [PATCH 32/49] Update microsoft-defender-antivirus-compatibility.md --- .../microsoft-defender-antivirus-compatibility.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index 0bb74a713b..79b5a1cc1a 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -77,7 +77,7 @@ The following table summarizes the functionality and features that are available - In Active mode, Microsoft Defender Antivirus is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files are scanned and threats remediated, and detection information are reported in your configuration tool (such as Configuration Manager or the Microsoft Defender Antivirus app on the machine itself). - In Passive mode, Microsoft Defender Antivirus is not used as the antivirus app, and threats are not remediated by Microsoft Defender Antivirus. Files are scanned and reports are provided for threat detections that are shared with the Microsoft Defender for Endpoint service. Therefore, you might encounter alerts in the Security Center console with Microsoft Defender Antivirus as a source, even when Microsoft Defender Antivirus is in Passive mode. -- When [EDR in block mode](../microsoft-defender-atp/edr-in-block-mode.md) is turned on and Microsoft Defender Antivirus is not used as the primary antivirus solution, it can still detect and remediate malicious items. +- When [EDR in block mode](../microsoft-defender-atp/edr-in-block-mode.md) is turned on and Microsoft Defender Antivirus is not the primary antivirus solution, it can still detect and remediate malicious items. - When disabled, Microsoft Defender Antivirus is not used as the antivirus app. Files are not scanned and threats are not remediated. ## Keep the following points in mind From fae702488ae56cb2ebbbec22015a5e78e2cf306e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 17 Dec 2020 13:43:08 -0800 Subject: [PATCH 33/49] Update microsoft-defender-antivirus-on-windows-server-2016.md --- ...fender-antivirus-on-windows-server-2016.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index 569e75a850..a4ba1836c2 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -1,5 +1,5 @@ --- -title: Microsoft Defender Antivirus on Windows Server 2019 and 2016 +title: Microsoft Defender Antivirus on Windows Server 2016 and 2019 description: Learn how to enable and configure Microsoft Defender Antivirus on Windows Server 2016 and Windows Server 2019. keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012 search.product: eADQiWindows 10XVcnh @@ -15,7 +15,7 @@ ms.reviewer: pahuijbr manager: dansimp --- -# Microsoft Defender Antivirus on Windows Server 2019 and Windows Server 2016 +# Microsoft Defender Antivirus on Windows Server 2016 and Windows Server 2019 [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] @@ -23,7 +23,7 @@ manager: dansimp - [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631) -Microsoft Defender Antivirus is available on Windows Server 2019 and Windows Server 2016. In some instances, Microsoft Defender Antivirus is referred to as *Endpoint Protection*; however, the protection engine is the same. +Microsoft Defender Antivirus is available on Windows Server 2016 and 2019. In some instances, Microsoft Defender Antivirus is referred to as *Endpoint Protection*; however, the protection engine is the same. While the functionality, configuration, and management are largely the same for [Microsoft Defender Antivirus on Windows 10](microsoft-defender-antivirus-in-windows-10.md), there are a few key differences on Windows Server 2019 and Windows Server 2016: @@ -34,9 +34,9 @@ While the functionality, configuration, and management are largely the same for The process of setting up and running Microsoft Defender Antivirus on a server platform includes several steps: -1. [Enable the interface](#enable-the-user-interface-on-windows-server-2019-or-windows-server-2016) +1. [Enable the interface](#enable-the-user-interface-on-windows-server-2016-or-2019) -2. [Install Microsoft Defender Antivirus](#install-microsoft-defender-antivirus-on-windows-server-2019-or-windows-server-2016) +2. [Install Microsoft Defender Antivirus](#install-microsoft-defender-antivirus-on-windows-server-2016-or-2019) 2. [Verify Microsoft Defender Antivirus is running](#verify-microsoft-defender-antivirus-is-running) @@ -48,9 +48,9 @@ The process of setting up and running Microsoft Defender Antivirus on a server p 6. (Only if necessary) [Uninstall Microsoft Defender Antivirus](#need-to-uninstall-microsoft-defender-antivirus) -## Enable the user interface on Windows Server 2019 or Windows Server 2016 +## Enable the user interface on Windows Server 2016 or 2019 -By default, Microsoft Defender Antivirus is installed and functional on Windows Server 2019 and Windows Server 2016. The user interface (GUI) is installed by default on some SKUs, but is not required because you can use PowerShell or other methods to manage Microsoft Defender Antivirus. And if the GUI is not installed on your server, you can add it by using the Add Roles and Features Wizard or by using PowerShell. +By default, Microsoft Defender Antivirus is installed and functional on Windows Server 2016 and 2019. The user interface (GUI) is installed by default on some SKUs, but is not required because you can use PowerShell or other methods to manage Microsoft Defender Antivirus. And if the GUI is not installed on your server, you can add it by using the Add Roles and Features Wizard or by using PowerShell. ### Turn on the GUI using the Add Roles and Features Wizard @@ -72,7 +72,7 @@ The following PowerShell cmdlet will enable the interface: Install-WindowsFeature -Name Windows-Defender-GUI ``` -## Install Microsoft Defender Antivirus on Windows Server 2019 or Windows Server 2016 +## Install Microsoft Defender Antivirus on Windows Server 2016 or 2019 You can use either the **Add Roles and Features Wizard** or PowerShell to install Microsoft Defender Antivirus. @@ -173,7 +173,7 @@ See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](con ## Need to uninstall Microsoft Defender Antivirus? -If you are using a non-Microsoft antivirus product as your primary antivirus solution, you can either disable Microsoft Defender Antivirus, or set it to passive mode, as described in the following procedures. +If you are using a non-Microsoft antivirus product as your primary antivirus solution, you can either disable Microsoft Defender Antivirus, or set it to passive mode, as described in the following procedures. ### Set Microsoft Defender Antivirus to passive mode @@ -198,7 +198,7 @@ If you are using Windows Server, version 1803 or Windows Server 2019, you can se >[!NOTE] >You can't uninstall the Windows Security app, but you can disable the interface with these instructions. -The following PowerShell cmdlet uninstalls Microsoft Defender Antivirus on Windows Server 2019 or Windows Server 2016: +The following PowerShell cmdlet uninstalls Microsoft Defender Antivirus on Windows Server 2016 or 2019: ```PowerShell Uninstall-WindowsFeature -Name Windows-Defender From cabc2351b1b958ef920012c27aab1023f1a82cb0 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 17 Dec 2020 13:43:36 -0800 Subject: [PATCH 34/49] Update microsoft-defender-antivirus-on-windows-server-2016.md --- .../microsoft-defender-antivirus-on-windows-server-2016.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index a4ba1836c2..8f3a10623e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -25,7 +25,7 @@ manager: dansimp Microsoft Defender Antivirus is available on Windows Server 2016 and 2019. In some instances, Microsoft Defender Antivirus is referred to as *Endpoint Protection*; however, the protection engine is the same. -While the functionality, configuration, and management are largely the same for [Microsoft Defender Antivirus on Windows 10](microsoft-defender-antivirus-in-windows-10.md), there are a few key differences on Windows Server 2019 and Windows Server 2016: +While the functionality, configuration, and management are largely the same for [Microsoft Defender Antivirus on Windows 10](microsoft-defender-antivirus-in-windows-10.md), there are a few key differences on Windows Server 2016 and 2019: - In Windows Server, [automatic exclusions](configure-server-exclusions-microsoft-defender-antivirus.md) are applied based on your defined Server Role. - In Windows Server, Microsoft Defender Antivirus does not automatically disable itself if you are running another antivirus product. From 136e0cffd26e50eb9069505bace9d4ca60d4020a Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 17 Dec 2020 13:44:58 -0800 Subject: [PATCH 35/49] Update microsoft-defender-antivirus-compatibility.md --- .../microsoft-defender-antivirus-compatibility.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md index 79b5a1cc1a..0a96956345 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md @@ -47,7 +47,7 @@ The following table summarizes what happens with Microsoft Defender Antivirus wh | Windows Server 2016 or 2019 | Microsoft Defender Antivirus | Yes | Active mode | | Windows Server 2016 or 2019 | Microsoft Defender Antivirus | No | Active mode | -(1) On Windows Server 2019 or 2016, Microsoft Defender Antivirus does not enter passive or disabled mode automatically when you install non-Microsoft antivirus product. In those cases, [disable Microsoft Defender Antivirus, or set it to passive mode](microsoft-defender-antivirus-on-windows-server-2016.md#need-to-uninstall-microsoft-defender-antivirus) to prevent problems caused by having multiple antivirus products installed on a server. +(1) On Windows Server 2016 or 2019, Microsoft Defender Antivirus does not enter passive or disabled mode automatically when you install non-Microsoft antivirus product. In those cases, [disable Microsoft Defender Antivirus, or set it to passive mode](microsoft-defender-antivirus-on-windows-server-2016.md#need-to-uninstall-microsoft-defender-antivirus) to prevent problems caused by having multiple antivirus products installed on a server. If you are using Windows Server, version 1803 or Windows Server 2019, you set Microsoft Defender Antivirus to passive mode by setting this registry key: - Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` @@ -55,7 +55,7 @@ If you are using Windows Server, version 1803 or Windows Server 2019, you set Mi - Type: `REG_DWORD` - Value: `1` -See [Microsoft Defender Antivirus on Windows Server 2019 and Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md) for key differences and management options for Windows Server installations. +See [Microsoft Defender Antivirus on Windows Server 2016 and 2019](microsoft-defender-antivirus-on-windows-server-2016.md) for key differences and management options for Windows Server installations. > [!IMPORTANT] > Microsoft Defender Antivirus is only available on endpoints running Windows 10, Windows Server 2016, and Windows Server 2019. From 98c877c7f8ef1fcc2ce8ef6f68f6f09913edd1a2 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 17 Dec 2020 15:21:05 -0700 Subject: [PATCH 36/49] couple typos --- windows/client-management/quick-assist.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/quick-assist.md b/windows/client-management/quick-assist.md index 3fee94cc1c..9fc8de6503 100644 --- a/windows/client-management/quick-assist.md +++ b/windows/client-management/quick-assist.md @@ -45,7 +45,7 @@ Both the helper and sharer must be able to reach these endpoints over port 443: 1. Both the helper and the sharer start Quick Assist. -2. The helper selects **Assist another person**. Quick Assist on the helper's side contacts the Remote Assistance Service to obtain a session code. An RCC chat session is established and the helpers Quick Assist instance joins it. The helper then provides the code to the sharer. +2. The helper selects **Assist another person**. Quick Assist on the helper's side contacts the Remote Assistance Service to obtain a session code. An RCC chat session is established and the helper's Quick Assist instance joins it. The helper then provides the code to the sharer. 3. After the sharer enters the code in their Quick Assist app, Quick Assist uses that code to contact the Remote Assistance Service and join that specific session. The sharer's Quick Assist instance joins the RCC chat session. @@ -53,9 +53,9 @@ Both the helper and sharer must be able to reach these endpoints over port 443: 5. The sharer is prompted to confirm allowing the helper to share their desktop with the helper. -6. Quick Assist starts RDP control and connects to RDP relay services. +6. Quick Assist starts RDP control and connects to the RDP Relay service. -7. RDP shares the video to the helper over https (port 443) through RDP relay services to the helper's RDP control. Input is shared from the helper to the sharer through the RDP relay service. +7. RDP shares the video to the helper over https (port 443) through the RDP relay service to the helper's RDP control. Input is shared from the helper to the sharer through the RDP relay service. :::image type="content" source="images/quick-assist-flow.png" alt-text="Schematic flow of connections when a Quick Assist session is established"::: From 909bf9fe8eac48bf0f619216302106092ea37a80 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 14:38:44 -0800 Subject: [PATCH 37/49] update spreadsheet --- .../downloads/mdatp-urls.xlsx | Bin 19968 -> 20092 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx b/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx index 37a6dacbe81bb80d18c3655023c7cab490bd7abf..de1ec91182b84f43093aeee46bb6ee02d8b3d2e2 100644 GIT binary patch delta 13780 zcmbt*WmKHa((T~x9^4&*y99Rz4NmYta0n9Q0fIXWuEBx^cMWdA9fCu!0KpwDLf(sojLZw=^AH)|s>;1bCC83l$e>mRd&C2cD+@5rAnPkQ?6{AlV zMGN@Mq$!1nfJt%SJ*WD9!VKGG0SB;_P%hKSnDI6v!MB zei(pfE`GK6m#D?YyTj`Q?)Selj*T>368y}YX2CwrQxN&CSaNG+j#0?u$JGE!pWI$% z29XG^+ydoahbjQ=$uahMy&^lbAXxA55Ux5`tD7% zowBvs@@Ev)X7>|C<6~zfnh6VGqfU+N;C(f0iXXrKG--Gd(OyAVH!G`H7R{PQ;`uM> zrySm`$hAi`Z%H(>5Lk_R&nv)r7;g!=8ni>uld1xm4OAVZ{RQ4-cpS!!J{01OOa34= zuf1Y{`QYmY^<+jq-uW7WzROmf;dO^M4m0%&pNQr4E^$iE6Vc*zF!!fLGMKs(@vSW> z2D1eW!m%lt2N-f_05YZk!-3g%9B_>3d_3y*@L8^*EffsK zEXIhXt7*xRr=uyZcW}^SY#z54IZyeqmA>lDmHLBswo(;U4N`j3$RHp|FK<0JdvA6k z{ArDaZav}kR^>1KNN?V@_O#YKEJm^L%*!|nJc17^1zY4$xxdH5bz)_csnOt=)kTBx zf!0{&2`WtsPmJ{n`0PvW1%nykA2VoH5#PoV$3AFGy$@5RnZq{}REKtij5BIdlXL3J z3A%UVQ`M%}l*_emA0T$!QJJ~$t7txC@47a;<3OT~2gyT)c)Afuif=0FP4k`1Wk&h4 zBbU-n*o1B$!A8t*g7fL{;#ux-2XRUiUNe+FlKF8{$z;klt+G=my}#A?B%*Uw9Wi1k zDJj*E>?&JsM&)H`aF+pteJ(n5PW<9OAhCq*S^x$FYD55mFrL%F!Vh3|q;<(W zxauI;>!@jGbZ&}$saYb%;4;_FG9_!C@Py6*W#Z@9pDQgHiO5gAX#rYx-B#B?*wyv$ z{aN9ZGBf$n;w2Q6_|(`Ry<)cNGEw8Rveqw$`eO)d%MNfx|%&oHBxs1~0YLX@N zva~SxV@xVfR2lswsvYZe3?7GRbg9#D#xJWC(sMEIKl-8?jBIs}$F+VF@@vFN1gpa1 z<_X4(9;Itnw;*?|sFT~#dP83Wg}kVvyGYS1O(oK7OYN*PNaFfJlgAr{_0oI9NcG1& z{OE%d_7GBni8>Pe(r$C0~HW%d6T9rEJlYyj}*33 zC>mC1BHk62-8g+ge>we#WI9MOq|aM)Au1Oo(4D0+d@M^~E0hHmdL?zT@wBk=geCIC z8)+q02Y)NDirBtqyfqFe*0$j(PuN?gfR}oA_YR%S&>f_6W@S{#aaRw0wl{pyB8!hb z1aBrMepp@$$QM4ER=LW*LeK-T(`ls9_Q>O(1b%|Bj0$%Te3BmIM*m`IIh|r|9C?gd z(7L7ENqg)25ncJa!KAa~rFnklP))!-g>ky^nRo1;Ej8$otu|Ib_~i4qJiBjklA|Rg zOwy`-g9(f1+zM?fUy?O{CS-lHyVlOU8v22l@#cKGh9K57W?pfQ-iZIB+-?)PeCxFC zEySWZ(kIh*`EB0QgyFA3KkO(p{WBx3V(s{CjPYL;9z-={$TI_GP^)w1W@3?c1Pq^u zMnYu^dBZlpQ~Rd9(aD+Q*1cUo(Pb6C>1-g?>r3O}k-LtAnzSU{<5)T-;~ie^Ye!w- z9^7S`X+Hk;Ooo=1~F}PtY&P zRnvwn2#q{O^lFC=4+PqZg+QT^0U3sdE=z(*-m4`K7;J6*ycdU>8O1$G)L8T1irel^ z$_5n5!tFe1X`8q-?pBj&(r_JbF<}e$SNN@Y(Z5W=hKlC*VgNU1+cz6?mySOVjU5mc zwlCI9@0u6Hj*L21(H{@Q$X7-X2>PdPFPt7)f#ntS$9fU;$I}zzr|s@z;9kDF6RhdQ!e3;BUwy5zq1-d+t0 z9j$nj?MGSeg&kUN5D3`QfveKvio5RH1DBJgryqR>BfZ%n8yzMmPen&xyNU~wmw#1? z9d%@~MGU;P|8alfP;Os7n@)!fJm$Y%xZbaPsAGl`4te$HA~{5-T(&MSznhK9YZs8X zC)oPbBpEsI$v!$JkGniikP}RAYa-!{8h^;I0#PwtR5Rb&X*}3 z+J{4$Z+1G8>9=ZNhFz`?e4p}A>zUFF36{x9DJ&WeMy#(scs2O2&1Z+Zl040!nd_i$ zln@0yU44?mn9+Tj1G;-RFPCn2&i2GEJCc`{uL?CdYEQOZ)n(>?XQO;N+36iF&-m0! z)bLnyd*gNG@u`_KQYQIq&|ElkjP7&9$k?X!)2Y~zT<~SN1xIa(#Yv5QYC#=Ip2Z0c zYkzlbQg3L9Xhin=R5X;h4*QtG5W^eBJnF36k0&+OJ^~r4)xe-D;Zqq`EsJmNwxhQ| zsv*ISMyp9xq!tXD@2uhIr071H9=_NCTS)T4b@PWJ-EWFF1hpAx?ET$?wkw>A%q9u!lUt1fb?^j*h0DMCcYF%OotzWx#1f+% z5TyH%&vi1^I{;B5pz&5Kqn`M+sE|xtT5w!Yq>v@5WM7*ZuDp$Dq(onUS)^p&XEXC& zSGxcui6Md@PBccvAWjrU<{(ZC#wLj-Bu1GWbE-Q0jE#PQhMg@VyjxzXWW`8aPgfUR zC2YPMA#=8Lf{5VNxbfYZJXkXj1iIkAL{vw5i?dz0a zsw?PDLt`+T;7rS^dX@<5j6{f}gP>G;@$+r292Fx6O9Dd@;WNk1qkjk~aG&u=kF*LA znj2+QqFCT=1p0t;2mX1#V6gRHZ5@9_L^Gc0DlRJ8%Px}Ard_7xeqAO#pAyA&0Zcpd z2*Z2N{PWB?52LY_y_Bsd+58QlWuRxFGA^mQ2d&wgNUhxy-YMd$0ht^I^bAbvpcXHCR za0-FZ4OG+lLJTlaJ52x}ddG-KN59SCjZaq=adIoQ;e+Z8Haj{!YUUGV?n{XximzAJ zt|R8<4APEYsSH!~)qB!ZFb;url3?$m_}f{`8^R!bfSgj2y_Ex&Y+M0%^k4*`{)Uov zE@yw(u)2$$xl_nPjknSqJ{j_Gmy-t;MCDT$#@ZPE;2^PzQc|;)Z9RW9l_L47(P(b@ zApyUW?#3)BCA4nOws#Jy15Vt^8gis_F`4qKjZ0jRJeTbe6hoc8AFu>E*H* zpNauPVh-LvW>pc*k{PqiqUpy~ayJr0$PPUT{I0#pzFuJi?JQf1FBTr%`bm>mRG*)m z>IS4D^k=iMDE=I!mZ}UM917=5sG8Rie(waxCBZ7j@VA4__ruH(tHiyRI7N@myA~$< z=dF-N$(}8Aa)`lfXTfRSI0Nh8*I${%({`?!2|s_wA7T~TN7pM0tdO0t%9z7v!}ySf z{c_@RZa(wd4ZlK1kQfy4<4g$q3B%wd$KaS--?5(IfZvSanZ%|VYKF~^Pa<6;3IzG( zxQwXvBdNH`@R0amM0NXvPwU$_aq)-H_;gb#3ZMcJ19SC{g%gmLz1%Yz!OQTzVJAJ7%S`?ddPgPb{(!vDg~Bgj z(XQzm)S%6t-ZBB!nrIX#9Nir?Ah^ranZ$^!#qJ5)r?>ZaG=#o~1BnDBn#wYpv*&dV zDwK-B4-X<}%79eHtMDN(opVJ|j|oRh1e{{e2`_EnRv@7S3#N3SsC39_aqB3N76I;P z1djv%hBSgJPAG+<>oebA=ajuYf3u;nOeC{ICsKyK_!$@LHi0l0i57r&+~DeD=lEj? z7x)Llm$>9&!Jy$;BOBJumD7Sh0z;P{Pw%ayPBltbmrTA-(6cIn)FiPfBN8`&5 zL94h9+VJln7!>QpV)oNGvhWK7GCn16cuk57R_S?X2u^xIra-b-L18RuKf3|A4zvs# z00AS-K=+*d!l3m0EQQ|;8x1FmRiaw=E&3LxhadI}^Z&ln7=O zH*N=iEVaZLcQlpw_)N!_2DHx&kp4En_QPxkb2V9L2TLS^Xwgv;!ARm6?`bLiMGfFD zH?UtT6v6u85O5hGiHC|S>0W3*)1ujaW7tfB7WCh=2=8LZ$pyX8LK=z^nxh~_J-ADe z;VrI*C7mYjcydRey0kz4zuYfvk^okFwnL&d*ALSl@$@qAnc4o?dhf8XnUHsf3H$*j ztWn z+;M}dhZz|WE0ls9S1q`Us?mO9E-8>6d;FPaB5~p*lA&<9q2q1YL?EZ|HBB0NLvz_B9U+QVH$AEi~*UDSBZ$KYo_sM%9NeRPGPKbaNPT&#|p3 zcoFaAXinS`^7l^pENfB+2xvR^>1mo`6w%MpFVA=od8diOQy zKIk-v6E`WS6rC%cHb>8|y_Gg1w)G9w8U3@)tNl{ldk1Kcqmc@=5c?p)X6#naI_d>F zFT+a6ujZl#x#_OKp2Y?_`}FRpjtGpAhi&aLE9b6VzHyQ21MDOe#!;TYL)!7TmW0 zv`$f=0_gTMs6;?aJuC2WYgMi1zzoZ1+H)CzBGb{qr{m)BmNAg}cLn{3L00Ph; zN@%PtQl;lH1su?|&nSC9gM4nN#&JM@*~QY8A7lJ1(8h<5wK=T9k%~=6ih%QjA@D9B z8ipNW3C*w85%*n}*6|cJT7FH(5trkx@&5DxN~oidv2&YRr8MRDsKYt5G{M3)5WNkLpb&W|vHpnv#u?S=ufC%D#{Z{N zNL!zsLfP3#tzrPXH~Ln&v<7i&EzImiC7u32U=c7>3<4WJ%Z7@>?ybFe8VQ}uX@g3x zquoX?Q#zJJlH^4lV?JjCH2fYfX+$b40ZS!^P=OkBB+TUG(U7#ZhSk5si4%`w`j1-k zU&{x4MtIKTpPkfF6alV(o`pRS79ocJBvoAXg74cX*MFIMBHf5}c~`z(`#XBxb5-uF z2z6V=7loaFW^UlEvEe;jsC!Mrn?+#wS1GKDN*vlVoq%kP7SZGN&lPYf=NuP!O~b0Q z!4LOubdwv4W%(Yr2Fk6MhT!1wzq(yq2;9Tv_?R>sKKp2f&FF7)x%k&pqB0#+?mnt4 z#6H;YPK&LS=pkJL-^w`gvA-fsBf|9He0@X36|A@Y;{RA~qFbGFYal=xfxg+ECnJgd zx5bA{!{L!K^M#{7&~;`iqX59z{l4a!HF>bFTcA|9WA8q zWL!4(%E+3?Yy$-bv}%hB=4V$riY~2E?;S7{|CvmxO|JB-tKun+SXVqab00csL`8Si z4i8l*7yFMvL1*GDn!j7o0yX`G&V1 z5jmjkwvOq=-qYxr=R+CgCT6=epD6#8MbNB%6a7`$Wexe&!$iGh8i;N#+^evi1zueui5Y65v*1Xit{MG8|5BvHe9i{STTa zi)l7x%4oIea!N%g_4?4x758hV8|UvYHIcJ!K~jKqazjb-?y9QL@+jSllD>@lMkR4+ zA;V3UX;$KR27KBQhE@F0ZijfnMQ)AdZ{287rNy7 z`f)9nF%-Qu=<52jPV=g>2Df@a-MVk(5y@sjlU3m zto1&yEfj+*raq_(n~8WAid9B-o+c6{l}^YL-zen`H7K@JKx&9Z|IaWzkIleVjPQ8* z(XIVxOs0XJg?5pa;Jtv7*e!j`jxR!D$CE%zc_`#>jwiHUITh95h9IlUu56;?adfp# z(Q3IACAbH1;~HI|G@qTRxI2XX54P$V8}S#5|AHNsCE~`e;0l-CZiUE7+X6oHF$#YP zw$&CRn_1wY85_{*RUunuZ@lWi;myW4yxcM^8cN> z1wurR&D5BklcnJpvs`2K;-m9SCifBpkMJv0bMrs=n@@J0#H$R1|I6nzFFr5i*Nhd6 zKN8XuoWi0~YW^w4M5EH|+@BP$(qM$Opl^iu4^I>(72T8W7nQBHk*S@^0sA8r}?_Q*UYGj(w8Od;f99C`Q zl4fO-c9hO8Me&!&J~SRB4$oF;n^y(JvCrI<#c#Dm1y9F+>_wc4AgGJp`T!#5#x7_( zI?QkjD@)@akt~0fzOtCWXSq<_2^ZO}{Q%G?cq!Y+w_uyG9Q^^MM+s#$g^6zhYS-;W?dDZUf`hE@n^WR;?k1kPu%zn0EkAd-WRRyILuZ_ zCIhqJk3nvG9fG2E4TX0X)(Mi;k@NgMPb{$6p7-riB-F9bz+23^Im&4`yDsH*Qs8zw0XsFRUAYHqzEZ zjKc0u?yn4l@vc{|6ng!4?ivhFoU7J9u8RP67=_Dpe(1;U&ufw0`y9*=Cq2MtMWFmzQh(I+SQGQl$UO>0*b}^;TaZx%vsG9cnpT3N}UIHOAr-s=B`@D zl^Mst#jg|WxO+a0nDG*vh+3qwNz*76!9UpyyL?nr+~jp;Olb!6+o%MDd*1fB@yA|j9%-TwP z;L9dE-P9ZYgUv_!C-zq{+9d6jM2XZ3f)Y5w87AaSn`&y}Vgf=X=`Q`#o9dyNo_}DE zPsAmv0(-x5k|2k`q*u{|jYFH0TmUU#o*jxkBOZq__S=Zu;0^_=-dWe|U5Ab9)RPhI z?m(nwN)F^IIZ()x%Fu{Zz-><9hQ}6jTNJoruGgR77FOWI$U5$k>3Gw{l?Y)poS#2y z6LAk-)N^+;SWeCf3#nhx{CGyLq1GVMTZM--CZAsr9Jpq=9((=vHSXYNY4|59fu^ zaD2)9Xsh%Gd}0-J>juPD*FT~nKfViV`-<`QK{w^g+bXLmB%9xGhlfP9j6S?{gqrud zIj;b)qTQ6$_}B9VLiOT_Q~<4Hm>kzxAAq+T%8sIJj29!;+`$NM`zH38cYCZaRv~KC z7Mv+oll@-62W>Gyj99YdtQ&sjhPd|Xxs&?^LTt_U3bc~55R;JEPoBKC8t^EcOj1YM z@6$EE^*7YUo-ID@Q-#`LdRk*j^QGw)>%}WM#fr6uwL>#+e5YgI*axky{eqP_8yuNbPa=fUGtv0j{^VZqqQh1K^ z{+j%6R@E5O0tiS#gcDfja3IhyWQTuJSqnQ)%)RNDmC&Pd z{Jk05+av7~|3x*^7_g={C5tcQpp<~YcG}3T!h{GJsDPtvkz%&`%k(ESP-aZ>`>li=5(@=Lrd3CMEctIwdIS^X)UcWS>wo z>I%}cYqF8=*TUdONS)1dw%BU2&eY24SruNc=f*} zneiwMtH&o$513biJj`5ta5&*GXUzv1G4`1WZt?$6f7`E>#74yARgpEjF|I_qC*`Dk z7va7r+DnbU2}X8W$(zTS2FTv?6G-1uTw|X;>uT=f^XvD+1O8gMzXXGnSpE zes)FsAV(Y~9Ms~nhG2S#<4TCNTm%j4$3#=(B(V@z+~Ema=r9A#r2u)S$xVP>bV|APdmrjs)wZ*Q(%@>EwG ze$d4KQnT;%I!fUt*jPm+-70QsiY4Dpa9u(NXO_+89m}G;rHL zTO*g8J#7|L3lUQ;jFtTI^qY6yWaGu~rkzVO%92k$rqTt#pUGx~%BIBIq(=%wWh0cS z7I0x&Pu`&W0uN&O-AdXF4k;|}o7jIJNb&rL5VThkSrlYV_24<}8YQNC4x z{b~?0-DH$I?uY9gId1R+Pj_&xGnp^Z`*3|{%;z}KTkEv$fp_=3B~ziD>84~0B_mWU zf5K?N_;9G*7$a-J7KoBlY7}P}jp302K9sr_IR^<7)a-+bQs);l@ho#$HoIPB+0 z#Ok{y9^rV}rN&2FWZ|BqjyR=QhhjTW6LM^y=J3gdr|ihBM(DAYTzKrig zDBfw73(%jP6s@4WwTMb?Nz)?FD*tB=D*Q=^yobziJ=Bh7$fOPCGo z@hZG?qaY$_tfRPx3~_K!??K);1x#a5>+PGcAZe+Q7WR%ym@f7=%u^j>A=~X$j@Q9C z+3khi@NT`0_UCz?{-aBq`j4xJ7q`)Bd`C~r=GJ6cvF=6Kw3Ly{wMX%o)i|EK3#j)~ z)uYlu63E8e?ohv}+zMB?MVG#+9q^&nSn@cP&f4())?4L0X!|}7BpOSHCd}{KscIZIzdApI)^w)&C0=R5;h&5!2WRYAX9HEt7$uU z*iEGy#FarbdXb*K`d0o2ewR-1j9n?QL0t+sCptfErM_?VX{p_wFmp6bKf4L5+8`?$dPJda~k&=AC*Hy?L;w}a5U^@ zw~tj98&4Z5m=x+X%ej2p*&m{6uV=mr2fATSZE#NPlVev3nMhJ=AP`q^?f_zeS+BB2 zg*lA!!_OzHkMIs&tG^+fZP|ZRw*+V05%rgUKJo%qoEn=g$3!yVDprmf*e$9N$dbgC z6%)S+Q}5GY4e7=h1m01!D#Ff3EIg(Xy>&0??F6XyEcFrse4~htb>J*hJvF z_-~jbTN%CZQKF0o7Oy4+hk?Z(q2#IDRHiC5a4{BAJ6$4C^iRWzH^EOR$Kc%!2K1!# zkRf$b1@%v(H40duq&H-II7(#{xEr5Oepoj)qNYwPR-wTpg*x^n)*`uFEAQ#3&e6EB z{3H(Rj1cNWJ0F*~aiwBC{~U#dMOTCVl!|Dnf%VHRY?H?;>c%zv_$P3Lkr-simfSw_ z(Z&Z7v)4YDhKJsmfz&GjYg0~QE%<6#lD|MIMGQW{gHSliS#}_imU_G?hd|S(ilPGf zo%*A8Ms;ftu0ZyPAts9Px^1Z@VVEloOE*mAF%^E8qh+Q(>YiMu?{z!gM0{e{NcW1n zlZe+^xaynGDcqlUsapUi_|-}Sn?cSH5;C)hgEg8kx zG~LFct?a_UgEMF<9r9Z~Mc7)x#LWr89fOqk=*Oxj=cl^9&jmjh4aL0~md-eJn7ov* zuJbhS_$HW=N+u8a5X=}fEHIc!Zo=%Sy={cgv}2}Jg{1y4U?l@H0lio9eoF4KMlEx1 zJ1Qe~CU!8Ig#LsXUH3wJqC0%_Z@u<6+$tXDT4q9=dPg*KHU~q`jJ+i;&=ebL=qx35 zE+K<>q+_Kfgl#UX@a{UgHC71yrX0`2GGCtymmaI%S>dQ%nbx;GTobG~kk_@&NCMZr zEc2De3)jAQB*PFuJti9jWP_AeZ3ei7U)$bHNX?=jgtyu{YIjgw!|F7+&lE(_y!s;` ztACOl3QgOJ|IPvOw7rF^*MImO(@8Cuf@G(l6Nq;9{GcPXFjwWk@%gfNh5D@;0t&a7 zsTMm!sZciZszBNO?}KG7;&S?dG4}*RV)%Voh4w6DU65L#8^(Z)T+_S0EQu)>* z?EI7upoe9kVJ8!!=@slQB68W`{BW&0hLR|y&o8?W6??d!$ecacsusU%b=C)!I?|$T zr3{UI0+;Ku$(+8lDeXlLztB2O=JmjZGzq@7a9I~=pd__vQij_;HFj=PtLrv-bnluy z=gSVU+jXdK>R2dWQ{O1Im!7f?Qq^!haNQ?LWr*(AF17T(NKwfcFs_wzMc&7ujD z3RwYyEuC;~?Or;Ld^i1={G$mRwPa>8%78su#MoyUt%+dE8>p`sAw+v7U=Hp5&@Upz zWf`Nd7tT63&vo$LBNe#>f?!_VHNi+l{AoYfA@g4XhNBmY;KwJ5y+A*)4+x-Vhc3(sAUJr_q3zY_~ zRSB^nI0oTBPPz$;wj%f@4dC_74;#~nH@f%EMx>OK+3HrfqwTIeH|H%XGppy`ICm9+ zf8p*T*s;O8U*Y+KG~f27Wmm$#&-p>&*7Xh*z+_>gP=56_x_!g`z8nVWx8Uz(L=E3n zCxx!|wkNH=@6#+3{LrtE7M6IrQ3hQI58p9S>4bk76xp!mgJ_IWWoIza(XDVxV#ut* z&v>5(mpOgg(Cx2`5b~q)6|7IIwJ+%|hyVDY2L3xI(s&&#{+L<)$q{1X zE1NW^Q{q81^}F!Nb$P)@QI@4vq|izB?%hz@h#(|CG4Z+R^`qiR9m2rK?|)XK`+Y63 zlI`j2j3goguc*6+UB+19d1eD<*Kj6G1&tm2^g2i=KcuTMZT zmo=rdyz`&^m4y)AME^Sb$#k6G4CDVtI0U<>89Sp$YhEhYCF`pxZPzPDdo+QQ5&;eP zawq?LoI92f=P=2tx=y6kPpJYEcefFPqENz)Ig>bVKT99GvXD_|s(HFyScVRR4kmy{ zTs2Kf%mO^*{o&KwFPYjO1MW8AhDd+$ku0g;awBN4Vb~G-ux79!r*W0E9WmIiVA|e& zF8Ni-Uo<1-BAM>Y60-wBW4(35uGWSzavbErhT6e;v)z)iSY{EuRM*7uK0eumy^`xo z_KifV&BIiuea92u^I_1ZCm7JnS!u{HC2~!p;43KPydQVYF;E~7K1@yg8ww~uec1l_ zcxWrZt{7tL@HF)|m@aL<`T<5L?~ro+^Vj6i-!e91o=8%Gb zg~>y2p;ruR^QIxe(Ch@XVm3%V1fsTtsW=ve*2fzvQ;mfy$k+mT1eB|W>ig^r$!sMU#knfau$mHpU5y#Jg3x}#fks^lzVwF|9 zU!w*e%iV`CT=5Xe;iOF}Z7Lej@kcJ_O&?O}2`O|k{~|Kempf1ljgM@ z;q4RkczdnTf+DK+wLUatLXthJ3IkE*;fO;hr2MmaR9c?UtK9A|MVIrQ>z*lx1~wQJ zz?qJ0w4!cUtDvIpaq-lUYkw!~^6#XzW>jVu8Zt`}(^0hf2NB8LzRu@N0GTjJVg+6L*K$dWfF_i{j{t?^6)Nu=Ub4TdAh45_ zXZVnJ!c>61L!J!b%W|R^#Swkh8D)4)fPXQSMJdyQR)ww?N#3iz0H=+j#itbv`p&QG zx%-JHpyM-AWBYcJbi>o%E$!%soV0KGmAzY#51M`SzOHr%QU`@|N7IU0>tv8&((CWeW*<;S9# zm3(XQTf^OMIwSviDqG%*As{^NkMvIVK@PVSLRuP=j%!eYL_il3`>!%KdVX^pT zG&}%(D6v%>FA25jH@2qXO3H;XZtGI`_&eS$M2Ct4-;PovAe+R^w?>J}*{4D|tp~Hz z@Cnn1tYIB)5oKgqg1{R=w%5spPl{5!D14^h*!M(^Owi+U6CJM2Us%Lq?@;+;Xy;7J zZi{&U`P62)qYhFO3mvYLHQEr#$50bJ!cKsOo$HFr@Mk+(B3g^&)a4)($s!__x_HKb z1K((`+40O&8nWa!=@dtQ{z5{F+INVh)jdsS_y?wCD|yFRISW%|gB@%1@HD8B=cAPg zxV7Wx6Y6h}Wf;v91~BQvxhzu#wwfgC!yg%4D>M+ZKBGzsN~GitStw92he@^4pl$>6 zYMM!1jht`$lH8QGV#a%szW>;h6dSv3ivObFsEHX*J*pr_wF%cnG)mG9{uUW^Ytgb2 z(i|0WjB$k%owfO$FjGJeN4A&|9QP)<$sBoGQcuCrCef^H+B6A*+iv{vLbPj$7N;of z^N`~EJ> zhZslA!1SgG*FZuIZ^Ak7Ubo@k&m=u8eS~?6kPc=z63egNzAyp0l%u9Jb>>1Ai_p!V zU7GKsIqmtKQ{$SM5PRY>6f^YI_4Fc7DJ zg4D~S!~MPd0~wSTCjNVqap0 z$^R_L3W7jr|Enu;R!Es5Imy3&w}YN7_|Jzi7X*_FAM&8c1nnaPVN~KF`FAY`fw2A) z3Q87+=qOW@{JWZfK$!mvU?>JjRu;wycmo2NJD7o;9UNWQ%|5!gI@m!@hE)d zpU*G)|JBe<3bH1|$nxJVdQsZZXTP&N-^lvkX2VKD#+1aNVdWuM%A~k(@Gre#K0kS3 LL7>+PFaP}?vZTi` delta 13647 zcmZ8|1ymf{wk_`NZUF+p-3czCad)=_hsL3TyL*t}?j*Pbhv4q+?hq_|l5_7n|Gn%I2cPZ^M(Ga#{*7an6@Fi9ZAC_zK zNCUa@W8p-V&13NvxnH>FsnLLzFO?3g^-mqkUUAp{P z+1uf56RT-;A$43h>$LYRp{|x!r5(?uN0Hfvf2r`v zD5_eNe_|`g4=T0yu#f12)b$k{R(aZYQ2MGr5t8{OPJJ?KvHPAr562VG`^0kO6*=ZV zmVXRm>?(E+Ta`UzVMP&OvHTwMNO>|aY63=2>kwyYI*OX>Ffjm_O!Q{@Mf;Kq6N^tf zgDh91e+?N=nm099$5M7c399tp0F#~UN5w-|PbxU6*kRcALX!nch9Zh=Zm|=>)yug% zy|7PFK4S3QV(+qtoDMD+vipDa>ay*GMd zix5vyAUJadQTsBcIeM>s9kCA0qK51mMlV zVv-V0&-yB#H6ijd#iYo`j4vXB>rCacK}=#HCrB$+Iz^EP2~Wi!Si>ENWw26KGxuQX zx+C#k92(p$-8HUc=GC?F@x6cF6x0iYgoPjrDJ^WKEyF+8g@>U7;?ku4dg;0>jiWu% z>!@@CJ@Ao`P9*_JRzqpZs)?cQouu{+1MZ|qBtQJIfR#~LA&ZBg1G%fE^W1o>)zclG zPxYxxB~!DD8PeBt@g7Y^fLp3nS&J!5Lp-@mRcD)@wzebk6FG-Ovmgy34`QYmS0vOK zI@QD@-IN=|AMSt|<@z&jXb6Z3cnApeS4VKSVR5r}`eb5n|B2b%)}~xtS8byqxGn1LYs`Q&r_s%ZlWK`imX)#SF#g74kfM3>+VhkGccWwTYS!97;Yv`mF zHVyB-bO8mp{%3oGuu6>^VN2XNP}h)S#CWhFTGvyLI$@3#^9*ec6BBBm(M4TB7e@(v?8`7zI0?p54ll$& zdTwn0tj+o^O1WP~a#tB_ptQB^bwwP9j>Hd;GZ`0p*9R%QpXcwJ{ldH5`ZLF9m|GZ2 zWeG7Vc>XZLAVvVn>O9Hw*2E%&tVT5jlLdhk%e_)O*sIZxsM{Zg{V!7$i$G9lpxU}b+k`RHMR3XB<+xT zqPe|U)Z-35F@Lqxr_P(~^%Pi{n7x7Wh2OUh+NaF7vM;QJc}Hf)J()LWIQBmtKaiAU ztdNy7KKV8^3#!~v>94Grn^HbcF6na*^Uua|?VKMQ{`IVcyANn}(@2a^Xy1<*fnpp8 zh|&ZI2m*+N968(s2RT?EKhw~DNhY~>4S)WOVqd7fSw&!;QDnfJ{TNC1phZC1xb&CFSnrp8O2(J-uB+i%B1;(bRC~ zTfQcb>7Q#zNeQ{x+Vuc8&bQea{FH7#z8xzwy&rp?8|pstt@Gryy?%1xYi$0aCtOv} z;-kB9B3#&aI+Swa>D-_T0IRJewsFt9)?mgxzl5LmHlkX-dt_Z z-pSPMul^FNjys^$x8>=fcBxAEebU(Doy|9$JKwdG7vjVh^4abT7or1?men(~7MA{q z+RK7Wj`z<;Lq|h1%_Ti!?@K}4&CB+_HVmKlR07`f6xb|J6Js+M~;-P(89 zliNMKw5J14tb`T;Jl*$Zzb!a3(btA6g_qk1ikg(TERchN1Hb@xuKD}q8R*L&U8 z9d}hLr}qsvrMY~>0xwUx-y@O>Ka}4djsbYEN)z9%uzGn9ujkGi?*cD#Ff zuQ6I(vr-P@xmf}*`oC@J+X+CG{X47JzLhj5Q;j={Hhcv7px^-QxnP>9so%}RqDZD54Ze?4C&n?fVmQ{kE6Iu2*!0M#Ybq(rGAJ2#Y zo+_uhj-;V2$Clr>j+TUUUaQ5+7jx>p=<0*%zV{!JSH(+yy8}0;m(ookRU5yoNO$CB zdD+(-hob$?8tbAjdp~_d@#)X_6zSdH1~%KFFQ;d}W%`OU)YHI-Gc?`6h&wdgupPd$ z*nksGgUwRmSM=oQYg>0!=A~_7KcCVFggu`>m`on~07!uPcfqbkY=ThB%L&gX*>Iuk zdbP(fkl>KOqtX4^RRYdqzg}AKyy$7tI}`MKGo~HKW5L*YalG#Z{HGd^FDgh)I7sva z3>gXTF34c0}p9uo=A~2<6xm(j25l`-Hez%!GAGF67yN6#XHc(CzT3*jNkRL0T6YF0C zwMEA=iRJiuAqOo*3~Ad5$9ZWX5|g#BSAuYx58MSGJzQ^+GP z&}s&}Cy9#nSwt^Cg^at3T_)+xL==sPsff(8sURm~fY)(bx^ z&1JJ%mBqdt@>A-}=8aF*1{k)a4w&RZr*?hw-+%<(xmTNcX3I+&*fD_Jtp_y#zY0Aq z90JZPjPg^fuIy;2vX73~Dan(Qs;9{_O@3Dr+mwg(Y~Rb7(BOhEFVSh1!3uN0x%+%C z*XCRIA8A|-5W2R(3Xu#M!r8%h>_ZWvw(R0aLwtS& zSXDqM0#rZ~a(;bL!vxCwiD zXj#GKnf$ue+5#l$k!IwT^1%mm_Yue4%5<%+bh6g!z9TR1DG6$4@5jd+ULF>|Ww{U4=4 zy%pjj?8|>u+7HAc+TxA2;#!thn{_y5HRi?4LF{uHP0ZiU|LbQN*W+dc*k67C(~xgT zzGMeK<|>%!zN%LYy8uJK|5Y$Q&a2?el;~@mZ8jww{(~IZd!8Sdzy&V$mu!_I$0+fH zFz+MXbd)LONql}U$z>h?&gJjo4au=Z|CpR5b$4nc3@vaH`g!X$Ug+tblTu=*#nC0? z$RLy1qlVl4#uik_mjr&sC$=g>;Xl1PQH(!>5NC-neD>qm+atjqc?v{LUd~RD)geY* zJ6m>~FIGXJni5w2{HG?lMNW2=)-*GpD z^eeVRV$YECQ&^~=NUqA#3>?`l#7_h5G!*^fPhe^hcmEXssJ*A6kz4JoxLr(eI6{oy zs}+&CMw)b?rFJn?vmM}5yU#<*04bxdhBS-aO3|rh{25H<1V@+DTB7QOq=JG23n+L> zv4s!P86AGc9;H+2_EI({E(Zl~%o}$(l)ptOy3N>-q3QR|5D<`gRRiwQUn)H}({pWIq$DBT;8{>;KkZ&9RI`)X|JKQN=KSpBK*N# zAxxjI4+x5-qqK1q;A|!U3KC>~{5jZD>|F`c?teMV$;kQ?Y2t*M%1;;Kj5>WzH>4+? zj-nbpz@*4 z*=dqDhy^R;%NFt*Nw4wDf%jAD&tb7wzQYC>U)c^}kFY2!yrL@jWAW>1`mT#UxTZ_R zA!lW;3W~0nMhdA5E*WP0!%Ag0!&|DlA6lcvQHdFe{~=I2(v%%Q{=*6f^0Wi`r%O}4 zy+yPA5#s`ksj$WxD6k$sd*8sIYOF~%oy(+ngd@o6H5+9*SiNQ=QbHZ8S3}1vfkg^J zw*l8W3LnYP*dKBlGyVzQ(sE3Fb%u|OD~=#L$b>QJ>%4}jk{u3lKKsd%SNg;0D zCR>U_;f=B@b?YkC#`*UPv9VY44;9~CD9->o8vod7H$C zP4VcvFc&+p`w^}B#|tqC8ViD19SxK&rNUqj120_Qu{~7xy#3=%3Egu)7f7R+(wGeN zgl)e8og#js3zZ~v-UDZd{cn?~3O zhlG5*R3xV!4i~+J={P7*ObQy=W~UrU#pxdxl=ReMRqle4Qr?5ui%9!) zf2T$_9q#Y-^yxvyt@jN}F~9~o{{<7%LU(wbePB0`kf8EM+tiZ@eqr$_tYOUu=y3?} z&;8VQV$I^vVxEq(ML)h%v{IfPX@Jg1xR=6mI_&ojutyj1$6m|jOf8f1r(Q+o#QzpI6^3=a*As>wBryb`4k8@JC2W9_w zH4fH+&nPbQPgFE#$lWKT~tOLs^b@7OlxtqLFy8NGr6(kFqS~^w@tK=pw zq(F3E9L08@r(r7uSZFpiGGwg4+iSvITjhu<$^XreVb{!FL{sM7IJC-cn@nqHy=N6M zJLZhRh*>qb=+9BCg3O4X(piH4#7;4)w!y4E&IQ&W+36^EWJJ5{ItD^_qYPH03XBS* z1vM6>MLyxU_5!V_m52Ht;8pMUH z5zVCbd{T~Onfen4{_?|O3=)jxgXWY;G+EON|1mPgNv{)Y091vVFhtc7-vkf3r3!EF zBaHDp67#j)(&HHH6T8AdTF_ysPVx$k&&v3las8><7G588i4~mf&|)jqDepwvf#($M zC}6gO=<#kWS<4{7{5h6$pY$lPy^`vSXM*fqs_ zDji8}R`nlOmudfog~o8VxBHB3N5V<5z{s1kfJsnVYehBN_v-OQFaMmh{l^+y?9O5# zO9B;bZfv_#2I|*P(io2ZrtKsPptrsIY-H8O*I6vj#QKe>c5ccd0TZPF>%aJbOk){E zQL?Rf!jaeQUWL~yDB_<+5v6QD`sJWfi(}Ywr`fP^zDk!C=#KqaTjCr{DFo{gS@w%{ zlK3ob(wzgPLf|dI_Y&A(pT-Bg&E3q)NJXMW83}O)NnRr&ZU6|a{^88jfqmz_N})Mg z=})67S9Ao4ymNWpxIl8I(LeL(R#jG&-cfmL*uWC9I<+fzA6dox^VX^3`9bT&ceyQV z+6n$ws{onX*i8o+Pg%%F`-7&3*>mj@=@F1vS9$omp3fIJIk{aL8FB?)f=Yt zz^AMGJ2MjW?mbg10WVryeCxngS9m_g0+YchaG>w+)CSK1Af)Brp z-7%cXxFfCM5lX_xrH*XYo5St2#ME@n0LCBz21@MQ4V6m$Bw49s4<)P?-=Zlnc9*Ie z2HYiPuvP`HIftklq8u19j**t=sSI^&IxTrz+5s_cNq;t%Y7nAkoo$YV4~Gwt)LXkq zEM5}jO4u`1X^(DWEJV?PjP~WXMSh?veWKO@ckD{n)yegv-5Sj|>Xp$K%E%CXVDNTX z@CWiw;42LaqxNrDyjJX4CSzKCr|PXCglAO$gVs4xuZq(r>)Ec~Hj{@T#vMCj{RzHq zi&vgsp8zXPJty}r3yo;AGK8qM&grW-0is>l>xjC5W_~x25Od)C7h*%B3^WRy2tux; z4GiAng~VRRz}?S|(_b?_jzS(J1H(sG96;9GInM#(Lin-Cvp$J1NBgRk7HcDE*D}Zv zC7FezkWP&TWfe`VyMPJ~;mHllE*W19mv6Tp+VD_5&_8?S;KqyB9SUWIo+*BYiH9>AXIyI6+-KN z+SsgZ!$km-7IT)-$Q@z2CkFL(o=Gc))V>5Go!v&y#r z+T=Hn;V2L>M5=GI>$V}>kR^9bn188lI$bOEdXnvcJ;xFpME%By{_bK+jV&hZ%7NsvCuxE` zvk;s#JzNjDJW?+o_#AGVUOZZV;78OZgR*W{Z%aj@X0s##u78xbCH}GUIwa8idn~js zN^Hj+?7*{j&#R7$Rz@5hrT(eyUf5%Cebv{)iyODHyq*HM<1LvE}y04OL zD?a)G!KaViW@cDq1!Qq>W7!3|G~ z2PzFB1AqjnWS;`ESamKhhYPG*YAvtM7fSELrtnjohJ)}3d4De1aajBo%dY=)o>T7{ zM(AuV;b=+WYGJwP<5-rUZq3{1<2P+~j6tL2N(zB!zyJ+|B$nQLqD|oTZZ6fQum&IaAZj;Oe$z*^8P&wuAf)@B>vjXdcc@aL3T=*f2DI z@c#@m0}gGAh16Vjxt~vn&Db|Ea|u>8v=1@moD-4uHfyI2^zMC^+yvy&eNh|WCBe*8 z+~&$6I$4Bu?5NvE+_5}w8lhlp8)obp1Xc@oP&@D*WXT`0|~kd(Cf}Xx68S7;xlI^rxlkF^~8tHy)II3l(1*s;IKh zZOAjE)-4*&R&Qf`E*Mg0K1A|pvA>f)hBl6ck0yAs!sn_dXm8o=5qgm95_F@^TxCBx zpGnhUlPztO&v+7-j#KJ0pN7AP;G#Pazm5Gdr(>(hzgypjNY^C(R`nV48&9fZBYa9s zHc%h&S|s0LDc&w^+wswCIXRxG;)>dXE*GDH`CO*dWb_TEf{CB(Eyp+AajL;JyGRqm z)(*vAuQl1K$s_-q_>NrJGLO((c?3hkRKO62^nG>70g9z?)ZCN}DL>tNwB|Z!7maNq z+1?I+619bU|IWwwb1SR{7K(36=ru6)xxk`=H=IgR1fE8hSdxtvo)z?0Z^WwZX1|s9 zZ)WBFJ#|#F6l{!<0o$AtdZdv4j@MR-Fd(BW%Q_tMlcqQe-+>#Uu?89@a?*Z4&eCh zvv8jEPW7a}DlE=0X<(DUgeZVrC1|O0(cksmN;nuRLzSuw&rfJfLd}}`E&oQY4h`{y zjBklr+V)rhIog~bpVW3Q^cS|{PF^0xt$Mu-o%$sK&fy1^lFr8{VXtw^nY^f=cDk+o zH?!{(Kv(XriX1-Zs_fvpxXsNAQQ(%3A37|E%){aK#Se{xk#&{TyXJ%8{9a9oR{N?S z2O+WnxZuQnmIaK7(oP{d18+&}Q4$1a9WOA4PRB_ByC!9&up3^!^J#A=U8lYN{3@mW zPN)6jy$(QpecO`xXIQ#}oDupyf5KqNaAmRG5G_mF7C=oiLW)^oY2yK^GLSw&mcd3& zL)|jY7u_leMm!0KaT-)~)+6GU#l)Je{hAa}C1@?NJ-;506@3J8Ri@EX?7C?g)|3{5pq-XY z7umEx<1W+JVaix6h(G?L<64>z@L1-xWIXGLd!fbPxVC_>bnpD@O3`hWA5Po+Oh9gL za?MMKm|3#RHd{64d? zGjvQa`!>*{*9fFq*QD;F#K6u6ROiH%KueXE-mi(VpeUwf5v~=4yVz;J1m6(YiV|=) z9=w#5W@p?XPT2+g_IiKDwY*%r2e~UYXY_Jns&3QOeK?+{wonG2tAJHenwJw6AQ3F3 z`@HF|^tR1~#*5%Y-wP=aaJ-ZZ=0&+>oFy_uD3rF&G}pK2i2)H|vK1|S>1WUN*bwdW ze0(+_z5jYn8^j#FNwG$iQIMZley#A#6||=V=e4ZDdV!R;J|AhR(9L5$5IGxdi(4%b zC|8*;pW4k+VA?hxyHMj`<>nO29K8qM(w8ZC&%;cKyew+3dzwpvj0E*Vs>v#C~3G z7#}&(*(+6zi+jwO+&NQ+{F1POXRUhD`LaNXQ6dmGJug$CD27#m9uqIbPaY&?ScF2^ zw8H2oa@A+RiPEb>C&5IqV?R=|sH>yAzfcKV$NF)8Z%&OMOpuDP8?xG-3NOsTLX{#| zF!wWgpBt@?SlToQ_>f|Xu9YR9GYb15vfaXUFw2U+>7B`b-~lRpX_IApFb+wN-Kji8`$NO8sY&weH)+OVNB{LuU+cN z%K_v#0B~o+P)d>H-k6oS%w9^%Ijyilne` zmtMm0jGeSHX!u62<*ej`wM-M^#zzk&4lO+PnLc7WdC9Z$`|YU{4Gr88Q!1sBNcJH~ zz_FM$Mn2`6%d;4ML3A7yi#XI3mBmdB=Bt+&6daa$Dy5%TvK}v@Sk0D|-NPC5=dNeCXIPaz&YGya4A381xaBBi+r|pd9J~~(XS>L1_T<;8?-;(a z5oH5{nfES=@-A(0sUE10+K6YHyfPp(G)}0!eUWu}sTtyq-#fd@wO`4z7Th`DDRp9p zam|>gWZj@iiUzqymn!U ze2p5l-1OO*^N<6Y3X)B$AimzU6n5!WXmneAQaI*rI;$##Dt@EuJGcGWRn=KLSXX;_ z@UX3Qu7>jnYFox8nv!6T&2fI5D5v{o>;M;x=$Kg{6^VcP;0Cbiw5FRI@_Mk_W2=V^M(2>2k+~V_l_+ z2`RoHhQ-)%{*?ox-?>ngfG0@>=-cN>;rywwyr(#Qn{^gLH;M#Ts6(%-K3M5FvbaSs z!-^M)Ej{!5jx2*KwGUstDiYrP>s1!ZsW54}{^e#%JK7054G*upcMH-{vyVaHT04LK zRDO(lOQmbh&CvD8-9gc#AOeo}8(xI}Q*5Fy#I_)vIg-?a)fI9Osg7lxlV zco|$jj%ptH9{Jd~B8S)LajLHro*^}i9Cn0qs^85S$7tj%Xx98TI6M61I{6{N0{nR2 zgt~$;!!G1HSYv8=VR|RpTB51H-%Y#vd7jFK`{uQR5O*%QXLv}-_1c8KS)-A%Y(5`*EdAx1I`nQk8rjAPc;(D(X6dZ1 zd(=MJTFQ?68z_Om_4GJ-z(dS*bWm<*MWw4abvJOiPzB4QFktQcnRFo%1whu(dG&lh8W69OL5nvZ}^? zj3&SIw#>omjRY@+!uB1p>gD{{v9)|q&MXzEQ6xh(l3j;2P+fa-nJog$W^p#?#-eoG z^y!l2SD0uBR3>3^yg%L|rOvx*qeL;OFcimJUen+(kOFS4`t?|jSGxE)*T8uGn?U+f zy+WAUc$pr#E~RLIRMMP2lEK;B##;If5Xd|VvHL|>&31Au2`1A&&p(#LQNuqh5+A{m z*BM2;o}K&fwOx<=kej((NO+j{fe3!lYST)dq@Ykl5>92eUB6aIueyTD zFW;G&M}#*i!`X*KI6B_`$(27EhiTp+c7}e+%mc~#Ic-D&gW8?ATW_v;$g^5Lc4Vf= z7z7l{A?&@|N=-pU2Bx=Dnc zd};>zxRY3b;+Ubkk2Ip(hbqm?!JfkCrUR;Qvv?K>`eq4*Nf#r6gB2x*`9 zd_b-@mbO3ym?r3>=5Ffw70@<8I6L?Tmf1aj3wL^-3dWTQ2FmLoSGF^To_8A4*Qh;G zyl)pO%osu|47vP+zGLg1dK3?d{lwEvwU{N@~M6E!G#yL$Cj~ErCNH7ZNK-B zyu z{D$w!!1Dd%u|sz+{u*R7Vwx#zwA?B0>1SgOtO-Q=-cXx%`5EZ^A4+~uCya%dy?_C{ z)Iu4$r}?H@fdIE}k?JzNZn!AP3cPM~U%hP}_kroJCmg^g%kWXXTg9yb>+_`=5-o~@ zX1ZYSR2O;W=B({gR0GXGNZwr4b^iVq8b++25c-ecM#~)`5AS!gbTP6ZF(>kPNzAv5 zl*e|r3sJ4^Yp_H_hn&COQx#BV;=2r5AWJ1BjuG*Ip{j@ zdvZu1VdB&4ZjZh-_-FFSRpO=vx;F#wXtWQ+`@7=5jg@*wOPb5dXeJz2t?|)Dx8cHh z39R^dKe>FRK1GWf(Fq-N*Q`$09%Xk}OzAs8u3r+?1I)F>c0QQ51^AOv)(Cjq$d>1! zW4vx080aeSp9wYY^qA!0d^cisY^8EPPnT~BEIS*jOLhM|x`QLR^vGIs;-zTB`gz1k zP`m0lvH9{P*}%>Fz{3j#hOyTNVb&_hMecrOe?Os$_0e_Q2$mcjcEVPqLpne@4Ov(? zJW2yE*^H6F92>#cI#gO|Wpegs54B`O1Rm!@D$P~IEVt!C*@y8BoO1OEx{$z`!H4b= zpq|n=kwv(@fCwUCoq9jL$f=xkZZ{(1D~uW_C{q+&EP#Gab@ zJcOaR`N^dI@tzZsY<%o!I2q>wz6)`STup8bW+xivy_#ZQTY>)kLy{OTJezH}d<9iv z;tIy}I7UpO=(o(lS`9n&9qp^TY%lIH?B}&uo`$+7X9X6MY3!#<ubM<5h`{ugeX{uM^*YUxx`9AIOOR@1}--e+MPZd=P}JO2Cq1 zBKhBa+5ci7AP!Le)1{3|^1oL#{(n$Ei;6H*%M4bB2cCL326c}2|qy?B!B-LyaJYAKX3m9zK(hX628gv{ge7Hs z1QRGE@e;@t-a#pdBv8l_CxGQJNdAo)5D=LE>wHhqgj>)Xl7F250s`ZI0j|Uoxa0+y sen>$;nAw{uIoUfnvzUUNUF>cD6cd!>VB!A2F<#%?Fc1*mWd9ufKc~2$mjD0& From 4efc7e487dddc7fd10fe13f4f536496a359c0a9a Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 17 Dec 2020 14:55:05 -0800 Subject: [PATCH 38/49] Removed duplicate of DisableCloudOptimizedContent --- .../mdm/policy-csp-experience.md | 70 ------------------- 1 file changed, 70 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 7809027bc7..c7a806320d 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -1227,76 +1227,6 @@ The following list shows the supported values:
- -**Experience/DisableCloudOptimizedContent** - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Windows EditionSupported?
Homecheck mark9
Procheck mark9
Businesscheck mark9
Enterprisecheck mark9
Educationcheck mark9
- - -
- - -[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device - -
- - - -This policy setting lets you turn off cloud optimized content in all Windows experiences. - -If you enable this policy setting, Windows experiences that use the cloud optimized content client component will present the default fallback content. - -If you disable or do not configure this policy setting, Windows experiences will be able to use cloud optimized content. - - - -ADMX Info: -- GP English name: *Turn off cloud optimized content* -- GP name: *DisableCloudOptimizedContent* -- GP path: *Windows Components/Cloud Content* -- GP ADMX file name: *CloudContent.admx* - - - -The following list shows the supported values: - -- 0 (default) – Disabled. -- 1 – Enabled. - - - - -
- **Experience/DoNotShowFeedbackNotifications** From 05d72aaa5c67010dd2356f8234d200c6d4ffbd8f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 15:02:52 -0800 Subject: [PATCH 39/49] Update indicator-certificates.md --- .../microsoft-defender-atp/indicator-certificates.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md index f0439ebf7f..35d49a64b9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md @@ -39,11 +39,11 @@ You can create indicators for certificates. Some common use cases include: It's important to understand the following requirements prior to creating indicators for certificates: -- This feature is available if your organization uses Windows Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md). +- This feature is available if your organization uses Windows Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](../microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.md). - The Antimalware client version must be 4.18.1901.x or later. - Supported on machines on Windows 10, version 1703 or later, Windows server 2016 and 2019. - The virus and threat protection definitions must be up to date. -- This feature currently supports entering .CER or .PEM (Base64 ASCII) encoding based certificates. +- This feature currently supports entering .CER or .PEM file extensions. >[!IMPORTANT] > - A valid leaf certificate is a signing certificate that has a valid certification path and must be chained to the Root Certificate Authority (CA) trusted by Microsoft. Alternatively, a custom (self-signed) certificate can be used as long as it's trusted by the client (Root CA certificate is installed under the Local Machine 'Trusted Root Certification Authorities'). From fdeb189ca96f7ca54de6c0efbb53dd06c5381743 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 15:11:25 -0800 Subject: [PATCH 40/49] udpate keyword --- .../microsoft-defender-atp/indicator-certificates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md index 35d49a64b9..4c34fbe26c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md +++ b/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates.md @@ -2,7 +2,7 @@ title: Create indicators based on certificates ms.reviewer: description: Create indicators based on certificates that define the detection, prevention, and exclusion of entities. -keywords: ioc, certificate, certificates, manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain +keywords: ioc, certificate, certificates, manage, allowed, blocked, block, clean, malicious, file hash, ip address, urls, domain search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 From 1fe446ed76ce210b62a016eba1fe3b157a732641 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 15:21:21 -0800 Subject: [PATCH 41/49] Added lightbox functionality to diagram --- windows/client-management/quick-assist.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/quick-assist.md b/windows/client-management/quick-assist.md index 9fc8de6503..6a50151342 100644 --- a/windows/client-management/quick-assist.md +++ b/windows/client-management/quick-assist.md @@ -57,7 +57,7 @@ Both the helper and sharer must be able to reach these endpoints over port 443: 7. RDP shares the video to the helper over https (port 443) through the RDP relay service to the helper's RDP control. Input is shared from the helper to the sharer through the RDP relay service. -:::image type="content" source="images/quick-assist-flow.png" alt-text="Schematic flow of connections when a Quick Assist session is established"::: +:::image type="content" source="images/quick-assist-flow.png" lightbox="images/quick-assist-flow.png" alt-text="Schematic flow of connections when a Quick Assist session is established"::: ### Data and privacy From 2765cbcb25c78118a1170e2692cd0286d3b8354b Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 15:32:54 -0800 Subject: [PATCH 42/49] Acrolinx grammar --- windows/client-management/mdm/policy-csp-experience.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index c7a806320d..8550d25403 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -1358,7 +1358,7 @@ ADMX Info: Supported values: -- 0 (default) - Allowed/turned on. The "browser" group syncs automatically between user’s devices and lets users to make changes. +- 0 (default) - Allowed/turned on. The "browser" group synchronizes automatically between users' devices and lets users make changes. - 2 - Prevented/turned off. The "browser" group does not use the _Sync your Settings_ option. From 3ecb9770addeb51cca42a467134fe2e6379b5819 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 15:59:18 -0800 Subject: [PATCH 43/49] Fixed broken note In an alert (like Note), blank lines must also start with an angle bracket to connect the content on both sides of the blank line. --- .../bitlocker/bitlocker-overview-and-requirements-faq.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml index de4338a325..63b1488107 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml +++ b/windows/security/information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml @@ -56,7 +56,7 @@ sections: > [!NOTE] > TPM 2.0 is not supported in Legacy and CSM Modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as Native UEFI only. The Legacy and Compatibility Support Module (CSM) options must be disabled. For added security Enable the Secure Boot feature. - + > > Installed Operating System on hardware in legacy mode will stop the OS from booting when the BIOS mode is changed to UEFI. Use the tool [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) before changing the BIOS mode which will prepare the OS and the disk to support UEFI. - question: How can I tell if a TPM is on my computer? From 1ed3377fb1b1e7adfd433197b5fe57c137be6940 Mon Sep 17 00:00:00 2001 From: Samantha Robertson Date: Thu, 17 Dec 2020 16:05:52 -0800 Subject: [PATCH 44/49] Fixing image links --- .../microsoft-defender-atp/deployment-phases.md | 2 +- .../images/phase-diagrams/deployment-phases.png | Bin 0 -> 5744 bytes .../images/phase-diagrams/migration-phases.png | Bin 0 -> 5711 bytes .../images/phase-diagrams/onboard.png | Bin 0 -> 1960 bytes .../images/phase-diagrams/prepare.png | Bin 0 -> 1713 bytes .../images/phase-diagrams/setup.png | Bin 0 -> 1508 bytes .../mcafee-to-microsoft-defender-migration.md | 2 +- .../mcafee-to-microsoft-defender-onboard.md | 2 +- .../mcafee-to-microsoft-defender-prepare.md | 2 +- .../mcafee-to-microsoft-defender-setup.md | 2 +- .../microsoft-defender-atp/onboarding.md | 2 +- .../microsoft-defender-atp/prepare-deployment.md | 2 +- .../production-deployment.md | 2 +- .../switch-to-microsoft-defender-migration.md | 2 +- .../switch-to-microsoft-defender-onboard.md | 2 +- .../switch-to-microsoft-defender-prepare.md | 2 +- .../switch-to-microsoft-defender-setup.md | 2 +- ...mantec-to-microsoft-defender-atp-migration.md | 2 +- ...symantec-to-microsoft-defender-atp-onboard.md | 2 +- ...symantec-to-microsoft-defender-atp-prepare.md | 2 +- .../symantec-to-microsoft-defender-atp-setup.md | 2 +- 21 files changed, 16 insertions(+), 16 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/deployment-phases.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/migration-phases.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/onboard.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/prepare.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/setup.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md index 6155038acf..71da90cdfd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md +++ b/windows/security/threat-protection/microsoft-defender-atp/deployment-phases.md @@ -37,7 +37,7 @@ Each section corresponds to a separate article in this solution. ![Image of deployment phases with details from table](images/deployment-guide-phases.png) -![Summary of deployment phases: prepare, setup, onboard](/windows/media/phase-diagrams/deployment-phases.png) +![Summary of deployment phases: prepare, setup, onboard](images/phase-diagrams/deployment-phases.png) |Phase | Description | |:-------|:-----| diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/deployment-phases.png b/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/deployment-phases.png new file mode 100644 index 0000000000000000000000000000000000000000..4d2a4fa94646c72b26e978c0c02cad12efb50a7f GIT binary patch literal 5744 zcmb_gXEYo@*A`JDSUu5+7DS2OdssCh(R&TDi!7q|MBhcCTU{h<^cFo>y$8##7Q|w; z=-uc2`JMBf@7Mcd?#wy&oS8fK%slr#PwY#5P4Wkf5Ag8t$bnkwuki5h9o?;MNr>(& z&N$5dZX)&6GK1jZkx~C=+?!koxx&Mv=LD*&y!Ol4frq{`M)~)#MI%M;-LkUua(Qj1 zIp#n3@JaXC1UsYF`Td9%I-ZY?MUV%vueqUL2~RW`OV1rR5M7D<+yyEUi810E^ahUR zJb^vBC01m+30X-hZhcWIu4 zmkMK$T!?=7b`Z81u(I5>N*BZ(1)yeyF7^y_Mgdg2C<);JRgzddT5nYn4lewc zNhHcDymwAcy#JQ-id8I`AiS$f^*aLLXziF39v*HM`l+m}?9TFuN=x(6(9qOg#AlRd za)0*MCi`C@jsMjr8Q{adP)dgsq1Le2P~JmqDCcqfx_0oJ<#V%J`$5=R%>Qy1xs=(V$twhOonSTsI>?aI6V@EUapyPG{oX?I z*2(pacgIADf3S>=ZIUuTlzmC7Co4w0rGPxucuz+g4ZEUY$&-ze7X_T0bhIvz-~$sa ziIBg3AHZ*~l+I7v*G@0XmH0o;kdv9|yC@SK9`Rwuf%@S|x5phJTROwPPGRJOS#8(P z<#!DPwZP#Sx93WU7xWNM-?OrT-?`yl>&D6|?G=H+J?R;d*By*$Syp>u1}={u$PPRP z97gU1rycC*QzRHo-6s*0j`_JXm^spaCJ`5)JfUq~c0MQ%59Zt8;_Vz!q!Be?-?E^D zyEqfZtW$Ux3}vDHbHP3&%7=eo!MFLlyI`|MFr1c_Hp2-SN5>Hi`9)a$OzcN7P|$!W z^om1Zsg{5czD7`o^bd!H-a@&Z;W42yK4#4q6(ZgEonwm4ZiTZ8%B&PhkjAdcxkqjha?V%s?2uULDvH-=jz=}u4GekLeG%12}nzo&)PTx;`0WVdv|w| zjY+!RIKYy6{66%9w_g8Xq!CO_XxOzI6Qf{}rEOfUnwp-@4Cbn34ifgl@N?!e*~sx8 z3!h{;)u2>Y;>>Z?YiyyW*x=yc8rR=n&)Tthp^BS6!-2P*vPypZ)ePiqG-$T=h1cWe zGam+1W1y(uW~CC5$w_+CDS3B1q9$T%E9 zxw+UDSjy6;X+?Ms>>uR!Cq+|3S-`(}tYLNsgsA=j4vx`Kd_xjKzo)pRzglDexw3z0 z{S9620%bBbL|z!+v9>8t*=j%N?&0Cl>iV&mf)MV=a%6K{SaL{n_~-P#BJFpAg?E^S z5rmwaT;{~%o}pFy`$NpZX>E$T{YFZl3KkZYR~8oT>dHuSdwSM`)5#K@7qsm2v(eft z{P(_1*@gQ1`%eb4>s^g~(_uSR4LI*?0S551FOx6QlE@C)&ROmWxeXAo>@lX+vdH=N zCT{;|jD)o|A63mz#x-BQOWv=UscNu_auaPXfe~)L zWdzSSy`DqAeEp>Ixb2Bey*!%r5#geg!l(LxRZohFS_P>r zXMU$gea@52B1}>GN3a(`NnKj&+X-3kzaM==;UJ$ z;vCG4cN|t~AG*t)h5mld;^-{6K|T%9TbE6Ter24izBs*qT?7O_eJa?0u2A0#Maw>D zxt@6GWgV;z`{X)5v_}kCL%8@PyvP-?ytkNI z**fd~BC5OJb2AB1xF%RT`@-4*gk^$qYDY+9Hb8u` zVZ3DwmZ>{Kh#6bDC4Rqxsjn+E!lUDA6>Dwz_HP=Q$%35|us5H`mj-FpPvBS3M}X$I z-QAI*K_vTjFUv7I%+*oq3V6-4ixE{Tsigpjsb}JlcEX!z!b|Gv`946^ne8gP97hw8 zsLWqKBXMRZ;GBh>g~4iwkgg%F-r|!!>u}@Fy5||f^TsO%6iJQWzHtjgXME`+ixE5M zdF&Sh+BPWV{7d_m_j{V1+yeV&uk_2&#v7A{4zFJ%QvxR+}Tr(kFx&AJOYwq!4 zQpDrECCJA*WNZ&KFQly77C%kG*Q0k?jLWjqK3Yt+EBQ;rTX;F#xaEHd^V1w3UhV{tdd zChEk0?p3f|p%>lJtCTx_({87OAIt>v6#d*{A1Xi^H&d4--ap}S|0iZhHb^}9 znPut|X#13GkhbFY!8eqBq66aJRLj zz&0J;H|ud!b)eHPL+hxqfdU&Csf7{Z->-Fyvtu zX>!Hc?rp}k7LDsFYg76_|7@E$OEA43#mhOoCWhVbV?~=Q9^2jLO%!j@RfQZq-w+#z z#Rn}%%x#UiPeeHyE3-k*6)@=25K-qe?@l~!>msNV^-fFfz;c=8=bgD3ksM(jG%#8L z$3WyPJ1w&2-{4}QW^?3mRol@-EX;nD^Jl2bGOxpVATSRtkL4+;UMQF(DfrLt?XD83aN4!cATOMqp^!=z)fA26uX?yjk0wRL+yuU{|VZ?k_h^&Ckm@_1em zxnXbUHG}PBM7bh=_3CThvNA&UMw18k-s_;i(0<~Ox^~kWLF9KyZl3k3;qzn?)}`yu z79~e%5ntMbGq9`+Xs!LQd?hLFBKvpDp!gd852FZ? zsCRQ2@5fe7Ry!z&PFqU6^P%e&WOd8jc+Hte@9V(=RyYK5>$cd{ev4shQ zOoKkYG6Uiglk)Ms`d+<3zGr;xJP&&Id#wwHgMixiLi3UA0nvvn)I;-=c9H_nZ5?vjO1!_N{Nm9rSxp0*UI`bUei=Wtn zGRsg8cFwj^dGCl(h#E*eg04wfSy`>0qEILuv&TgNqyt3!>yJX{j3Gi{ym;2(VlJco zo4-r{RqZGR(cDw^e98p zkBrD?!faL~P4?4=X)4S%(26zz1pPPbLnL8Yj*1`pQX-q%+{0u4%S(?fa&Wn6H13l) z&bLDeMB(!v!igvb6{x9mAOJSHQ%9mQ_c{l2)gnSEe6W){WqI)5D2>m8OV)9BN>GEY(AYQt4zWiyv+<|0~=0(|nn_ z{AE68_|dU6RApZ(_~(>-9t3<8l!;6zrbPdm>&pR96HU^4m!_5%Zf<}5ddaCjWDvy!frM6mhdr1bcNy;$?Vu!ku!`n#_m4 z*BNvxQ0Or3tTv5;0F30tkyUE@99vE4=IDSWbzNini`CDy?^<{p4})p$^Z*|J@KQ>$ zQhjnZt6-A^te&faDUiWuvzlc~_#z*;j#fS+my++uOCq!zk%9i4oF=)lg zd)|Qe+ui0*HvTm>V4jHRFC0h{ky+bQ?WNd%j9g&dKG+&<5|RZ^)XX$B#5q z!n+cYzzp~OD0RA)rw{F0orcoRd~e66n=<07hlPO_r~6-|CLnh62+>7#)4m)ni*b%D z-%w9puu=L-&?Tek&?p$(u*{QfPB&)TSSn}sFS7md)$^3Sy1eFh=+U9|MXqP=9kvKx z&y^n1F{#?O6P&dG)%VfQHu%?LKC1lmk%X}eIXecqd7fmUEml#s%?mY!`y)zS$txsY z_arVVJ5K(5xqrumz%wxUgBYwpB%y&oZqj_jQ!pKgEE?HyU|%^0(KI_a-?yvoejh!4 zyTLSFQ_m5kCS^2E>QxZ>)~&JkPxaV&mTH%gfdY5Bu#Nsjm2m5RgxTtqV^p<*#FFQz z$q7ziZJ zRW!0x5`L|hq+6%l0rN#jFEOiM=NA z&N+_ts!l3`=zB!~w$*pmf$Ihg{V5+0)zZuB#z}#A^IrTLcH}7>zg1oqu@Hxgp4kK+ zzcJssS5#mBhT^V(XhNBRo4>}t9Lz(;GQ;zm8>V|O6WlXadiD!bcs-WH39n8NHhd%H z{H46i_;*;>6c&~x5qP;;ANXS=9tJdhM9ZL?m6bIN`B`77MleMPll18T2c}rrf-nnX zukIQ9>0pshO*)Yji+*RmG`x{Lm5|&}vlAK<5HNbGg6uM;S%6%H^h z$fr>y86aDBZoF?<#JM)8_sj3$U4e-zzW;w}n4S63)FeDSJdU=u7a45}fw5g2d~L^@^YkQ!>}k{0QXVTP0* zP>>E^{_DH_F5mTDoLJ{voU_h8>v{J6ebUiVqo#O3K|nx2t)c!*mw(5H^jH6|mj3&lonn)&e_3w@MTiq3WH!DAWrB{^Rd$ z_NL6JjBSRK|G#G7>gpo>uOQxVARXIXOED=($%|^pwLh~J-tU_La5MEXAv zhHeOmc-@}OL#8u!2NWK6PbpOn#G|7{6D&}SKn+xm+?d*o-sm}O4ks=AR4x&12^GtT z6IO=u`&(>9?;g5BxDT~X-<(gUmq|!^m^@PukFB|?e^-;Y!8fm?uSy#U{CBm&e3%?{`CJvH{{ACiY69)wgnqXg&m`2P+->aj-R)5ETsJZq`jVmVW z!ksWT+=Fta#}DR6`x(N{vj6e_!zJFpKAfu+PSga54sMeG9%<85QzO?I0Ow}cyPNGj ztXF4l9p!WLLh$aJp0IVM$n)&$!8liO@?x^e40-$xi;YVJ!}{(|u;>MyXVoPbuG@xh z7@CxS3gwp}wroG`7L#blR<~P31pq=x$;D5NWNMqFgJSa7bM3!b&|$; zey$CQXTja=wL|5=@u_{h{kvC>2PZ4;651{N`*fiAt+w{{Ta>ZDWRd3MK@(pr<2abv z6o`=+f1bf}h+Zk?s69mTKiuNs&k-4+47v&gi%IV4U0t2=Zf`XWQBe|h$a_vdtL7*6 zmpc}c$g%FBpQXx@|4o~}Z8qe>Gf)jjKhTn@@4vEO3&}*LB*=K8XSgbO| zX2=G#wt;g{s1f0_xc$W@&qep3sW-solzs%WsJ|WwI-&T|DH@CGdw|)QK^VL&r05hw z?&lBK8yH(3GM;15<%_kKpu@%3P14mEd2F>6LZA|h#cEAb46stj4#;kG?5G@tY7Zlp zXwG!3>AWWA=Imz3@3NY!l1HZY_mZW^TnGmSFUA+c7K||%Okq(`Ut~yB9gnd5`auLG z^XG?3jny>CvU)^1CEYhQH8to{rHr%eSE&m75r2z_I108)LPEfPuQ|6K!V4d_wR|h2 z_iA<28+qc2+w(Jx>zGr8)ePC({qJ2mI6ibxnWh_jr&c)JndmlDe7Lh;tI{=S*uCIG zTiTl@94xG^HmPo7(w9u_T{v;_WBBkIJX%yy<&At{rUB=CIt7|i5^)bY`;#T5{W~zv zGKY~sLys)J{YJY7c{+M2r2k-V&U-&9w)Sdm-#R1!S>96sV?+<^sZ;O{t zvmiX(kocx?$;SfS(ofF>x&fx$o;$odJOeQV9J- zFC@fkCW{&;ge#1anfbv%ozk6`$3X%UzLb9SH^R4<1;26T!i^(kYR)dA6N_{8Ybe20 znrP`Tz0#`Y9K{y_SuriXl>&*Dq}q9{t7$23F4NA0yEE?IETLZ_((h2p_S{R4Chba# z+V8k7k|FQXDB|lSo%Fczb&O%F^Jeh5%+Fm#S>|l!@qM8QfvLBaOI38{tHxfR^!ICV zoX(z@Q~-NAledzKtA?t-tL%a|K-h2Yeg{79Uo3$XT7jOI+_6Du#WNq=w_nBn+g~ca z*W-VxU0D2!B=237!EuM?+dC~R1#>RJN-&=Ri1-!0r_E6bEkl+p{xNk(SLu&IU9hVe ztFvsSrfIL=m=Uv%_xEO>{^k7y204*f=FYwumW*bJglYPBHeP?l$=cqCpIo2nXql1= z|2~PCUK3>Zy?z~=^l$5fwRxDR@oMbB5RFf!ZDpjr3VapKHmyq8Xb7l(pNgtr?Eek= zj(}F|TW?14^6U_f^`0<2W2}^qNb3%BG%$85mld8%jp9}K7}875a$szd4Rj*WEvZ9w z#u|!G%J;*9lB6DL9lglUk4MQJpoxl-J4?ETdvDeW{G+1`n>`{m{98k$xwRKV5p#Vv z19}CEM0mbQ38!Kf8$OXO2(xNSC68xzWm|1enj~OjkHs18Qk6|cLQw@5j;+gOw`z4{B#Rks0oLJSSOW*#0Pi=YlO+x`? zNwl*F)X&+sg+fYLs3q^Ce1F~C%!!{78h^RmT4ITWUpn-$m{9}>aF((;8f;QWM@{rW z%vYJje!IjY9?~0*RP{YMxx8wx8yH?XSyS0}I=EudT5*ZvQdDGgFm( z;hxhH2xjPH{bVg>>FEBZ;eGhpSX zNt-ICMPYZF$Q@|^@h(o<8HG?+2F8yxgGbUR!m@~`L{NlI)z>*)QIwO5 zTUEF`<50@5gOQHTr0Ic>=MQ@26-l_Zfbs@)4_J#k-2`j4bykkKZw5xX+m>l{^qZnw z`BtMOtCZ5PjCb~)8u~0}U$SD0Fc7KA3c&;wv%%IbD>6R&@(nev@T;vru%T4NfV{YWo^W&$JCnt=cWQDqt!%my* z5fQyv)c2?rWuja&`N-J?2Y!^ozp`1i74Ob4NTO%1hzb3Uw4;Ok%^#U6UWn(%%H9zZ z5wabaIl!*B3o&YbtyamsdQd%2>9d$K2Wqf~^Dk;%s zC%)n|GZMq{R+_1;QUvGFRAz*HdDp;O@ta6ewioqRAA?hMk27gbWhSX$MUyG@o6s^Q z%8dzFv2D-&-L@R_sfjYAz8zP7diFTsdxrRflAk3!f_8uu$L8WLeIV8QZW8TllKgXMM8geBEiy;SmswU%(#=#hxBs|NjA(H$N7}d;|BL4y z@D-&+f7rV$Eh??V)m6(9QK1}1NSAQdD!GfLPA2t7eb#TePkezzlE9X&3ufE z`J&z_)4yrA#wu?^IMZy#c>_>@^Ollr>-;}S+`&^IJ(Sptt``Uq021+x%WY{E*nn1Mn_LYkGw{+ARg;KXq&w3 z4^6hOYP_~}-*v#+7#K;xk;%+ZA0x`CU+g>!q{8WSng9^Y9?u$A@y}i1_i4nkLLZ5B ztZkOR>dC=U_R*y!x*1MRqv|oYqyvy$XdNfJ+aSHT2Rve<`8-2}4Ia5O0A^!j+qmQ4 z=vatO%Fm=tpw=4_zY;9pFecC@XeHv;&Pt-^*ZP5PSYj_}rH;tSH5c6P3@?4{Vyj=ZfGn9_J-K51kHTqdTqm$)6Ct;K%L zHSr`RF`-*!mr@38ZQZq@`So1=p1p&EM-QuUtKT>v$kkO$`RPC~M_lX8@lB?U-kq z>R*dIfAJz3U0*MYImHE5Zh8+74_|d~hFc@cDFbQ*p5InSKssTsCi>M?tnZSy&v)d_ z)NAeZB}{`W808~ui6p1QDxh+Puji_*g4)94GH+Aq9+lD)x5&ESq2R1bY2sf1P*ZrA zR;2b69e;S-BMA#=f9BdfFq>6oey}nBGib*jP1oa?UBxf&=G_s(vkoG3^x0g9+q!@ASz37+& zRiz5ZbNeBnjkF-rSuT-9;!$f3wE%TEd?wE8dyGp%NuWhTHodYsDjl8EoiOA70~80; ziIisw{3uaZ1o{?mSJ>u?y>6$2PT!cEu>Ym4<*@4)$KIOnysvVVREV~B-C5zw|Jk~H zHYB@=oxg|1j@*{RQ(2uM4V}|cVa%xM3zou)&9H7f+0jBM?bbE->6JPZc2D%zM@jUs zE~kz3qNb9TmS1j`PL`Dl;b82_3FCiH_z%~*uXS~$pBm1-)#%O}pHDUQ|HU|Z8et*m zDWk^=3RgD>TSZ^9D7Sdb3UJr&yJJ_rAikBor?F^2L`OKX&%h+y*irCal=Gjt{`5t4 z!ACaW+yBMd&L`5bbtI51;=a)hZTjX3IJapY7J@JS(Uois~9I8#kEZ;0+h!6}U~y`Yh*pvToPsYiFYVs;l%o=%RJtz=`+AJsIDF**IN&JAkjna#i4 zshC=MxNyAP6y)gvQ*W7m-d4k`sezLa#t}Jn{bhS3J)J1$I?D+%`88aB*fW_)EA?Y< z@5qq9L4IpPd4^-rOOr;oTn0u)6;Wn>k*$1XQx_7whG~kE!T+53$JuS3xItmC>cb#M zVm6r?PH76?bE9$zXvBNRhpV7wc~-z>WU28!AC`|}`&sP**O_Wzf5+7zX7`2t4F80$ zGre>#QyLo=y}_q84`&&@m>fmWM6;#Hh2PYXmsvkG`TNnOD2F~F92Z)ReL!9rG%(9R zn+3bDZ@LxK1w`;l1oO~?&0_8-e93F-)1c#Fas_V~X5U8x5aj(Xw7PFvmt!~Kpg4z~ zj(IuHNcY{t{tH#i^j?><5z#hv-0!@uhys%Fd& zM$E-We$>iwEYbsIe%XeL_VD%AD8NmJlR`{do`7Bz?|vfXldbpKpenvLPB0(}k6Z2p z#N3MU#QeNHlj2Yo1Y@u0`p(3j3xluscvkat$Rd;*aF z&!tZwYFyJB%YVT0v=5%6DtDL2>UYP*P8oXYsp_o+?#umqsisLY+N~_e&~`*Z%pDIkt1dwmU5@6>nlwrhbO7=-g1SSi@3YQw{Q92XzCvJ zUv2M?7k|8271#>rAtYV!nchZ(glFG63J;^RSOb0_ksrBKwTzv8x+icrPGq8mHJSAJ zXEWB*Z^t6r>ZW;l*>`OsO*11$ij2FbBUd^08Cc9g;*@Ad;D~Yk>L_6v^rzQ7kQOj7 z_sNbBdUNyDwjc8N1VqHHX}@nS{eC!)%c|{`J<5VKl!jTM?iEPlqGgP;!>wrry$9J0 zXGm$}=S^ys=9inc8J3oo_U&1XMr@5&HL7RevMd&c$5rrSYG%}GUql@SnrljaxPB9g zUSE3opAUF?9;LBuT}>=zog3}oH6a0@0rsu>q|e-HU(T90yJ-|(o(51U6}I{wfz^aI zgS)N5))EN8^5qu~Zz)qx?@Wc!`EyHv$;N9MXJR#1Mi$B9&O(=##TMPhrF@cGZDP2Z z(0$h)ho{0LEJNaNh(Vy z;1frr(}7*)`+zbu8;6IbC0eMoMJzxs_dg(+PWOG-g}kv(#z=!PmR2hJOA2dFS^#=e{JR}V7j)5Lm=^-q^z*c|NL92q zYEO|P6+{>ASB5aJG*|pM(-9V)nRz@R^HmG})EFysds2NPm;LQv(rt)4x>fpQUsYP6 zy$p;HL~!r&h?Yp?b3puW$+=o~xG^+5+|@?t7$27|2Y@W~{u|NNRaMIR`V-4nE@jv# z&h zfsrNb6*c+d_0Q>1R8z@sz@VY;3~HdM^4WOFv(UW*3gRz*Vi9k`hde3gqQHH5quqPr zUW2Bd$L4$}TIL!gsB!i&$$jeWc-7a6eo=GhwcPrjw$fWE{XU(4T$ruPZy}E7TkZHE0bOM13mltP$_NaN%2Ov*a`;S zo0NUHy_@E88W+b9tz|F>Ii4S5a0F_^T_Il4_Ek2+)us^kMi)1{$K_63-V1qdeH2V4hv8S2&w6{LpbYL(0ZjE zgj3^p=vP)_akfZ>288~Juyb(ej@7$+j8Q#2LXKV8L_>C?`K6)8eKOhw%KkwVW))CC zX%am0IbajTLUZyF25|c6#wY5;hU+*J^d9o&pI~K}t&% z^5i5^nXocG@B4~7DI%a((jBpo#gfhk!k~8b4~UTWX%yAEqi1fdnHPO+(1pQm4Qt+h zj4f8)>kkjlhDuGh--uug{$?rI7o(3Gkg%9$_SdfgPR^Fi>>bOiKE+w%`1ssp=kdn9i#5c*XH_7%7b$q&@2t@PB(v^$K z^G}Z(EashMshn7=C6B&rX*tiS2Y`DeB_*h53$nm7&BZ2z+5pG~&)e>kYHDiPhmqwd zZ|BoKcijJUMN(=he-V_GoP&Z!8opP;UY>wt%=p&;V`k6q@_GL0YAvjc!HAno47!CJ zk`D9_XLEmQbAF=&of6d-T{P&Eg5jd@#EgOL;Gkj81M!_N1GnC+fEwv3LrV+?cY+*T zR`$i--c8o7xw$#+xKK2*^W%L8TC=8~Oc&x5;+68ux4ZCI7*z{CgkinX-}L|E7ck58X!e2RyJr@gg3 z=Ihth5#@FxG3L{o>xS;D*7byYJmB#Duk{%}w{1UBb^MpoeRnRi?|y`sg3mm_%D_>Q zbE~3;v}&Fh@~&=UL7PtpX-^4T!%)yOD2iu@5(yOcn@iI%l@~Z9y>V>cmY0VVdU?oq z-A2~)i5z2^fPKmfOhBI3@EIw9l6!Ye-#5$=rt{9$IX;h64}VS0=qU0(j(|7^HJ+*P zLhI=;MCy_jk4L+Ih@^EQ)_=}4w50Nh%z$6JaY^1SvLS6otxFjesD0^PRr+Xb5)IPR z(K?4xyxB@ XSz?>75Vz#;3%y)s#@0B%&^_iqEKr?r literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/prepare.png b/windows/security/threat-protection/microsoft-defender-atp/images/phase-diagrams/prepare.png new file mode 100644 index 0000000000000000000000000000000000000000..1001e41e0dbf403ec43cf619766ba4096db69553 GIT binary patch literal 1713 zcmV;i22S~jP)h2TO9oLUKx;8<`K z!7YUz0-TC_K+sEoQ$bvkD-{w5sZu~u0p-xDR6x{^3rI$4AQzCyhf|dT<|{E!LiL|8 zmYu}*u0Pi6xAT)$-jA8_c>aDfZ}-h?ireizB?Vi~DQS751ZIvBm^n&d<|u)gqXcG- z5|}wkVCE=+nWF?|PFk#gUT$tKrKhJ`ycY3kUXn>I;A?G)&8)fNnEh*Ii@eh9+Knk-;sQsA_{a149mTGXO|xD zz0m!ww|?KG-kE=tUIwCD;IHoP(e6>?vwZq~-JrR(19SX(3!qEj+bf6k=ac_}UbkhW zQg7`gI{mIRWH~JpPpsbVhM`N~@#WxSZrSAwa&=uH$EP`A%fXl&&WbB4Dkvo-#kVyz zH5uJDEYK`4#@+zllC(1tdNK<)}%i%r4#>PfEJw2t>)m2(tT%@+PHZJXM7@7tC zYa_V0z_oo$Ba0r*^>(_wn$s2*7E*0(EzQi#XwIW}Ny46F!Qvw&CnraA*+oS~zOK8w zyW7{D*VWb0_V%{0dK|;@kw;#W3=9nT@}MlF2PhLm1kxg3u=10E#0mUdyTEApiHQkn zZEX!Wx3I84VVw08%;bD!k>&G>T z92P>ApA2ZW;14oWWBPLnvd@Q2Bb_X4{r&v`*QB@r76mb6T5Pb^U?499 z^38+}fzMINyRj45UYZ%RvZMnBiw8qPL%w}F>j~)060yNjVZAah_N7%vQofnd)kRlC5i1BI{oGcg~O}bV04rQjNMEr%#pV(B`&_Hwx zT>4%r-MN|>k;o8tr15=owE%M>4)`M`eB<6h$j6rw%c%6g`><_G(GA>eDS{jw*Wr*;hB08cKIHpgsFh1wz zUNH5V9%wNJ{=9LXjr<1Cyt7&Iv$9FC(D@&X&C@4s1 z-GZT3Ht4`^w+Dy|aO`k6OkVTIv6R5;>+9kZR@>9l<2ye!HI=|x#TOO=&&|yROz#P{ zNno+Py}i`Y(cwF%Cx0?w>7^^2ohwPg;=%Evxw$#OVS;tf&(Di}*)7A-^8bWqJvurn z_Cw`QMp$^!5TT}~M(oed&iaG{=!*OL`ouosxbeszPfT?mY<3{ln}7v##Zm%GOSBSd zeK2#_TQD9)`j4sMC@U*VR8`{wdx7B*oAoiI5wH~)D=q9}4{7PCSA;Dmzswiwr@-{| zG`ZdGkohsy2V1hkR$#0{hPZUL*bT>%*Yd?N9!-XtMG4y5+gS+A*2#he`{Q}8f5AEj z*b40UEH~iTUTV#Wer&sF%-o#4ULfXaR~No5Hp%etaH6Yc7_7Z$OdIn5v?6Q;c0Tn| z^^l8pyeDE-C#LJl`PhSlgY@9RgOK?f8XBm+zTTkP#t+tB^v>BDWPINIZPO<(#0}>~ zS5{UUQqOp!9#t}juLaj$qPewaJ}dV3s*8(@!{*P+%ZqFMjDoGecxvVRx`*1Z4*RIKXs5z|WKOmkZ81AIGS16DOt( z*x;tXhUeO0x~cWOaJfmG8C}*!c`RVRLqo!M(36T^^NBM^$t+voD|qdsj-3r2c(Yr{ zMaLhCaG83=w%Qoj{$sBXGu3g5DZ+_m^GAw{a9$EgGzxw8hg=tII6d_lP zl`k6_e;jD)AQqG+*{3F(ZF$Tn27wc#boR+obN(8jGksyTEEY2?EDXK9*_aw&;>2dN zkrohzZwpBFoW=^QXbhf9VIb$*D-FKfC!Jf%To|TY)T1Q}t|o5kAxX)g++ATOQ8YYq zxovQ|lw)CVm%nj1D+c4fMCZhVcV3dBazQ$c3wCqktFX#$g)hakP71u=glyx8D9%*` z{W7J=#X`UW?^5jUhJX*g+Kt*SO#b>I3+6D-XetlEh&PILH0SiGL{ghSSkZ&}Ol=QI&=2t6wNm6txGnFfx^ey4bI4#uHYT!kRj8 ziHWf4>gqv(K&Ny#R7F*_*!4uln$l8aLkrM3bM@;JXIurI&Cl z34^`37fVs(!Pt{MgNiz!a^3EBkBRsiuXX+Ui&jq=+eUmuSQs6JLdhVh+?0 zS>S+ym6QcO2cOiE(lhw<9C3Slx^@D9wnESX?GS};%BD}H>wC_-Nx5_mbbJPZS@bn@ z$y{BC7RKkep&J1LUmo`HHpVKZNQL)6sub<~m9eBoTplj1wDU~@&uc@O$$;MC98{0m z?Py@e;+kmYoCuY!F6~RoD;XvR+vFv)DrI5at!uA;w@I7Y8WdkRS~o*0Wl(loA6Jcb zE=w!EC1@eoBcJ=G)-Pn)@Adj;HM>D#z#EG+_V-LpBLv*GI~))-u+Pfc8smF7g&rF) zGe+VaD871>Q{>ER?tNR3^3l_bcA^%Y!-Z;Lf@b;%BSBB%N^_Gn4mfXQ$`NIV>Fw?9 z^w`z7RHTphub=W6SAMb#4(m~(^aV@GHJq^v9XwtCL&733zQ2vW=u;So3u{U zL^T@a9X=xvL5-))Od_-blaFW@8sOWO9v%WO7d28quCR)wu!Ww_JxPxE=~STNLQ9mT)pN7a-6|a z)DQ6+zbBoU+>gg};7a-{;>E0~{MJi9(6I*{6>iJ)Sb?Gj`}~4Ae9ByNbv0y4`n0q) zH8!XcEuW@9_Vc3(K7ERaB$3J4drun?*{lZjo+Lnb5Gy4-KEJvBb+o3F!oRux8~CwQ zaq;sN#MA457Wtg)><2<&>~LgSLJJm)eH%?8HPdJEqjqe)PH?G7 zs;a7wxJye*<#v|-P=9k9ISIApA_xS6smsgB$*G52nl3V})i-055uVX91;EIW(C~0; zH+zUFNh(cotZ!(tC{~Qtf_7}7!|xxeah=`7!NLDcFfNOlMz%pqNW2#{r{B>a-)mPN p(;?_)x+BX^btC^j`7G@bA|PrE{aouA4YU{A04F3GQDcWo{sV3X&OiVF literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md index dbb50ab562..6977f6f2c9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from McAfee Endpoint Security (McAfee) to [Microso When you switch from McAfee to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare setup onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare setup onboard](images/phase-diagrams/migration-phases.png) |Phase |Description | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md index 703d353b4c..dd52552ec9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md @@ -28,7 +28,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md index 4fa7e47e70..886846f36f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md @@ -29,7 +29,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](mcafee-to-microsoft-defender-setup.md)
[Phase 2: Set up](mcafee-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md index b9f5ed18c6..432aed7160 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md @@ -29,7 +29,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](mcafee-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](mcafee-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md index 7c9ce553cb..5cbe6e5c30 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md @@ -29,7 +29,7 @@ ms.topic: article Deploying Defender for Endpoint is a three-phase process: -| [![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | [![deployment phase - setup](/windows/media/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | ![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +| [![deployment phase - prepare](images/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | [![deployment phase - setup](images/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | ![deployment phase - onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | | ----- | ----- | ----- | | | |*You are here!*| diff --git a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md index 2db4bdf69c..f93867d6d6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/prepare-deployment.md @@ -33,7 +33,7 @@ ms.topic: article Deploying Defender for Endpoint is a three-phase process: -| ![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare | [![deployment phase - setup](/windows/media/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | [![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | +| ![deployment phase - prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare | [![deployment phase - setup](images/phase-diagrams/setup.png)](production-deployment.md)
[Phase 2: Setup](production-deployment.md) | [![deployment phase - onboard](images/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | | ----- | ----- | ----- | |*You are here!* | || diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index 801cfd63d9..3f5f8aabcc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -31,7 +31,7 @@ ms.topic: article Deploying Defender for Endpoint is a three-phase process: -| [![deployment phase - prepare](/windows/media/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | ![deployment phase - setup](/windows/media/phase-diagrams/setup.png)
Phase 2: Setup | [![deployment phase - onboard](/windows/media/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | +| [![deployment phase - prepare](images/phase-diagrams/prepare.png)](prepare-deployment.md)
[Phase 1: Prepare](prepare-deployment.md) | ![deployment phase - setup](images/phase-diagrams/setup.png)
Phase 2: Setup | [![deployment phase - onboard](images/phase-diagrams/onboard.png)](onboarding.md)
[Phase 3: Onboard](onboarding.md) | | ----- | ----- | ----- | | | *You are here!*|| diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md index 1a9ceac19e..0a7421bb95 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from a non-Microsoft endpoint protection solution When you switch to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare, setup, onboard](images/phase-diagrams/migration-phases.png) |Phase |Description | |--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md index 40074d3a9c..18422aba57 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-onboard.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 3: Onboard -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md index 334eb1708e..c55bd95f20 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-prepare.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 1: Prepare -|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](switch-to-microsoft-defender-setup.md)
[Phase 2: Set up](switch-to-microsoft-defender-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index 5fef44d9d6..2d0c515fe8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -25,7 +25,7 @@ ms.reviewer: jesquive, chventou, jonix, chriggs, owtho # Switch to Microsoft Defender for Endpoint - Phase 2: Setup -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](switch-to-microsoft-defender-prepare.md)
[Phase 1: Prepare](switch-to-microsoft-defender-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](switch-to-microsoft-defender-onboard.md)
[Phase 3: Onboard](switch-to-microsoft-defender-onboard.md) | |--|--|--| ||*You are here!* | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md index cd4d8387d3..0fe3fbf828 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md @@ -35,7 +35,7 @@ If you are planning to switch from Symantec Endpoint Protection (Symantec) to [M When you switch from Symantec to Microsoft Defender for Endpoint, you follow a process that can be divided into three phases, as described in the following table: -![Migration phases - prepare, setup, onboard](/windows/media/phase-diagrams/migration-phases.png) +![Migration phases - prepare, setup, onboard](images/phase-diagrams/migration-phases.png) |Phase |Description | |--|--| diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md index b78be37a84..a80c0ae736 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)
Phase 3: Onboard | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |[![Phase 2: Set up](images/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |![Phase 3: Onboard](images/phase-diagrams/onboard.png)
Phase 3: Onboard | |--|--|--| || |*You are here!* | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md index 86b5570c34..10e8d99bb4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | +|![Phase 1: Prepare](images/phase-diagrams/prepare.png)
Phase 1: Prepare |[![Phase 2: Set up](images/phase-diagrams/setup.png)](symantec-to-microsoft-defender-atp-setup.md)
[Phase 2: Set up](symantec-to-microsoft-defender-atp-setup.md) |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| |*You are here!*| | | diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 68a0f10921..401eaec958 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -28,7 +28,7 @@ ms.reviewer: depicker, yongrhee, chriggs [!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)] -|[![Phase 1: Prepare](/windows/media/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](/windows/media/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](/windows/media/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | +|[![Phase 1: Prepare](images/phase-diagrams/prepare.png)](symantec-to-microsoft-defender-atp-prepare.md)
[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |![Phase 2: Set up](images/phase-diagrams/setup.png)
Phase 2: Set up |[![Phase 3: Onboard](images/phase-diagrams/onboard.png)](symantec-to-microsoft-defender-atp-onboard.md)
[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) | |--|--|--| ||*You are here!* | | From b51c5a542168bb6cc519325e9db7dd46f15745e1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 16:07:21 -0800 Subject: [PATCH 45/49] edits --- .../microsoft-defender-atp/android-intune.md | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md index d899f7568a..52450260ef 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md @@ -29,7 +29,7 @@ ms.topic: conceptual - [Defender for Endpoint](microsoft-defender-atp-android.md) -This topic describes deploying Defender for Endpoint for Android on Intune +Learn how to deploy Defender for Endpoint for Android on Intune Company Portal enrolled devices. For more information about Intune device enrollment, see [Enroll your device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-company-portal). @@ -44,13 +44,13 @@ device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-co **Deploy Defender for Endpoint for Android on Intune Company Portal - Device Administrator enrolled devices** -This topic describes how to deploy Defender for Endpoint for Android on Intune Company Portal - Device Administrator enrolled devices. +Learn how to deploy Defender for Endpoint for Android on Intune Company Portal - Device Administrator enrolled devices. ### Add as Android store app 1. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> -**Android Apps** \> **Add \> Android store app** and click **Select**. +**Android Apps** \> **Add \> Android store app** and choose **Select**. ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addandroidstoreapp.png) @@ -60,13 +60,13 @@ center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> - **Name** - **Description** - **Publisher** as Microsoft. - - **Appstore URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Defender for Endpoint app Google Play Store URL) + - **App store URL** as https://play.google.com/store/apps/details?id=com.microsoft.scmx (Defender for Endpoint app Google Play Store URL) Other fields are optional. Select **Next**. ![Image of Microsoft Endpoint Manager Admin Center](images/mda-addappinfo.png) -3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Click **Select** and then **Next**. +3. In the *Assignments* section, go to the **Required** section and select **Add group.** You can then choose the user group(s) that you would like to target Defender for Endpoint for Android app. Choose **Select** and then **Next**. >[!NOTE] >The selected user group should consist of Intune enrolled users. @@ -111,7 +111,7 @@ Defender for Endpoint for Android supports Android Enterprise enrolled devices. For more information on the enrollment options supported by Intune, see [Enrollment Options](https://docs.microsoft.com/mem/intune/enrollment/android-enroll). -**Currently, Personally-owned devices with work profile and Corporate-owned fully managed user device enrollments are supported for deployment.** +**Currently, Personally owned devices with work profile and Corporate-owned fully managed user device enrollments are supported for deployment.** @@ -141,7 +141,7 @@ select **Approve**. > ![A screenshot of a Managed Google Play](images/07e6d4119f265037e3b80a20a73b856f.png) -4. You should now be presented with the permissions that Defender for Endpoint +4. You'll be presented with the permissions that Defender for Endpoint obtains for it to work. Review them and then select **Approve**. ![A screenshot of Defender for Endpoint preview app approval](images/206b3d954f06cc58b3466fb7a0bd9f74.png) @@ -218,7 +218,7 @@ Defender ATP should be visible in the apps list. 1. In the **Review + Create** page that comes up next, review all the information and then select **Create**.
- The app configuration policy for Defender for Endpoint auto-granting the storage permission is now assigned to the selected user group. + The app configuration policy for Defender for Endpoint autogranting the storage permission is now assigned to the selected user group. > [!div class="mx-imgBorder"] > ![Image of create app configuration policy](images/android-review-create.png) @@ -244,11 +244,11 @@ above. Then select **Review + Save** and then **Save** again to commence assignment. ### Auto Setup of Always-on VPN -Defender for Endpoint supports Device configuration policies for managed devices via Intune. This capability can be leveraged to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user does not need to setup VPN service while onboarding. -1. On **Devices** Page go to **Configuration Profiles** > **Create Profile** > **Platform** > **Android Enterprise** +Defender for Endpoint supports Device configuration policies for managed devices via Intune. This capability can be leveraged to **Auto setup of Always-on VPN** on Android Enterprise enrolled devices, so the end user does not need to set up VPN service while onboarding. +1. On **Devices**, select **Configuration Profiles** > **Create Profile** > **Platform** > **Android Enterprise** Select **Device restrictions** under one of the following, based on your device enrollment type - **Fully Managed, Dedicated, and Corporate-Owned Work Profile** -- **Personally-Owned Work Profile** +- **Personally owned Work Profile** Select **Create**. @@ -292,7 +292,7 @@ displayed here. > ![Image of device installation status](images/900c0197aa59f9b7abd762ab2b32e80c.png) -2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you are enrolled to the **Personally-owned devices with work profile**. If you are enrolled to a **Corporate-owned, fully managed user device**, you will have a single profile on the device where you can confirm that Defender for Endpoint is available. +2. On the device, you can validate the onboarding status by going to the **work profile**. Confirm that Defender for Endpoint is available and that you are enrolled to the **Personally owned devices with work profile**. If you are enrolled to a **Corporate-owned, fully managed user device**, you will have a single profile on the device where you can confirm that Defender for Endpoint is available. ![Image of app in mobile device](images/c2e647fc8fa31c4f2349c76f2497bc0e.png) From 258b1b91dc8dedcb54c7aaf414220be440c789c3 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 16:54:27 -0800 Subject: [PATCH 46/49] Indented content in list items --- .../switch-to-microsoft-defender-setup.md | 23 ++++++++++--------- 1 file changed, 12 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md index 2d0c515fe8..c1ad46027c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/switch-to-microsoft-defender-setup.md @@ -87,11 +87,11 @@ The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/d `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
-> [!NOTE] -> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. -> Example:
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
+ > [!NOTE] + > When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. + > Example:
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet:
@@ -227,12 +227,13 @@ To use CMPivot to get your file hash, follow these steps: 6. In the query box, type the following query:
-```kusto -File(c:\\windows\\notepad.exe) -| project Hash -``` -> [!NOTE] -> In the query above, replace *notepad.exe* with the your third-party security product process name. + ```kusto + File(c:\\windows\\notepad.exe) + | project Hash + ``` + + > [!NOTE] + > In the query above, replace *notepad.exe* with the your third-party security product process name. ## Set up your device groups, device collections, and organizational units From b9b89c535deff5eb59b741a509e2b794b29cf7e9 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 16:59:08 -0800 Subject: [PATCH 47/49] Indented content in list items --- ...ymantec-to-microsoft-defender-atp-setup.md | 33 +++++++++++-------- 1 file changed, 19 insertions(+), 14 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 401eaec958..04b7812825 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -64,15 +64,16 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll 1. As a local administrator on the endpoint or device, open Windows PowerShell. -2. Run the following PowerShell cmdlets:
- `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
- `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
+2. Run the following PowerShell cmdlets: -> [!NOTE] -> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. -> Example:
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
-> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
+ `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` + `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` + + > [!NOTE] + > When using the DISM command within a task sequence running PS, the following path to cmd.exe is required. + > Example:
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
+ > `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet:
`Get-Service -Name windefend` @@ -174,10 +175,12 @@ To add exclusions to Microsoft Defender for Endpoint, you create [indicators](ht 3. On the **File hashes** tab, choose **Add indicator**. 3. On the **Indicator** tab, specify the following settings: + - File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.) - Under **Expires on (UTC)**, choose **Never**. 4. On the **Action** tab, specify the following settings: + - **Response Action**: **Allow** - Title and description @@ -203,12 +206,14 @@ To use CMPivot to get your file hash, follow these steps: 6. In the query box, type the following query:
-```kusto -File(c:\\windows\\notepad.exe) -| project Hash -``` -> [!NOTE] -> In the query above, replace *notepad.exe* with the your third-party security product process name. + ```kusto + File(c:\\windows\\notepad.exe) + | project Hash + ``` + + > [!NOTE] + > In the query above, replace *notepad.exe* with the your third-party security product process name. + ## Set up your device groups, device collections, and organizational units From 58c113b28788b0b339dab0c1a9d3b451d10ddb11 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Thu, 17 Dec 2020 17:05:27 -0800 Subject: [PATCH 48/49] Restored
--- .../symantec-to-microsoft-defender-atp-setup.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md index 04b7812825..72385ecf92 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md +++ b/windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md @@ -66,7 +66,7 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll 2. Run the following PowerShell cmdlets: - `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` + `Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` > [!NOTE] From e25ad2d1521b8980512ad262a3cbbbe6c7491954 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 17 Dec 2020 17:26:27 -0800 Subject: [PATCH 49/49] add to timeout value in limitiations --- .../threat-protection/microsoft-defender-atp/live-response.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/live-response.md b/windows/security/threat-protection/microsoft-defender-atp/live-response.md index 312550fb3f..193c067a32 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/live-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/live-response.md @@ -293,6 +293,7 @@ Each command is tracked with full details such as: - Live response sessions are limited to 10 live response sessions at a time. - Large-scale command execution is not supported. +- Live response session inactive timeout value is 5 minutes. - A user can only initiate one session at a time. - A device can only be in one session at a time. - The following file size limits apply: